Blood Vessel Imaging Access Control

January 2006
Security: Solutions for Enterprise Security Leaders;Jan2006, Vol. 43 Issue 1, p10
Trade Publication
The article features the new VA-100G finger Blood Vessel Authentication System from iAccess Systems Inc. in Long Beach, California. This system has passed the requirements under the Underwriter Laboratory (UL) Specification UL294 intended for Standard Access Control Systems. It has a two-factor system using a personal identification number. It has been added to the unique image of the blood vessel finger pattern intended for enrollment and authentication purposes.


Related Articles

  • Authentication - Antidote to Phone Hacking. Kemshall, Andy // Technical Support Magazine;Dec2011, Vol. 3 Issue 3, p15 

    The article offers information on the use of authentication to prevent phone hacking. It mentions that the great bonus to place authentication to phone is that users recognize immediately when they have lost their mobile phone and quickly report it. It states that the hacker will just get one...

  • Card Is Designed For Online Purchases.  // ATM & Debit News;5/10/2007, Vol. 7 Issue 27, p1 

    The article offers information on an Internet payment and debit card developed by VeriSign Inc. Each of the so-called double-authentication card has a constantly changing security code, which can be accessed by touching a button on the card's back. When a number is provided by a cardholder in an...

  • New VeriFone Service Authenticates PIN Pads. Woodward, Kevin // CardLine;5/28/2010, Vol. 10 Issue 22, p41 

    The article announces that a personal identification number (PIN)-entry device authentication service has been developed by Verifone Inc. in the U.S. It notes another element of security that has been offered by the new PIN-entry device authentication through periodically monitoring PIN pads....

  • Access Control Helps to Solve a Case. Scaglione, Bernard // Security: Solutions for Enterprise Security Leaders;Nov2009, Vol. 46 Issue 11, p82 

    The article reports on the importance of access control in solving crimes. It mentions that physical security programs such as high technology solutions to access control and identification programs can provide accurate and timely information that helps in the identification of persons and...

  • BIOMETRICS BREAKOUT. Engebretson, Joan // SDM: Security Distributing & Marketing;May2005, Vol. 35 Issue 5, p67 

    Describes the applications of biometric technologies in security systems. Use of fingerprint readers at drug laboratory Genzyme in Massachusetts; Installation of Taser's biometric system by Ryan Cos.; Capital Direct Lending's use of a standalone reader from iAccess Systems Inc. that uses a pass...

  • Enhanced Knowledge Based Authentication Using Iterative Session Parameters. Alkhalifah, Ali; Skinner, Geoff D. // World Academy of Science, Engineering & Technology;Dec2010, Issue 48, p293 

    No abstract available.

  • SSSL: Shoulder Surfing Safe Login. Perković, Toni; Čagalj, Mario; Rakić, Nikola // Journal of Communications Software & Systems;Jun2010, Vol. 6 Issue 2, p65 

    Classical PIN-entry methods are vulnerable to a broad class of observation attacks (shoulder surfing, key-logging). A number of alternative PIN-entry methods that are based on human cognitive skills have been proposed. These methods can be classified into two classes regarding information...

  • Ubiquitous-City Integrated Authentication System (UCIAS). Jang, Jae-Soo; Lim, Hyung-Min // Journal of Intelligent Manufacturing;Apr2014, Vol. 25 Issue 2, p347 

    Recently the information and network technologies have been applied to the urban environment. We call this type of a city a ubiquitous-city, or shortly a U-City. Security is an important factor to the success of U-City, by protecting citizen's private date and by preventing malicious attack to...

  • What Is Federated Identity Management? Kobielus, James // Business Communications Review;Aug2005, Vol. 35 Issue 8, p56 

    This article discusses various issues related to the significance of federated identity management (IdM) computer network security. Federated IdM is a hot topic right now in the world of network security. Although it has many definitions and applications, at heart, federated IdM refers to a new...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics