SlideShare uma empresa Scribd logo
1 de 22
 Introduction
 Palm Vein Technology
 Registering through palm vein scanner
 Working of palm vein technology
 Security provided with this system
 Solution if the palm gets damaged
 Imaging Methods
 Contactless palm vein Authentication Device
 Applications
 Advantages
 DisAdvantages
 Conclusion
OVERVIEW:
INTRODUCTION
• Palm vein technology is the upcoming technology in this
world.
• Palm vein technology is the worlds first contactless
personal identification system that uses the vein pattern in
human palm to confirm persons identity.
• It is one of the Biometric Authentication technology.
PALM VEIN TECHNOLOGY
• It is developed by FUJISTU research group.
• Palm vein authentication works by comparing
the pattern of veins .
• The veins present in the palm of the individual are scanned
& verified thus providing the access.
• Palm vein authentication has a high level of accuracy due
to the uniqueness and complexity of vein patterns of the
palm.
Registering through palm vein scanner
• Place the hand near scanner
• Sensor scans vein patterns
• Vein pattern along with personal
details are stored in database
Working of Palm Vein Technology
Security provided with this system
On the basis of testing the technology on more than 70,000
individuals, Fijistu declared that the new system had False
Rejection Rate of 0.01% and the False Acceptance Rate of
0.00008%.
• If profile is registered with right hand, we can’t log in with left
hand as the palm patterns of both hands are different.
• And if we registered our profile as a child, it still can be
recognized as we grow, as an individual.
• It is difficult to forge for intruders.
• It is not effected by dryness or roughness of skin or by physics
injury on surface of the hand.
Solution if the palm gets damaged
• Registering both palms while
registration.
• The vein pattern of the other Palm
can be used if one palm is damaged.
Contactless palm vein Authentication
device
The completely contactless feature of this
Device makes it suitable for use where high
levels of hygiene are required .
In addition to being contactless and thereby hygienic
and user-friendly in that the user does not need to
physically touch a surface and is free of such hygiene
concerns, palm vein authentication is highly secure in
that the veins are internal to the body and carry a
wealth of information, thereby being extremely difficult
to forge.
Banking and ATM’s:
• The application of Biometric
solutions in banks and ATM’s
provides high server security &
it avoids card forgery.
• There is a smartcard, on which
the client's unique palm vein
pattern is stored.
• At an ATM the client can
authorize by scanning his palm
vein pattern & let the ATM
compare it with palm vein
pattern stored in database.
Personal computers and
Laptops:
• For authorized LOGIN into
personal computers.
• For folder security & to protect
input and output data.
ID cards and
Passports:
• This Biometric
technology can be used to
avoid forgery of
passports and ID cards,
where Biometric data is
embedded in documents.
• It is very ideal for such
applications as the palm
vein pattern is almost
impossible to Forge.
In hospitals:
• In the medical environment there is a strong demand for
especially hygienic biometric devices.
• Palm Secure device is used in hospitals for doctor and
patient’s identification.
Home appliances:
• In front of the doors as a door
lock to protect entrances and
exit.
• It is also used in Laboratories
where high security is
maintained.
Industries:
 “Staff on time” Palm Scan Indoor used in industries to provide
access to their employees.
Advantages
• It is very fast that it scans the palm within 2.18sec.
• Palm has no hair so it is easy to photograph the vascular
pattern.
• Forgery of vein pattern is impossible , because no one in
the world would have same vein pattern even twins.
• Skin Color does not affects the Scanner Outcome.
• No more problems of forgetting passwords and ID’s.
• The cost of palm vein scanner is around 300$-400$.
Conclusion
• Usage of this technology gives accurate results
• It can be used in several organizations to increase security.
• If this technology is introduced in our country we can
solve many problems such as password theft ,in ATM ,
security in various fields.
• Surely this Biometric technology will bring a revolution
in the field of science and technology in the near
future.
palmveintechnologyppt

Mais conteúdo relacionado

Mais procurados (20)

Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 

Semelhante a palmveintechnologyppt

Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptxShamamaIbtesam
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptxPallavi Goli
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationgagana5017
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffkantharajubn600
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger printManoranjan Roy
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 

Semelhante a palmveintechnologyppt (17)

Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 

Mais de Naga Dinesh

Mais de Naga Dinesh (20)

pi code (picture embedding)
pi code (picture embedding)pi code (picture embedding)
pi code (picture embedding)
 
internet and intra net
internet and intra netinternet and intra net
internet and intra net
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 
Firewall
FirewallFirewall
Firewall
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Tera data
Tera dataTera data
Tera data
 
