Synopsis Palm Vein Technology
Synopsis Palm Vein Technology
Synopsis Palm Vein Technology
PREPARED BY
MRINMOY MANDAL(16905517033)
MRINALINI KARMAKAR(16905517034)
ACADEMY OF TECHNOLOGY
ABSTRACT-
KEYWORDS-
INTRODUCTION-
In addition to the palm, vein authentication can be done using the vascular
pattern on the back of the hand or a finger. However, the palm vein pattern
is the most complex and covers the widest area. Because the palm has no
hair, it is easier to photograph its vascular pattern. The palm also has no
significant variations in skin color compared with fingers or the back of the
hand, where the color can darken in certain areas.
In one method, the vein patterns are stored on the server of a client-server
system. The advantage of this system is that it provides an integrated
capability for managing vein patterns and comparison processing.
Fujitsu plans to develop another type of ATM for use at convenience stores
in Japan, embedding the palm vein authentication sensor in the ATM.
In 2006, Fujitsu reduced the Palm Secure sensor to 1/4 of its current size for
its next generation product. By using a smaller sensor on existing ATMs ,
there will be room on the operating panel for a sensor for FeliCa mobiles, a
10-key pad that meets the DES (Data Encryption Standard), as well as an
electronic calculator and other devices. The downsized sensor can also be
mounted on ATMs in convenience stores.
The palm vein pattern sensor is also used for access control units. The
"palm vein authentication access control device" is comprised of the palm
vein pattern sensor, a keypad and a small display. This device controls
access to rooms or buildings that are for restricted personnel. The device
consists of two parts: the palm vein sensor, plus the control unit that
executes the authentication processing and sends the unlock instruction. A
simple configuration system can be achieved by connecting this device to
the electric lock control board or electric locks provided by the
manufacturer.
(i)Management in healthcare
(ii)Operator authentication
(iii)Owner authentication
• Retrieval of checked luggage
• Driver authentication
(iv)Attendance authentication
5. CONCLUSION