recommended reading

Get Ready to Pay for Things With Your Veins

Sebastian Kaulitzki/

Fingerprint scanners like those on the latest iPhones could soon give way to another biometric identifier: The geometry of the veins in your hands.

Hackers in the Chaos Computer Club last year fooled the Apple TouchID, which unlocks the iPhone 5S when presented with a familiar finger, by creating a copy of fingerprint residue. Fingerprints, the hackers wrote in a blog post, are a terrible way to secure your information: You leave them everywhere when you touch things, and it’s (relatively) easy to create fakes that fool the current scanner technology.

But if you’re still looking to replace passwords with biometric scans, there’s still hope. We now have an increasing number of scanners that identify you by the pattern of veins in your hand instead.

Vein geometry is just as unique as irises and fingerprints. The serpentine network of your vascular system is determined by many factors, including random influences in the womb. The result is a chaotic, singular print. Even twins have different vein structure in their hands. Vein patterns don’t change much as you age, so a scan of your palm can serve as biometric identification for the rest of your life.

Fujitsu has already produced a standalone palm-vein scanner as well as integrated one into its laptops. ComputerWorld reported last month that the Japanese company might soon use them to unlock cellphones as well.
Vein scanners could be used to unlock everything from your phone to your front door, but the technology may get its first mainstream use for fast-and-easy point of sale payments. US company Biyo (which debuted at 2012′s Consumer Electronics Show as PulseWallet) is the first to provide payment terminals that connect a palm scan to a credit card. And now a number of stores and eateries at Lund University in Sweden offer Quixter, a vein pattern payment system developed by student Fredrik Leifland. With 1,600 users, Leifland considers his system to be the first truly functional one of its kind. You can see it in action here.
Reprinted with permission from Quartz. The original story can be found here.

(Image via Sebastian Kaulitzki/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.