• Call Us : (+61) 423 630 379
  • Email : admin@atss.tech

What is palm vein technology

Palm Vein Technology is a contactless authentication technology that uses vascular patterns as personal identification data. Palm Vein recognition technology is secure because the authentication data exists inside the body and is therefore very difficult to defraud

How does it work?

Palm vein authentication works by comparing the pattern of veins in the palm of a person being authenticated with a pattern stored in a database. Vascular patterns are unique to each individual - even identical twins have different patterns.

Since the vascular patterns exist inside the body, they cannot be stolen by means of photography, physically copying the pattern, or by any other means, making Palm Vein Technology far more secure than other forms of biometrics.

Simple operation

Our Palm Vein scanning Unit is completely contactless. Simply hold your hand above the sensor to begin the authentication process

Super-fast response time

Our matching server will authenticate user's with an average speed of around 0.6 of a second

FALSE ACCEPTANCE RATE

The False Acceptance Rate `{`FAR`}` of our Palm Vein units is 0.0001 percent, making it around 90 percent more accurate and secure than our nearest biometric competitor - iris scanning

Authentisure palm vein access control unit
colour screen

When presenting a user's palm for authentication, our colour screen will show simple instructions to guide the user's hand into the correct position

Contactless Authentication

Safe and hygienic - our Palm Vein solutions do not require cleaning or disinfecting after each use

FALSE REJECTION RATE

The False Rejection Rate `{`FRR`}` for all biometric authentication methods is similar at around 0.01 percent

Security features of atlass solutions

The security features surrounding our authentication processes are second to none:

    • Five million data reference points
    • No image of the vein pattern is stored in any database
    • The vein pattern is converted to a date file within the sensor
    • The data file is encrypted at 256 bit AES prior to being forwarded to the matching server
    • Every client has their own encryption key, preventing data files being stolen from one database and used in another
    • Our solutions are contactless, making them safe and hygienic