SlideShare a Scribd company logo
0 © 2017 FUJITSU
Passwörter in den Griff bekommen
FUJITSU PalmSecure™ ID Login
Last update: October 06th, 2017
1 © 2017 FUJITSU
Introduction PalmSecure™
 Advantages
 How it works
2 © 2017 FUJITSU
Advantages of palm vein authentication
 Hidden under the skin
 Unique (even in the case of twins)
 Traits do not change for entire lifetime
 Live hand detection: only used
if blood circulation detected
 Very hygienic because contact-free
 Easy and intuitive operation
 High level of privacy because
hidden under the skin
 Palm veins are complex
>5 million reference points
 Palm has thicker veins than
fingers – easier to identify
 Palm veins are not sensitive
to external factors, e.g. cold temperature, skin
scratches
1 Highest level of
security & performance
Extremely
precise
Accepted
everywhere2 3
3 © 2017 FUJITSU
How PalmSecure Works
Hand positioned
over sensor
Sensor focuses &
detects live hand
Hand scanned
with infrared light
Hand Veins reference points
scanned
Secure storage of cryptographic
hash
2nd AES encryption with unique private
key
Binary file
transmitted to PC
1st AES encryption
binary file created
4 © 2017 FUJITSU
False acceptance rate (FAR) &
false rejection rate (FRR) compared
Fujitsu's palm vein scanner is the most precise and practical technology.
Precision
Practicality
Face recognition
Fingerprint
Palm veins
High
HighLow
Voice
recognition
Signature
Iris/retina
Finger vein
Low
Precision of authentication compared
Authentication method FAR (%) = If FRR (%) =
Face recognition ~ 1.3 ~ 2.6
Voice recognition ~ 0.01 ~ 0.3
Fingerprint ~ 0.001 ~ 0.1
Finger vein ~ 0.0001 ~ 0.01
Iris/retina ~ 0.0001 ~ 0.01
Palm vein < 0.00001* ~ 0.01
* I format
5 © 2017 FUJITSU
Fujitsu PalmSecure™ ID Login
 Overview
 Workplace Protect AD
6 © 2017 FUJITSU
PalmSecure ID Login (WPP AD) – Big picture
Thin Client (FUTRO)
Software: eLux,
(midterm planing)
CitrixServe /
MS Server /
Xen Server
AD Controller
Matching Server
(shortterm planing)
Pass through authentication
AD Controller
Replication
Login
Login
Login
ADFS based SSO
Citrix Server
Windows Server
VMware Server
Matching Server
(short term planning)
AD Server
Thin client (eLux)
(mid term planning)
Thin client (Windows
7 Embedded, 10 IoT)
Thin Client (FUTRO)
Software: eLux,
(midterm planing)
Mobile/Fat client
(Windows 7, 10)
7 © 2017 FUJITSU
Fujitsu PalmSecure™ ID Login
 Designed to be used as logical access control for Active
Directory login
 Used to manage a centralized palm vein template
handling for Windows login at users client
 Workplace Protect AD software can be used
 With different types of PalmSecure sensors
 At Fujitsu hardware
 To run Fujitsu PalmSecure ID Login WPP AD software
and a PalmSecure sensor is required.
Username
Fujitsu PalmSecure ID Login prevents misuse caused by stolen or misused
passwords. Unauthorized access to clients can be prevented.
8 © 2017 FUJITSU
Fujitsu PalmSecure ID Login
Workplace Protect AD
 Centralized user enrollment
 Administrating palm vein templates at Active directory
 Modifying user data at Active directory
 Handling client Windows login via Active Directory
 Optional: Unique application key for maximum
security
 Structure change of AD not necessary, used AD field
can be changed optionally
PalmSecure sensor
 USB sensor Guide Kit
 USB PalmSecure mouse
 OEM sensor
 PalmSecure U-Guide with OEM sensor
 Built-in sensor at Fujitsu Notebook LIFEBOOK, Fujitsu
Tablet STYLISTIC, Fujitsu Desktop ESPRIMO and
Fujitsu Workstation CELSIUS
10 © 2017 FUJITSU
Domain and
Active Directory
Location BLocation A
Licensing
Configuration
Local caching y/n
Encryption Key
Application Key for PalmSecure
Register new biometric data
Modify biometric data record
Delete biometric record
Send license informationEnrollment stationEnrollment station
Register new biometric data
Modify biometric data record
Delete biometric record
Send license information
Credential Provider with AD support,
installed on the client system
Credential Provider with AD support,
installed on the client system
Login with biometric
data stored in AD
Architecture of Workplace Protect AD
Workplace
Manager
11 © 2017 FUJITSU

