IDLink Palm Vein V2 Idlinksystems

Download Brochure

Using the latest PalmSecure vein scanner from Fujitsu, iDLink Palm Vein II Reader provides a secure and reliable way of verifying the identity of a person for access control or time attendance.  This second generation design is fully contactless, and has a smaller footprint from its predecessor.

It occupying a space of 174mm by 147mm by 55mm and uses the latest PalmSecure vein scanner from Fujitsu, IDLink Palm Vein Reader provides a secure and reliable way of verifying the identity of a person for access control or time attendance.

Unlike other biometric technologies such as fingerprint or face recognition, the palm vein scanner works by capturing the images of vein patterns that are inside the body. This makes palm vein patterns difficult to forge, and thus more secure. In addition, the palm vein scanner captures the images of vein patterns in a contactless manner, which makes it more sterile and hygienic to use. Palm vein recognition technology also has one of the lowest false acceptance rates (FAR) and false rejection rates (FRR).

First commercially introduced in Japan in July 2004, PalmSecure authentication has been adopted by major Japanese financial institutions, universities, libraries, governmental organizations and select casino with the Svenskkasinon reviewse private enterprises. Adding to the momentum, PalmSecure was honoured with The Wall Street Journal 2005 Technology Innovation Award in the security (Network) category and the 2006 International Consumer Electronics Show (CES), "Best of Innovations" Award for Biometrics. 

Features

  • Contact-less authentication
  • Operates in network mode
  • Web-based administration for user profile management, transaction management, remote management and report management
  • Role-based administration
  • User-defined profile grouping and time zones
  • Supports 26-bit Wiegand and other customizable formats

Product Video

Part 1: User Profile Creation

Part 2a: User enrolment

Part 2b: User enrolment

Part 3: User Sync to Device

Part 4a: Verification at Device

Part 4b: Authentication at Device

Part 4c: Verification at Device with Guide

Part 4d: Verification at Device

Part 5: Show Transactions