Biometric methods for identifying and authenticating persons are more and more in trend when it comes to increasing security in the areas of access control, time management and payment.  Since its first introduction onto the European market in Spring 2004, vein biometrics has received increasing attention: The VP-II "vein scanner“ of the LEGIC partner RTC checks identity based on the vessel pattern on the back of the hand.  The biometric data (210 Byte) can be stored on a LEGIC credential.

With "SEVA 3D“ RTC now offers high-security biometric access control using LEGIC technology which allows physical and organisational authorities to be separated and which represents a new dimension in the area of opening safes/vaults using redundant key technology.

The first installation of this kind was recently put into operation by a Swiss bank located in Zurich.  Normal key technology with keys and code entry was re-equipped to SEVA 3D and redundant lock motors.

The operating design calls for system encryption when putting into operation by means of customised password.  Biometric detection of authorisations to open the safe and the opening of the safe itself are always using dual control.  Every authorisation credential is also individually encrypted in addition to the LEGIC security features.  In addition to biometrics, emergency opening is possible using a coded keyboard with separate lock control.

The operating design can generally be adapted to all kinds of customer requirements and can not only be used for opening safes and vaults but for many other high-security access controls.

The advantages of this solution are in the fast and easy handling of the biometrics system as well as the physical separation between the identity check, data storage and lock control system.  The authorised user no longer needs to remember a code or to carry a key.  He can use his normal access credential that is immediately linked to his identity through the additional storage of his biometric features and which can therefore only be used by himself.  The security risk in case of loss of theft is therefore eliminated.

Finally, observance of pertinent data protection regulations is guaranteed as the biometrical data remain within the control and at the disposal of the user.
Download PDF version Download PDF version

In case you missed it

Comprehensive K12 security
Comprehensive K12 security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing the right fingerprint capture technology
Choosing the right fingerprint capture technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How do new security technologies transform retail and loss prevention?
How do new security technologies transform retail and loss prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...