The growth of biometrics
November 2017, Access Control & Identity Management
Biometric verification is the future, we live in a time where a person can be uniquely identified by evaluating one or more distinguishing biological traits. Unique identifiers include fingerprints, hand geometry, earlobe geometry, retina and iris patterns, DNA, etc. Biometric verification has advanced considerably with the advent of computerised databases and the digitisation of analogue data, allowing for almost instantaneous personal identification.
Iris-pattern and retina-pattern authentication methods are already employed in some bank automated teller machines. Hand geometry is being used in some industries to provide physical access to buildings. Earlobe geometry has been used to disprove the identity of individuals who claim to be someone they are not (identity theft). Facial recognition technology has been used by law enforcement to pick out individuals in large crowds with considerable reliability.
No matter what biometric methodology is used, the identification verification process remains the same. A record of a person’s unique characteristic is captured and kept in a database. Later, when identification verification is required, a new record is captured and compared with the previous record in the database. If the data in the new record matches that in the database, the person’s identity is confirmed.
Many biometric systems are developed for security applications. From bank accounts to personal profiles, passwords have become the default option for verifying a user’s identity. Governments and organisations use biometric systems to get more information about individuals or about a populace.
Some new biometric programs are now using information that’s more abstract, what you might call ‘physical-behavioural’ information, to pick someone out of a crowd. With these new innovations in technology new biometric identification programs are certainly getting a lot of attention. Facial recognition, or face scanning, has been added to the three primary biometric platforms, allowing verification by one’s face. The scanner uses a camera with infrared features and scans a face to profile it, creating a unique profile of a person in a database, by determining facial features, contours and in some cases even more detailed features such as scars, etc.
Facial scanning is preferred in the market, due to the scanners being inexpensive, and still very much secure allowing 1:1 verification. Facial scanning can be done on long- or short-range, depending on the reader or scanner, allowing faster and more sufficient identification and verification of a person.
Despite all the new advances in the field of biometrics, fingerprints remain the most common type of biometric identifiers, partly because of their essential uniqueness and permanence, and partly because, even before modern biometric technologies were available, law enforcement kept fingerprint identifiers on file. So, with biometrics rapidly advancing in the IT field, and because it offers so many potential applications, we can expect to see more multi-mode biometric designs in the years to come.
For more information, contact ZKTeco (SA), +27 (0)12 259 1047, firstname.lastname@example.org, www.zkteco.co.za
- Directory of access and identity management suppliers 2019
November 2018, Access Control & Identity Management
- Open source identity initiative
November 2018, Access Control & Identity Management
Industry-first open source identity initiative promises to eliminate vendor lock-in and reduce costs for governments around the world.
- Significant differences in perceptions on state of digital trust
November 2018, CA Southern Africa, Access Control & Identity Management, Security Services & Risk Management
Nearly half of businesses admit to selling customer data, despite claiming data protection as paramount; consumer behaviour shows strong correlation between loss of business and lack of digital trust.
- Trust but continually verify
November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
- The expanding role of IT in access control
November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
What role is IT playing in the world of physical access control and how far will its role expand in future?
- Taking augmented identity to the world
November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
- A scan of fingerprint biometrics
November 2018, Technews Publishing, Access Control & Identity Management
Given the increase in the use of fingerprint technology in public and private organisations, as well as some recent announcements on the reliability or lack or reliability of certain types of sensors and algorithms in the fingerprint biometric market, Hi-Tech Security Solutions spoke to some of the leading fingerprint biometric vendors in the market to find out more about the state of this market.
- BIMS set to change identity management
November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
- Tracking biometrics into a brave new digital world
November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
- Panasonic’s Face Recognition Server
November 2018, Panasonic South Africa, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Products
Panasonic has adopted deep learning technology in its face recognition products that overcomes the difficulties of conventional technologies.
- A better approach to fingerprint biometrics
November 2018, This Week's Editor's Pick, Access Control & Identity Management
Not all optical biometric fingerprint scanners are created equal. The type of sensor used has a powerful impact on speed, accuracy, reliability and portability.
- Your face tells a story
November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Government and Parastatal (Industry)
Facial recognition has advanced to the point where it can be rolled out over large areas and accuracy is no longer a hit-and-miss affair.