SlideShare uma empresa Scribd logo
1 de 17
PALM VEIN TECHNOLOGY
What is biometrics??
Biometrics can be defined as
recognizing and identifying a
person based on
physiological or behavioral
characteristics
The behavioral
characteristics measure the
movement of a user, when
users walk, speak, type on a
keyboard or sign their name.
The physiological
characteristics would be the
physical human traits like
fingerprints, hand shape,
eyes and face, veins, etc
Disadvantages of other technologies
1 )Finger print
• Some people may feel offended about placing
their fingers on the same place where many
other people have continuously touched
• Wrong results if the finger is dirty.
2)Face recognition
• 2D recognition is affected by changes in
lighting, the person’s hair, the age ,and if the
person wear glasses.
Disadvantages of other technologies
1 )Finger print
• Some people may feel
offended about placing
their fingers on the same
place where many other
people have continuously
touched
• Wrong results if the finger is
dirty.
2)Face recognition
• 2D recognition is affected
by changes in lighting, the
person’s hair, the age ,and if
the person wear glasses.
• It also depends on orientation/angle of user’s
face with camera
3)IRIS scan
• Difficult to use because of positioning eye.
Requires more time for matching with database
stored
• Many commercial Iris scanners can be easily
fooled by a high quality image of an iris or face in
place of the real thing
INTRODUCTION
• Palm vein technology is the upcoming
technology in this world
• It is the worlds first contactless personal
identification system that uses the vein
pattern in human palm to confirm persons
identity
• It is one of the biometric authentication
technology, which identifies people by their
unique biological information
How does it work?
Simply hold your palm a few
centimeters over the scanner and with
a second it reads your unique vein
pattern .
when near-infrared light passes,
deoxygenated hemoglobin in the blood
flowing through the veins absorbs near-
infrared rays, causing it to be visible as
black regions to the scanner
• Then it compares it with the pre registered
one with the help of infra red rays
• Generated image is digitized,encrypted &
finally stored as a registered image template
in database
• If there is a match found then access is
allowed else access is denied
How secure is this technology?
• On the basis of testing the technology on more
than 70,000 individuals, Fujitsu declared that the
new system had a false rejection rate of 0.01%
• And a false acceptance rate of less than 0.00008%
(i.e., incorrect approval for access in one in over a
million scan
• And if you registered your profile as a child, itll
still be recognized as you grow, as an individuals
patterns of veins are established in utero
What happens if hands get damaged
• There may be a chance that the palm we had
registered may get damaged then we cannot use
this technology.
• During the time of registration we take the veins
of both the hands so that if one gets damaged we
can access through the second hand.
• When hand get damaged upto large extent we
can get veins because deeper into the hand veins
are obtained
Applications
• ATM & BANKING
• PERSONAL COMPUTERS
• HOSPITALS &LIBRARIES
ATM & BANKING
• The Bank of Tokyo launched its
“Super –IC Card”.
• This card combines the functions
of a bankcard, credit card,
electronic money and palm vein
authentication.
• This system is advantageous
because the customer’s
information is not stored at the
bank.
• To activate the palm vein
authentication function, the
customer brings the card and his
passbook and seal to the bank
counter where the customers
vein information is registered on
the card .
PERSONALCOMPUTERS
In personal computers palm vein technology can be
applied by inserting the vein sensor inside mouse or
on the keyboard. When power is supplied to system
the mouse/keyboard also gets power and the sensor
in the mouse/keyboard will be ready to sense palm
veins
IN HOSPITALS AND LIBRARYS
Palm Secure device can also be used in hospitals for
doctor and patient’s identification and where the high
level of security is required
ADVANTAGES
• This technology is,
— More Reliable, More Accurate
— Fast
— Small
— Relatively cheap to implemented and operate
• —No more problems of forgotten passwords
and id codes.
• —No two people in the world share a palm vein
pattern- even those of identical twins differ.
Conclusion
• Palm vein pattern authentication technology
developed by Fujitsu was being used in a wide range
• If this technology is introduced in our country we can
solve many problems such as password protection in
ATM , security in various fields and if we implement
this technology in government offices we can make
the employees to work according the government
timings. surely this technology will bring a revolution
in the field of science and technology in the near
future.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
An eye with an atm
An eye with an atmAn eye with an atm
An eye with an atm
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 

Destaque

Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Introduction to pattern recognization
Introduction to pattern recognizationIntroduction to pattern recognization
Introduction to pattern recognizationAjharul Abedeen
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)Ojal Katiyar
 
Pattern Recognition and its Applications
Pattern Recognition and its ApplicationsPattern Recognition and its Applications
Pattern Recognition and its ApplicationsSajida Mohammad
 
Artificial intelligence Pattern recognition system
Artificial intelligence Pattern recognition systemArtificial intelligence Pattern recognition system
Artificial intelligence Pattern recognition systemREHMAT ULLAH
 

