Smartcards and hand geometry may provide stricter security measures

September 2002 Access Control & Identity Management

While smartcards can provide quality security measures for applications such as access control, it is possible to crack them - and smartcard developers continually have to identify these possible weaknesses and come up with counter measures.

According to Clive Handley, executive at NamITech New and Emerging Business, smartcards, used in conjunction with fingerprint recognition and hand geometry, have the ability to significantly cut down on fraud and to increase security.

"An investigation by the US Justice Department, known as Operation Smartcard.net, discovered that TV operators could be losing more than $6 million (about R60m) a year in the United States alone thanks to fraudulent conditional access cards," says Handley.

"Despite the swap-outs and electronic counter measures operators use to kill pirated cards, hackers are continually inventing new ways of trying to bypass security. On the other hand, chip manufacturers," said Handley, "are continually improving features and safeguards."

When it comes to applications such as access control, smartcards can be used in conjunction with other security technology to elevate the safety standards even further. "It is now possible to have employees identify themselves at access control points by means of chip cards carrying biometric data. In fact, since the 11 September Twin Towers attack in the Unites States, this type of technology has been implemented at a number of airports.

"One of the other possible biometric-based solutions that could be used is hand geometry. Even locally this technology is being successfully used, especially at very sensitive areas. Anglo Gold, for instance, is using hand geometry for access control and time and attendance at its mineshafts. This technology has removed the risk of unidentified persons entering the mines undetected. The verification process takes less than a second; it is reliable and definitely enhances security levels," concludes Handley.

For more information: NamITech, 011 458 0000.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...