Biometrics - more than just image recognition

May 2002 Access Control & Identity Management

Touted as an established and serviceable means of user authentication, the field of biometrics is starting to create its own little buzz in amongst the drive to make identification procedures more convenient, safer and easier to use. But, on its own biometrics is nothing short of useless.

"Without some parameters that define area and circumstance, and some indication of the status of real-world events, the massive opportunity for viable applications may not be realised," says John Harris, MD of local software development company, Trac-Ware. Harris believes image recognition has some inherent problems, so much so that a significant percentage of alarms generated by current biometrics systems are false. "If you do not have full frontal recognition the entire system can be thrown off. This effectively compromises its integrity, rendering it incapable of making trustworthy decisions."

Using active IR scanners to scan for multiple sources of body heat linked to active RfId and a valid biometric will guarantee a valid identification, but any given profile has to tie into a set of real-world events to be of any significance. Biometrics as a means of access control, in conjunction with active RfId needs to rely on a management platform that ties applications and policies together across interfaces in one central location. "What is required when implementing biometrics processes is also the ability to handle the task of managing and monitoring dissimilar software and hardware components.

"The seamless integration of various types of hardware into a system, as well as the system's ability to easily create complex transactions based on the various types of connected hardware will allow users to monitor and control assets or people, and automate buildings and their responses to events with both ease and speed," Harris says.

The ability of a system to seamlessly link together rules and rule sets, ranging from zone control, access control to state control and movement limitations, will ensure that almost any scenario can be dealt with. But the 'real world' also needs to be monitored, with realtime updates of events sent to a database via the communications infrastructure in place.

"Biometrics, as it stands, provides fingerprint, face or eye scans which form just one piece of the puzzle, offering little more than a single point of defence. Biometrics, according to IDC, could find its strongest role as a complementary component of a multifactor authentication system," Harris concludes.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managing staff effectively
September 2019, dormakaba South Africa, iPulse Systems , Integrated Solutions, Access Control & Identity Management
Workforce management solutions allow organisations to track the relationship between productivity and the cost of employment, incorporating issues such as health and safety, T&A, rostering and more.

Read more...
Hennie Lategan joins Centurion as head of exports
September 2019, Centurion Systems , News, Access Control & Identity Management
Centurion Systems has announced the appointment of Hennie Lategan as the head of the company’s exports department.

Read more...
New AlproMAX7 secures maximum rating
September 2019 , Access Control & Identity Management, Products
Alpro has launched a new range of ultra-secure mechanical mortice deadlocks, the AlproMAX7 which comply with BS EN 12209.

Read more...
ViRDI UBio Tab 5
September 2019 , Access Control & Identity Management, Products
ViRDI Distribution SA (ViRDI Africa) has announced the release of its long-awaited UBio Tablet to the South African market.

Read more...
Visitor access control at Ruimsig Country Club
September 2019, Elvey Security Technologies , Access Control & Identity Management, Products
Cost-effective access control solution that would control the ingress and egress of people, without hindering the traffic throughput of members.

Read more...
Estate-focused visitor management solution
September 2019, Vox Telecom , Access Control & Identity Management, Residential Estate (Industry)
Vox has expanded its cloud-based visitor management solution to cater specifically for the needs of small multi-dwelling unit estates and large residential estates.

Read more...
Biometrics control airport railroad
September 2019, Suprema , Access Control & Identity Management
63 km railroad to Incheon Airport is centrally controlled and secured by Suprema biometric hardware and software.

Read more...
Dual energy X-ray inspection system
September 2019, Regal Distributors SA , Products, Access Control & Identity Management
The ZKX6550 X-ray inspection system increases the operator's ability to identify potential threats; the device is designed to scan briefcases, carry-on baggage, small cargo parcels.

Read more...
ZKTeco parking barrier
September 2019, Regal Distributors SA , Products, Access Control & Identity Management
The PB3000 parking barrier is an ideal automatic car park barrier for parking lot and security control; it can easily integrate with revenue collection and access control systems.

Read more...
ZKTeco automatic bollard
September 2019, Regal Distributors SA , Products, Access Control & Identity Management
The high-quality automatic bollard is used to protect security areas from vehicle intrusion; in case of power failure, the bollard can be lowered manually.

Read more...