More Related Content

Similar to FUJITSU PalmSecure™ ID Login - Passwörter in den Griff bekommen

A Shelter to Protect your Documents
A Shelter to Protect your DocumentsA Shelter to Protect your Documents
A Shelter to Protect your Documents
team-WIBU
 
T13.Fujitsu World Tour India 2016-World is your Workplace
T13.Fujitsu World Tour India 2016-World is your WorkplaceT13.Fujitsu World Tour India 2016-World is your Workplace
T13.Fujitsu World Tour India 2016-World is your Workplace
Fujitsu India
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
FIDO Alliance
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
FIDO Alliance
 
Assisting gear
Assisting gearAssisting gear
Assisting gear
Aruna B Veliyath
 
Finger xs fp1000-fp9000
Finger xs fp1000-fp9000Finger xs fp1000-fp9000
Finger xs fp1000-fp9000
Adit Group
 
Finger xs fp1000-fp9000
Finger xs fp1000-fp9000Finger xs fp1000-fp9000
Finger xs fp1000-fp9000
Adit Group
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
Ana González Monzón
 
Why Hexnode UEM
Why Hexnode UEMWhy Hexnode UEM
Why Hexnode UEM
Hexnode
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement
TELKOMNIKA JOURNAL
 
4 so customer presentation
4 so   customer presentation4 so   customer presentation
4 so customer presentation
Dedi Ben-Natan
 
4SO customer presentation
4SO   customer presentation4SO   customer presentation
4SO customer presentation
Dedi Ben-Natan
 
4SO customer presentation
4SO  customer presentation4SO  customer presentation
4SO customer presentation
Dedi Ben-Natan
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Lumension
 
Digital Co-creation with Hybrid IT
Digital Co-creation with Hybrid ITDigital Co-creation with Hybrid IT
Digital Co-creation with Hybrid IT
Fujitsu Middle East
 
VISULOX-Summary-SN
VISULOX-Summary-SNVISULOX-Summary-SN
VISULOX-Summary-SN
Tillmann A. Basien
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
LINE Corporation
 
Gesture Human-Machine Interface (GHMI) in Home Automation
Gesture Human-Machine Interface (GHMI) in Home AutomationGesture Human-Machine Interface (GHMI) in Home Automation
Gesture Human-Machine Interface (GHMI) in Home Automation
IRJET Journal
 
xyzmo Company Overview
xyzmo Company Overviewxyzmo Company Overview
xyzmo Company Overview
Namirial GmbH
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET Journal
 

Similar to FUJITSU PalmSecure™ ID Login - Passwörter in den Griff bekommen (20)

A Shelter to Protect your Documents
A Shelter to Protect your DocumentsA Shelter to Protect your Documents
A Shelter to Protect your Documents
 
T13.Fujitsu World Tour India 2016-World is your Workplace
T13.Fujitsu World Tour India 2016-World is your WorkplaceT13.Fujitsu World Tour India 2016-World is your Workplace
T13.Fujitsu World Tour India 2016-World is your Workplace
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
Assisting gear
Assisting gearAssisting gear
Assisting gear
 
Finger xs fp1000-fp9000
Finger xs fp1000-fp9000Finger xs fp1000-fp9000
Finger xs fp1000-fp9000
 
Finger xs fp1000-fp9000
Finger xs fp1000-fp9000Finger xs fp1000-fp9000
Finger xs fp1000-fp9000
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
 