Selenium ppt
Selenium pptSelenium ppt
Selenium ppt
 
pillcam
pillcampillcam
pillcam
 
team viewer
team viewerteam viewer
team viewer
 
Haptic tech
Haptic techHaptic tech
Haptic tech
 
Growth hacking
Growth hackingGrowth hacking
Growth hacking
 
Gifi
GifiGifi
Gifi
 
Anjular js
Anjular jsAnjular js
Anjular js
 
brain chip
 brain chip brain chip
brain chip
 
35.digital jewellery
35.digital jewellery35.digital jewellery
35.digital jewellery
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
29.skinput technology
29.skinput technology29.skinput technology
29.skinput technology
 
5 g technology
5 g technology5 g technology
5 g technology
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

palmveintechnologyppt

  • 1.
  • 2.  Introduction  Palm Vein Technology  Registering through palm vein scanner  Working of palm vein technology  Security provided with this system  Solution if the palm gets damaged  Imaging Methods  Contactless palm vein Authentication Device  Applications  Advantages  DisAdvantages  Conclusion OVERVIEW:
  • 3. INTRODUCTION • Palm vein technology is the upcoming technology in this world. • Palm vein technology is the worlds first contactless personal identification system that uses the vein pattern in human palm to confirm persons identity. • It is one of the Biometric Authentication technology.
  • 4. PALM VEIN TECHNOLOGY • It is developed by FUJISTU research group. • Palm vein authentication works by comparing the pattern of veins . • The veins present in the palm of the individual are scanned & verified thus providing the access. • Palm vein authentication has a high level of accuracy due to the uniqueness and complexity of vein patterns of the palm.
  • 5. Registering through palm vein scanner • Place the hand near scanner • Sensor scans vein patterns • Vein pattern along with personal details are stored in database
  • 6. Working of Palm Vein Technology
  • 7. Security provided with this system On the basis of testing the technology on more than 70,000 individuals, Fijistu declared that the new system had False Rejection Rate of 0.01% and the False Acceptance Rate of 0.00008%. • If profile is registered with right hand, we can’t log in with left hand as the palm patterns of both hands are different. • And if we registered our profile as a child, it still can be recognized as we grow, as an individual. • It is difficult to forge for intruders. • It is not effected by dryness or roughness of skin or by physics injury on surface of the hand.
  • 8. Solution if the palm gets damaged • Registering both palms while registration. • The vein pattern of the other Palm can be used if one palm is damaged.
  • 9.
  • 10. Contactless palm vein Authentication device The completely contactless feature of this Device makes it suitable for use where high levels of hygiene are required . In addition to being contactless and thereby hygienic and user-friendly in that the user does not need to physically touch a surface and is free of such hygiene concerns, palm vein authentication is highly secure in that the veins are internal to the body and carry a wealth of information, thereby being extremely difficult to forge.
  • 11.
  • 12. Banking and ATM’s: • The application of Biometric solutions in banks and ATM’s provides high server security & it avoids card forgery. • There is a smartcard, on which the client's unique palm vein pattern is stored. • At an ATM the client can authorize by scanning his palm vein pattern & let the ATM compare it with palm vein pattern stored in database.
  • 13. Personal computers and Laptops: • For authorized LOGIN into personal computers. • For folder security & to protect input and output data.
  • 14. ID cards and Passports: • This Biometric technology can be used to avoid forgery of passports and ID cards, where Biometric data is embedded in documents. • It is very ideal for such applications as the palm vein pattern is almost impossible to Forge.
  • 15. In hospitals: • In the medical environment there is a strong demand for especially hygienic biometric devices. • Palm Secure device is used in hospitals for doctor and patient’s identification.
  • 16. Home appliances: • In front of the doors as a door lock to protect entrances and exit. • It is also used in Laboratories where high security is maintained.
  • 17. Industries:  “Staff on time” Palm Scan Indoor used in industries to provide access to their employees.
  • 18. Advantages • It is very fast that it scans the palm within 2.18sec. • Palm has no hair so it is easy to photograph the vascular pattern. • Forgery of vein pattern is impossible , because no one in the world would have same vein pattern even twins. • Skin Color does not affects the Scanner Outcome. • No more problems of forgetting passwords and ID’s. • The cost of palm vein scanner is around 300$-400$.
  • 19.
  • 20.
  • 21. Conclusion • Usage of this technology gives accurate results • It can be used in several organizations to increase security. • If this technology is introduced in our country we can solve many problems such as password theft ,in ATM , security in various fields. • Surely this Biometric technology will bring a revolution in the field of science and technology in the near future.