WELCOME TO PALM VEIN TECHNOLOGY M.Sravanthi K.Raga Ranjitha

Slides:



Advertisements
Similar presentations
AmeriCorps is introducing a new online payment system for the processing of AmeriCorps forms
Advertisements

The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Prime Time: On a clean sheet of paper with today’s heading on it, explain how you decide what to wear. (What factors do you consider when choosing an outfit?)
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
By: Monika Achury and Shuchita Singh
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
PALM VEIN TECHNOLOGY.
Computer Vision. Computer vision is concerned with the theory and technology for building artificial Computer vision is concerned with the theory and.
Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
1.Complete the online application (instructions to follow) 2.Pass a medical examination at your nearest institution (call for instructions)
WELCOME.
Copyright © 2007, SAS Institute Inc. All rights reserved. SAS Activity-Based Management Survey Kit (ASK): User Management & Security.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
ESerbia – Information society Base draft Ministry of Science, technology & development Legal framework IT (Information Technology) infrastructure Technical.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
COLOR PICKING PEN NOW, THE COLOR IS YOURS TO USE.
WNAG: Advisory Report Presented to: UCIST by: Stephen Sempson.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Databases. Types of databases Full-text (e.g. IEEE Explore, Periodicals Archive Online, Safari Books) Abstracts & some full text (e.g. Web of Science,
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Biometrics Authentication Technology
Desktop Security: Making Sure Your Office Environment is Secure.
How to create a profile in ADP Please note: All questions with a red asterisk* Must be completed to continue the application process.
Biometric Technologies
INFORMATION TECHNOLOGY. RIGHT METHODS TO DEAL WITH THE COMPUTER  Screen’s brightness and position should be comfortable for your eyes.  Keyboard should.
Computer Use Guidelines Business Lab. Computers are Important Tools! Internet Research Learning Software Word Processing Multimedia Presentations.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
0 Electronic Subcontracting Reporting System (eSRS) Department of Defense Government Training Submitting a SSR – Individual Plan.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Exponential and Logarithmic Equations
Rules of the Computer Lab
Payment systems. Debit or Credit cards  Let the customers pay by taking money directly form their account  Allow the money to borrow the money and the.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Global Palm Vein Biometrics Market WEBSITE Single User License: US$ 2500 No of Pages: 56 Corporate User License: US$
Target Classification in Wireless Distributed Sensor Networks (WSDN) Using AI Techniques Can Komar
Overview of Bio-Tech Technology+- Fingerprint Popular Cheapest Less Accurate Voice Non invasive Least Accurate Iris & Retinal Very accurate Invasive Expensive.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Beavercreek High School BYOD Orientation
Welcome to Cloud Computing. The Internet of People and Things. An Introduction to Cloud Computing: The Internet. Presenter: Roy McCollum The cloud image.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Black Ice Security Services
Information Technology
Two-factor authentication
Biometric Security Fujitsu Palm Vein Technology
Tablet and eBook Orientation
Biometric Security Palm Vein Technology
Seminar Presentation on Biometrics
BSC Biometric Security System
Tablet and eBook Orientation
“Udderly” Fantastic.
BSC Biometric Security System
Enter your and password from when you first created an account
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Gdax 2fa not working Two-factor authentication is required as it protects your account from extra activities that can damage your files and information.
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
Want to get the most out of the feedback on your assignments?
Enter your and password from when you first created an account
K.C.C.A. : Key Crime Ceasing Association
Pace University IT691/Fall 2015
BY: Michael Etse and Maverick Fermill
Using NoodleTools: Setting up your account
Presentation transcript:

WELCOME TO PALM VEIN TECHNOLOGY M.Sravanthi K.Raga Ranjitha PAPER PRESENTATION ON PALM VEIN TECHNOLOGY -- (TOUCHING THE PERFECTION) PRESENTED BY M.Sravanthi K.Raga Ranjitha 08RC1A0531 08RC1A0526 II/IV CSE II/IV CSE Laqshya Institute of Technology Sciences Tanikella(v),Konijerla(m),KHAMMAM

CONTENTS 1.Introduction 2.The basis of palm vein technology 3.Registering through palm vein technology 4.Working of palm vein security systems 5.How secure is the technology ? 6.What happens if the registered palm gets damaged? 7.Contact less palm vein authentication device 8.Applications 9.Conclusion

Introduction In the ubiquitous network society, where individuals can easily access their information. personal identification technology is used which includes Passwords, personal identification numbers and identification cards. However, cards can be stolen and passwords and numbers can be guessed or forgotten. To solve these problems, Fujitsu developed four methods fingerprints, faces, voice prints and palm veins.

The Basis of Palm Vein Technology

REGISTERING THROUGH PALM VEIN TECHNOLOGY Scanner Display Scanned palm Original palm Regitered pattern Process of registration

Working of palm vein security systems Infra red on Palm Palm on Sensor Short region on palm

How Secure is the Technology ? On the basis of testing the technology on more than 70,000 individuals , Fujitsu declared that the new system had a false rejection rate of 0.01% , and a false acceptance rate of less than 0.00008% . If your profile is registered with your right hand, don't log in with your left - the patterns of an individual's two hands differ. And if you registered your profile as a child , it'll still be recognized as you grow.

What happens if the registered palm gets damaged? we take the veins of both the hands When hand get damaged up to large extent we can get veins because deeper into the hand veins are obtained. Registering two palms

Contact less palm vein authentication device The completely contactless feature of this Device makes it suitable for use where high levels of hygiene are required. No need to physical touch Contact less sensor

APPLICATIONS PERSONAL COMPUTERS ATM HOSPITALS AND LIBRARYS AUTHENTICATION

Conclusion : we can solve many problems such as password protection in ATM . Security in various fields and if we implement this technology in government offices. Surely this technology will bring a revolution in the field of science and technology in the near future.

QUERIES........???

THANK YOU