Palm-ID Pro.

Access control based on vein pattern recognition in the palm of the hand fully integrated with most access control systems and door controllers.

The Palm-ID Pro is widely used 
within justice, government, laboratories, logistics and critical infrastructure.
Palm-ID Pro - Recogtech

Clear LED feedback

High level of security

Compatible

Easy to install

Improve your security with the Palm-ID Pro, a high-performance biometric innovation based on palm vein pattern recognition. This advanced solution is specifically designed for enterprises and government institutions with multiple access points and users. To enable full integration with all major brands, an SIC (Serial Interface Converter) from deister is integrated, allowing communication with all common access control systems. The Palm-ID Pro offers multiple outputs, including I/O, Wiegand and OSDP signals.

Combined with an access control system, you can also assign specific authorisations to designated individuals. For example, you can set it up so that the technician has access to specific rooms for maintenance, but only during certain days of the week. The system’s full database and software are stored solely on the controller, eliminating the need for additional software or database installations on the existing IT and security network. Configure the system effortlessly with the included web service, giving you both ease of use and control in a single package.
Brochure Palm-ID Pro - Recogtech
Palm-ID Pro - Recogtech
Palm-ID Pro - Recogtech
Palm-ID Pro - Recogtech
Palm-ID Pro - Recogtech

Palm-ID Pro parts

The Palm-ID Pro consists of three components: a palm scanner, a controller and an SIC.
The palm scanner allows individual users to access rooms or data for which they have authorisation. The scanner registers the vein pattern of the offered palm, which is transmitted to the controller as a template.

The controller contains the database in which the authorised persons and their unique biometric identifiers are stored. The controller compares the vein pattern of each scanned palm with the encrypted data in the database in real time.

The SIC receives a signal from the Recogtech controller via RS485. Then, based on a pre-programmed protocol (Wiegand or OSDP), the SIC communicates with your access control system that manages your door controller.

Palm-ID Pro accessories

Various accessories are available for the Palm-ID Pro. Among other things, there is a Palm-ID Pro registration kit. This tabletop model is easy to transport so you can register people at multiple locations. You capture the vein pattern in the user’s palm once. The pattern is not saved as an image: it is immediately encoded and stored digitally as a registered template.

Installation and implementation

Installation and implementation of Palm-ID Pro is carried out by recognised system integrators and installers with appropriate knowledge of access control systems and security. If you would like more information or to become an installer, please contact us.

Palm-ID Pro - Recogtech

Recent articles

Superuser functionality biometric technology

Superuser functionality biometric technology

Due to the explosive growth of cybercrime, the need for higher levels of security will increase enormously in the coming years, especially biometric security solutions based on vein pattern recognition.* Ironically, their implementation may actually create new...

Biometric access control and privacy: what does the GDPR say?

Biometric access control and privacy: what does the GDPR say?

The GDPR (General Data Protection Regulation) has been in force since 2018, and this has not gone unnoticed. Many organisations still struggle with its interpretation. In our own field, biometric access control, the GDPR also has the necessary impact. The court ruled...

FAR and FRR: security level versus ease of use

FAR and FRR: security level versus ease of use

FAR and FRR. Anyone looking to assess or compare the performance of biometric security systems cannot avoid these terms. In this article, we explain what FAR and FRR mean, how they affect each other and their implications for security level and ease of use. Let us...