Feeds

Fujitsu unveils palm-reading security mouse

Vein pattern scanned for authentication

Internet Security Threat Report 2014

Fujitsu has introduced what it claims is the world's first mouse capable of scanning the pattern of veins in the user's hand. The reason? To use the pattern to authenticate the user for access to the host computer.

Fujitsu's PalmSecure system is not itself new - the company has been equipping ATMs and other systems in Japan with the scanning system since 2004. The technique involves illuminating the hand with near-infrared rays, which show up the veins against the skin, and taking a picture. The deoxidised haemoglobin held in the red blood cells within the veins absorbs the rays, so the picture shows a white hand marked with a network of black veins.

Fujitsu palm-vein scanning mouse
Fujitsu's vein-scanning mouse

Clever software then turns this photo into a digital pattern that can be compared against an archive of patterns stored in the computer.

Fujitsu maintains the system is highly secure, and requires the deoxidised haemoglobin to be flowing through the veins - so no lopping of hands to fool the authentication system, please.

And now the scanner's been built into a mouse. Fujitsu will be pitching the product at big business, so it's unlikely for now to make an appearance at your local computer store. But with the device ready to scan and authenticate as soon as the user pushes the mouse, it's an approach that's rather more user-friendly than swiping a fingerprint reader.

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.