logging in or signing up palm vein Technology sridaddu41 Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 8572 Category: Entertainment License: All Rights Reserved Like it (0) Dislike it (0) Added: December 01, 2011 This Presentation is Public Favorites: 12 Presentation Description palm vein Technology Comments Posting comment... Premium member Presentation Transcript PALM VEIN TECHNOLOGY: PALM VEIN TECHNOLOGYPowerPoint Presentation: Because of this risk, personal identification technology is used which includes Passwords, personal identification numbers and identification cards. To solve these problems, Fujitsu developed four methods: fingerprints, faces, voice prints and palm veins. Among these, because of its high accuracy, contact less palm vein authentication technology is being incorporated.BIOMETRICS:- : BIOMETRICS:- Automated measurement of Physiological and/or behavioral characteristics to determine or authenticate identity is known as Biometrics . Usage Minimizes Risks such as The person, who has my office id card, can… The person, who has my house key, can… The person, who knows my password, can… The person, who knows the pin number of my credit card, can… The person, who is able to forge my signature, can… The person, who steals my passport, can…BIOMETRICS - SECURITY & CONVENIENCE:: BIOMETRICS - SECURITY & CONVENIENCE: PALM VEIN TECHNOLOGY REVIEWS:: PALM VEIN TECHNOLOGY REVIEWS: BASIS OF PALM VEIN TECHNOLOGY:- An individual first rests his wrist, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the device's scanner, which flashes a near-infrared ray on the palm. veins in palm deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. REGISTERING THROUGH PALM VEIN TECHNOLOGY : REGISTERING THROUGH PALM VEIN TECHNOLOGY Palm vein authentication technology consists of a small Palm vein scanner that's easy and natural to use, fast and Highly accurate . A vein picture is taken and palm pattern is Scanner Display registered. Process of Registration WORKING OF PALM VEIN SECURITY SYSTEMS : WORKING OF PALM VEIN SECURITY SYSTEMS One should place his/her palm near to scanner. The scanner makes use of a special characteristic of the reduced hemoglobin coursing through the palm veins — it absorbs near-infrared light .PowerPoint Presentation: Integrated optical system in the palm vein sensor uses this phenomenon to generate an image of the palm vein pattern. Generated image is digitized, encrypted and finally stored as a registered template in the database. PERFORMANCE METRICS OF BIOMETRIC SYSTEM : PERFORMANCE METRICS OF BIOMETRIC SYSTEM FALSE ACCEPTANCE RATE (FAR ). FALSE REJECTION RATE (FRR): EQUAL ERROR RATE OR CROSSOVER ERROR RATE (EER OR CER). RECEIVER OPERATING CHARACTERISTICS (ROC).HOW SECURE IS TECHNOLOGY?: HOW SECURE IS TECHNOLOGY? On the basis of testing the technology on more than 70,000 individuals , Fujitsu declared that the new system had a false rejection rate of 0.01%. In addition the devices ability to perform personal authentication was verified using the following: 1. Data from people ranging from 6 to 85 years old including people in various occupations. 2. Data about foreigners living in Japan in accordance with the world demographics released by the united nations. 3. Data taken in various situations in daily life including after drinking alcohol, taking a bath, going outside and waking upWHAT HAPPENS IF THE REGISTERED HAND GETS DAMAGED? : WHAT HAPPENS IF THE REGISTERED HAND GETS DAMAGED? There may be a chance that the palm we had registered may get damaged then we cannot use this technology. During the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. When hand get damaged upto large extent we can get veins because deeper into the hand veins are obtained. CONTACT LESS PALM VEIN AUTHENTICATION DEVICE (HYGIENE CONCERN): : CONTACT LESS PALM VEIN AUTHENTICATION DEVICE (HYGIENE CONCERN): The completely contactless feature of this Device makes it suitable for use where high levels of hygiene are required. It also eliminates any hesitation people might have about coming into contact with something that other people have already touched. In addition to being contactless and thereby hygienic and user-friendly in that the user does not need to physically touch a surface and is free of such hygiene concerns.APPLICATIONS : : APPLICATIONS : ATM AND BANKING PERSONAL COMPUTERS IN HOSPITALS AND LIBRARYSATM AND BANKING: ATM AND BANKING The Bank of Tokyo launched its “Super –IC Card”. This card combines the functions of a bankcard, credit card, electronic money and palm vein authentication. This system is advantageous because the customer’s information is not stored at the bank. To activate the palm vein authentication function, the customer brings the card and his passbook and seal to the bank counter where the customers vein information is registered on the card .PERSONAL COMPUTERS: PERSONAL COMPUTERS In personal computers palm vein technology can be applied by inserting the vein sensor inside mouse or on the keyboard. When power is supplied to system the mouse/keyboard also gets power and the sensor in the mouse/keyboard will be ready to sense palm veins. use of PVT (a) in ATM (b) in personal computers.IN HOSPITALS AND LIBRARYS : IN HOSPITALS AND LIBRARYS Palm Secure device can also be used in hospitals for doctor and patient’s identification and where the high level of security is required. PVT used in (a) Library (b) Hospitals for authentication.ADVANTAGES : ADVANTAGES You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.