SlideShare a Scribd company logo
Your Hand is the Key
MD Arshad Shareef
CONTENTS
• INTRODUCTION
• THE SOLUTION
• WHY PALMSECURE FOR SECURITY?
• EXTRACTION OF VEIN PATTERN
• FUNCTIONAL PRINCIPLE
• FEATURES
• USES
• APPLICATIONS
• PALM SECURE DEVICES
• CONCLUSION
• REFERENCES
Today passwords, personal identification numbers (four-digit PIN
numbers), and ID cards are used for personal identification. However,
cards can be stolen and passwords and numbers can be guessed or
forgotten. Another issue is how to handle growing numbers of
passwords. This results in a security risk, because three out of four
users share their online banking password with a nonfinancial Website:
47 percent share both ID and password. The management of many
passwords – including refreshing a web page after a given period of
time, or maintaining a high level of protection by using a long
password – is asking too much of many users. Passwords are typically
recorded in places that are not saved or on paper, which results in
passwords being lost, copied, stolen, or forgotten. Not to mention the
potential damage and extra administration effort that is necessary to
create new passwords or cards.
INTRODUCTION
THE SOLUTION
• Fujitsu has developed a contactless palm vein pattern authentication
technology, called Fujitsu PalmSecure.
• Fujitsu PalmSecure technology uses the very complex vein pattern in
the palm of your hand to identify you with great precision. More than
five million reference points of the vein pattern are captured by the
highly accurate PalmSecure sensor.
• The capturing and matching process is contactless – the sensor’s
surface is never touched, for hygienic reasons.
• Your palm vein pattern remains the same for your entire lifetime and
is different on your left and right hands. Even twins have different palm
vein patterns.
• Vein recognition technology is secure, because the authentication data
is inside your body in your circulatory system, making it very difficult
to forge.
WHY PALMSECURE FOR SECURITY?
• Vein patterns are unique to individuals and contain detailed
characteristics for formulation of algorithm template. The sensor
of the palm vein device can only recognize the pattern if the
deoxidized haemoglobin is actively flowing within the individual's
veins.
• Contactless authentication is hygienic and non-invasive, thus
promoting high-level of user acceptance.
• Advanced authentication algorithm produces high level of
accuracy and application versatility.
• Technology based on more than two decades of Fujitsu image
recognition experience.
When the palm is illuminated with near-infrared light, unlike the
image seen by the human eye [Figure 1(a)], the deoxidized
hemoglobin in the palm veins absorbs this light, which reduces the
reflection rate and causes the veins to appear as a black pattern
[Figure 1(b)]. In vein authentication based on this principle, the
region used for authentication is photographed with near-infrared
light and the vein pattern is extracted by image processing [Figure
1(c)] and registered.
EXTRACTION OF VEIN PATTERN
FUNCTIONAL PRINCIPLE
• Once a hand is placed in the right position above the PalmSecure
sensor emitting infra red light emblazed the hand.
• The infra red light redords the palm vein patterns and the sensor
encypts th received datas.
• After transfering the encrypted data to the PC the software converts
it to a biometric template and assignes an individual key.
• The protected biometric templates can be stored on a PC, device or
chip. Fujitsu evaluates the best way to match and store the data
together with the customer and its individual requirements.
• Maximum Security
• Maximum Accuracy
• Maximum Performance
• Highly Accepted
• Easy to use
• Hygeinic and non invasive
FEATURES
• Site Access Control
• Time recording
• Mobile applications
• Web and workplace
USES
APPLICATIONS
• Healthcare Solutions
• Financial Solutions
• Retail Solutions
• Genral enterprise solutions
• Facility, buliding and data centre solutions
• Office and company solutions
• PalmSecure ID Match
• PalmSecure Mouse Login Kit
• PalmSecure OEM Sensor STD
• PalmSecure Sensor Guide Kit STD
• PalmSecure U Guide
PALMSECURE DEVICES
CONCLUSION
• This technology is highly secure because it uses
information contained within the body and is also highly
accurate because the pattern of veins in the palm is
complex and unique to each individual.
• This technology will bring a revolution in the field of
science and technology.
• If we implement this technology in government offices
we can make employees to work as per office timings.
REFERENCES
• www.fujitsu.com

More Related Content

What's hot

Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
vedabobbala
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
Dinesh Ediga
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
Papun Papun
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
Sai Divya
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
Harisankar U K
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
Gadwal Mounika Mudhiraj
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Chitrachedu Dada Kalandar
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
Akmal Hussain
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
Ojal Katiyar
 
PPT (2)
PPT (2)PPT (2)
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
sathyakawthar
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Augustine Micahel
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
bhoovi1239
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
Chitrachedu Dada Kalandar
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
vishesh2969
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
Rohit Kumar
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Ashwani Kumar
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
RAJASHREE B
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
Sarvani Mallipeddi
 

What's hot (20)

Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 

Similar to Palmsecure

palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
Naga Dinesh
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
ssuserb46d43
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
Srinivasa Rao Gurram
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
Pallavi Goli
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
praful borad
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
lissapenas123
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
BhavanaKs10
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
Veridium
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
andreeabrodo
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
Rohit Kumar
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
Inttelix
 
Access Control
Access ControlAccess Control
Access Control
Waseem Hamid Hussain
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
brijesh kumar
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
gagana5017
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
Mohamed Safraz
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
Sufiyan Arab
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
thadgamHemanthReddy
 

Similar to Palmsecure (20)

palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Matrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein ReaderMatrix COMSEC Palm Vein Reader
Matrix COMSEC Palm Vein Reader
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Access Control
Access ControlAccess Control
Access Control
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 

Recently uploaded

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 

Recently uploaded (20)

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 

Palmsecure

  • 1. Your Hand is the Key MD Arshad Shareef
  • 2. CONTENTS • INTRODUCTION • THE SOLUTION • WHY PALMSECURE FOR SECURITY? • EXTRACTION OF VEIN PATTERN • FUNCTIONAL PRINCIPLE • FEATURES • USES • APPLICATIONS • PALM SECURE DEVICES • CONCLUSION • REFERENCES
  • 3. Today passwords, personal identification numbers (four-digit PIN numbers), and ID cards are used for personal identification. However, cards can be stolen and passwords and numbers can be guessed or forgotten. Another issue is how to handle growing numbers of passwords. This results in a security risk, because three out of four users share their online banking password with a nonfinancial Website: 47 percent share both ID and password. The management of many passwords – including refreshing a web page after a given period of time, or maintaining a high level of protection by using a long password – is asking too much of many users. Passwords are typically recorded in places that are not saved or on paper, which results in passwords being lost, copied, stolen, or forgotten. Not to mention the potential damage and extra administration effort that is necessary to create new passwords or cards. INTRODUCTION
  • 4. THE SOLUTION • Fujitsu has developed a contactless palm vein pattern authentication technology, called Fujitsu PalmSecure. • Fujitsu PalmSecure technology uses the very complex vein pattern in the palm of your hand to identify you with great precision. More than five million reference points of the vein pattern are captured by the highly accurate PalmSecure sensor. • The capturing and matching process is contactless – the sensor’s surface is never touched, for hygienic reasons. • Your palm vein pattern remains the same for your entire lifetime and is different on your left and right hands. Even twins have different palm vein patterns. • Vein recognition technology is secure, because the authentication data is inside your body in your circulatory system, making it very difficult to forge.
  • 5. WHY PALMSECURE FOR SECURITY? • Vein patterns are unique to individuals and contain detailed characteristics for formulation of algorithm template. The sensor of the palm vein device can only recognize the pattern if the deoxidized haemoglobin is actively flowing within the individual's veins. • Contactless authentication is hygienic and non-invasive, thus promoting high-level of user acceptance. • Advanced authentication algorithm produces high level of accuracy and application versatility. • Technology based on more than two decades of Fujitsu image recognition experience.
  • 6. When the palm is illuminated with near-infrared light, unlike the image seen by the human eye [Figure 1(a)], the deoxidized hemoglobin in the palm veins absorbs this light, which reduces the reflection rate and causes the veins to appear as a black pattern [Figure 1(b)]. In vein authentication based on this principle, the region used for authentication is photographed with near-infrared light and the vein pattern is extracted by image processing [Figure 1(c)] and registered. EXTRACTION OF VEIN PATTERN
  • 8. • Once a hand is placed in the right position above the PalmSecure sensor emitting infra red light emblazed the hand. • The infra red light redords the palm vein patterns and the sensor encypts th received datas. • After transfering the encrypted data to the PC the software converts it to a biometric template and assignes an individual key. • The protected biometric templates can be stored on a PC, device or chip. Fujitsu evaluates the best way to match and store the data together with the customer and its individual requirements.
  • 9. • Maximum Security • Maximum Accuracy • Maximum Performance • Highly Accepted • Easy to use • Hygeinic and non invasive FEATURES
  • 10. • Site Access Control • Time recording • Mobile applications • Web and workplace USES
  • 11. APPLICATIONS • Healthcare Solutions • Financial Solutions • Retail Solutions • Genral enterprise solutions • Facility, buliding and data centre solutions • Office and company solutions
  • 12. • PalmSecure ID Match • PalmSecure Mouse Login Kit • PalmSecure OEM Sensor STD • PalmSecure Sensor Guide Kit STD • PalmSecure U Guide PALMSECURE DEVICES
  • 13. CONCLUSION • This technology is highly secure because it uses information contained within the body and is also highly accurate because the pattern of veins in the palm is complex and unique to each individual. • This technology will bring a revolution in the field of science and technology. • If we implement this technology in government offices we can make employees to work as per office timings.