Feeds

Fujitsu unveils palm-reading security mouse

Vein pattern scanned for authentication

Providing a secure and efficient Helpdesk

Fujitsu has introduced what it claims is the world's first mouse capable of scanning the pattern of veins in the user's hand. The reason? To use the pattern to authenticate the user for access to the host computer.

Fujitsu's PalmSecure system is not itself new - the company has been equipping ATMs and other systems in Japan with the scanning system since 2004. The technique involves illuminating the hand with near-infrared rays, which show up the veins against the skin, and taking a picture. The deoxidised haemoglobin held in the red blood cells within the veins absorbs the rays, so the picture shows a white hand marked with a network of black veins.

Fujitsu palm-vein scanning mouse
Fujitsu's vein-scanning mouse

Clever software then turns this photo into a digital pattern that can be compared against an archive of patterns stored in the computer.

Fujitsu maintains the system is highly secure, and requires the deoxidised haemoglobin to be flowing through the veins - so no lopping of hands to fool the authentication system, please.

And now the scanner's been built into a mouse. Fujitsu will be pitching the product at big business, so it's unlikely for now to make an appearance at your local computer store. But with the device ready to scan and authenticate as soon as the user pushes the mouse, it's an approach that's rather more user-friendly than swiping a fingerprint reader.

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.