Why Hexnode UEM
Why Hexnode UEMWhy Hexnode UEM
Why Hexnode UEM
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement
 
4 so customer presentation
4 so   customer presentation4 so   customer presentation
4 so customer presentation
 
4SO customer presentation
4SO   customer presentation4SO   customer presentation
4SO customer presentation
 
4SO customer presentation
4SO  customer presentation4SO  customer presentation
4SO customer presentation
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
Digital Co-creation with Hybrid IT
Digital Co-creation with Hybrid ITDigital Co-creation with Hybrid IT
Digital Co-creation with Hybrid IT
 
VISULOX-Summary-SN
VISULOX-Summary-SNVISULOX-Summary-SN
VISULOX-Summary-SN
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
 
Gesture Human-Machine Interface (GHMI) in Home Automation
Gesture Human-Machine Interface (GHMI) in Home AutomationGesture Human-Machine Interface (GHMI) in Home Automation
Gesture Human-Machine Interface (GHMI) in Home Automation
 
xyzmo Company Overview
xyzmo Company Overviewxyzmo Company Overview
xyzmo Company Overview
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
 

More from Fujitsu Central Europe

Quantum Algorithms @ work - Short introduction to Quantum Annealing and opera...
Quantum Algorithms @ work - Short introduction to Quantum Annealing and opera...Quantum Algorithms @ work - Short introduction to Quantum Annealing and opera...
Quantum Algorithms @ work - Short introduction to Quantum Annealing and opera...
Fujitsu Central Europe
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Workshop:  Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...Workshop:  Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Fujitsu Central Europe
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...
Fujitsu Central Europe
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...
Fujitsu Central Europe
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Fujitsu Central Europe
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Fujitsu Central Europe
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Fujitsu Central Europe
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Fujitsu Central Europe
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Fujitsu Central Europe
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Workshop:  Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...Workshop:  Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Fujitsu Central Europe
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Workshop:  Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...Workshop:  Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Fujitsu Central Europe
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Fujitsu Central Europe
 
Fujitsu Storage Days 2018 - Kontrollverlust vermeiden
Fujitsu Storage Days 2018 - Kontrollverlust vermeidenFujitsu Storage Days 2018 - Kontrollverlust vermeiden
Fujitsu Storage Days 2018 - Kontrollverlust vermeiden
Fujitsu Central Europe
 
Fujitsu Storage Days 2018 - Eternus Survivalpack
Fujitsu Storage Days 2018 - Eternus SurvivalpackFujitsu Storage Days 2018 - Eternus Survivalpack
Fujitsu Storage Days 2018 - Eternus Survivalpack
Fujitsu Central Europe
 
Fujitsu Storage Days 2018 - Erfahrungsbericht crisp research
Fujitsu Storage Days 2018 - Erfahrungsbericht crisp researchFujitsu Storage Days 2018 - Erfahrungsbericht crisp research
Fujitsu Storage Days 2018 - Erfahrungsbericht crisp research
Fujitsu Central Europe
 
Fujitsu Storage Days 2018 - Der Bergdoktor in Aktion
Fujitsu Storage Days 2018 - Der Bergdoktor in AktionFujitsu Storage Days 2018 - Der Bergdoktor in Aktion
Fujitsu Storage Days 2018 - Der Bergdoktor in Aktion
Fujitsu Central Europe
 
Fujitsu Storage Days 2018 - 3-S-IT Dienstleistungen GmbH
Fujitsu Storage Days 2018 - 3-S-IT Dienstleistungen GmbHFujitsu Storage Days 2018 - 3-S-IT Dienstleistungen GmbH
Fujitsu Storage Days 2018 - 3-S-IT Dienstleistungen GmbH
Fujitsu Central Europe
 
Fujitsu Storage Days 2018 - Siemens Schweiz AG
Fujitsu Storage Days 2018 - Siemens Schweiz AGFujitsu Storage Days 2018 - Siemens Schweiz AG
Fujitsu Storage Days 2018 - Siemens Schweiz AG
Fujitsu Central Europe
 
