Vein scanner.
The vein scanner of Recogtech works on the basis of vein pattern recognition.
The Palm-ID is a system based on PalmSecureTM. This is an extremely reliable security method developed by Fujitsu.
User-friendly
Fraud resistant
Simple configuration
One-minute registration
There are several biometric solutions but the vein scanner is more secure than others because every palm has a unique vein pattern which can be scanned using an infrared camera.
The vein scanner is the next-generation product which is considerably more resistant to fraud than fingerprint recognition. Towards your fingerprint, iris, or face, the palm vein pattern is internal. Are you looking for an access solution to protect your premises or confidential data? The vein scanner of Recogtech is the ideal option.
Product information
The vein scanner security access consists of 3 components: a registration unit, a vein scanner and a controller. There are different biometric solutions. Besides being accurate and fraud-proof, the vein scanner is also hygienic, quick and extremely easy to use. Users are very positive about the vein scanner. Also the vein has a larger surface area and is capturing over 5 million data points. This is far more than other techniques and therefore the vein scanner has the lowest false acceptance rate and false rejection rate compared to other biometrics.
Registration unit
First the registration unit is used to record the vein pattern in the user’s palm. You only need to do this once. Instead of being stored as an image, the pattern is immediately encoded and stored digitally in the form of a registered template.
Vein scanner
The vein scanner is installed and gives individual users access to rooms or data for which they have been granted autorisation. The palm vein scanner records the vein pattern of the palm and sends it to the controller.
The controller
The controller contains the database in which authorised individuals and their unique biometric characteristics are stored. It compares the vein pattern of the offered palm with the encrypted data in the database in real time.
Installation and implemenation
The installation and implementation of the vein scanner will be done by well-known system integrators and installers with in-depth knowledge of access control systems and security. We support our partners with information and training, on-site and off-site, to ensure you receive a solution that perfectly meets your wishes and requirements.
Advantages vein scanner
- Very user-friendly: use your vein to gain access
- Extremely accurate and resistant to fraud
- Easy to combine with existing security systems (like for example card readers)
- Highest security at database level
- Also available in a one device combination with card-reader: the Palm-ID Card is GDPR compliant (privacy proof)
About Recogtech
Recogtech was the first company in the world to use Fujitsu’s PalmSecureTM vein scanner to create an effective palm access control scanner based on recognition of the vein pattern in your hand. Director Eduard de Knegt, a member of the Dutch Association for Biometrics and Identity (VVBI), is also an authority in the area of biometrics himself.
Recent articles
Superuser functionality biometric technology
Due to the explosive growth of cybercrime, the need for higher levels of security will increase enormously in the coming years, especially biometric security solutions based on vein pattern recognition.* Ironically, their implementation may actually create new...
Biometric access control and privacy: what does the GDPR say?
The GDPR (General Data Protection Regulation) has been in force since 2018, and this has not gone unnoticed. Many organisations still struggle with its interpretation. In our own field, biometric access control, the GDPR also has the necessary impact. The court ruled...
FAR and FRR: security level versus ease of use
FAR and FRR. Anyone looking to assess or compare the performance of biometric security systems cannot avoid these terms. In this article, we explain what FAR and FRR mean, how they affect each other and their implications for security level and ease of use. Let us...