Feeds

Hitachi goes global with vein recognition biometric

Buster Bloodvessel

Using blade systems to cut costs and sharpen efficiencies

Retinal scans, finger prints or facial recognition get most of the attention but developers across the world are quietly labouring away at alternative types of biometrics.

Recognition by the way someone walks (their gait) or the rhythm they make when they type and others have each been tried as potential biometrics. Hitachi is adding to this stock with the worldwide release this month of a finger vein identity authentication device.

Kit based on the technology will be available. Hitachi is also making a software development kit available to integrate the unit into existing security set-ups.

The product is based on PC log-in technology that's been on sale in Japan since October 2006. The technology is also as a validation device for bank ATMs: according to Hitachi, about 80 per cent of the financial institutions in Japan had adopted finger vein biometrics by the end of March 2007. Other applications such as opening car doors may also be possible.

The technology uses the vein patterns in users' fingers to manage their computer login process. A single chip design means the unit can be small and cheap.

User biometrics are captured, and subsequently verified, using a contact-less technique. Light penetrates through the finger using a light-transmission technique to allow the detection of the structure of the vein pattern. This vein pattern is image-processed using a special algorithm, resulting in digital data that can be stored in a relevant data repository.

Hitachi reckons vein authentication can offer higher accuracy rates than finger print recognition, with the additional benefit that finger vein patterns are thought to be impossible to forge. By contrast, finger print recognition technology has proved all too susceptible to attack. ®

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.