Fujitsu Storage Days 2018 - „Mit Fujitsu zum Gipfelstürmer werden – Ihr Sherp...
Fujitsu Storage Days 2018 - „Mit Fujitsu zum Gipfelstürmer werden – Ihr Sherp...Fujitsu Storage Days 2018 - „Mit Fujitsu zum Gipfelstürmer werden – Ihr Sherp...
Fujitsu Storage Days 2018 - „Mit Fujitsu zum Gipfelstürmer werden – Ihr Sherp...
Fujitsu Central Europe
 
Fujitsu Storage Days 2018 - Josefs-Gesellschaft Köln (JG-Gruppe)
Fujitsu Storage Days 2018 - Josefs-Gesellschaft Köln (JG-Gruppe)Fujitsu Storage Days 2018 - Josefs-Gesellschaft Köln (JG-Gruppe)
Fujitsu Storage Days 2018 - Josefs-Gesellschaft Köln (JG-Gruppe)
Fujitsu Central Europe
 

More from Fujitsu Central Europe (20)

Quantum Algorithms @ work - Short introduction to Quantum Annealing and opera...
Quantum Algorithms @ work - Short introduction to Quantum Annealing and opera...Quantum Algorithms @ work - Short introduction to Quantum Annealing and opera...
Quantum Algorithms @ work - Short introduction to Quantum Annealing and opera...
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Workshop:  Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...Workshop:  Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung -...
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Workshop:  Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...Workshop:  Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Workshop:  Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...Workshop:  Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung ...
 
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...Workshop:   Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
Workshop: Mit Sicherheit Datenschutz in der Gesetzlichen Unfallversicherung...
 
Fujitsu Storage Days 2018 - Kontrollverlust vermeiden
Fujitsu Storage Days 2018 - Kontrollverlust vermeidenFujitsu Storage Days 2018 - Kontrollverlust vermeiden
Fujitsu Storage Days 2018 - Kontrollverlust vermeiden
 
Fujitsu Storage Days 2018 - Eternus Survivalpack
Fujitsu Storage Days 2018 - Eternus SurvivalpackFujitsu Storage Days 2018 - Eternus Survivalpack
Fujitsu Storage Days 2018 - Eternus Survivalpack
 
Fujitsu Storage Days 2018 - Erfahrungsbericht crisp research
Fujitsu Storage Days 2018 - Erfahrungsbericht crisp researchFujitsu Storage Days 2018 - Erfahrungsbericht crisp research
Fujitsu Storage Days 2018 - Erfahrungsbericht crisp research
 
Fujitsu Storage Days 2018 - Der Bergdoktor in Aktion
Fujitsu Storage Days 2018 - Der Bergdoktor in AktionFujitsu Storage Days 2018 - Der Bergdoktor in Aktion
Fujitsu Storage Days 2018 - Der Bergdoktor in Aktion
 
Fujitsu Storage Days 2018 - 3-S-IT Dienstleistungen GmbH
Fujitsu Storage Days 2018 - 3-S-IT Dienstleistungen GmbHFujitsu Storage Days 2018 - 3-S-IT Dienstleistungen GmbH
Fujitsu Storage Days 2018 - 3-S-IT Dienstleistungen GmbH
 
Fujitsu Storage Days 2018 - Siemens Schweiz AG
Fujitsu Storage Days 2018 - Siemens Schweiz AGFujitsu Storage Days 2018 - Siemens Schweiz AG
Fujitsu Storage Days 2018 - Siemens Schweiz AG
 
Fujitsu Storage Days 2018 - „Mit Fujitsu zum Gipfelstürmer werden – Ihr Sherp...
Fujitsu Storage Days 2018 - „Mit Fujitsu zum Gipfelstürmer werden – Ihr Sherp...Fujitsu Storage Days 2018 - „Mit Fujitsu zum Gipfelstürmer werden – Ihr Sherp...
Fujitsu Storage Days 2018 - „Mit Fujitsu zum Gipfelstürmer werden – Ihr Sherp...
 
