Sie sind auf Seite 1von 8

ERODE SENGUNTHAR ENGINEERING COLLEGE

THUDUPATHI-638 057

PAPER ON

PALM_VEIN TECHNOLOGY

By,

Anandhi.S
Hazira Bibi.M

Email-id:
anandhi.sam@gmail.com
hazirabibi@gmail.com

PALM VEIN TECHNOLOGY


ABSTRACT:
1
Palm vein technologies are one of the way that it can only detect the vein pattern of
up coming technologies which is highly secure. It living people. The scanning process is extremely
is the world’s first contactless personal fast and does not involve any contact meaning that
identification system that uses the vein patterns PalmSecure meets the stringent hygienic
in human palms to confirm a person’s identity. It requirements that are normally necessary for use in
is highly secure because it uses information public environments.
contained within the body and is also highly The opportunities to implement palmsecure
accurate because the pattern of veins in the palm span a wide range of vertical markets, including
is complex and unique to each individual. security, financial/banking, healthcare, commercial
Moreover, its contact less feature gives it a enterprises and educational facilities. Applications
hygienic advantage over other biometric for the device include physical admission into
authentication technologies. secured areas; log-in to PCs or server systems;
The palm secure works by capturing a person’s access to POS, ATMs or kiosks; positive ID
vein pattern image while radiating it with near- control; and other industry-specific applications.
infrared rays. The PalmSecure detects the This paper also describes some examples of
structure of the pattern of veins on the palm of financial solutions and product applications for the
the human hand with the utmost precision. The general market that have been developed based on
sensor emits a near-infrared beam towards the this technology. Typically palm vein
palm of the hand and the blood flowing through authentication technology consists of a small palm
these back to the heart with reduced oxygen vein scanner that's easy and natural to use, fast and
absorbs this radiation, causing the veins to appear highly accurate.
as a black pattern. This pattern is recorded by the INTRODUCTION:
sensor and is stored in encrypted form in a In the ubiquitous network society,
database, on a token or on a smart card. where individuals can easily access their
Veins are internal in the body and have wealth of information anytime and anywhere, people are also
differentiating features, assuming false identity faced with the risk that others can easily access the
through forgery is extremely difficult, thereby same information anytime and anywhere. Because
enabling an extremely high level of security. The of this risk, personal identification technology,
Palm Secure technology is designed in such a which can distinguish between registered
legitimate users and imposters, is now generating
interest.

