Convenience vs security: How well do biometrics work?

June 2005 Access Control & Identity Management

Can you be absolutely certain that a biometric device will work as claimed? Will it securely keep the bad guys out, while effortlessly letting the good guys in?

In real life, security versus convenience turns out to be pretty much a non-issue, since the combination of biometric identification plus a keypad code provides virtually unbreakable security. Here is why.

Biometric devices can be adjusted to favour security or user convenience. Think of a car alarm. When your car alarm is very sensitive, the probability of the bad guys stealing it is low. Yet the chance of your accidentally setting off the alarm is high. Reduce the sensitivity, and the number of false alarms goes down, but the chance of someone stealing your car increases.

The security requirements of a national defence contractor might demand that the device at the front door be adjusted to keep the bad guys out, for example. On the other hand, if hundreds of employees will clock in using a biometric reader at a low-security facility, you will want to adjust the unit's sensitivity to let the good guys in.

People like things that work. If the biometric does not allow employees effortless access, frustration will quickly rise and the biometric may never be accepted. Fortunately, this is extremely unlikely.

False accept rates

The probability that a biometric device will allow a bad guy to pass is called the 'false accept rate'.

This figure must be sufficiently low to present a real deterrent. False accept rates claimed for today's biometric access systems range from 0,0001% to 0,1%. The biometric hand readers at the front entrances of 60% of the nuclear power plants in the US (for example) have a false accept rate of 0,1%.

It is important to remember that the only way a bad guy can get access is if a bad guy tries. Thus, the false accept rate must be multiplied by the number of attempts by bad guys to determine the number of possible occurrences.

False reject rates

For most applications, letting the good guys in is just as important as keeping the bad guys out. The probability that a biometric device will not recognise a good guy is called the 'false reject rate'.

The false reject rates quoted for current biometric systems range from 0,00066% to 1,0%.

A low false reject rate is very important for most applications, since users will become extremely frustrated if they are denied access by a device that has previously recognised them.

An example may be helpful.

A company with 100 employees has a biometric device at its front door. Each employee uses the door four times a day, yielding 400 transactions per day.

A false reject rate of 1,0% predicts that every day, four good guys (1% of 400) will be denied access. Over a five-day week, that means 20 problems. Reducing the false reject rate to 0,1% results in just two problems per week.

A low false reject rate is very important for most applications, since users will become extremely frustrated if they are denied access by a device that has previously recognised them. As mentioned previously, the combination of a low false reject rate plus a simple keypad code provides virtually unbreakable security.

Equal error rates

Error curves give a graphical representation of a biometric device's 'personality'. The point where false accept and false reject curves cross is called the 'equal error rate'. The equal error rate provides a good indicator of the unit's performance. The smaller the equal error rate, the better.

Validity of test data

Testing biometrics is difficult, because of the extremely low error rates involved. To attain any confidence in the statistical results, thousands of transactions must be examined.

Some error rates cited by manufacturers are based on theoretical calculations. Other rates are obtained from actual field testing. Field data is usually more reliable. In the case of false reject rates, only field test data can be considered accurate, since biometric devices require human interaction. For example, if the device is hard to use, false reject rates will tend to rise. A change in the user's biometric profile could also cause a false reject (a finger is missing, for example).

None of these conditions can be accurately quantified by purely theoretical calculations. On the other hand, false accept rates can be calculated with reasonable accuracy from cross-comparison of templates in large template databases.

Currently, most field test error rates have been generated by various biometric manufacturers using end-user data, though tests have also been conducted by independent laboratories.

It is important to remember that error rates are statistical: they are derived from a series of transactions by a population of users. In general, the larger the population and the greater the number of transactions, the greater the confidence level in the accuracy of the results.

If the error rate is reported at 1:100 000, and only 100 transactions were included in the study, the confidence level in the results should be very low. If the same error rate was reported for 1 million transactions, the confidence level would be much higher.

The magnitude of the reported results affects the size of the sample required for a reasonable confidence level. If the reported error rate is 1:10, then a sample of 100 transactions may provide a sufficient confidence level. Conversely, a 100-transaction sample would be too small if the error rate was reported as 1:100 000.

Conclusion: security and convenience are a fact

Biometric devices are extremely secure, thanks to the combination of low false accept rates at moderate sensitivity settings, combined with a short user keypad code. At the same time, biometrics are extremely convenient and error-free, thanks to low false reject rates.

Source: Recognition Systems





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...