Вы находитесь здесь: English Biometrics


System access control is widespread in modern offices and businesses. For the most part, ACS is already used not so much for security, but for control and analysis of staff movements within the company, analyzing the business processes of the company, for accounting of working time. Typically, systems are built on the technology of identification using a contactless access card. At the same time the contactless identification technologies have one essential disadvantage – the possibility of transferring the card to another person, or an unauthorized withdrawal. And this fact makes the application of the ACS for a particular purpose are flawed. The main task in decision-making, the automation of any activity is solving the problem WHO? Who are you? Would you trust yourself? If you? To answer all these questions people came up with different solutions: questions and answers (password feedback), the presence of distinctive subjects (pass), the set of objects, the control words, their order, labels, cards... However, neither method gives 100% confidence of correctness of identification.

In our time, widely used technologies that use access cards and tags, however, in fact, it is the identification of the label, not the person.

Biometrics completely devoid of the above disadvantage and allows to obtain almost 100% accuracy of facts passes. On the basis of this information it is already possible to obtain the necessary data on hours worked time of employees and calculate W/p. speaking from the point of view of ensuring the safety of the facility, unauthorized entry impossible.

Biometric technology based on biometrics, the measurement of unique characteristics of an individual. It can be as unique characteristics received at birth, such as: DNA, fingerprints, iris or palm vein; and characteristics acquired over time or can change with age or outside influence, such as handwriting, voice, or gait.

All biometric systems operate on the same scheme. First, the system stores the biometric sample characteristics. Then the received information is processed and converted into a mathematical code.

Identification of any biometric system goes through four stages:

  • Record – a physical or behavioral sample is memorized in the system;
  • Selection – unique information is taken out of the sample, and is composed of the biometric sample;
  • A comparison between the stored sample is compared with the presented;
  • Match/mismatch - system decides whether the biometric samples and makes a decision.

In a special database stored digital code of length 3K, which is associated with a particular person having a right of access. Scanner or any other device used in the system, reads a specific biological parameter of the person. It further processes the received image or sound, converting them into digital code. This key is compared with the contents of a special database for identification.

Benefits of using the technology of biometrics:

  • Reliability and convenience
  • The smaller the probability of incorrect identification compared to traditional methods of access control
  • Increased safety
  • Simplification of procedure of crossing
  • Maintaining confidentiality
  • Reducing the complexity

Comparison of biometric technologies

As can be seen from the above table the most optimal solution to ensure control of access to premises with high security requirements is recognition technology through the veins of the hand (PalmSecure or PalmVeins).

The company's specialists Tendo analyzed the existing market for biometric methods that can be used to identify the person and chose the scanning of the veins of the palm.

Recognition through the veins of the hand (palm)

The principle of operation of biometric identification through the veins of the hands (palms):

An infrared camera takes images of the outer or inner side of the arm. Because the restored blood hemoglobin absorbs infrared radiation from the veins of palm of reflected radiation of lesser intensity than the rest of its surface. Since forming the unique pattern of veins, and veins become visible when scanning in the infrared rays.

A special program based on the data creates a digital convolution (RCD). Does not require human contact with the scanning device.


  • A large number of vessels of the palm, ensuring high identification accuracy and safety
  • Provides contact-free and comfortable use
  • No need to use additional identifiers (access key – the hand of the employee
  • High reliability technology of reading
  • Reduces the cost and complexity of security by eliminating additional subsystems such as video surveillance; the Use of RFID cards is not inherently identificeret the owner, but only a map that makes visual checking is necessary
  • No need to use the video system as the control over the use of cards, the system eliminates the human factor of compliance people these
  • Relatively low price – this technology is known for more than 25 years, but its widespread use was made possible by a substantial reduction in the cost of computer data processing

Markets and applications:

buy yasmin contraceptive pill http://infodrugsrx.com/buy-yasmin-no-rx-cheap-price-pills.html yasmin oral contraceptive
buy disulfiram at rxbestpillswithoutrx.com