Currently, passwords, Personal Identification


Numbers (4-digit PIN numbers) or identification
cards are used for personal identification.
2
However, cards can be stolen, and passwords and authentication technology, which authenticates
numbers can be guessed or forgotten. To solve physiological data, will be deployed to supplement
these problems, biometric authentication - or as an alternative to - these other systems.
technology, which identifies people by their The Fujitsu Group has developed biometric
unique biological information, is attracting authentication technologies based on fingerprints,
attention. In biometric authentication, an account voice, facial features, and vein patterns in the
holder’s body characteristics or behaviors palm, and has also combined two or more of these
(habits) are registered in a database and then capabilities in multi-biometric authentication
compared with others who may try to access that systems. Although biometric authentication is
account to see if the attempt is legitimate. already being used to some extent by companies
Fujitsu has researched and and government authorities, for it to gain wider
developed biometric authentication technology acceptance, it needs to be considered less intrusive,
focusing on four methods: fingerprints, faces, and concerns about hygiene need to be addressed.
voiceprints, and palm veins. Among these, For that reason, there is a market need
because of its high accuracy, contact less palm for voice or facial recognition systems and other
vein authentication technology is being biometric authentication technology that can read
incorporated into various financial solution physiological data without requiring physical
products for use in public places. contact with sensor equipment, and the
The Palm Secure sensor developed development of such systems that are both
by Fujitsu is a biometric authentication solution practical and offer greater precision.
offering optimum levels of security. Palm Secure TECHNOLOGY:
detects the structure of the pattern of veins on the Palm vein authentication works by comparing the
palm of the human hand with the utmost pattern of veins in the palm (which appear as blue
precision. lines) of a person being authenticated with a
BACKGROUND: pattern stored in a database.Vascular patterns are
The ability to verify identity has unique to each individual, according to Fujitsu
become increasingly important in many areas of research — evenidentical twins have different
modern life, such as electronic government, patterns. And since the vascular patterns exist
medical administration systems, access control inside the body, they cannot be stolen by means of
systems for secure areas, passenger ticketing, and photography, voice recording or fingerprints,
home office and home study environments. thereby making this method of biometric
Technologies for personal identification include authentication more secure than others.
code numbers, passwords, and smart cards, but
these all carry the risk of loss, theft, forgery, or
unauthorized use. It is expected that biometric
3
PRINCIPLES OF VASCULAR PATTERN
AUTHENTICATION:
Hemoglobin in the blood is oxygenated in the
lungs and carries oxygen to the tissues of the
body through the arteries. After it releases its
oxygen to the tissues, the deoxidized hemoglobin
Fig1 visible ray image
returns to the heart through the veins. These two
types of hemoglobin have different rates of
absorbency.Deoxidized hemoglobin absorbs light
at a wavelength of about 760 nm in the near-
infrared region. When the palm is illuminated
with near infrared light, unlike the image seen by
the human eye, the deoxidized hemoglobin in the
Fig: infrared ray image
palm veins absorbs this light, thereby reducing
the reflection rate and causing the veins to appear
as a black pattern.In vein authentication based on
this principle, the region used for authentication
is photographed with near-infrared light, and the
vein pattern is extracted by image processing and
registered. The vein pattern of the person being Fig: Extracted vein pattern
authenticated is then verified against the
preregistered pattern. ADVANTAGES OF REFLECTION
PHOTOGRAPHY:
ADVANTAGES OF USING THE PALM: There are two methods of photographing veins:
In addition to the palm, vein authentication can reflection and transm ission. Fujitsu employs the
be done using the vascular pattern on the back of reflection method.
the hand or a finger. However, the palm vein The reflection method illuminates the palm
pattern is the most complex and covers the and photographs the light that is reflected back
widest area. Because the palm has no hair, it is from the palm, while the transmission method
easier to photograph its vascular pattern. The photographs light that passes straight through the
palm also has no significant variations in skin hand. Both types capture the near-infrared light
color compared with fingers or the back of the given off by the region used for identification after
hand, where the color can darken in certain areas. diffusion through the hand.
An important difference between the
reflection method and transmission method is how
4
they respond to changes in the hand’s light Fujitsu is a pioneer in designing a completely
transmittance. When the body cools due to a contactless palm vein authentication device. With
lowered ambient temperature, the blood vessels this device, authentication simply involves holding
(in particular the capillaries) contract, decreasing a hand over the vein sensor.
the flow of blood through the body. This The completely contactless feature of this device
increases the hand’s light transmittance, so light makes it suitable for use where high levels of
passes through it more easily. If the transmittance hygiene are required, such as in public places or
is too high, the hand can become saturated with medical facilities. It also eliminates any hesitation
light and light can easily pass through the hand. people might have about coming into contact with
In the transmission method, this results in a something that other people have already touched.
lighter, less-contrasted image in which it is HIGH AUTHENTICATION ACCURACY:
difficult to see the vessels. However, a high light Using the data of 140,000 palms from 70,000
transmittance does not significantly affect the individuals, Fujitsu has confirmed that the system
level or contrast of the reflected light. Therefore, has a false acceptance rate of less than 0.00008%
with the reflection method, the vessels can easily and a false rejection rate of 0.01%, provided the
be seen even when the hand/body is cool. hand is held over the device three times during
The system configurations of the two registration, with one retry for comparison during
methods are also different. The reflection method authentication. In addition, the device’s ability to
illuminates the palm and takes photographs perform personal authentication was verified using
reflected back from the palm, so the illumination the following: 1) data from people ranging from 5
and photography components can be positioned to 85 years old, including people in various
in the same place. Conversely, because the occupations in accordance with the demographics
transmission method photographs light that released by the Statistics Center of the Statistics
passes through the hand, the illumination and Bureau; 2) data about foreigners living in Japan in
photography components must be placed in accordance with the world demographics released
different locations. This makes it difficult for the by the United Nations; 3) data taken in various
system to be embedded into smaller devices such situations in daily life, including after drinking
as notebook PCs or cellular phones. Fujitsu has alcohol, taking a bath, going outside, and waking
conducted an in-depth study of the necessary up.
optical components to reduce the size of the
sensor, making it more suitable for embedded
