Você está na página 1de 10

Palm Vein Technology

(Security Issue)
Abstract: database, on a token or on a smart

Palm vein technologies are card.

one of the up coming technologies Veins are internal in the body and have

which is highly secure. It is the world’s wealth of differentiating features,

first contactless personal identification assuming false identity through forgery

system that uses the vein patterns in is extremely difficult, thereby enabling

human palms to confirm a person’s an extremely high level of security.

identity. It is highly secure because it The Palm Secure technology is

uses information contained within the designed in such a way that it can only

body and is also highly accurate detect the vein pattern of living people.

because the pattern of veins in the The scanning process is extremely fast

palm is complex and unique to each and does not involve any contact

individual. Moreover, its contact less meaning that PalmSecure meets the

feature gives it a hygienic advantage stringent hygienic requirements that

over other biometric authentication are normally necessary for use in

technologies. public environments.

The palm secure works by capturing a The opportunities to implement

person’s vein pattern image while palmsecure span a wide range of

radiating it with near-infrared rays. vertical markets, including security,

The PalmSecure detects the structure financial/banking, healthcare,

of the pattern of veins on the palm of commercial enterprises and

the human hand with the utmost educational facilities. Applications for

precision. The sensor emits a near- the device include physical admission

infrared beam towards the palm of the into secured areas; log-in to PCs or

hand and the blood flowing through server systems; access to POS , ATMs

these back to the heart with reduced or kiosks; positive ID control; and

oxygen absorbs this radiation, causing other industry-specific applications.

the veins to appear as a black pattern. This paper also describes some

This pattern is recorded by the sensor examples of financial solutions and

and is stored in encrypted form in a product applications for the general

1
and then compared with others who
market that have been developed based may try to access that account to see if
on this technology. Typically palm the attempt is legitimate.
vein authentication technology consists Fujitsu has researched
of a small palm vein scanner that's and developed biometric
easy and natural to use, fast and highly authentication technology focusing on
accurate. four methods: fingerprints, faces,
Introduction: voiceprints, and palm veins. Among

In the ubiquitous network these, because of its high accuracy,

society, where individuals can easily contact less palm vein authentication

access their information anytime and technology is being incorporated into

anywhere, people are also faced with various financial solution products for

the risk that others can easily access use in public places.

the same information anytime and The Palm Secure sensor

anywhere. Because of this risk, developed by Fujitsu is a biometric

personal identification technology, authentication solution offering

which can distinguish between optimum levels of security. Palm

registered legitimate users and Secure detects the structure of the

imposters, is now generating interest. pattern of veins on the palm of the

Currently, passwords, human hand with the utmost precision.

Personal Identification Numbers (4- Background:


digit PIN numbers) or identification The ability to verify
cards are used for personal identity has become increasingly
identification. However, cards can be important in many areas of modern
stolen, and passwords and numbers can life, such as electronic government,
be guessed or forgotten. To solve these medical administration systems, access
problems, biometric authentication control systems for secure areas,
technology, which identifies people by passenger ticketing, and home office
their unique biological information, is and home study environments.
attracting attention. In biometric Technologies for personal
authentication, an account holder’s identification include code numbers,
body characteristics or behaviors passwords, and smart cards, but these
(habits) are registered in a database all carry the risk of loss, theft, forgery,

2
or unauthorized use. It is expected that person being authenticated with a
biometric authentication technology, pattern stored in a database.Vascular
which authenticates physiological data, patterns are unique to each individual,
will be deployed to supplement - or as according to Fujitsu research —
an alternative to - these other systems. evenidentical twins have different
The Fujitsu Group has patterns. And since the vascular
developed biometric authentication patterns exist inside the body, they
technologies based on fingerprints, cannot be stolen by means of
voice, facial features, and vein patterns photography, voice recording or
in the palm, and has also combined fingerprints, thereby making this
two or more of these capabilities in method of biometric authentication
multi-biometric authentication more secure than others.
systems. Although biometric Principles of vascular pattern
authentication is already being used to authentication:
some extent by companies and Hemoglobin in the blood is
government authorities, for it to gain oxygenated in the lungs and carries
wider acceptance, it needs to be oxygen to the tissues of the body
considered less intrusive, and concerns through the arteries. After it releases
about hygiene need to be addressed. its oxygen to the tissues, the
For that reason, there is a deoxidized hemoglobin returns to the
market need for voice or facial heart through the veins. These two
recognition systems and other types of hemoglobin have different
biometric authentication technology rates of absorbency.Deoxidized
that can read physiological data hemoglobin absorbs light at a
without requiring physical contact with wavelength of about 760 nm in the
sensor equipment, and the near-infrared region. When the palm is
development of such systems that are illuminated with near infrared light,
both practical and offer greater unlike the image seen by the human
precision. eye, the deoxidized hemoglobin in the
Technology: palm veins absorbs this light, thereby

