The vexing issue with biometrics

1 October 2014 Access Control & Identity Management

Fingerprint biometric systems have, in recent years stormed the access control and time & attendance market becoming the mainstream devices to use for identification and verification of users of the system. Very few access control systems are installed these days without at least one biometric device being connected to the solution with these devices replacing proximity readers to a large extent.

Time & attendance solution providers have all but disregarded any other form of electronic clocking system. This is mainly due to biometrics offering two invaluable aspects of either an access control or time & attendance solution – security and convenience. No more shared numerical pins, no lost proximity cards and no more buddy clocking.

This however does not mean that biometrics, and fingerprint biometrics in particular, are foolproof. Quite the contrary, a little mentioned fact of fingerprint biometrics are that only an estimated 95% of people can utilise a fingerprint biometric system. This estimation differs from vendor to vendor as the industry strives to make the biometric market more useable by utilising differing technologies.

Reasons for failure

From using multispectral response fingerprint scanning modules to incorporating scar tissue on the actual fingerprint template these technologies, some proprietary, helps the usability of the fingerprint biometric system. Fact is, not one vendor has been able to achieve a 100% usability rate unless they fake it until they make it.

Tier 1 vendors can claim up to a 98% usability rate by the use of proprietary technologies, but there always remains a percentage of people that are unable to use a fingerprint biometric system. I have interacted with individuals that have not one single useable fingerprint due to various reasons – wear and tear being the foremost.

Some individuals, contrary to popular belief, just do not have fingerprints. This seems to be a quirk of nature as normally this phenomenon occurs in industries where the individuals’ fingerprints are subject to abrasive or corrosive materials. In numerous instances individuals exist that have no contact in either their professional or personal lives with any material that could explain them not having at least one single usable fingerprint.

The usability rate of 95% does not necessarily translate into real word usability rates. Some systems have a rate as low as 70% when deployed in the field and this translates to one very simple fact – the biometric system is delinquent. It has the potential but is not performing as expected. The reasons for this may be numerous. It may be attributed to environmental factors, the wrong solution for the application, outdated algorithms, archaic but cheap technologies and training on the correct usage of the biometric device. The biggest culprit however seems to be situated at the source of the fingerprint database – initial enrolment of user’s fingerprints on the systems.

Enrolment issues

The mantra for biometric vendors and installers alike should be: ‘If you have a poor enrolment, you have a poor system’; or in IT parlance: ‘Junk in, junk out’. No amount of tweaking after the fact will make the system perform any better and will in fact open the system to abuse negating the raison d’ître for making use of a biometric fingerprint system in the first instance.

Various vendors provide for different fingerprint enrolment methods. Some only allow for enrolment on the field based biometric device itself and then transferring the template to the software where additional information is captured. Others allow for enrolment on both the biometric device and on the software via a take-on reader.

The issue with enrolling the fingerprint onto the system via the field based biometric device is the inherent difficulty with judging how good or bad a fingerprint template is. There is no way to know if the fingerprint template will be useable and invariably – due to not being able to ‘score’ the fingerprint – this leads to a low usage rate, multiple scans, long transaction times and complaints from users that the system does not work. These complaints are certainly justified since the optimum for access control systems are to keep bad guys out and give good guys access whilst doing it as speedily and accurately as possible. The same applies to time & attendance systems.

The correct enrolment procedure is to use a system that allows for enrolment directly onto the software via a take-on biometric device. These systems allow for the fingerprint to be scored on a percentage basis and will automatically indicate that a fingerprint does not conform to the required levels of usability. This in turn allows the administrator of the system to take steps to ensure that the user will be able to use the system without hindrance. Typically, this is done by adjusting the software to lessen or heighten the amount of identifiable features that the system looks for when matching a user’s fingerprint from the database.

Some vendors allow this to be done on a global scale and some vendors allow this to be done on an individual basis. The former poses a security risk due to every user’s profile being amended according to a lowered matching standard. Being able to amend the enrolment and matching levels on an individual basis is therefore desirable since only the single user – or a small group of users at least – uses less or more identifiable features which translates to a higher level of security. Sometimes however, the problem with a poor fingerprint exists simply because the fingerprint is dry or wet and these are easily solved.

By addressing enrolment issues, 8 out of 10 delinquent biometric systems can be rectified to operate optimally and as advertised. This is true for all Tier 1 vendors. Unfortunately, it will not resolve all issues with delinquent systems due to all systems not being equal. Environment and embedded technology will always play a major role in the usability of the system just as with everything else.

For more information contact Deon van Rensburg, Virdi Distribution, +27 (0)82 820 0887, deon@virditech.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.