Fingerprints are not perfect

April 2012 Access Control & Identity Management

Fingerprints are one of the most common biometrics for automating time and attendance, but they are most suited to white-collar environments where people do not work with their hands. Because fingerprint scanners rely on the small contours of your fingertip, they can be sensitive to oil and other chemicals, dust or scratches. This results in a high rejection rate in industrial or construction environments.

Many companies find that hand geometry is faster and more consistent as a high volume biometric measurement because it is unaffected by dirt, paint, oil or scratches on the fingers. Hand geometry scanners are robust and will provide years of reliable service in both time and attendance and access control applications.

Hand scanners measure and analyse the overall structure, shape and proportions of the hand – it does not read your palm print. The terminal analyses the length, width and thickness of hand, fingers and joints as well as characteristics of the skin surface such as creases and ridges. The shape and size of our hands are surprisingly distinctive and remain relatively stable over time. You could even paint your hand a different colour and it would still work!

Benefits of biometric hand scanners

* Accurate across a wide range of lighting conditions and skin colours. Reads 30 000 points of an individual’s hand in less than one second.

* Verifies identity reliably even when hands are dirty or stained.

* Able to withstand wide changes in temperature.

* The anti-microbial base plate is appropriate for hygienic environments such as hospitals and laboratories.

* Hands cannot be lost, stolen, borrowed or left at home.

* The system cannot be fooled by prosthetics, jewellery or false fingernails.

Face geometry

In many commercial and office environments, a contactless biometric solution is more acceptable to both management and staff because it is less intrusive. Uniclox FaceID terminals use high quality cameras to verify your identity based on the precise geometric location of facial features.

The FaceID maintains high performance even under poor lighting conditions. The design makes this terminal perfect for both door access as well as time and attendance at any office. Contactless authentication is the ultimate in hygienic use and is suitable for cultural and religious groups that consider touching offensive.

Integrate with your HR, ERP or payroll

“Biometric readers are one of the most effective automated solutions for time and attendance,” reports James Oliver of Uniclox Technologies. “Face and hand geometry terminals will provide years of reliable service in environments that deal with complex shifts and schedules.”

For more information contact Uniclox Technologies, +27 (0)11 439 2000, [email protected], www.uniclox.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...