classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


The growth of biometrics
November 2017, Access Control & Identity Management

Biometric verification is the future, we live in a time where a person can be uniquely identified by evaluating one or more distinguishing biological traits. Unique identifiers include fingerprints, hand geometry, earlobe geometry, retina and iris patterns, DNA, etc. Biometric verification has advanced considerably with the advent of computerised databases and the digitisation of analogue data, allowing for almost instantaneous personal identification.

Iris-pattern and retina-pattern authentication methods are already employed in some bank automated teller machines. Hand geometry is being used in some industries to provide physical access to buildings. Earlobe geometry has been used to disprove the identity of individuals who claim to be someone they are not (identity theft). Facial recognition technology has been used by law enforcement to pick out individuals in large crowds with considerable reliability.

No matter what biometric methodology is used, the identification verification process remains the same. A record of a person’s unique characteristic is captured and kept in a database. Later, when identification verification is required, a new record is captured and compared with the previous record in the database. If the data in the new record matches that in the database, the person’s identity is confirmed.

Many biometric systems are developed for security applications. From bank accounts to personal profiles, passwords have become the default option for verifying a user’s identity. Governments and organisations use biometric systems to get more information about individuals or about a populace.

Some new biometric programs are now using information that’s more abstract, what you might call ‘physical-behavioural’ information, to pick someone out of a crowd. With these new innovations in technology new biometric identification programs are certainly getting a lot of attention. Facial recognition, or face scanning, has been added to the three primary biometric platforms, allowing verification by one’s face. The scanner uses a camera with infrared features and scans a face to profile it, creating a unique profile of a person in a database, by determining facial features, contours and in some cases even more detailed features such as scars, etc.

Facial scanning is preferred in the market, due to the scanners being inexpensive, and still very much secure allowing 1:1 verification. Facial scanning can be done on long- or short-range, depending on the reader or scanner, allowing faster and more sufficient identification and verification of a person.

Despite all the new advances in the field of biometrics, fingerprints remain the most common type of biometric identifiers, partly because of their essential uniqueness and permanence, and partly because, even before modern biometric technologies were available, law enforcement kept fingerprint identifiers on file. So, with biometrics rapidly advancing in the IT field, and because it offers so many potential applications, we can expect to see more multi-mode biometric designs in the years to come.

For more information, contact ZKTeco (SA), +27 (0)12 259 1047, sales@zkteco.co.za, www.zkteco.co.za


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • More than locking the door
    April 2019, Technews Publishing, Salto Systems Africa, ZKTeco, Entertainment and Hospitality (Industry), Access Control & Identity Management, Asset Management, EAS, RFID
    Electronic locks offer hotels far more than simply a more convenient way to manage doors, they can be integrated into a host of other systems and services.
  • Wide-area surveillance on estates, farms and other large properties
    April 2019, Protoclea Advanced Image Engineering, Access Control & Identity Management, Integrated Solutions
    Using the right solution to protect large, open areas can be accomplished with the right technology and planning.
  • Visible light facial recognition
    April 2019, ZKTeco, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    ZKTeco recently expanded its reach in the facial recognition market with the launch of its new series of visible light facial recognition (VLFR) products.
  • Split design hotel door
    April 2019, ZKTeco, Products, Access Control & Identity Management
    LH7500 hotel door locks are the latest models from ZKTeco’s Smart Lock series with elegant designs and support for Mifare cards and the EU standard mortise.
  • Slim hotel door lock
    April 2019, ZKTeco, Products, Access Control & Identity Management
    The LH7000 hotel door lock is the latest from the ZKTeco Smart lock series, supporting Mifare cards and the EU standard mortise.
  • People Mobility Management solution
    April 2019, Secutel Technologies, Access Control & Identity Management
    Secutel launches the latest Matrix COSEC time and attendance, and people mobility management solution.
  • Optimise cost by mixing and matching
    April 2019, Suprema, Access Control & Identity Management
    By combining different Suprema readers based on their individual benefits, greater flexibility is provided for meeting the demand for cost effectiveness and quality.
  • Alastair McPhail joins Jarrison
    April 2019, Jarrison Systems, News, Access Control & Identity Management
    Alastair McPhail has taken the position of national marketing manager at time and attendance manufacturers, Jarrison Systems.
  • ExiSAFE from ASSA ABLOY
    April 2019, ASSA ABLOY South Africa, Access Control & Identity Management, Products
    ASSA ABLOY South Africa has announced the launch of the new ExiSAFE panic and emergency exit hardware from the UNION brand.
  • Kyalami Estate uses Boomgate barriers
    April 2019, BoomGate Systems, Access Control & Identity Management, Products
    Kyalami Estates install Boomgate barriers for streamlined entrance and exit to the estate.
  • Access in the mobile era
    April 2019, Suprema, Products, Access Control & Identity Management
    BioStar 2 Mobile Card offers convenience to end-users by storing biometric information, to function as a credential, in their own smartphones.
  • Is security restricting your function as a service?
    April 2019, Access Control & Identity Management, Integrated Solutions
    Security can really scupper your efforts to get the benefits of functions as a service (FaaS).

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.