Destaque (10)

Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern Recognition
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Introduction to pattern recognization
Introduction to pattern recognizationIntroduction to pattern recognization
Introduction to pattern recognization
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
Pattern Recognition and its Applications
Pattern Recognition and its ApplicationsPattern Recognition and its Applications
Pattern Recognition and its Applications
 
Artificial intelligence Pattern recognition system
Artificial intelligence Pattern recognition systemArtificial intelligence Pattern recognition system
Artificial intelligence Pattern recognition system
 
Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern Recognition
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Introduction to pattern recognition
Introduction to pattern recognitionIntroduction to pattern recognition
Introduction to pattern recognition
 

Semelhante a PALM VEIN BIOMETRIC TECHNOLOGY

Semelhante a PALM VEIN BIOMETRIC TECHNOLOGY (20)

Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Palm veim technology.pptx
Palm veim technology.pptxPalm veim technology.pptx
Palm veim technology.pptx
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
palm vein technology (1).pptx
palm vein technology (1).pptxpalm vein technology (1).pptx
palm vein technology (1).pptx
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

PALM VEIN BIOMETRIC TECHNOLOGY

  • 2. What is biometrics?? Biometrics can be defined as recognizing and identifying a person based on physiological or behavioral characteristics The behavioral characteristics measure the movement of a user, when users walk, speak, type on a keyboard or sign their name. The physiological characteristics would be the physical human traits like fingerprints, hand shape, eyes and face, veins, etc
  • 3. Disadvantages of other technologies 1 )Finger print • Some people may feel offended about placing their fingers on the same place where many other people have continuously touched • Wrong results if the finger is dirty. 2)Face recognition • 2D recognition is affected by changes in lighting, the person’s hair, the age ,and if the person wear glasses.
  • 4. Disadvantages of other technologies 1 )Finger print • Some people may feel offended about placing their fingers on the same place where many other people have continuously touched • Wrong results if the finger is dirty. 2)Face recognition • 2D recognition is affected by changes in lighting, the person’s hair, the age ,and if the person wear glasses.
  • 5. • It also depends on orientation/angle of user’s face with camera 3)IRIS scan • Difficult to use because of positioning eye. Requires more time for matching with database stored • Many commercial Iris scanners can be easily fooled by a high quality image of an iris or face in place of the real thing
  • 6. INTRODUCTION • Palm vein technology is the upcoming technology in this world • It is the worlds first contactless personal identification system that uses the vein pattern in human palm to confirm persons identity • It is one of the biometric authentication technology, which identifies people by their unique biological information
  • 7. How does it work? Simply hold your palm a few centimeters over the scanner and with a second it reads your unique vein pattern .
  • 8. when near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near- infrared rays, causing it to be visible as black regions to the scanner
  • 9. • Then it compares it with the pre registered one with the help of infra red rays • Generated image is digitized,encrypted & finally stored as a registered image template in database • If there is a match found then access is allowed else access is denied
  • 10. How secure is this technology? • On the basis of testing the technology on more than 70,000 individuals, Fujitsu declared that the new system had a false rejection rate of 0.01% • And a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scan • And if you registered your profile as a child, itll still be recognized as you grow, as an individuals patterns of veins are established in utero
  • 11. What happens if hands get damaged • There may be a chance that the palm we had registered may get damaged then we cannot use this technology. • During the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. • When hand get damaged upto large extent we can get veins because deeper into the hand veins are obtained
  • 12. Applications • ATM & BANKING • PERSONAL COMPUTERS • HOSPITALS &LIBRARIES
  • 13. ATM & BANKING • The Bank of Tokyo launched its “Super –IC Card”. • This card combines the functions of a bankcard, credit card, electronic money and palm vein authentication. • This system is advantageous because the customer’s information is not stored at the bank. • To activate the palm vein authentication function, the customer brings the card and his passbook and seal to the bank counter where the customers vein information is registered on the card .
  • 14. PERSONALCOMPUTERS In personal computers palm vein technology can be applied by inserting the vein sensor inside mouse or on the keyboard. When power is supplied to system the mouse/keyboard also gets power and the sensor in the mouse/keyboard will be ready to sense palm veins
  • 15. IN HOSPITALS AND LIBRARYS Palm Secure device can also be used in hospitals for doctor and patient’s identification and where the high level of security is required
  • 16. ADVANTAGES • This technology is, — More Reliable, More Accurate — Fast — Small — Relatively cheap to implemented and operate • —No more problems of forgotten passwords and id codes. • —No two people in the world share a palm vein pattern- even those of identical twins differ.
  • 17. Conclusion • Palm vein pattern authentication technology developed by Fujitsu was being used in a wide range • If this technology is introduced in our country we can solve many problems such as password protection in ATM , security in various fields and if we implement this technology in government offices we can make the employees to work according the government timings. surely this technology will bring a revolution in the field of science and technology in the near future.