tech matrix palm information
TRANSCRIPT
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 1/13
TechMatrix
Biometric Access Control and Identification System
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 2/13
TechMatrix 2009
2 | P a g e
Table of Contents
An Overview .................................................................................................................................................. 3
The Technology and the Scope ..................................................................................................................... 4
Market Analysis - Current Statistics ......................................................................................................... 5
Existing Solutions - A Detailed Depiction ................................................................................................... 6
The Need of the Hour - An Optimal Solution........................................................................................... 10
Let Us Assist You - Costing Analysis ........................................................................................................ 12
Tech Support Specifications ........................................................................................................................ 13
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 3/13
TechMatrix 2009
3 | P a g e
An Overview
Biometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic
physical or behavioral traits. In information technology, in particular, biometrics is used as a form
of identity access management and access control. It is also used to identify individuals in groups
that are under surveillance.
Biometric characteristics primarily consist of Physiological classification; related to the shape of
the body (examples including fingerprint, face recognition, DNA, hand and palm geometry,
iris/retina recognition and odor/scent), and Behavioral classification; related to the behavior of a
person (examples including typing rhythm, gait, and voice).
As a result of our increasing dependency on the ever-evolving technology, we have reached a phasewhere Data Security and Identity Management have never been more critical. Various organizations
are now resorting to use multiple forms or modes of authentication in order to access electronic
records and other sensitive data. An accurate identification system will not only help organizations
combat identity theft but will help abase identification errors. As organizations engage in more
automated workflows and information sharing across departments, employee identification at each
point of access plays an important role in ensuring the operational efficiency and credibility while
complying with regulations.
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 4/13
TechMatrix 2009
4 | P a g e
The Technology and the Scope
Biometric technologies are fast becoming the foundation of an extensive array of highly secure
identification and personal verification solutions. As the level of security breaches and transaction
fraud increases, the need for highly secure identification and personal verification technologies is
becoming apparent.
Biometric-based solutions are able to provide for confidential financial transactions and personal
data privacy. The need for biometrics can be found in federal, state and local governments, in the
military, and in commercial applications. Enterprise-wide network security infrastructures,
government IDs, secure electronic banking, investing and other financial transactions, retail sales,
law enforcement, and health and social services are already availing these technologies.
Consequently, various industry domains stand to benefit from the advent of such a robust and
reliable, cutting-edge technology; to name a few:
Healthcare
Security
Government
Financial/banking
Commercial enterprises
Employee Attendance system.
Educational facilities
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 5/13
TechMatrix 2009
5 | P a g e
Market Analysis - Current Statistics
Biometric characteristics can be divided in two main classes:
Physiological are related to the shape of the body. Examples include, but are not limited to
fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has
largely replaced retina, and odor/scent.
Behavioral are related to the behavior of a person. Examples include, but are not limited to
typing rhythm, gait, and voice.
Ensuring the safety and maintainability of highly critical and significant data, IT industry has given
us various biometric solutions to choose from, depending on our needs and requirements.
1. Palm Vein Identification system
A palm print identification system in which an image of the palm pattern is optically formed
and scanned to generate a video signal which is an analog of the pattern, the signal being
converted into a numerical code. Because each palm print is unique, an individual is thereby
given a singular identifying code number which is an index to the pattern.
2. Face Identification system
A facial recognition system is a computer application for automatically identifying or
verifying a person from a digital image source. One of the ways to do this is by comparing
selected facial features from the image and a facial database.
3. Retina Identification system
The Retina Identification system, which uses an iris/retina pattern to identify a customer,
extracts the matching bits between previously-registered iris data and obtained iris data
and, compares the extracted bits with the registered iris data to increase the accuracy of
customer identification.
4. Fingerprint Identification system
Automated fingerprint identification is the process of automatically matching one or many
unknown fingerprints against a database of known and unknown prints. It is a closely-
related technique used in applications such as attendance and access control systems.
