Access control in the palm of your hand

Access & Identity Management Handbook 2021 Access Control & Identity Management

Palm vein technology exploits the fact that each one of us has a unique pattern of blood vessels in the palm of our hand that is more complex than our fingerprint and never changes throughout life.

“Veins take oxygen-depleted blood back to the heart and this blood shows as black in near-infrared light. During the capture process, the palm is held a few centimetres above the scanner, which shines a near-infrared ray of light onto the user’s palm. The still image captured in the near-infrared range by the palm vein technology camera appears as a black network, reflecting the palm’s vein pattern against the lighter background of the palm,” says Dave Crawshay-Hall, chief technology officer for Fulcrum Biometrics Southern Africa.

“As veins are internal and have a wealth of differentiating features, attempts to forge an identity when using this technology are extremely difficult, thereby enabling a high level of security. Furthermore, the palm vein readers encapsulate the actual blood flow, which is as good as capturing the liveliness of the user. Even if the pattern is disclosed, fooling the scanner without blood flowing through the veins is almost impossible,” he adds.

Crawshay-Hall says that palm vein technology is extremely accurate, with an impressive false acceptance rate tested at 0,00008% and false rejections of just 0,01%. “This makes the technology similarly reliable to iris pattern scanning technology and more reliable than fingerprint scanning technology.” The speed at which a scan takes place is rapid, with a similarly notable authentication time of less than one second.

Since palm vein is a mature technology, there are many off-the-shelf products available on the market, so rapid deployment of the technology into many applications is generally a relatively painless process.

“This technology is very versatile and lends itself well to many applications, but because of the limited number of vendors offering this technology, the solutions tend to be proprietary and have a relatively high cost, which may be seen as a barrier to entry in certain markets. However, given the extreme accuracy it provides and its anti-spoofing measures, it would certainly benefit organisations for which other identification methods are not suitable,” says Crawshay-Hall.

Since vein pattern recognition is not impacted by dirt on the surface of the skin, by cuts, bruises, scars, or even moisture or dryness of the fingertips or the palm, it can be deployed for a range of applications in different industries, and this is especially appropriate to countries where a large percentage of the workforce use their hands, as in southern Africa.

Crawshay-Hall says that in terms of reliability, fingerprints and facial features may vary over time, whereas the palm vein pattern remains the same throughout a person’s lifetime. “This is particularly useful, since the user won’t be required to re-enrol at any stage. Additionally, instances of the palm vein structure getting damaged are extremely rare.”

While first-generation palm vein sensors were sensitive to palm placement and ambient light – which often necessitated the use of a hand guide – modern sensors are 50% smaller, have improved capture and authentication capabilities, and also have the ability to capture even a slowly moving palm. Changes to environmental tolerances also enable the sensor to operate in higher ambient sunlight and temperature conditions.

“Palm vein recognition systems are designed to withstand tough conditions and are resilient to dirt, dust, grease or moisture and require no physical contact with the surface of the sensor, thus making them a suitable alternative to facial recognition biometric technology in the COVID-19 era and beyond,” says Crawshay-Hall.


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Amendments to the Private Security Industry Regulations
Technews Publishing Agriculture (Industry) News & Events Associations
SANSEA, SASA, National Security Forum, CEO, TAPSOSA, and LASA oppose recently published Amendments to the Private Security Industry Regulations regarding firearms.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Local is a lekker challenge
Secutel Technologies Technews Publishing AI & Data Analytics
There are a number of companies focused on producing solutions locally, primarily in the software arena, but we still have hardware producers churning out products, many doing business locally and internationally.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...