Sie sind auf Seite 1von 6

Palm Vein Technology

By
K.ASHRITA
G.NAGA SHANTHI
TKREC,B.Tech IV Year(CSE)
ashrithareddy16@gmail.com
shanthi.gajawada@gmail.com
Abstract- This abstract gives an overview of palm vein
technology which is one of the upcoming technologies
and highly secured. It is the world’s first contactless
personal identification system that uses the vein
patterns in human palms to confirm a person’s The opportunities to implement palm secure
identity. It is highly secure because it uses information has a wide range of vertical markets including
contained within the body and is also highly accurate security, financial/banking, health care, commercial
because the pattern of veins in the palm is complex enterprises and educational facilities, applications for
and unique to each individual. It is a contact less the device include physical admission into secured
feature gives it a hygienic advantage over other areas; log-in to PCs or server systems; access to POS ,
biometric authentication technologies. The palm ATMs , positive ID control and other industry-specific
secure works by capturing a person’s vein pattern applications. This paper also provides product
image while radiating it with near-infrared rays.The applications for the general market that have been
palm secure detects the structure of the pattern of developed based on this technology. Typically palm
veins on the palm of the human hand with the utmost vein authentication technology consists of a small palm
precision. The sensor emits a near-infrared beam vein scanner that's easy and natural to use, fast and
towards the palm of the hand and the blood flowing highly accurate.
through these back to the heart with reduced oxygen
absorbs this radiation, causing the veins to appear as a
black pattern. This pattern is recorded by the sensor
and is stored in encrypted form in a database, on a
token or on a smart card. Veins are internal in the
body and have wealth of differentiating features,
assuming false identity through forgery is extremely
difficult, thereby enabling an extremely high level of
security. An individual's palm vein image is converted
by algorithms into data points, which is then
compressed, encrypted, and stored by the software and
registered along with the other details in his profile as
a reference for future comparison. Each time when a
person logs in attempting to gain access by a palm scan
to a particular bank account or secured entryway, the
newly captured image is likewise processed and
compared to the registered one or to the bank of
stored files for verification, all in a period of seconds.
If an unauthorized person wanted to gain access it
would be difficult. A person's fingerprints can be lifted
easily and replicated with some difficulty. It's much
harder to gain access to a palm vein profile since
people don't leave traces of it on every object they
touch with their hands. The Palm Secure technology is
designed in such a way that it can only detect the vein
pattern of living people. One of the main benefits of
vein readers is that, unlike fingerprints that change
during childhood, the palm and finger vein pattern is
established in the womb and is constant throughout a
person's life. The scanners operate on near-infrared
light to read the palm vein pattern, which lies
underneath the epidermis and so can't be distorted by
damage to the skin, age or the wearing of gloves. Vein
readers also benefit from being non-contact - a
particular advantage in environments such as health
care, where hygiene may be an issue.
recording or fingerprints, thereby making this method
of biometric authentication more secure than others.

2) Principles of vascular pattern authentication

Introduction
 Hemoglobin in the blood is oxygenated in the lungs
 Fujitsu has researched and developed biometric and carries oxygen to the tissues of the body through
authentication technology focusing on four methods: the arteries.
fingerprints, faces, voiceprints, and palm veins.
 After it releases its oxygen to the tissues, the
 Among these, because of its high accuracy, contact deoxidized hemoglobin returns to the heart through
less palm vein authentication technology is being the veins.
incorporated into various financial solution products
for use in public places.  When the palm is illuminated with near infrared light,
unlike the image seen by the human eye, the
 The Palm Secure sensor developed by Fujitsu is a deoxidized hemoglobin in the palm veins absorbs this
biometric authentication solution offering optimum light, thereby
levels of security.
 Palm Secure detects the structure of the pattern of
veins on the palm of the human hand with the utmost
precision.
reducing the reflection rate and causing the veins to
 In the present network society, where individuals can
appear as a black pattern.
easily access their information anytime and
anywhere, people are also faced with the risk that
others can easily access the same information  In vein authentication based on this principle, the
anytime and anywhere. region used for authentication is photographed with
 Because of this risk, personal identification near-infrared light, and the vein pattern is extracted
technology, which can distinguish between registered by image processing and registered.
legitimate users and imposters, is now generating  The vein pattern of the person being authenticated is
interest. then verified against the preregistered pattern.
 Currently, passwords, Personal Identification
Numbers (4-digit PIN numbers) or identification
cards are used for personal identification. However,
cards can be stolen, and passwords and numbers can
be guessed or forgotten.
 To solve these problems, biometric authentication
technology, which identifies people by their unique
biological information, is attracting attention.
 In biometric authentication, an account holder’s body
characteristics or behaviors (habits) are registered in a
database and then compared with others who may try
to access that account to see if the attempt is
legitimate.