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 6/13
TechMatrix 2009
6 | P a g e
Existing Solutions - A Detailed Depiction
Following are depicted some of the common biometric solutions which have been adopted to
strengthen various Access and Identification applications worldwide. These biometric measures
have been discussed below in features and aspects in order to provide clarity of view and the
knowledge to choose.
Face Identification Solution
The dimensions, proportions and physical attributes of a person's face are unique. Biometric
facial recognition systems will measure and analyze the overall structure, shape and
proportions of the face.
At enrolment, several pictures are taken of the user's face, with slightly different angles
and facial expressions, to allow for more accurate matching.
For verification and identification, the user stands in front of the camera for a few
seconds, and the scan is compared with the template previously recorded.
To prevent an image / photo of the face or a mask from being used, face biometric
systems will require the user to smile, blink, or nod their head. Also, facial
thermographs can be used to record the heat of the face (which won't be affected by a
mask).
The main advantage with the Face Identification system is that it is Not intrusive, can be
done from a distance, even without the user being aware of it (for instance whenscanning the entrance to a bank or a high security area).
However,
Face biometric systems are more suited for authentication than for identification
purposes, as it is easy to change the proportion of one's face by wearing a mask, a nose
extension, etc.
Also, it affects User perceptions / civil liberty: Most people are uncomfortable with
having their picture taken.
The procedure is very time-consuming; takes approximately 15-20 secs/ face
recognition
The solution is quite expensive; involves various minute and costly parts.
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 7/13
TechMatrix 2009
7 | P a g e
Retina Identification Solution
The blood vessels at the back of the eye have a unique pattern, from eye to eye and person to
person.
Retina scans require that the person removes their glasses, place their eye close to the
scanner, stare at a specific point, and remain still, and focus on a specified location for
approximately 10 to 15 seconds while the scan is completed.
A retinal scan involves the use of a low-intensity coherent light source, which is
projected onto the retina to illuminate the blood vessels which are then photographed
and analyzed.
A coupler is used to read the blood vessel patterns.
A retina scan cannot be faked as it is currently impossible to forge a human retina. Furthermore,
the retina of a deceased person decays too rapidly to be used to deceive a retinal scan. A retinal
scan has an error rate of 1 in 10,000,000, compared to fingerprint identification error being
sometimes as high as 1 in 500.
However, the enrollment and scanning for retinal identification are intrusive and slow.
Also, the Retinal Identification system is a very expensive application and this defines its
incapability for use in cases where price may be a factor.
Fingerprint Identification Solution
A fingerprint is made of a number of ridges and valleys on the surface of the finger. The
uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as
the minutiae points. There are five basic fingerprint patterns: arch, tented arch, left loop, right
loop and whorl. Loops make up 60% of all fingerprints, whorls account for 30%, and arches for
10%.
Fingerprints are usually considered to be unique, with no two fingers having the exact same
dermal ridge characteristics. The main technologies used to capture the fingerprint image with
sufficient detail are optical, silicon, and ultrasound.
There are two main algorithm families to recognize fingerprints:
Minutia matching compares specific details within the fingerprint ridges. At registration
(also called enrollment), the minutia points are located, together with their relative
positions to each other and their directions.
At the matching stage, the fingerprint image is processed to extract its minutia points,
which are then compared with the registered template.
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 8/13
TechMatrix 2009
8 | P a g e
Pattern matching compares the overall characteristics of the fingerprints, not only
individual points. Fingerprint characteristics can include sub-areas of certain interest
including ridge thickness, curvature, or density.
During enrollment, small sections of the fingerprint and their relative distances are
extracted from the fingerprint.
However,
The tip of the finger is a small area from which to take measurements, and ridge
patterns can be affected by cuts, dirt, or even wear and tear.
Acquiring high-quality images of distinctive fingerprint ridges and minutiae is
complicated task.
People with no or few minutia points (surgeons as they often wash their hands with
strong detergents, builders, people with special skin conditions) cannot enroll or use the
system.
