recommended reading

Get Ready to Pay for Things With Your Veins

Sebastian Kaulitzki/

Fingerprint scanners like those on the latest iPhones could soon give way to another biometric identifier: The geometry of the veins in your hands.

Hackers in the Chaos Computer Club last year fooled the Apple TouchID, which unlocks the iPhone 5S when presented with a familiar finger, by creating a copy of fingerprint residue. Fingerprints, the hackers wrote in a blog post, are a terrible way to secure your information: You leave them everywhere when you touch things, and it’s (relatively) easy to create fakes that fool the current scanner technology.

But if you’re still looking to replace passwords with biometric scans, there’s still hope. We now have an increasing number of scanners that identify you by the pattern of veins in your hand instead.

Vein geometry is just as unique as irises and fingerprints. The serpentine network of your vascular system is determined by many factors, including random influences in the womb. The result is a chaotic, singular print. Even twins have different vein structure in their hands. Vein patterns don’t change much as you age, so a scan of your palm can serve as biometric identification for the rest of your life.

Fujitsu has already produced a standalone palm-vein scanner as well as integrated one into its laptops. ComputerWorld reported last month that the Japanese company might soon use them to unlock cellphones as well.
Vein scanners could be used to unlock everything from your phone to your front door, but the technology may get its first mainstream use for fast-and-easy point of sale payments. US company Biyo (which debuted at 2012′s Consumer Electronics Show as PulseWallet) is the first to provide payment terminals that connect a palm scan to a credit card. And now a number of stores and eateries at Lund University in Sweden offer Quixter, a vein pattern payment system developed by student Fredrik Leifland. With 1,600 users, Leifland considers his system to be the first truly functional one of its kind. You can see it in action here.
Reprinted with permission from Quartz. The original story can be found here.

(Image via Sebastian Kaulitzki/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.