Feeds

Fujitsu unveils palm-reading security mouse

Vein pattern scanned for authentication

Choosing a cloud hosting partner with confidence

Fujitsu has introduced what it claims is the world's first mouse capable of scanning the pattern of veins in the user's hand. The reason? To use the pattern to authenticate the user for access to the host computer.

Fujitsu's PalmSecure system is not itself new - the company has been equipping ATMs and other systems in Japan with the scanning system since 2004. The technique involves illuminating the hand with near-infrared rays, which show up the veins against the skin, and taking a picture. The deoxidised haemoglobin held in the red blood cells within the veins absorbs the rays, so the picture shows a white hand marked with a network of black veins.

Fujitsu palm-vein scanning mouse
Fujitsu's vein-scanning mouse

Clever software then turns this photo into a digital pattern that can be compared against an archive of patterns stored in the computer.

Fujitsu maintains the system is highly secure, and requires the deoxidised haemoglobin to be flowing through the veins - so no lopping of hands to fool the authentication system, please.

And now the scanner's been built into a mouse. Fujitsu will be pitching the product at big business, so it's unlikely for now to make an appearance at your local computer store. But with the device ready to scan and authenticate as soon as the user pushes the mouse, it's an approach that's rather more user-friendly than swiping a fingerprint reader.

Choosing a cloud hosting partner with confidence

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.