The number of minutia points can be a limiting factor for security of the algorithm.Results can also be confused by false minutia points (areas of obfuscation that appear
due to low-quality enrollment, imaging, or fingerprint ridge detail).
Palm Vein Identification Solution
The pattern of blood veins is unique to every individual, even among identical twins. Palms
have a broad and complicated vascular pattern and thus contain a wealth of differentiating
features for personal identification. Furthermore, it will not vary during the person's lifetime.
It is a very secure method of authentication because this blood vein pattern lies under the skin.
This makes it almost impossible for others to read or copy.
An individual's vein pattern image is captured by radiating his/her hand with near-
infrared rays.
The reflection method illuminates the palm using an infrared ray and captures the light
given off by the region after diffusion through the palm.
The deoxidized hemoglobin in the in the vein vessels absorbs the infrared ray, thereby
reducing the reflection rate and causing the veins to appear as a black pattern. This veinpattern is then verified against a preregistered pattern to authenticate the individual.
As veins are internal in the body and have a wealth of differentiating features, attempts to forge
an identity are extremely difficult, thereby enabling a high level of security.
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 9/13
TechMatrix 2009
9 | P a g e
In addition, the sensor of the palm vein device can only recognize the pattern if the deoxidized
hemoglobin is actively flowing within the individual's veins.
“In addition, the Palm Vein Identification Solution is an efficient and reliable application; while
being very cost-effective to aid the user’s consideration.”
This system is not dangerous; a near infrared is a component of sunlight: there is no more
exposure when scanning the hand than by walking outside in the sun.
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 10/13
TechMatrix 2009
10 | P a g e
The Need of the Hour - An Optimal Solution
We aim to empower our clients by providing a highly reliable and consistent biometric
authentication system based on Palm Vein pattern Recognition technology . This application
features industry-leading authentication accuracy with extremely low false rates, and the non-
intrusive and contactless integrated reader device provides ease of use with virtually no
physiological restriction for all users.
This application is a logical solution for those situations where identification and access control is
critical. As this innovative technology is difficult to forge and highly secure, the application is
provided with an extra layer of necessary protection while ensuring an easy user interface suitable
for the work environment.
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 11/13
TechMatrix 2009
11 | P a g e
PRACTICAL APPLICATIONS OF PALM VEIN BIOMETRICS
Security systems: physical admission into secured areas with door lock and integrated
building security systems
Log-in control : network or PC access
Healthcare: ID verification for medical equipment, electronic record management
Banking and financial services: access to ATM, kiosks etc.
BENEFITS OF THE PALM-VEIN BIOMETRICS
The users of the application will reap vast benefits with this application as not only they will
guarantee total safety of their critical data; they will also enjoy unprecedented control management
over it.
Our clients are empowered to gain a significant advantage over their competitors owing to the
efficient access control and identification system; thus ensuring much better management of their
critical data.
The application brings about revolutionary changes for our users:
Improved services through enhancement of secured information sharing capabilities
Reduced organizational expenses and administrative tasks
Assistance with combating fraudulent activities
Easily integrated with existing software
Difficult to forge
Contactless, hygienic and non-invasive
Highly accurate
Capable of 1:1 and 1:many matching
Non-invasive, contactless and highly accurate biometric technology
"Healthcare organizations, government agencies, financial institutions and many other global
enterprises, rely on Palm Secure as a cost-effective, highly accurate authentication solution"
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 12/13
TechMatrix 2009
12 | P a g e
Let Us Assist You - Costing Analysis
8/3/2019 Tech Matrix Palm Information
http://slidepdf.com/reader/full/tech-matrix-palm-information 13/13
TechMatrix 2009
13 | P a g e
Tech Support Specifications
We ensure our clients extended support and maintenance as per the following norms:
Technical Support after Warranty and change request can be considered as actual as per the
requirement (Using Effort Estimation).
Integration with other technology (i.e. Smart Card, Door Closer Technology, etc.) will be
charged as actual of effort estimation.