classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018

Tracking biometrics into a brave new digital world
November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions

The concept of using of biometrics – measuring an individual’s unique physical and behavioural characteristics or traits – to confirm a person’s identity, was conceived thousands of years ago. For instance, since the dawn of time people relied on facial recognition to distinguish between people they did or did not know. The use of fingerprinting can also be dated as far back as 500 BC1, whereby these unique markers were recorded on tablets as part of verifying the identities of parties to a transaction.

Pine Pienaar.
Pine Pienaar.

Whilst society of that time didn’t recognise the full potential and value of biometrics, the solutions we use today are still embedded in the authenticity of these origins. Where the science behind biometrics really started to evolve during the 19th and 20th centuries (to read more on the chronological developments in the 19th and 20th centuries to modern biometrics, please see the ‘Detect and protect’ series of articles on my LinkedIn profile.) and some of the milestones that defined how we understand and use biometrics today include:

• 18232 – Dr J. E. Purkinje, a professor of anatomy at the University of Breslau was the first to publish an essay on the varied ridge patterns of fingerprints and classified them into pattern types.

• 18802 – Discussions first commenced on the use of fingerprints for accurately verifying personal identification. This followed an article by Dr Henry Faulds, a Scottish doctor in Tokyo, Japan, that was published in the scientific journal Nature, in which he observed the wide diversity in fingerprints between

individuals and that these markings remained unchanged throughout life.

• 18823 – The Bertillon System was introduced. Although use of the Bertillon System as a standalone method to verify an individual’s identity, saw a dramatic decline following the case of William West and Will West at a Federal Prison in Leavenworth, Kansas, in 1903, the methodology of the Bertillon System is still pursued in biometrics and forensic science today.

• 19364 – The concept of using iris patterns as a means of recognising and verifying an individual’s identity was first introduced.

• 19605 – Face recognition becomes semi-automated, and later the first model of acoustic speech for identification was proposed.

• 19803 – The first computer database of fingerprints was developed, which came to be known as the Automated Fingerprint Identification System, (AFIS).

° The AFIS was introduced in South Africa in the 1990s, though this system and other versions that came after it weren’t very successful and by 1995 this system was disbanded. However, efforts continued to create a system that was optimised and effective, and a new system was re-introduced in the country in 2002.

° Research6 indicates that the AFIS market will continue to experience solid growth and the market is expected to be worth US$ 8.49 billion by 2020.

It is interesting to note that most of these developments centred around physiological traits and unimodal biometric systems. In fact, much of the focus during the 20th century was on building devices, back-end databases and systems that could correctly capture and store fingerprints so that these records could later be used to make an accurate and automated comparison when a ‘one-to-one’ or a ‘one-to-many’ request was entered into the system.

For that time period, it was strongly believed that fingerprints alone would be the universal identifier that could be used for a number of applications for authenticating and verifying a person’s identity, but it was soon realised that other systems could be built on top of this, including verification for security, access control, or verifying personal and/or criminal records, for example.

For the most part, automated fingerprint identification systems still form the basis of most biometric solutions today. However, following the advent of the Internet and given the pervasiveness of fake documents – linked to fake identities or identity theft – as well as major world events such as 9/11, it was realised that a standalone biometric identifier is not suitable to meet all the security requirements of various applications. As a result, the industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verifications and to deliver faster results in real-time.

As an emerging trend, multimodal biometric solutions can take input from a single, or multiple devices, capturing two or more different physiological or behavioural traits for identity authentication and verification – depending on the application and security measures required. The combinations for a specific application can vary and may include any number of identifiers from fingerprints to iris, face or voice recognition, or a person’s signature – even a person’s gait signature (distinguishing someone by the way they walk, although less known). These biometric identifiers may be used in combination with any other unique traits to identify an individual.

For consumers, businesses, government services and even national and global security on a macro level, these solutions offer increased recognition rates and as a result improved accuracy in verifying the authenticity of an individual’s identity. Additionally, these solutions are able to take live measurements of more than one biometric identifier and check them against multiple systems based on approved integration which presents results in real-time – this process reduces the risk of the spoofing or hacking, which inherently also increases the level of security. (Spoofing refers to a person attempting to cheat or trick a biometric system by using a copy or imitation of the biometric identifier of the authentic subject. For example, someone trying to use a copy of another person’s fingerprint.)

While unimodal fingerprint systems will continue to have a place in the market, multimodal biometric solutions are certainly more robust and reliable. But, the real value of these solutions is in the diverse applications in which they can be used, across any sector or industry, to better protect personal information – and to detect and protect against fraud and/or other illicit or criminal acts.

As we leap forward to the current brave new digital age, due to the ongoing waves of digital transformation, biometric solutions are dubbed to go mainstream as the foundation to managing identity authentication and digital security. In fact, an IBM Security Report7 found that while 67% of respondents said they are comfortable using biometric authentication today, 87% say they’ll be comfortable with it in the future.

As the digital play in biometrics rapidly evolves, these solutions include fingerprints, facial recognition and even iris or retina scanners on mobile devices, at ATMs and self-­service check-in counters at airports. Devices and solutions will be designed and built specifically to address the need application and the fluidity of this modern world. In fact, there are already examples of such applications being implemented and tested globally. Going forward, we expect that mainstream adoption of biometrics will impact how employers, service providers and technology companies provide end-users with access to these devices, applications and services in the future.

However, the biggest challenge for the industry and for the public and private entities that want to adopt biometric solutions as part of their identity verification and security protocols, is to obtain user (consumer) buy-in. There are concerns over how and where biometric data will be captured and stored – and how secure the information will be. Though these concerns can be easily allayed as it is possible to securely capture, encrypt and store biometric data, and the research by IBM7 shows that consumers are ready and willing to make use of biometric solutions. The onus is now on the industry and organisations to make use of flexible identity platforms that provide users with accuracy, security, speed and convenience – which makes the identity verification process a positive user experience.

In today’s fast-paced lifestyles, knowing who you are dealing with is critical in order to manage personal, business and even ­societal risks on a macro level. The fundamental attribute of biometrics remains as the ability to verify an individual’s identity, which continues to become ever more prevalent in the digital age. Therefore, with the added benefits of agility and scalability offered by digital and mobile biometric solutions, mainstream adoption is only a matter of time.

For more information contact Afiswitch, +27 12 679 2900,,








7. IBM, Future of Identity Study, 2018

  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • The expanding role of IT in access control
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    What role is IT playing in the world of physical access control and how far will its role expand in future?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • A better approach to fingerprint biometrics
    November 2018, This Week's Editor's Pick, Access Control & Identity Management
    Not all optical biometric fingerprint scanners are created equal. The type of sensor used has a powerful impact on speed, accuracy, reliability and portability.
  • Key components of access control
    November 2018, Paxton Access, Access Control & Identity Management, Integrated Solutions
    Dan Drayton speaks to Hi-Tech Security Solutions about what the key components in modern access control systems are.
  • The right access decisions
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management
    Making the right access control decision depends on what you want secured and how secure it should be.
  • IP is no stranger to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).
  • Applying the SaaS model to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    The software-as-a-service model has proven transformative to many organisations, and even entire industries. The benefits it can offer are undeniable, but in the security sector which is risk-averse by necessity, we wanted to hear the views of some local experts in access control as a service (ACaaS) to find out what some of the pros and cons are.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.