recommended reading

Get Ready to Pay for Things With Your Veins

Sebastian Kaulitzki/Shutterstock.com

Fingerprint scanners like those on the latest iPhones could soon give way to another biometric identifier: The geometry of the veins in your hands.

Hackers in the Chaos Computer Club last year fooled the Apple TouchID, which unlocks the iPhone 5S when presented with a familiar finger, by creating a copy of fingerprint residue. Fingerprints, the hackers wrote in a blog post, are a terrible way to secure your information: You leave them everywhere when you touch things, and it’s (relatively) easy to create fakes that fool the current scanner technology.

But if you’re still looking to replace passwords with biometric scans, there’s still hope. We now have an increasing number of scanners that identify you by the pattern of veins in your hand instead.

Vein geometry is just as unique as irises and fingerprints. The serpentine network of your vascular system is determined by many factors, including random influences in the womb. The result is a chaotic, singular print. Even twins have different vein structure in their hands. Vein patterns don’t change much as you age, so a scan of your palm can serve as biometric identification for the rest of your life.

Fujitsu has already produced a standalone palm-vein scanner as well as integrated one into its laptops. ComputerWorld reported last month that the Japanese company might soon use them to unlock cellphones as well.
Vein scanners could be used to unlock everything from your phone to your front door, but the technology may get its first mainstream use for fast-and-easy point of sale payments. US company Biyo (which debuted at 2012′s Consumer Electronics Show as PulseWallet) is the first to provide payment terminals that connect a palm scan to a credit card. And now a number of stores and eateries at Lund University in Sweden offer Quixter, a vein pattern payment system developed by student Fredrik Leifland. With 1,600 users, Leifland considers his system to be the first truly functional one of its kind. You can see it in action here.
Reprinted with permission from Quartz. The original story can be found here.

(Image via Sebastian Kaulitzki/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.