Fujitsu Storage Days 2018 - Josefs-Gesellschaft Köln (JG-Gruppe)
Fujitsu Storage Days 2018 - Josefs-Gesellschaft Köln (JG-Gruppe)Fujitsu Storage Days 2018 - Josefs-Gesellschaft Köln (JG-Gruppe)
Fujitsu Storage Days 2018 - Josefs-Gesellschaft Köln (JG-Gruppe)
 

Recently uploaded

VIP Shimla Girls Call Shimla 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Shimla Girls Call Shimla 0X0000000X Doorstep High-Profile Girl Service Ca...VIP Shimla Girls Call Shimla 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Shimla Girls Call Shimla 0X0000000X Doorstep High-Profile Girl Service Ca...
sukaniyasunnu
 
PSUG 3 - 2024-07-15 - Splunk & AI with Philipp Drieger
PSUG 3 - 2024-07-15 - Splunk & AI with Philipp DriegerPSUG 3 - 2024-07-15 - Splunk & AI with Philipp Drieger
PSUG 3 - 2024-07-15 - Splunk & AI with Philipp Drieger
Tomas Moser
 
Conflict resolution in corporate worlds
Conflict resolution in corporate  worldsConflict resolution in corporate  worlds
Conflict resolution in corporate worlds
artemacademy2
 
VIP Nashik Girls Call Nashik 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Nashik Girls Call Nashik 0X0000000X Doorstep High-Profile Girl Service Ca...VIP Nashik Girls Call Nashik 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Nashik Girls Call Nashik 0X0000000X Doorstep High-Profile Girl Service Ca...
saroohilakhatariroy
 
2024-07-14 Transformed 07 (shared slides).pptx
2024-07-14 Transformed 07 (shared slides).pptx2024-07-14 Transformed 07 (shared slides).pptx
2024-07-14 Transformed 07 (shared slides).pptx
Dale Wells
 
CULTURE-The way of life for entire society.
CULTURE-The way of life for entire society.CULTURE-The way of life for entire society.
CULTURE-The way of life for entire society.
RIYAPAWASHE
 
VIP Kolkata Girls Call Kolkata 0X0000000X Doorstep High-Profile Girl Service ...
VIP Kolkata Girls Call Kolkata 0X0000000X Doorstep High-Profile Girl Service ...VIP Kolkata Girls Call Kolkata 0X0000000X Doorstep High-Profile Girl Service ...
VIP Kolkata Girls Call Kolkata 0X0000000X Doorstep High-Profile Girl Service ...
shalvikaprincessparv
 
Pass AWS Certified Developer Associate with new exam dumps 2024
Pass AWS Certified Developer Associate  with new exam dumps 2024Pass AWS Certified Developer Associate  with new exam dumps 2024
Pass AWS Certified Developer Associate with new exam dumps 2024
SkillCertProExams
 
NAAC REFORMS IN ACCREDITATION 2024.pptx
NAAC REFORMS IN ACCREDITATION  2024.pptxNAAC REFORMS IN ACCREDITATION  2024.pptx
NAAC REFORMS IN ACCREDITATION 2024.pptx
VeluSureshKumar
 
VIP Ahmedabad Girls Call Ahmedabad 0X0000000X Doorstep High-Profile Girl Serv...
VIP Ahmedabad Girls Call Ahmedabad 0X0000000X Doorstep High-Profile Girl Serv...VIP Ahmedabad Girls Call Ahmedabad 0X0000000X Doorstep High-Profile Girl Serv...
VIP Ahmedabad Girls Call Ahmedabad 0X0000000X Doorstep High-Profile Girl Serv...
satpalsheravatmumbai
 
Chapter 1 A - Introduction to Arbitration
Chapter 1 A - Introduction to ArbitrationChapter 1 A - Introduction to Arbitration
Chapter 1 A - Introduction to Arbitration
Adroit PMC
 
