140 likes | 351 Views
A PAPER ON. NETWORK SECURITY THROUGH BIOMETRICS. P ALM VIEN T ECHNOLOGY. BY Sagar Pudi , B.TECH CSE JNTUK - VZM. INDEX. INTRODUCTION WHAT DOES IT MEAN? HOW DOES IT WORK? FEATURES APPLICATIONS CONCLUSION. INTRODUCTION.
E N D
A PAPER ON NETWORK SECURITYTHROUGH BIOMETRICS PALM VIEN TECHNOLOGY BY Sagar Pudi , B.TECH CSE JNTUK - VZM
INDEX • INTRODUCTION • WHAT DOES IT MEAN? • HOW DOES IT WORK? • FEATURES • APPLICATIONS • CONCLUSION
INTRODUCTION • In the ubiquitous network society, individuals can easily access information any time and any where. • Users are faced with the risk others can easily access information, Ex: PINCODE TECHNOLOGY • There was a need to introduce a technology that secures our data more efficiently from unlawful intervention.
FUJITSU introduced four technologies namely 1.Voice recognition 2.Finger print 3.Face recognition 4.Palm vein. • Among them palm vein technology is most accurate one.
What does it mean? • Palm vein pattern acts as security key. • It is unique and affable. • An individuals palm-vein image is scanned and converted by algorithms into data points. • These are compressed, encrypted & stored as orientation for future authentication.
How does it works? • Pattern reading. • Authentication • Access to the environment.
CATALOGUING: • Palm scanning. -> Infraredrays illuminate the palm for pattern capturing. -> Vein pattern is stored in the data base.
Features: • Easier and penetrable. Highly securable: • Test basis • Declared -> PVT is most secured . False rejection rate : 0.01% False acceptance rate: 0.00008%
Growth recognition HYGIENE CONCERN:- Sanitation • Contact less feature
Applications: • Banking - Money withdrawl • Medicine - Disinfection • Atms- User recognise
Personal Computers: • Vein sensor in mouse. Hospitals and libraries: • To maintain unique & secured records of patients and students.
Conclusion • Presently this technology was being used in a wide range in Japan. • Threats abating. • Hoping for greater benefits.
??? Queries