Browse Definitions :
Definition

palm vein recognition

Palm vein recognition is a biometric authentication method based on the unique patterns of veins in the palms of people’s hands.

Palm vein recognition systems, like many other biometric technologies, capture an image of a target, acquire and process image data and compare it to a stored record for that individual.

How palm vein matching works:

Palm vein scanning systems, like those for finger vein ID, use a technology based on the use of near-infrared rays and the way hemoglobin in the veins reacts to them. The blood's hemoglobin is oxygenated in the lungs and the arteries then carry the oxygenated blood to deliver oxygen to tissues throughout the body. The veins carry deoxygenated blood back to the heart. 

A palm scanner illuminates the palm with near-infrared light, which is absorbed by the deoxidized hemoglobin flowing through the veins. Deoxygenated hemoglobin absorbs more light, reducing the ability of the veins to reflect the light back and causing them to appear as a black pattern that is captured as an image by the system’s camera. The raw data for that image is then processed and compared to a stored record for the individual in question.

Benefits of palm vein recognition systems:

Vascular matching systems rely on the uniqueness of vein patterns in each person, which differ more markedly from one individual to another than the patterns of fingerprints and palm prints. Because the veins are located beneath the skin’s surface and, furthermore, the scans rely on blood flowing through living humans, palm vein scans are virtually impossible to counterfeit. The systems are typically contactless, which makes them more hygienic than touch-based systems. That consideration is particularly important for healthcare environments and high-traffic venues such as supermarkets. Palm scanners are also more protective of individual privacy than some biometric technologies, such as facial recognition, because a sample cannot usually be captured without the person’s knowledge or consent. One exception to that rule, however is a healthcare context, where a palm scan could enable identification of an unconscious individual.

Palm recognition is considered a strong form of the inherence biometric authentication factor and is currently used or being considered for an increasing number of user identification and authentication applications, including online and onsite authentication, automobile security, employee time and attendance tracking, computer and network authentication, healthcare identification, end point security and ATM machines.

This was last updated in May 2016

Continue Reading About palm vein recognition

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • information lifecycle management (ILM)

    Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, ...

  • WORM (write once, read many)

    In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage ...

  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

Close