Dehradun Girls Call Dehradun 0X0000000X Unlimited Short Providing Girls Servi...
Dehradun Girls Call Dehradun 0X0000000X Unlimited Short Providing Girls Servi...Dehradun Girls Call Dehradun 0X0000000X Unlimited Short Providing Girls Servi...
Dehradun Girls Call Dehradun 0X0000000X Unlimited Short Providing Girls Servi...
sankisogandhi
 
Hyderabad Girls Call Hyderabad 0X0000000X Unlimited Short Providing Girls Ser...
Hyderabad Girls Call Hyderabad 0X0000000X Unlimited Short Providing Girls Ser...Hyderabad Girls Call Hyderabad 0X0000000X Unlimited Short Providing Girls Ser...
Hyderabad Girls Call Hyderabad 0X0000000X Unlimited Short Providing Girls Ser...
rashmikasinghdelhiro
 
Curtin Cert degree offer diploma
Curtin Cert degree offer diploma Curtin Cert degree offer diploma
Curtin Cert degree offer diploma
popecap
 
Flinders Cert degree offer diploma
Flinders Cert degree offer diploma Flinders Cert degree offer diploma
Flinders Cert degree offer diploma
popecap
 
Trapbone Routing Plan created by Marcus Davis Jr
Trapbone Routing Plan created by Marcus Davis JrTrapbone Routing Plan created by Marcus Davis Jr
Trapbone Routing Plan created by Marcus Davis Jr
MarcusDavisJr1
 
VIP Mysore Girls Call Mysore 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Mysore Girls Call Mysore 0X0000000X Doorstep High-Profile Girl Service Ca...VIP Mysore Girls Call Mysore 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Mysore Girls Call Mysore 0X0000000X Doorstep High-Profile Girl Service Ca...
satpalsheravatmumbai
 
Integrated and localized Approach in Development Communication.pptx
Integrated and localized Approach in Development Communication.pptxIntegrated and localized Approach in Development Communication.pptx
Integrated and localized Approach in Development Communication.pptx
Sayan Bachaspati
 
Colorfcul Presentation - Public Relations
Colorfcul Presentation - Public RelationsColorfcul Presentation - Public Relations
Colorfcul Presentation - Public Relations
StephanieFeliciano8
 
ulcerative colitis case presentation
ulcerative colitis case presentation ulcerative colitis case presentation
ulcerative colitis case presentation
anshu reddy
 

Recently uploaded (20)

VIP Shimla Girls Call Shimla 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Shimla Girls Call Shimla 0X0000000X Doorstep High-Profile Girl Service Ca...VIP Shimla Girls Call Shimla 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Shimla Girls Call Shimla 0X0000000X Doorstep High-Profile Girl Service Ca...
 
PSUG 3 - 2024-07-15 - Splunk & AI with Philipp Drieger
PSUG 3 - 2024-07-15 - Splunk & AI with Philipp DriegerPSUG 3 - 2024-07-15 - Splunk & AI with Philipp Drieger
PSUG 3 - 2024-07-15 - Splunk & AI with Philipp Drieger
 
Conflict resolution in corporate worlds
Conflict resolution in corporate  worldsConflict resolution in corporate  worlds
Conflict resolution in corporate worlds
 
VIP Nashik Girls Call Nashik 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Nashik Girls Call Nashik 0X0000000X Doorstep High-Profile Girl Service Ca...VIP Nashik Girls Call Nashik 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Nashik Girls Call Nashik 0X0000000X Doorstep High-Profile Girl Service Ca...
 
2024-07-14 Transformed 07 (shared slides).pptx
2024-07-14 Transformed 07 (shared slides).pptx2024-07-14 Transformed 07 (shared slides).pptx
2024-07-14 Transformed 07 (shared slides).pptx
 
CULTURE-The way of life for entire society.
CULTURE-The way of life for entire society.CULTURE-The way of life for entire society.
CULTURE-The way of life for entire society.
 
VIP Kolkata Girls Call Kolkata 0X0000000X Doorstep High-Profile Girl Service ...
VIP Kolkata Girls Call Kolkata 0X0000000X Doorstep High-Profile Girl Service ...VIP Kolkata Girls Call Kolkata 0X0000000X Doorstep High-Profile Girl Service ...
VIP Kolkata Girls Call Kolkata 0X0000000X Doorstep High-Profile Girl Service ...
 
