Convenience vs security: How well do biometrics work?

June 2005 Access Control & Identity Management

Can you be absolutely certain that a biometric device will work as claimed? Will it securely keep the bad guys out, while effortlessly letting the good guys in?

In real life, security versus convenience turns out to be pretty much a non-issue, since the combination of biometric identification plus a keypad code provides virtually unbreakable security. Here is why.

Biometric devices can be adjusted to favour security or user convenience. Think of a car alarm. When your car alarm is very sensitive, the probability of the bad guys stealing it is low. Yet the chance of your accidentally setting off the alarm is high. Reduce the sensitivity, and the number of false alarms goes down, but the chance of someone stealing your car increases.

The security requirements of a national defence contractor might demand that the device at the front door be adjusted to keep the bad guys out, for example. On the other hand, if hundreds of employees will clock in using a biometric reader at a low-security facility, you will want to adjust the unit's sensitivity to let the good guys in.

People like things that work. If the biometric does not allow employees effortless access, frustration will quickly rise and the biometric may never be accepted. Fortunately, this is extremely unlikely.

False accept rates

The probability that a biometric device will allow a bad guy to pass is called the 'false accept rate'.

This figure must be sufficiently low to present a real deterrent. False accept rates claimed for today's biometric access systems range from 0,0001% to 0,1%. The biometric hand readers at the front entrances of 60% of the nuclear power plants in the US (for example) have a false accept rate of 0,1%.

It is important to remember that the only way a bad guy can get access is if a bad guy tries. Thus, the false accept rate must be multiplied by the number of attempts by bad guys to determine the number of possible occurrences.

False reject rates

For most applications, letting the good guys in is just as important as keeping the bad guys out. The probability that a biometric device will not recognise a good guy is called the 'false reject rate'.

The false reject rates quoted for current biometric systems range from 0,00066% to 1,0%.

A low false reject rate is very important for most applications, since users will become extremely frustrated if they are denied access by a device that has previously recognised them.

An example may be helpful.

A company with 100 employees has a biometric device at its front door. Each employee uses the door four times a day, yielding 400 transactions per day.

A false reject rate of 1,0% predicts that every day, four good guys (1% of 400) will be denied access. Over a five-day week, that means 20 problems. Reducing the false reject rate to 0,1% results in just two problems per week.

A low false reject rate is very important for most applications, since users will become extremely frustrated if they are denied access by a device that has previously recognised them. As mentioned previously, the combination of a low false reject rate plus a simple keypad code provides virtually unbreakable security.

Equal error rates

Error curves give a graphical representation of a biometric device's 'personality'. The point where false accept and false reject curves cross is called the 'equal error rate'. The equal error rate provides a good indicator of the unit's performance. The smaller the equal error rate, the better.

Validity of test data

Testing biometrics is difficult, because of the extremely low error rates involved. To attain any confidence in the statistical results, thousands of transactions must be examined.

Some error rates cited by manufacturers are based on theoretical calculations. Other rates are obtained from actual field testing. Field data is usually more reliable. In the case of false reject rates, only field test data can be considered accurate, since biometric devices require human interaction. For example, if the device is hard to use, false reject rates will tend to rise. A change in the user's biometric profile could also cause a false reject (a finger is missing, for example).

None of these conditions can be accurately quantified by purely theoretical calculations. On the other hand, false accept rates can be calculated with reasonable accuracy from cross-comparison of templates in large template databases.

Currently, most field test error rates have been generated by various biometric manufacturers using end-user data, though tests have also been conducted by independent laboratories.

It is important to remember that error rates are statistical: they are derived from a series of transactions by a population of users. In general, the larger the population and the greater the number of transactions, the greater the confidence level in the accuracy of the results.

If the error rate is reported at 1:100 000, and only 100 transactions were included in the study, the confidence level in the results should be very low. If the same error rate was reported for 1 million transactions, the confidence level would be much higher.

The magnitude of the reported results affects the size of the sample required for a reasonable confidence level. If the reported error rate is 1:10, then a sample of 100 transactions may provide a sufficient confidence level. Conversely, a 100-transaction sample would be too small if the error rate was reported as 1:100 000.

Conclusion: security and convenience are a fact

Biometric devices are extremely secure, thanks to the combination of low false accept rates at moderate sensitivity settings, combined with a short user keypad code. At the same time, biometrics are extremely convenient and error-free, thanks to low false reject rates.

Source: Recognition Systems





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.