1) Technology
3) Advantages

 Palm vein authentication works by comparing the  Security:


pattern of veins in the palm (which appear as blue
lines) of a person being authenticated with a pattern
stored in a database.
• Veins are located underneath the skin surface and
are not prone to external distortion the way
 Vascular patterns are unique to each individual, even fingerprints are. This reduces the high failure to
identical twins have different patterns. enroll (FTE) rate caused by bad samples.
 Since the vascular patterns exist inside the body, they • Vein patterns are difficult to replicate because
cannot be stolen by means of photography, voice they lie under the skin surface. Fingerprints can
be duplicated using gummy fingers.
• Additionally, some vein recognition models
come with ‘liveness' detection that senses flow of
blood in veins.
 Expensive:
 Accuracy and Reliability:
• The technology is not cheap enough for mass
• Using the data of 140,000 palms from 70,000 deployment. Vein recognition units cost $2,000
individuals, Fujitsu has confirmed that the to $4,000, whereas hand geometry readers and
system has a false acceptance rate of less than fingerprint scanners are priced at $1,200 and
0.00008% and a false rejection rate of 0.01%, $500, respectively.
provided the hand is held over the device three
times during registration, with one retry for 5) Applications
comparison during authentication.
 Product development for financial solutions:
 User friendliness:
• Vein authentication can provide two types of
• This technology overcomes aversion to systems for financial solutions, depending on
fingerprinting and related privacy concerns since where the registered vein patterns are stored.
its traditional association to criminal activity is
non-existent. • In one method, the vein patterns are stored on
• In countries such as Japan, where there is strong the server of a client-server system. The
opposition to fingerprinting, vein recognition has advantage of this system is that it provides an
become the biometric technology of choice. It is integrated capability for managing vein patterns
relatively quick as it takes less than 2 seconds to and comparison processing.
authenticate.
• In the other type, a user’s vein pattern is stored
on an IC card, which is beneficial because users
 Contactless: can control access to their own vein pattern.
• To ensure customer security, Suruga Bank3
• The test taker does not touch the palm vein
launched its “Bio-Security Deposit” the world’s
sensor, eliminating the possibility of smudging.
The system is also much more accessible for first financial service to use palm secure.
people with some physical disabilities. Some • The Bank of Tokyo-Mitsubishi4 launched its
non-contact models are more hygienic than “Super-IC Card Tokyo-Mitsubishi VISA.” This
fingerprint readers. card combines the functions of a bankcard, credit
card, electronic money and palm vein
4) Disadvantages
authentication.
• From a technical and user-friendly point of
 Invasive:
view, The Bank of Tokyo-Mitsubishin arrowed
the biometric authentication methods suitable for
• It is less invasive than iris scanning, the fact that
the technology studies the subcutaneous level can financial transactions to palm veins, finger veins
create apprehensions among people, giving them and fingerprints. The bank then mailed a
the psychological impression that it could be a questionnaire to 1,000 customers and surveyed
painful process. an additional 1,000 customers who used devices
in their branches.
 Large Size: • The Super-IC Card contains the customer’s palm
vein data and vein authentication algorithms, and
• The presence of a CC camera makes the unit performs vein authentication by itself.
larger than a fingerprint reader. This prevents its
• To activate the palm vein authentication
adoption for the fast-growing mobile computing
and logical access application markets. function, the customer brings the card and his or
her passbook and seal to the bank counter, where
the customer’s vein information is registered on • PalmSecure login unit can also be used for
the card. authentication using conventional IDs and
• After registration, the customer can make passwords, existing operating systems and
transactions at that branch’s counter and any applications can continue to be used.
ATM using palm vein authentication and a • It is also possible to build the unit into an
matching PIN number. existing application to enhance operability. In the
early stage of introduction, the units were limited
 ATMs to businesses handling personal information that
came under the “Act for the Protection of
• In addition to product development for financial Personal Information”.
solutions, product applications were being
launched for the general market.
• Two products are in great demand in the general
market. One is for a physical access control unit
that uses Palm Secure to protect entrances and
exits, and the other is a logical access control unit
that uses Palm Secure to protect input and output
of electronic data.

 Access control unit using Palm Secure:

• The Palm Secure access control unit can be used


to control entry and exit for rooms and
buildings .This unit integrates the operation and
control sections.  Other applications:
• The operation section has a vein sensor over
which the palm is held, and the control section • Vein recognition solutions have been
performs authentication processing and issues implemented in a number of small and medium
commands to unlock the door. size applications noticeably across the IT security
• The system can be introduced in a simple sector. These include banks, hospitals, military
configuration by connecting it to the controller of and many other financial institutions.
an electronic lock. Palm Secure units are used to • The vein recognition technology has extensive
control access to places containing systems or applications and can be applied to small personal
machines that manage personal or other biometric systems e.g. Bio watches and Bio keys
confidential information, such as machine rooms and to generic biometric applications including
in companies and outsourcing centers where intelligent door handles, door locks.
important customer data is kept. • Some other applications of vein recognition
include: Computer log ins, Personnel
Authentication, Time Attendance applications.

6) Conclusion:

• This paper explains palm vein authentication.


The Fijitsu palm secure is a palm-vein based
authentication system that utilizes the latest in
Biometric Security technology.
 Login unit using PalmSecure:
• This contactless device offers an easy-to-use,
hygienic solution for verifying identity. This
technology is highly secure because it uses
information contained within the body and is also
highly accurate because the pattern of veins in
the palm is complex and unique to each
individual.
• This paper also describes some examples of
product applications for the general market that
have been developed based on this technology.

Das könnte Ihnen auch gefallen