SlideShare a Scribd company logo
Your Hand is the Key
MD Arshad Shareef
CONTENTS
• INTRODUCTION
• THE SOLUTION
• WHY PALMSECURE FOR SECURITY?
• EXTRACTION OF VEIN PATTERN
• FUNCTIONAL PRINCIPLE
• FEATURES
• USES
• APPLICATIONS
• PALM SECURE DEVICES
• CONCLUSION
• REFERENCES
Today passwords, personal identification numbers (four-digit PIN
numbers), and ID cards are used for personal identification. However,
cards can be stolen and passwords and numbers can be guessed or
forgotten. Another issue is how to handle growing numbers of
passwords. This results in a security risk, because three out of four
users share their online banking password with a nonfinancial Website:
47 percent share both ID and password. The management of many
passwords – including refreshing a web page after a given period of
time, or maintaining a high level of protection by using a long
password – is asking too much of many users. Passwords are typically
recorded in places that are not saved or on paper, which results in
passwords being lost, copied, stolen, or forgotten. Not to mention the
potential damage and extra administration effort that is necessary to
create new passwords or cards.
INTRODUCTION
THE SOLUTION
• Fujitsu has developed a contactless palm vein pattern authentication
technology, called Fujitsu PalmSecure.
• Fujitsu PalmSecure technology uses the very complex vein pattern in
the palm of your hand to identify you with great precision. More than
five million reference points of the vein pattern are captured by the
highly accurate PalmSecure sensor.
• The capturing and matching process is contactless – the sensor’s
surface is never touched, for hygienic reasons.
• Your palm vein pattern remains the same for your entire lifetime and
is different on your left and right hands. Even twins have different palm
vein patterns.
• Vein recognition technology is secure, because the authentication data
is inside your body in your circulatory system, making it very difficult
to forge.
WHY PALMSECURE FOR SECURITY?
• Vein patterns are unique to individuals and contain detailed
characteristics for formulation of algorithm template. The sensor
of the palm vein device can only recognize the pattern if the
deoxidized haemoglobin is actively flowing within the individual's
veins.
• Contactless authentication is hygienic and non-invasive, thus
promoting high-level of user acceptance.
• Advanced authentication algorithm produces high level of
accuracy and application versatility.
• Technology based on more than two decades of Fujitsu image
recognition experience.
When the palm is illuminated with near-infrared light, unlike the
image seen by the human eye [Figure 1(a)], the deoxidized
hemoglobin in the palm veins absorbs this light, which reduces the
reflection rate and causes the veins to appear as a black pattern
[Figure 1(b)]. In vein authentication based on this principle, the
region used for authentication is photographed with near-infrared
light and the vein pattern is extracted by image processing [Figure
1(c)] and registered.
EXTRACTION OF VEIN PATTERN
FUNCTIONAL PRINCIPLE
• Once a hand is placed in the right position above the PalmSecure
sensor emitting infra red light emblazed the hand.
• The infra red light redords the palm vein patterns and the sensor
encypts th received datas.
• After transfering the encrypted data to the PC the software converts
it to a biometric template and assignes an individual key.
• The protected biometric templates can be stored on a PC, device or
chip. Fujitsu evaluates the best way to match and store the data
together with the customer and its individual requirements.
• Maximum Security
• Maximum Accuracy
• Maximum Performance
• Highly Accepted
• Easy to use
• Hygeinic and non invasive
FEATURES
• Site Access Control
• Time recording
• Mobile applications
• Web and workplace
USES
APPLICATIONS
• Healthcare Solutions
• Financial Solutions
• Retail Solutions
• Genral enterprise solutions
• Facility, buliding and data centre solutions
• Office and company solutions
• PalmSecure ID Match
• PalmSecure Mouse Login Kit
• PalmSecure OEM Sensor STD
• PalmSecure Sensor Guide Kit STD
• PalmSecure U Guide
PALMSECURE DEVICES
CONCLUSION
• This technology is highly secure because it uses
information contained within the body and is also highly
accurate because the pattern of veins in the palm is
complex and unique to each individual.
• This technology will bring a revolution in the field of
science and technology.
• If we implement this technology in government offices
we can make employees to work as per office timings.
REFERENCES
• www.fujitsu.com

More Related Content

What's hot

What's hot (20)

Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 

Similar to Palmsecure

palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptxPallavi Goli
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Readerlissapenas123
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile BankingVeridium
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTimeInttelix
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationgagana5017
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 

Similar to Palmsecure (20)

palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Access Control
Access ControlAccess Control
Access Control
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 

Recently uploaded

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Palmsecure

  • 1. Your Hand is the Key MD Arshad Shareef
  • 2. CONTENTS • INTRODUCTION • THE SOLUTION • WHY PALMSECURE FOR SECURITY? • EXTRACTION OF VEIN PATTERN • FUNCTIONAL PRINCIPLE • FEATURES • USES • APPLICATIONS • PALM SECURE DEVICES • CONCLUSION • REFERENCES
  • 3. Today passwords, personal identification numbers (four-digit PIN numbers), and ID cards are used for personal identification. However, cards can be stolen and passwords and numbers can be guessed or forgotten. Another issue is how to handle growing numbers of passwords. This results in a security risk, because three out of four users share their online banking password with a nonfinancial Website: 47 percent share both ID and password. The management of many passwords – including refreshing a web page after a given period of time, or maintaining a high level of protection by using a long password – is asking too much of many users. Passwords are typically recorded in places that are not saved or on paper, which results in passwords being lost, copied, stolen, or forgotten. Not to mention the potential damage and extra administration effort that is necessary to create new passwords or cards. INTRODUCTION
  • 4. THE SOLUTION • Fujitsu has developed a contactless palm vein pattern authentication technology, called Fujitsu PalmSecure. • Fujitsu PalmSecure technology uses the very complex vein pattern in the palm of your hand to identify you with great precision. More than five million reference points of the vein pattern are captured by the highly accurate PalmSecure sensor. • The capturing and matching process is contactless – the sensor’s surface is never touched, for hygienic reasons. • Your palm vein pattern remains the same for your entire lifetime and is different on your left and right hands. Even twins have different palm vein patterns. • Vein recognition technology is secure, because the authentication data is inside your body in your circulatory system, making it very difficult to forge.
  • 5. WHY PALMSECURE FOR SECURITY? • Vein patterns are unique to individuals and contain detailed characteristics for formulation of algorithm template. The sensor of the palm vein device can only recognize the pattern if the deoxidized haemoglobin is actively flowing within the individual's veins. • Contactless authentication is hygienic and non-invasive, thus promoting high-level of user acceptance. • Advanced authentication algorithm produces high level of accuracy and application versatility. • Technology based on more than two decades of Fujitsu image recognition experience.
  • 6. When the palm is illuminated with near-infrared light, unlike the image seen by the human eye [Figure 1(a)], the deoxidized hemoglobin in the palm veins absorbs this light, which reduces the reflection rate and causes the veins to appear as a black pattern [Figure 1(b)]. In vein authentication based on this principle, the region used for authentication is photographed with near-infrared light and the vein pattern is extracted by image processing [Figure 1(c)] and registered. EXTRACTION OF VEIN PATTERN
  • 8. • Once a hand is placed in the right position above the PalmSecure sensor emitting infra red light emblazed the hand. • The infra red light redords the palm vein patterns and the sensor encypts th received datas. • After transfering the encrypted data to the PC the software converts it to a biometric template and assignes an individual key. • The protected biometric templates can be stored on a PC, device or chip. Fujitsu evaluates the best way to match and store the data together with the customer and its individual requirements.
  • 9. • Maximum Security • Maximum Accuracy • Maximum Performance • Highly Accepted • Easy to use • Hygeinic and non invasive FEATURES
  • 10. • Site Access Control • Time recording • Mobile applications • Web and workplace USES
  • 11. APPLICATIONS • Healthcare Solutions • Financial Solutions • Retail Solutions • Genral enterprise solutions • Facility, buliding and data centre solutions • Office and company solutions
  • 12. • PalmSecure ID Match • PalmSecure Mouse Login Kit • PalmSecure OEM Sensor STD • PalmSecure Sensor Guide Kit STD • PalmSecure U Guide PALMSECURE DEVICES
  • 13. CONCLUSION • This technology is highly secure because it uses information contained within the body and is also highly accurate because the pattern of veins in the palm is complex and unique to each individual. • This technology will bring a revolution in the field of science and technology. • If we implement this technology in government offices we can make employees to work as per office timings.