Advances in UV technology for biometric disinfection

Access & Identity Management Handbook 2021 Editor's Choice

Ideco Biometrics has a new solution for disinfecting biometric sensors by using ultraviolet technologies to destroy most known viruses and bacteria. The company has introduced Steri-C, an ultraviolet disinfection device to ensure the safe use of touch-based fingerprint readers.

Steri-C is easily mountable on existing fingerprint readers and has no adverse impact on the normal operations or accuracy of the fingerprint reader. It offers fast and effective UV irradiation for optimal destruction of all known microorganisms, including the SARS-CoV-2 virus responsible for COVID-19.

Hi-Tech Security Solutions asked Ideco’s CEO, Marius Coetzee, how the solution is applied to existing equipment. Coetzee replied that depending on the type of fingerprint reader, the device can either be fixed directly to the reader or attached using a custom-made bracket. “When installing the unit, it is however important to position the UV-C light centre to the surface area of the fingerprint sensor, not more than 25 mm away from the sensor to ensure sufficient UVC irradiation of the sensor.”

The device itself is 4,6 mm thick, which ensures it takes as little space as possible and can be used on almost any biometric reader. More specifically, Coetzee explains it will work on any fingerprint reader with a surface area not more than 24 mm x 24 mm. However, he advises that the device is not IP rated and should not be used in direct sunlight or rain.

Backed by research

The use of UV-C (200-225 nm) as a disinfectant is supported by decades of scientific research and has been used for disinfection with applications in water treatment, air systems and surfaces. UV light is able to achieve thorough disinfection far quicker than the other traditional methods; it is highly effective in destroying viruses, bacteria and fungal spores.

Steri-C is based on Ultraviolet Germicidal Irradiation (UVGI) recommendations for medical sanitisation practice according to the International Ultraviolet Association (IUVA) and the FDA. The specific UV-C used by Steri-C was proven effective against the coronavirus by Boston University’s National Emerging Infectious Diseases Laboratories.

When viruses are exposed to UV-C, its effects on the molecular structures destroy the structural bonds in the DNA, with a resultant rendering of the virus harmless and stopping its spread.

Coetzee adds that the unit is configured to supply 1,8 seconds of irradiation after every use, which delivers a sufficient dose to ensure the safe use of the fingerprint reader, if installed correctly.

Netcare also recently introduced the Xenex Pulsed Xenon UV disinfection robot, a germ-zapping robot to take the war on ‘superbugs’ to a new level. The robot emits UV-C spectrum light, which destroys the DNA of bacteria, viruses and fungi to neutralise them and prevent them from replicating.

Fast and effective

Coetzee says Steri-C is ideal to make biometric readers COVID-19 safe and maintain normal biometric operations during high-risk periods. “It is the perfect solution for improving hygiene and to limit contamination. Steri-C has been designed for fast and effective operations, ready to be integrated into your existing fingerprint readers.”

The device can be retrofitted to most fingerprint readers available on the market. Disinfection is triggered immediately after every use of the reader. It boasts built-in intelligence to automatically detect when the biometric terminal has been used.

“Steri-C can be pre-installed as a standard feature on biometric terminals purchased from Ideco,” he concludes.


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.