Palm vein authentication works by reducing the reflection rate and

comparing the pattern of veins in the causing the veins to appear as a black

palm (which appear as blue lines) of a pattern.In vein authentication based on

3
this principle, the region used for In addition to the palm, vein
authentication is photographed with authentication can be done using the
near-infrared light, and the vein pattern vascular pattern on the back of the
is extracted by image processing and hand or a finger. However, the palm
registered. The vein vein pattern is the most complex and
pattern of the person being covers the widest area. Because the
authenticated is then verified against palm has no hair, it is easier to
the preregistered pattern. photograph its vascular pattern. The
palm also has no significant variations
in skin color compared with fingers or
the back of the hand, where the color
can darken in certain areas.
Advantages of reflection
photography:
There are two methods of
photographing veins: reflection and
Fig1 visible ray image
transm ission. Fujitsu employs the
reflection method.
The reflection method
illuminates the palm and photographs
the light that is reflected back from the
palm, while the transmission method
photographs light that passes straight
Fig: infrared ray image
through the hand. Both types capture
the near-infrared light given off by the
region used for identification after
diffusion through the hand.
An important difference
between the reflection method and
Fig: Extracted vein pattern transmission method is how they
respond to changes in the hand’s light
Advantages of using the palm: transmittance. When the body cools
due to a lowered ambient temperature,

4
the blood vessels (in particular the Fujitsu has conducted an in-depth
capillaries) contract, decreasing the study of the necessary optical
flow of blood through the body. This components to reduce the size of the
increases the hand’s light sensor, making it more suitable for
transmittance, so light passes through embedded applications.
it more easily. If the transmittance is Completely contactless design
too high, the hand can become minimizes hygiene concerns and
saturated with light and light can easily psychological resistance:
pass through the hand. In the Fujitsu is a pioneer in designing a
transmission method, this results in a completely contactless palm vein
lighter, less-contrasted image in which authentication device. With this
it is difficult to see the vessels. device, authentication simply involves
However, a high light transmittance holding a hand over the vein sensor.
does not significantly affect the level The completely contactless feature of
or contrast of the reflected light. this device makes it suitable for use
Therefore, with the reflection method, where high levels of hygiene are
the vessels can easily be seen even required, such as in public places or
when the hand/body is cool. medical facilities. It also eliminates
The system configurations of any hesitation people might have about
the two methods are also different. The coming into contact with something
reflection method illuminates the palm that other people have already touched.
and takes photographs reflected back High authentication accuracy:
from the palm, so the illumination and Using the data of 140,000 palms from
photography components can be 70,000 individuals, Fujitsu has
positioned in the same place. confirmed that the system has a false
Conversely, because the transmission acceptance rate of less than 0.00008%
method photographs light that passes and a false rejection rate of 0.01%,
through the hand, the illumination and provided the hand is held over the
photography components must be device three times during registration,
placed in different locations. This with one retry for comparison during
makes it difficult for the system to be authentication. In addition, the
embedded into smaller devices such as device’s ability to perform personal
notebook PCs or cellular phones. authentication was verified using the

5
following: 1) data from people ranging IC (smart) cards as a way to reinforce
from 5 to 85 years old, including the security of personal identification.
people in various occupations in Vein authentication can
accordance with the demographics provide two types of systems for
released by the Statistics Center of the financial solutions, depending on
Statistics Bureau; 2) data about where the registered vein patterns are
foreigners living in Japan in stored. In one method, the vein
accordance with the world patterns are stored on the server of a
demographics released by the United client-server system. The advantage of
Nations; 3) data taken in various this system is that it provides an
situations in daily life, including after integrated capability for managing vein
drinking alcohol, taking a bath, going patterns and comparison processing. In
outside, and waking up. the other type, a user’s vein pattern is
Applications: stored on an IC card, which is

Product development for financial beneficial because users can control

solutions : access to their own vein pattern.

Financial damage caused Suruga Bank uses the server type for

by fraudulent withdrawals of money their financial solutions, and The Bank

using identity spoofing with fake of Tokyo-Mitsubishi uses the IC card

bankcards has been rapidly increasing system.

