Tracking biometrics into a brave new digital world

Access & Identity Management Handbook 2019 Editor's Choice, Access Control & Identity Management, Integrated Solutions

The concept of using of biometrics – measuring an individual’s unique physical and behavioural characteristics or traits – to confirm a person’s identity, was conceived thousands of years ago. For instance, since the dawn of time people relied on facial recognition to distinguish between people they did or did not know. The use of fingerprinting can also be dated as far back as 500 BC1, whereby these unique markers were recorded on tablets as part of verifying the identities of parties to a transaction.

Pine Pienaar.
Pine Pienaar.

Whilst society of that time didn’t recognise the full potential and value of biometrics, the solutions we use today are still embedded in the authenticity of these origins. Where the science behind biometrics really started to evolve during the 19th and 20th centuries (to read more on the chronological developments in the 19th and 20th centuries to modern biometrics, please see the ‘Detect and protect’ series of articles on my LinkedIn profile.) and some of the milestones that defined how we understand and use biometrics today include:

• 18232 – Dr J. E. Purkinje, a professor of anatomy at the University of Breslau was the first to publish an essay on the varied ridge patterns of fingerprints and classified them into pattern types.

• 18802 – Discussions first commenced on the use of fingerprints for accurately verifying personal identification. This followed an article by Dr Henry Faulds, a Scottish doctor in Tokyo, Japan, that was published in the scientific journal Nature, in which he observed the wide diversity in fingerprints between

individuals and that these markings remained unchanged throughout life.

• 18823 – The Bertillon System was introduced. Although use of the Bertillon System as a standalone method to verify an individual’s identity, saw a dramatic decline following the case of William West and Will West at a Federal Prison in Leavenworth, Kansas, in 1903, the methodology of the Bertillon System is still pursued in biometrics and forensic science today.

• 19364 – The concept of using iris patterns as a means of recognising and verifying an individual’s identity was first introduced.

• 19605 – Face recognition becomes semi-automated, and later the first model of acoustic speech for identification was proposed.

• 19803 – The first computer database of fingerprints was developed, which came to be known as the Automated Fingerprint Identification System, (AFIS).

° The AFIS was introduced in South Africa in the 1990s, though this system and other versions that came after it weren’t very successful and by 1995 this system was disbanded. However, efforts continued to create a system that was optimised and effective, and a new system was re-introduced in the country in 2002.

° Research6 indicates that the AFIS market will continue to experience solid growth and the market is expected to be worth US$ 8.49 billion by 2020.

It is interesting to note that most of these developments centred around physiological traits and unimodal biometric systems. In fact, much of the focus during the 20th century was on building devices, back-end databases and systems that could correctly capture and store fingerprints so that these records could later be used to make an accurate and automated comparison when a ‘one-to-one’ or a ‘one-to-many’ request was entered into the system.

For that time period, it was strongly believed that fingerprints alone would be the universal identifier that could be used for a number of applications for authenticating and verifying a person’s identity, but it was soon realised that other systems could be built on top of this, including verification for security, access control, or verifying personal and/or criminal records, for example.

For the most part, automated fingerprint identification systems still form the basis of most biometric solutions today. However, following the advent of the Internet and given the pervasiveness of fake documents – linked to fake identities or identity theft – as well as major world events such as 9/11, it was realised that a standalone biometric identifier is not suitable to meet all the security requirements of various applications. As a result, the industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verifications and to deliver faster results in real-time.

As an emerging trend, multimodal biometric solutions can take input from a single, or multiple devices, capturing two or more different physiological or behavioural traits for identity authentication and verification – depending on the application and security measures required. The combinations for a specific application can vary and may include any number of identifiers from fingerprints to iris, face or voice recognition, or a person’s signature – even a person’s gait signature (distinguishing someone by the way they walk, although less known). These biometric identifiers may be used in combination with any other unique traits to identify an individual.

For consumers, businesses, government services and even national and global security on a macro level, these solutions offer increased recognition rates and as a result improved accuracy in verifying the authenticity of an individual’s identity. Additionally, these solutions are able to take live measurements of more than one biometric identifier and check them against multiple systems based on approved integration which presents results in real-time – this process reduces the risk of the spoofing or hacking, which inherently also increases the level of security. (Spoofing refers to a person attempting to cheat or trick a biometric system by using a copy or imitation of the biometric identifier of the authentic subject. For example, someone trying to use a copy of another person’s fingerprint.)

While unimodal fingerprint systems will continue to have a place in the market, multimodal biometric solutions are certainly more robust and reliable. But, the real value of these solutions is in the diverse applications in which they can be used, across any sector or industry, to better protect personal information – and to detect and protect against fraud and/or other illicit or criminal acts.

As we leap forward to the current brave new digital age, due to the ongoing waves of digital transformation, biometric solutions are dubbed to go mainstream as the foundation to managing identity authentication and digital security. In fact, an IBM Security Report7 found that while 67% of respondents said they are comfortable using biometric authentication today, 87% say they’ll be comfortable with it in the future.

As the digital play in biometrics rapidly evolves, these solutions include fingerprints, facial recognition and even iris or retina scanners on mobile devices, at ATMs and self-­service check-in counters at airports. Devices and solutions will be designed and built specifically to address the need application and the fluidity of this modern world. In fact, there are already examples of such applications being implemented and tested globally. Going forward, we expect that mainstream adoption of biometrics will impact how employers, service providers and technology companies provide end-users with access to these devices, applications and services in the future.

However, the biggest challenge for the industry and for the public and private entities that want to adopt biometric solutions as part of their identity verification and security protocols, is to obtain user (consumer) buy-in. There are concerns over how and where biometric data will be captured and stored – and how secure the information will be. Though these concerns can be easily allayed as it is possible to securely capture, encrypt and store biometric data, and the research by IBM7 shows that consumers are ready and willing to make use of biometric solutions. The onus is now on the industry and organisations to make use of flexible identity platforms that provide users with accuracy, security, speed and convenience – which makes the identity verification process a positive user experience.

In today’s fast-paced lifestyles, knowing who you are dealing with is critical in order to manage personal, business and even ­societal risks on a macro level. The fundamental attribute of biometrics remains as the ability to verify an individual’s identity, which continues to become ever more prevalent in the digital age. Therefore, with the added benefits of agility and scalability offered by digital and mobile biometric solutions, mainstream adoption is only a matter of time.

For more information contact Afiswitch, +27 12 679 2900,,








7. IBM, Future of Identity Study, 2018

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

The human factor side of video management systems
Leaderware Editor's Choice Surveillance Risk Management & Resilience
A video management system (VMS) is central to, and the most vital element to any control room operation using CCTV as part of its service delivery, however, all too often, it is seen as a technical solution rather than an operational solution.

Get the basics right to win more business
ServCraft Editor's Choice Risk Management & Resilience
The barriers to entry in security are not high. More people are adding CCTV and fencing to their repertoire every year. Cowboys will not last long in a space where customers trust you with their safety.

Lock down your access control with Alcatraz AI
C3 Shared Services Healthcare (Industry) Access Control & Identity Management AI & Data Analytics
Alcatraz AI, represented in South Africa by C3 Shared Services, changes access control by harnessing the power of artificial intelligence and analytics at the edge, where facial recognition becomes the essential credential autonomously.

Integrating farming and security solutions for productivity
Security BIS Agriculture (Industry) Integrated Solutions
Security challenges are a harsh reality in South Africa, particularly for those in remote areas. Sadly, recurring rural crimes like farm attacks and livestock theft are part of the farming community’s lives.

All aspects of data protection
Technews Publishing Editor's Choice Information Security Infrastructure AI & Data Analytics
SMART Security Solutions spoke to Kate Mollett, Senior Director, Commvault Africa, about the company and its evolution from a backup specialist to a full data protection specialist, as well as the latest announcements from the company.

Global strength, local craft
Impro Technologies Editor's Choice
Impro Technologies is a resounding success story. Started in South Africa, the company remains true to its roots and still designs and manufactures its access control systems and solutions in the country.

New generation of cyber-focused controllers
Gallagher News & Events Access Control & Identity Management Products & Solutions
The C7000 gives users an opportunity to leverage their hardware and firmware to build a platform designed to catapult their organisation into the future, with cybersecurity baked in from inception.