Access control in the palm of your hand

Access & Identity Management Handbook 2021 Access Control & Identity Management

Palm vein technology exploits the fact that each one of us has a unique pattern of blood vessels in the palm of our hand that is more complex than our fingerprint and never changes throughout life.

“Veins take oxygen-depleted blood back to the heart and this blood shows as black in near-infrared light. During the capture process, the palm is held a few centimetres above the scanner, which shines a near-infrared ray of light onto the user’s palm. The still image captured in the near-infrared range by the palm vein technology camera appears as a black network, reflecting the palm’s vein pattern against the lighter background of the palm,” says Dave Crawshay-Hall, chief technology officer for Fulcrum Biometrics Southern Africa.

“As veins are internal and have a wealth of differentiating features, attempts to forge an identity when using this technology are extremely difficult, thereby enabling a high level of security. Furthermore, the palm vein readers encapsulate the actual blood flow, which is as good as capturing the liveliness of the user. Even if the pattern is disclosed, fooling the scanner without blood flowing through the veins is almost impossible,” he adds.

Crawshay-Hall says that palm vein technology is extremely accurate, with an impressive false acceptance rate tested at 0,00008% and false rejections of just 0,01%. “This makes the technology similarly reliable to iris pattern scanning technology and more reliable than fingerprint scanning technology.” The speed at which a scan takes place is rapid, with a similarly notable authentication time of less than one second.

Since palm vein is a mature technology, there are many off-the-shelf products available on the market, so rapid deployment of the technology into many applications is generally a relatively painless process.

“This technology is very versatile and lends itself well to many applications, but because of the limited number of vendors offering this technology, the solutions tend to be proprietary and have a relatively high cost, which may be seen as a barrier to entry in certain markets. However, given the extreme accuracy it provides and its anti-spoofing measures, it would certainly benefit organisations for which other identification methods are not suitable,” says Crawshay-Hall.

Since vein pattern recognition is not impacted by dirt on the surface of the skin, by cuts, bruises, scars, or even moisture or dryness of the fingertips or the palm, it can be deployed for a range of applications in different industries, and this is especially appropriate to countries where a large percentage of the workforce use their hands, as in southern Africa.

Crawshay-Hall says that in terms of reliability, fingerprints and facial features may vary over time, whereas the palm vein pattern remains the same throughout a person’s lifetime. “This is particularly useful, since the user won’t be required to re-enrol at any stage. Additionally, instances of the palm vein structure getting damaged are extremely rare.”

While first-generation palm vein sensors were sensitive to palm placement and ambient light – which often necessitated the use of a hand guide – modern sensors are 50% smaller, have improved capture and authentication capabilities, and also have the ability to capture even a slowly moving palm. Changes to environmental tolerances also enable the sensor to operate in higher ambient sunlight and temperature conditions.

“Palm vein recognition systems are designed to withstand tough conditions and are resilient to dirt, dust, grease or moisture and require no physical contact with the surface of the sensor, thus making them a suitable alternative to facial recognition biometric technology in the COVID-19 era and beyond,” says Crawshay-Hall.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

What to do in the face of growing ransomware attacks
Technews Publishing Cyber Security Security Services & Risk Management
Ransomware attacks are proliferating, with attackers becoming more sophisticated and aggressive, and often hitting the same victims more than once, in more than one way.

Texecom launches the Midnight Black Collection
Technews Publishing Perimeter Security, Alarms & Intruder Detection Products
Working in harmony with darker environments, the Midnight Black Collection has been created for businesses and sites that require or prefer a security solution which offers discreet protection that compliments their surroundings.

SAN market set for growth
Technews Publishing News IT infrastructure
Storage-area network (SAN) market to hit US$ 26,86 billion in revenue by the end of 2029 due to factors like widespread adoption of Hybrid SAN-NAS solutions.

Optimising remote technical support
Technews Publishing Asset Management, EAS, RFID Products
Sanden Intercool Kenya improves efficiency, removes manual processes with FIELDForce from MACmobile, making its technical backup and support staff more productive, while also optimising record keeping.

Free-to-use solar score for South African homes
Technews Publishing Editor's Choice
The LookSee Solar Score is one of the first of its kind to provide insight into the potential of solar power for South Africa’s residential properties.

CA Southern Africa unmasks container security
Technews Publishing IT infrastructure Cyber Security
Adoption of software containers has risen dramatically as more organisations realise the benefits of this virtualised technology.

Gallagher to showcase new Controller 7000 single door
Technews Publishing Access Control & Identity Management Products
Gallagher will be showcasing its latest access control innovation, the Controller 7000 Single Door on its stand at Intersec Dubai from 17-19 January 2023.

Fast, reliable and secure cloud services
Technews Publishing Editor's Choice Cyber Security IT infrastructure
Security and speed are critical components of today’s cloud-based services infrastructure. Cloudflare offers a range of services supporting these goals beyond what most people think it does.

Healthcare and the edge
Technews Publishing Healthcare (Industry)
With the proliferation of IoT devices in healthcare, more data is generated which drives the need to distribute it efficiently and keep it closer to the user.

Sasol ensures Zero Trust for SAP financials with bioLock
Technews Publishing Editor's Choice Cyber Security Security Services & Risk Management
Multi-factor authentication, including biometrics, for SAP Financials from realtime North America prevents financial compliance avoidance for Sasol.