Download PDF version Contact company

Biometric methods for identifying and authenticating persons are more and more in trend when it comes to increasing security in the areas of access control, time management and payment.  Since its first introduction onto the European market in Spring 2004, vein biometrics has received increasing attention: The VP-II "vein scanner“ of the LEGIC partner RTC checks identity based on the vessel pattern on the back of the hand.  The biometric data (210 Byte) can be stored on a LEGIC credential.

With "SEVA 3D“ RTC now offers high-security biometric access control using LEGIC technology which allows physical and organisational authorities to be separated and which represents a new dimension in the area of opening safes/vaults using redundant key technology.

The first installation of this kind was recently put into operation by a Swiss bank located in Zurich.  Normal key technology with keys and code entry was re-equipped to SEVA 3D and redundant lock motors.

The operating design calls for system encryption when putting into operation by means of customised password.  Biometric detection of authorisations to open the safe and the opening of the safe itself are always using dual control.  Every authorisation credential is also individually encrypted in addition to the LEGIC security features.  In addition to biometrics, emergency opening is possible using a coded keyboard with separate lock control.

The operating design can generally be adapted to all kinds of customer requirements and can not only be used for opening safes and vaults but for many other high-security access controls.

The advantages of this solution are in the fast and easy handling of the biometrics system as well as the physical separation between the identity check, data storage and lock control system.  The authorised user no longer needs to remember a code or to carry a key.  He can use his normal access credential that is immediately linked to his identity through the additional storage of his biometric features and which can therefore only be used by himself.  The security risk in case of loss of theft is therefore eliminated.

Finally, observance of pertinent data protection regulations is guaranteed as the biometrical data remain within the control and at the disposal of the user.

About LEGIC® Identsystems Ltd

LEGIC Identsystems Ltd, with headquarters in Switzerland, is the world leader in the design and manufacture of 13.56 MHz contactless smart card technology.  The LEGIC product portfolio includes highly integrated LEGIC RF Standard, ISO 15693 and ISO 14443 compliant read/write chip sets, security modules and transponder chips.

LEGIC Identsystems currently works with over 200 external co-operation partners world-wide who offer compatible LEGIC all-in-one-card applications including access control, e-payment, parking, e-ticketing and other multiapplications.  More than 1 million readers and over 70 million credentials are successfully integrated in more than 50,000 work and leisure places worldwide.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?