Pass AWS Certified Developer Associate with new exam dumps 2024
Pass AWS Certified Developer Associate  with new exam dumps 2024Pass AWS Certified Developer Associate  with new exam dumps 2024
Pass AWS Certified Developer Associate with new exam dumps 2024
 
NAAC REFORMS IN ACCREDITATION 2024.pptx
NAAC REFORMS IN ACCREDITATION  2024.pptxNAAC REFORMS IN ACCREDITATION  2024.pptx
NAAC REFORMS IN ACCREDITATION 2024.pptx
 
VIP Ahmedabad Girls Call Ahmedabad 0X0000000X Doorstep High-Profile Girl Serv...
VIP Ahmedabad Girls Call Ahmedabad 0X0000000X Doorstep High-Profile Girl Serv...VIP Ahmedabad Girls Call Ahmedabad 0X0000000X Doorstep High-Profile Girl Serv...
VIP Ahmedabad Girls Call Ahmedabad 0X0000000X Doorstep High-Profile Girl Serv...
 
Chapter 1 A - Introduction to Arbitration
Chapter 1 A - Introduction to ArbitrationChapter 1 A - Introduction to Arbitration
Chapter 1 A - Introduction to Arbitration
 
Dehradun Girls Call Dehradun 0X0000000X Unlimited Short Providing Girls Servi...
Dehradun Girls Call Dehradun 0X0000000X Unlimited Short Providing Girls Servi...Dehradun Girls Call Dehradun 0X0000000X Unlimited Short Providing Girls Servi...
Dehradun Girls Call Dehradun 0X0000000X Unlimited Short Providing Girls Servi...
 
Hyderabad Girls Call Hyderabad 0X0000000X Unlimited Short Providing Girls Ser...
Hyderabad Girls Call Hyderabad 0X0000000X Unlimited Short Providing Girls Ser...Hyderabad Girls Call Hyderabad 0X0000000X Unlimited Short Providing Girls Ser...
Hyderabad Girls Call Hyderabad 0X0000000X Unlimited Short Providing Girls Ser...
 
Curtin Cert degree offer diploma
Curtin Cert degree offer diploma Curtin Cert degree offer diploma
Curtin Cert degree offer diploma
 
Flinders Cert degree offer diploma
Flinders Cert degree offer diploma Flinders Cert degree offer diploma
Flinders Cert degree offer diploma
 
Trapbone Routing Plan created by Marcus Davis Jr
Trapbone Routing Plan created by Marcus Davis JrTrapbone Routing Plan created by Marcus Davis Jr
Trapbone Routing Plan created by Marcus Davis Jr
 
VIP Mysore Girls Call Mysore 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Mysore Girls Call Mysore 0X0000000X Doorstep High-Profile Girl Service Ca...VIP Mysore Girls Call Mysore 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Mysore Girls Call Mysore 0X0000000X Doorstep High-Profile Girl Service Ca...
 
Integrated and localized Approach in Development Communication.pptx
Integrated and localized Approach in Development Communication.pptxIntegrated and localized Approach in Development Communication.pptx
Integrated and localized Approach in Development Communication.pptx
 
Colorfcul Presentation - Public Relations
Colorfcul Presentation - Public RelationsColorfcul Presentation - Public Relations
Colorfcul Presentation - Public Relations
 
ulcerative colitis case presentation
ulcerative colitis case presentation ulcerative colitis case presentation
ulcerative colitis case presentation
 