applications.
COMPLETELY CONTACTLESS DESIGN APPLICATIONS:
MINIMIZES HYGIENE CONCERNS AND PRODUCT DEVELOPMENT FOR
PSYCHOLOGICAL RESISTANCE: FINANCIAL SOLUTIONS :
5
Financial damage caused by passbook, and prevents withdrawals from branches
fraudulent withdrawals of money using identity other than the registered branch and ATMs,
spoofing with fake bankcards has been rapidly thereby minimizing the risk of fraudulent
increasing in recent years, and this has emerged withdrawals. To open a Bio-Security Deposit
as a significant social problem2. As a result, account, customers go to a bank and have their
there has been a rapid increase in the number of palm veins photographed at the counter. In order to
lawsuits filed by victims of identity theft against guarantee secure data management, the palm vein
financial institutions for their failure to control data is stored only on the vein database server at
information used for personal identification. The the branch office where the account is opened.
“Act for the Protection of Personal Information” In October 2004, The Bank of
came into effect in Japan on May 1, 2005, and in Tokyo-Mitsubishi4 launched its “Super-IC Card
response, financial institutions have been Tokyo-Mitsubishi VISA.” This card combines the
focusing on biometric authentication together functions of a bankcard, credit card, electronic
with IC (smart) cards as a way to reinforce the money and palm vein authentication. From a
security of personal identification. technical and user-friendly point of view, The
Vein authentication can provide two Bank of Tokyo-Mitsubishin arrowed the biometric
types of systems for financial solutions, authentication methods suitable for financial
depending on where the registered vein patterns transactions to palm veins, finger veins and
are stored. In one method, the vein patterns are fingerprints. The bank then mailed a questionnaire
stored on the server of a client-server system. to 1,000 customers and surveyed an additional
The advantage of this system is that it provides 1,000 customers who used devices in their
an integrated capability for managing vein branches. Finally, the bank decided to employ
patterns and comparison processing. In the other Palm Secure because the technology was
type, a user’s vein pattern is stored on an IC card, supported by the largest number of people in the
which is beneficial because users can control questionnaire.
access to their own vein pattern. Suruga Bank The Super-IC Card contains the
uses the server type for their financial solutions, customer’s palm vein data and vein authentication
and The Bank of Tokyo-Mitsubishi uses the IC algorithms, and performs vein authentication by
card system. itself. This system is advantageous because the
In July 2004, to ensure customer customer’s information is not stored at the bank.
security, Suruga Bank3 launched its “Bio- When a customer applies for a Super-IC card, the
Security Deposit” — the world’s first financial bank sends the card to the customer’s home. To
service to use PalmSecure. This service features activate the palm vein authentication function, the
high security for customers using vein customer brings the card and his or her passbook
authentication, does not require a bankcard or and seal to the bank counter, where the customer’s
6
vein information is registered on the card. After processing and issues commands to unlock the
registration, the customer can make transactions door. The system can be introduced in a simple
at that branch’s counter and any ATM using configuration by connecting it to the controller of
palm vein authentication and a matching PIN an electronic lock. Palm Secure units are used to
number. control access to places containing systems or
In 2006, Fujitsu reduced the Palm machines that manage personal or other
Secure sensor to 1/4 of its current size for its next confidential information, such as machine rooms
generation product. By using a smaller sensor on in companies and outsourcing centers where
existing ATMs there will be room on the important customer data is kept.
operating panel for a sensor for Felica mobiles, a Due to increasing concerns about
10-key pad that meets the DES (Data Encryption security, some condominiums and homes have
Standard), as well as an electronic calculator and started using this system to enhance security and
other devices. The downsized sensor can also be safety in daily life.For both of these applications,
mounted on ATMs in convenience stores. the combination of the following features provides
PRODUCT DEVELOPMENT FOR the optimum system: a hygienic and contactless
GENERAL MARKET : unit ideal for use in public places, user-friendly
In addition to product development operation that requires the user to simply hold a
for financial solutions, Fujitsu has started to palm over the sensor, and an authentication
develop product applications for the general mechanism that makes impersonation difficult.
market .Two products are in great demand in the
general market. One is for a physical access
control unit that uses Palm Secure to protect
entrances and exits, and the other is a logical
access control unit that uses Palm Secure to
protect input and output of electronic data. This
section describes the features of these
applications.
ACCESS CONTROL UNIT USING PALM
SECURE:
The Palm Secure access control unit
can be used to control entry and exit for rooms Fig : Palm Vein Access Control Unit
and buildings .This unit integrates the operation
and control sections. The operation section has a
vein sensor over which the palm is held, and the
control section performs authentication LOGIN UNIT USING PALMSECURE:
7
The palm vein authentication login unit controls • Identification of doctors and nurses
access to electronically stored Information .As when accessing protected health
with the units for financial solutions, there are records
two types: a server type and an IC card type. • Patient identification management
Because the PalmSecure login unit can also be • Operator authentication
used for authentication using conventional IDs • Settlement by credit card
and passwords, existing operating systems and • Obtaining various certificates using
applications can continue to be used. It is also the Basic resident Register Card
possible to build the unit into an existing • Owner authentication
application to enhance operability. In the early • Retrieval of checked luggage
stage of introduction, the units were limited to • Driver authentication
businesses handling personal information that • Attendance authentication
came under the “Act for the Protection of • Checking attendance in schools
Personal Information” enforced in April 2005. • Clocking in and out of the
However, use of the units is now expanding to workplace.
leading-edge businesses that handle confidential CONCLUSION:
information. This paper explains palm vein authentication.
The Fijitsu Palmsecure is a palm-vein based
authentication system that utilizes the latest in
Biometric Security Technology. Answering a
worldwide need from governments to the private
sector, this contactless device offers an easy-to-
use, hygienic solution for verifying identity. This
technology is highly secure because it uses
Fig : palm Secure Login Unit information contained within the body and is also
highly accurate because the pattern of veins in the
OTHER PRODUCT APPLICATIONS: palm is complex and unique to each individual.
Because of the importance of personal Moreover, its contactless feature gives it a
identification, we can expect to see the hygienic advantage over other biometric
Development of new products for various authentication technologies. This paper also
applications, such as: describes some examples of financial solutions and
• Management in healthcare product applications for the general market that
• Access control to medication have been developed based on this technology.
dispensing

Das könnte Ihnen auch gefallen