Feeds

Hitachi goes global with vein recognition biometric

Buster Bloodvessel

Secure remote control for conventional and virtual desktops

Retinal scans, finger prints or facial recognition get most of the attention but developers across the world are quietly labouring away at alternative types of biometrics.

Recognition by the way someone walks (their gait) or the rhythm they make when they type and others have each been tried as potential biometrics. Hitachi is adding to this stock with the worldwide release this month of a finger vein identity authentication device.

Kit based on the technology will be available. Hitachi is also making a software development kit available to integrate the unit into existing security set-ups.

The product is based on PC log-in technology that's been on sale in Japan since October 2006. The technology is also as a validation device for bank ATMs: according to Hitachi, about 80 per cent of the financial institutions in Japan had adopted finger vein biometrics by the end of March 2007. Other applications such as opening car doors may also be possible.

The technology uses the vein patterns in users' fingers to manage their computer login process. A single chip design means the unit can be small and cheap.

User biometrics are captured, and subsequently verified, using a contact-less technique. Light penetrates through the finger using a light-transmission technique to allow the detection of the structure of the vein pattern. This vein pattern is image-processed using a special algorithm, resulting in digital data that can be stored in a relevant data repository.

Hitachi reckons vein authentication can offer higher accuracy rates than finger print recognition, with the additional benefit that finger vein patterns are thought to be impossible to forge. By contrast, finger print recognition technology has proved all too susceptible to attack. ®

New hybrid storage solutions

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.