contactless biometricsBioGuard and Fujitsu, leaders in biometric solutions, have teamed together to create a contactless, biometric authentication system for verifying an individual’s identity by recognizing the unique pattern of veins in the palm.

Combining Fujitsu’s breakthrough Palm Vein Authentication technology (see test results using Fujitsu’s PalmSecure device) with BioGuard’s compact product design and management software, this solution maximizes accuracy and ease of use for security-based applications.

Using Fujitsu’s “no touch” palm vein scanning technology, ID-POD ™  provides the same level of reliability and accuracy of iris recognition, with the ease of use of fingerprint recognition. It addresses the growing scourge of credit card and smart card fraud, as well as helping organizations comply with HIPAA and other legal requirements. ID-POD ™  is suitable for a wide range of vertical markets, including Smart ID security, financial/banking, healthcare, commercial enterprises and educational facilities.

Download: Palm Access Control – User Manual v3.0

Key Features and Benefits

ID-POD ™  leverages the inherent advantages of palm vein authentication to provide organizations with the following key benefits:

Accuracy and Reliability – Uniqueness and complexity of vein patterns, together with advanced authentication algorithms, ensure unsurpassed accuracy. Field test results show exceptionally low FTE (failure to enroll) rates, recognition attempt duration less than iris recognition, and near-zero false rejection and false acceptance rates.

Security – Vein patterns are internal and unexposed, making them almost impossible to duplicate or forge. Images are converted into encrypted biometric templates at the sensor level, preventing misuse of the actual image.

Contactless – Hygienic, non-invasive, “no touch” technology enables use when hands are dirty, wet or even wearing latex gloves.

Cost-Effective – Attractively priced while saving you the huge potential costs of malpractice litigation, privacy violations, etc. Provides a high level of security at a reasonable cost.

Usability – Compact form factor provides greater flexibility and ease of implementation in a variety of security applications.

How ID-POD ™ Authentication Technology Works

Palm vein authentication technology works by identifying the subcutaneous (beneath the skin) vein patterns in an individual’s hand. When a user’s hand is held over a scanner, a near-infrared light maps the location of the veins. The red blood cells (hemoglobin) present in the veins absorb the rays and show up on the map as black lines, whereas the remaining hand structure shows up as white. This vein pattern is then verified against a preregistered pattern to authenticate the individual.

As veins are internal in the body and have a wealth of differentiating features, attempts to forge an identity are extremely difficult, thereby enabling a high level of security. Additionally, the sensor of the palm vein device can only recognize the pattern if the hemoglobin is actively flowing within the individual’s veins.

ID-POD ™ Authentication Workflow
An individual inserts a smart card into the sensor device and holds her hand over the reader. The vein pattern is instantly captured using a completely safe near-infrared light. The reader converts the image into an encrypted biometric template and compares it against the template on the smart card (1 to 1 matching) or those in the database (1 to N matching).

Using a built-in speaker, the device instructs the user to place his hand over the device and informs the user when the scan is complete.

In the example below, the template is stored in a smart card. This enhances security since the template never leaves the card. Alternatively, the reference templates can be stored in a database on a server (1 to N matching).

how it works

The first step in all palm vein authentication applications is the enrollment process, which scans the user’s palm and records the unique pattern as an encrypted biometric template in the database or on the smart card itself. In banking applications, for example, once a new customer has been issued a smart card, he/she is asked to visit the bank in order to enroll her vein data.

Learn more about ID-POD security