Biometric methods for identifying and authenticating persons are more and more in trend when it comes to increasing security in the areas of access control, time management and payment.  Since its first introduction onto the European market in Spring 2004, vein biometrics has received increasing attention: The VP-II "vein scanner“ of the LEGIC partner RTC checks identity based on the vessel pattern on the back of the hand.  The biometric data (210 Byte) can be stored on a LEGIC credential.

With "SEVA 3D“ RTC now offers high-security biometric access control using LEGIC technology which allows physical and organizational authorities to be separated and which represents a new dimension in the area of opening safes/vaults using redundant key technology.

The first installation of this kind was recently put into operation by a Swiss bank located in Zurich.  Normal key technology with keys and code entry was re-equipped to SEVA 3D and redundant lock motors.

The operating design calls for system encryption when putting into operation by means of customised password.  Biometric detection of authorisations to open the safe and the opening of the safe itself are always using dual control.  Every authorisation credential is also individually encrypted in addition to the LEGIC security features.  In addition to biometrics, emergency opening is possible using a coded keyboard with separate lock control.

The operating design can generally be adapted to all kinds of customer requirements and can not only be used for opening safes and vaults but for many other high-security access controls.

The advantages of this solution are in the fast and easy handling of the biometrics system as well as the physical separation between the identity check, data storage and lock control system.  The authorized user no longer needs to remember a code or to carry a key.  He can use his normal access credential that is immediately linked to his identity through the additional storage of his biometric features and which can therefore only be used by himself.  The security risk in case of loss of theft is therefore eliminated.

Finally, observance of pertinent data protection regulations is guaranteed as the biometrical data remain within the control and at the disposal of the user.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...