Smartcards and hand geometry may provide stricter security measures

September 2002 Access Control & Identity Management

While smartcards can provide quality security measures for applications such as access control, it is possible to crack them - and smartcard developers continually have to identify these possible weaknesses and come up with counter measures.

According to Clive Handley, executive at NamITech New and Emerging Business, smartcards, used in conjunction with fingerprint recognition and hand geometry, have the ability to significantly cut down on fraud and to increase security.

"An investigation by the US Justice Department, known as Operation Smartcard.net, discovered that TV operators could be losing more than $6 million (about R60m) a year in the United States alone thanks to fraudulent conditional access cards," says Handley.

"Despite the swap-outs and electronic counter measures operators use to kill pirated cards, hackers are continually inventing new ways of trying to bypass security. On the other hand, chip manufacturers," said Handley, "are continually improving features and safeguards."

When it comes to applications such as access control, smartcards can be used in conjunction with other security technology to elevate the safety standards even further. "It is now possible to have employees identify themselves at access control points by means of chip cards carrying biometric data. In fact, since the 11 September Twin Towers attack in the Unites States, this type of technology has been implemented at a number of airports.

"One of the other possible biometric-based solutions that could be used is hand geometry. Even locally this technology is being successfully used, especially at very sensitive areas. Anglo Gold, for instance, is using hand geometry for access control and time and attendance at its mineshafts. This technology has removed the risk of unidentified persons entering the mines undetected. The verification process takes less than a second; it is reliable and definitely enhances security levels," concludes Handley.

For more information: NamITech, 011 458 0000.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...