Eye on biometrics

July 2009 Access Control & Identity Management

Arguably, the first form of fingerprinting recorded was in China in the 8th century AD when Chinese documents refer to fingerprints being impressed on business contracts. Due to the years of R&D into fingerprint technology therefore, biometrics today is dominated by fingerprint recognition.

Of course, today we know fingerprint biometrics is no longer the ultimate biometric solution, as about 2% of the world’s population (depending on who you ask) can not be reliably identified by their digits. Moreover, it is easy to damage ones fingers with manual work, and it is a contact biometric solution, which makes it unpopular among a few people.

The reality is that fingerprinting is going to be with us for a long time to come as other biometric technologies are only now starting to deliver the ease, speed and reliability of fingerprint solutions, albeit in contactless scenarios that are more difficult to fool. The cost of fingerprinting solutions is also lower due to its head start.

One of the currently available iris recognition solutions to deliver the speed and accuracy required by business and government access control and identification needs is the Panasonic BM-ET200 Iris Reader. The ET200 offers fast and accurate, contactless recognition suitable for any access control and identification environment.

Two mirrors are mounted on the front panel of the ET200, making it easier for users to align their eyes with the system’s cameras. The ET200 also comes with built-in voice commands to assist users in standing in the correct position when being enrolled or recognised. The actual recognition process takes approximately 0,3 seconds.

When Hi-Tech Security Solutions tested the solution, which is easily mounted into a portable casing, enrolment took about 20 seconds until the system was happy with the quality images it managed to capture and we had learned where to look. The confusion about standing too close or far becomes moot once the recognition system had been used a few times the user automatically places himself or herself in the correct position, making the recognition process faster and simpler. By the end of the test, the whole process of recognition takes a couple of seconds at most.

Most precise identification

Iris recognition uses individual differences in the complex patterns found within the iris of the human eye to authenticate individual identities. Today, iris recognition is the most precise of all biometric identification systems.

Not to be confused with another, less prevalent, ocular-based technology, retina scanning, iris recognition uses camera technology, with subtle infrared illumination reducing specular reflection from the convex cornea, to create images of the detail-rich, intricate structures of the iris. Converted into digital templates, these images provide mathematical representations of the iris that yield unambiguous positive identification of an individual.

Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier (those who cannot use/enrol) group of all biometric technologies. The only biometric authentication technology designed for use in a one-to-many search environment, a key advantage of iris recognition is its stability, or template longevity, as, barring trauma, a single enrolment can last a lifetime.

Iris patterns in humans stabilise between the ages of six months and two years and then remain unchanged for life. Moreover, they are difficult to imitate.

Panasonic says the ET200’s false acceptance rate is so low that the probability of falsely identifying one individual as another is virtually zero. The ET200 system boasts a false acceptance rate of 1 in 1,2 million.

Most beneficially, users with spectacles or sunglasses are recognised through their eyewear.

Tamper detection

The ET200 tamper protection feature prevents data from being extracted from the system. An audible alarm is triggered via the integrated tamper switches when someone tries to fiddle with the reader. The alarm signals are also transmitted to the access control system and administration server.

Panasonic also provides its own administration software. With additional (optional) user licences, the system can register and manage iris data for up to

10 025 users. The device in standalone mode recognises up to 50 users, ensuring specific personnel can still access sensitive areas should networks be down.

The ET200 can be used with smartcards and compare iris data on a card with the captured image to allow access. The benefit of smartcards is they provide application flexibility and do not require a central database. The system is also compatible with standard Wiegand interface protocol access control systems.

The system’s credentials were confirmed when Panasonic was awarded the Best Access Control Product in October last year for its BM-ET200 Iris Recognition Reader at the 8th annual Detektor International Awards in Stockholm Sweden.

For more information contact Peter Wiehahn, Panasonic Business Systems, +27 (0)79 966 9538, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...