Pointing fingers at access control

February 2009 Access Control & Identity Management

Biometric technology – the analysis of unique physical characteristics such as fingerprints, DNA, veins, voice, hand geometry, iris or retinal patterns – has long been used for the purpose of access control, but is now also playing a significant role in complete workplace access management. In addition to controlling the access of employees and visitors into certain areas, workplace access management can integrate solutions for time and attendance, access control, job costing, alarm monitoring, HR information processing, payroll interfaces and other ERP, planning and reporting packages.

The benefit of a biometric access control system is that only authorised people – not merely their credentials – are granted access to specific places. A card-based system will only control the access of authorised pieces of plastic, but not who is in possession of the card, which can be shared or stolen. Similarly, the use of PINs requires an individual to punch in a specific number to gain entry, but who actually entered the code cannot be determined as PINs can also be shared.

Typically, a building’s access control system focuses on controlling the access rights of people whose identities are already known: employees. These identities need to be known for a variety of reasons that have nothing to do with controlling access – payroll, taxation, medical schemes, employment contracts and so on.

For most companies, payroll is the single largest expense so this is where the greatest protection is required against threats of fraud, corruption and theft. Workplace access management systems have therefore become a crucial element of financial control in companies of all sizes.

Payroll and HR applications can be seamlessly linked to biometric fingerprint readers. Employees then scan their fingers when they arrive at the office and again when they leave at the end of the day or shift. At the end of the month the company payroll is automatically calculated based on the employees’ attendance as registered by the fingerprint reader.

Unauthorised entry into the workplace creates potential threats of theft, injury to people and damage to property. With a biometric access control system, instead of visitors writing in a visitor book, the visitor’s ID number, car registration and contact details are entered on a terminal and a fingerprint is used to ‘sign’. Within seconds, the visitor’s details are checked against a national database and his identity confirmed. The terminal then prints a gate pass with the visitor’s name and the site conditions and he is cleared to proceed.

Crucial factors in the success of a biometric system are the enrolment procedure and user acceptance of the device.

With modern technology, there is no reason why everybody cannot be enrolled on a biometric fingerprint system. Enrolment of all end-users should be regarded as a crucial part of the installation process.

Education about fingerprint technology is also important so that the users know how and what information is collected, what it is used for and how and where it is stored. All this will help in reassuring users and making them feel more comfortable in using the technology.

Biometrics capabilities go way beyond mere access control – integrated into other business solutions, a comprehensive business tool can be created, with which companies can reduce labour costs, increase efficiency and output and drive business value throughout the organisation.

Benefits of biometrics

Accuracy – increases corporate vigilance through precise control of key outcomes in payroll, safety and security. Eliminates constantly recurring costs imposed by access cards, PINS, passwords, logbooks and registers.

Capacity – comprehensive access protection that identifies and records everyone entering and leaving the workplace, including visitors and contractors. Supports existing investments when systems are upgraded to meet changing access needs, without additional per-user charges.

Security – more effective risk management and reduced exposure to potential loss and liability through consistent control of access. Cuts overall losses caused by unauthorised access, including accidents, theft and fraud.

Integrity – protects every part of a business through universal control of physical and logical access. Eradicates duplicate costs for multiple access systems and databases, minimising integration costs across different business functions.

Speed – accelerates administration processes with reliable, realtime data for workforce management. Minimises the impact on productivity by cutting queue times and clocking times.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...