Vein scanning - undisputed identification and authentication

Access & Identity Management Handbook 2006 Access Control & Identity Management

The use of biometrics is unlimited and highly accurate. Among many others, it provides the solution to eliminate fraud with drivers' licences, ID documents, passports and confidential records such as university degrees and legal ­documents.

The methods of biometric authentication used worldwide include fingerprint, iris, voice, face, hand, vein and signature identification. Hand vascular pattern person identification technology - or vein scanning - is the next generation in biometric technology. The system is believed to change the paradigm of the biometric system market through its system usability. Vein recognition guarantees imperative security because it is almost impossible to duplicate a vein. This is the ideal solution where high security access is needed and ease of use perpetuates this system as the ultimate access control product to introduce in an ever expanding market.

Vein scanners in the mining industry, for instance, offer a better solution than fingerprint readers because miners' fingerprints are often grimy or damaged by their underground work. Manual labourers often have their fingerprints damaged to such an extent that the reading of fingerprints becomes impossible.

For identification purposes, vein scanners are claimed to be faster and more effective than fingerprint readers. The scanners 'read' a person's veins through a photo and heat process. Just as every individual's fingerprints are unique, their heat emission and vein patterns are similarly unique.

The greatest advantage of these systems is the speed and accuracy with which people can be identified. Using the example of miners again, the number of miners going up and down a shaft each day is tremendous and if this process is not running at an optimal speed, it can have a critical effect on the production of a shaft. Long queues and waiting periods also cause frustration and irritation for workers, which leads to possible situations of unnecessary conflict. With the high speed of the vein scanner, the flow of miners can be increased to an optimum level.

Vein scanners can also be used to ensure that workers have undergone medical examinations. Due to the nature of their working conditions, miners are expected to undergo medical tests on a regular basis. When integrating the systems, a miner can be denied access to the canteen or a shaft if he has not gone for a medical examination.

As far as cost savings go, vein scanning can play an important role in the control of fraud committed by workers, for example wages paid to ghost workers, unauthorised use of company canteens and the management of equipment and clothing handed out by employers. Stricter control of 'buddy-clocking' also increases safety levels by preventing unauthorised people from entering restricted areas or danger zones.

For more information contact Jans Wesssels, DexSecurity Solutions, +27 (0) 11 644 6500, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...