FUJITSU PalmSecure™ ID Login - Passwörter in den Griff bekommen

  • 1. 0 © 2017 FUJITSU Passwörter in den Griff bekommen FUJITSU PalmSecure™ ID Login Last update: October 06th, 2017
  • 2. 1 © 2017 FUJITSU Introduction PalmSecure™  Advantages  How it works
  • 3. 2 © 2017 FUJITSU Advantages of palm vein authentication  Hidden under the skin  Unique (even in the case of twins)  Traits do not change for entire lifetime  Live hand detection: only used if blood circulation detected  Very hygienic because contact-free  Easy and intuitive operation  High level of privacy because hidden under the skin  Palm veins are complex >5 million reference points  Palm has thicker veins than fingers – easier to identify  Palm veins are not sensitive to external factors, e.g. cold temperature, skin scratches 1 Highest level of security & performance Extremely precise Accepted everywhere2 3
  • 4. 3 © 2017 FUJITSU How PalmSecure Works Hand positioned over sensor Sensor focuses & detects live hand Hand scanned with infrared light Hand Veins reference points scanned Secure storage of cryptographic hash 2nd AES encryption with unique private key Binary file transmitted to PC 1st AES encryption binary file created
  • 5. 4 © 2017 FUJITSU False acceptance rate (FAR) & false rejection rate (FRR) compared Fujitsu's palm vein scanner is the most precise and practical technology. Precision Practicality Face recognition Fingerprint Palm veins High HighLow Voice recognition Signature Iris/retina Finger vein Low Precision of authentication compared Authentication method FAR (%) = If FRR (%) = Face recognition ~ 1.3 ~ 2.6 Voice recognition ~ 0.01 ~ 0.3 Fingerprint ~ 0.001 ~ 0.1 Finger vein ~ 0.0001 ~ 0.01 Iris/retina ~ 0.0001 ~ 0.01 Palm vein < 0.00001* ~ 0.01 * I format
  • 6. 5 © 2017 FUJITSU Fujitsu PalmSecure™ ID Login  Overview  Workplace Protect AD
  • 7. 6 © 2017 FUJITSU PalmSecure ID Login (WPP AD) – Big picture Thin Client (FUTRO) Software: eLux, (midterm planing) CitrixServe / MS Server / Xen Server AD Controller Matching Server (shortterm planing) Pass through authentication AD Controller Replication Login Login Login ADFS based SSO Citrix Server Windows Server VMware Server Matching Server (short term planning) AD Server Thin client (eLux) (mid term planning) Thin client (Windows 7 Embedded, 10 IoT) Thin Client (FUTRO) Software: eLux, (midterm planing) Mobile/Fat client (Windows 7, 10)
  • 8. 7 © 2017 FUJITSU Fujitsu PalmSecure™ ID Login  Designed to be used as logical access control for Active Directory login  Used to manage a centralized palm vein template handling for Windows login at users client  Workplace Protect AD software can be used  With different types of PalmSecure sensors  At Fujitsu hardware  To run Fujitsu PalmSecure ID Login WPP AD software and a PalmSecure sensor is required. Username Fujitsu PalmSecure ID Login prevents misuse caused by stolen or misused passwords. Unauthorized access to clients can be prevented.
  • 9. 8 © 2017 FUJITSU Fujitsu PalmSecure ID Login Workplace Protect AD  Centralized user enrollment  Administrating palm vein templates at Active directory  Modifying user data at Active directory  Handling client Windows login via Active Directory  Optional: Unique application key for maximum security  Structure change of AD not necessary, used AD field can be changed optionally PalmSecure sensor  USB sensor Guide Kit  USB PalmSecure mouse  OEM sensor  PalmSecure U-Guide with OEM sensor  Built-in sensor at Fujitsu Notebook LIFEBOOK, Fujitsu Tablet STYLISTIC, Fujitsu Desktop ESPRIMO and Fujitsu Workstation CELSIUS
  • 10. 10 © 2017 FUJITSU Domain and Active Directory Location BLocation A Licensing Configuration Local caching y/n Encryption Key Application Key for PalmSecure Register new biometric data Modify biometric data record Delete biometric record Send license informationEnrollment stationEnrollment station Register new biometric data Modify biometric data record Delete biometric record Send license information Credential Provider with AD support, installed on the client system Credential Provider with AD support, installed on the client system Login with biometric data stored in AD Architecture of Workplace Protect AD Workplace Manager
  • 11. 11 © 2017 FUJITSU