in recent years, and this has emerged In July 2004, to ensure

as a significant social problem2. As a customer security, Suruga Bank3

result, there has been a rapid increase launched its “Bio-Security Deposit” —

in the number of lawsuits filed by the world’s first financial service to

victims of identity theft against use PalmSecure. This service features

financial institutions for their failure to high security for customers using vein

control information used for personal authentication, does not require a

identification. The “Act for the bankcard or passbook, and prevents

Protection of Personal Information” withdrawals from branches other than

came into effect in Japan on May 1, the registered branch and ATMs,

2005, and in response, financial thereby minimizing the risk of

institutions have been focusing on fraudulent withdrawals. To open a Bio-

biometric authentication together with

6
Security Deposit account, customers the customer’s information is not
go to a bank and have their palm veins stored at the bank. When a customer
photographed at the counter. In order applies for a Super-IC card, the bank
to guarantee secure data management, sends the card to the customer’s home.
the palm vein data is stored only on the To activate the palm vein
vein database server at the branch authentication function, the customer
office where the account is opened. brings the card and his or her passbook
In October 2004, The and seal to the bank counter, where the
Bank of Tokyo-Mitsubishi4 launched customer’s vein information is
its “Super-IC Card Tokyo-Mitsubishi registered on the card. After
VISA.” This card combines the registration, the customer can make
functions of a bankcard, credit card, transactions at that branch’s counter
electronic money and palm vein and any ATM using palm vein
authentication. From a technical and authentication and a matching PIN
user-friendly point of view, The Bank number.
of Tokyo-Mitsubishin arrowed the In 2006, Fujitsu reduced
biometric authentication methods the Palm Secure sensor to 1/4 of its
suitable for financial transactions to current size for its next generation
palm veins, finger veins and product. By using a smaller sensor on
fingerprints. The bank then mailed a existing ATMs there will be room on
questionnaire to 1,000 customers and the operating panel for a sensor for
surveyed an additional 1,000 Felica mobiles, a 10-key pad that
customers who used devices in their meets the DES (Data Encryption
branches. Finally, the bank decided to Standard), as well as an electronic
employ Palm Secure because the calculator and other devices. The
technology was supported by the downsized sensor can also be mounted
largest number of people in the on ATMs in convenience stores.
questionnaire. Product development for general
The Super-IC Card market :
contains the customer’s palm vein data In addition to product
and vein authentication algorithms, and development for financial solutions,
performs vein authentication by itself. Fujitsu has started to develop product
This system is advantageous because applications for the general market

7
.Two products are in great demand in using this system to enhance security
the general market. One is for a and safety in daily life.For both of
physical access control unit that uses these applications, the combination of
Palm Secure to protect entrances and the following features provides the
exits, and the other is a logical access optimum system: a hygienic and
control unit that uses Palm Secure to contactless unit ideal for use in public
protect input and output of electronic places, user-friendly operation that
data. This section describes the requires the user to simply hold a palm
features of these applications. over the sensor, and an authentication
Access control unit using Palm mechanism that makes impersonation
Secure: difficult.
The Palm Secure access
control unit can be used to control
entry and exit for rooms and
buildings .This unit integrates the
operation and control sections. The
operation section has a vein sensor
over which the palm is held, and the
control section performs authentication
processing and issues commands to
unlock the door. The system can be
introduced in a simple configuration by
connecting it to the controller of an Fig : Palm Vein Access Control Unit
electronic lock. Palm Secure units are
Login unit using PalmSecure:
used to control access to places
The palm vein authentication login
containing systems or machines that
unit controls access to electronically
manage personal or other confidential
stored
information, such as machine rooms in
Information .As with the units for
companies and outsourcing centers
financial solutions, there are two types:
where important customer data is kept.
a server type and an IC card type.
Due to increasing
Because the PalmSecure login unit can
concerns about security, some
also be used for authentication using
condominiums and homes have started

8
conventional IDs and passwords, • Identification of doctors and nurses
existing operating systems and when accessing protected health
applications can continue to be used. It records
is also possible to build the unit into an • Patient identification management
existing application to enhance   Operator authentication
operability. In the early stage of • Settlement by credit card
introduction, the units were limited to • Obtaining various certificates using
businesses handling personal the Basic Resident Register Card
information that came under the “Act  Owner authentication
for the Protection of Personal • Retrieval of checked luggage
Information” enforced in April 2005. • Driver authentication
However, use of the units is now  Attendance authentication
expanding to leading-edge businesses • Checking attendance in schools
that handle confidential information. • Clocking in and out of the workplace.
Conclusion:
This paper explains palm vein
authentication. The Fijitsu Palmsecure
is a palm-vein based authentication
system that utilizes the latest in
Biometric Security Technology.
Answering a worldwide need from
governments to the private sector, this
contactless device offers an easy-to-
Fig : palm Secure Login Unit use, hygienic solution for verifying
identity. This technology is highly
Other product applications: secure because it uses information
Because of the importance of personal contained within the body and is also
identification, we can expect to see the highly accurate because the pattern of
Development of new products for veins in the palm is complex and
various applications, such as: unique to each individual. Moreover,
 Management in healthcare its contactless feature gives it a
• Access control to medication hygienic advantage over other
dispensing biometric authentication technologies.

9
This paper also describes some
examples of financial solutions and
product applications for the general
market that have been developed based
on this technology.

10

Você também pode gostar