Selecting a biometric technology

Access & Identity Management Handbook 2005 Access Control & Identity Management

The selection of the appropriate biometric technology will depend on a number of application-specific factors, including the environment in which the identity verification process is carried out, the user profile, requirements for verification accuracy and throughput, the overall system cost and capabilities, and cultural issues that could affect user acceptance.

The Figure below shows a comparison of different biometric technologies, with their performance rated against several metrics.

Comparison of biometric technologies
Comparison of biometric technologies

A key factor in the selection of the appropriate biometric technology is its accuracy. When the live biometric template is compared to the stored biometric template, a matching score is used to confirm or deny the identity of the user. System designers set this numeric score to accommodate the desired level of accuracy for the system, as measured by the false acceptance rate (FAR) and false rejection rate (FRR). The false acceptance rate indicates the likelihood that a biometric system will incorrectly identify an individual or accept an impostor. The false rejection rate indicates the likelihood that a biometric system will reject the correct person. Biometric system administrators will tune system sensitivity to FAR and FRR to get to the desired level of accuracy supporting the system security requirements (eg, for a high security environment, tuning to achieve a low FAR and tolerating a higher FRR).

Source: 'A Practical Guide to Biometric Security Technology', IT Professional, January/February 2001.2





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Paxton opens first experience centre in South Africa
Paxton News Access Control & Identity Management
The new Paxton Experience Centre in Johannesburg is now open and welcoming security installers and end users who want to see Paxton’s products in action.

Read more...
Securing a luxurious residential estate
Turnstar Systems Residential Estate (Industry) Access Control & Identity Management
Turnstar Systems recently partnered with Balwin Munyaka Residential Estate to secure the entrance to its Crystal Lagoon, ensuring only authorised residents and guests can access the site.

Read more...
Visitor management via QR code
ATG Digital Access Control & Identity Management Products
ATG Digital has launched its QR Code Reader to enhance access control's security and efficiency. The new QR Code Reader enables seamless, contactless access control, creating an efficient user journey.

Read more...
District secures activity centre
Paxton Access Control & Identity Management Products
Paxton’s Net2 access control solution is a user-friendly and flexible networked access control system, which made installing and managing access control security at an activity centre straightforward.

Read more...
GardaWorld partners with Gallagher
Gallagher Access Control & Identity Management
Access control via facial recognition was at the top of GardaWorld’s wish list, and Gallagher's integration with IDEMIA's VisionPass played a crucial role in delivering a seamless experience.

Read more...
ZK-IWB Series
ZKTeco Products Access Control & Identity Management
Experience the ultimate virtual meeting solution with ZKTeco’s ZK-IWB system. Featuring a built-in 13-megapixel UHD camera and 6-microphone array, the solution ensures clear audio and video experiences with an 8 metre pickup distance.

Read more...
Security for critical industries
ZKTeco Government and Parastatal (Industry) Access Control & Identity Management
The traditional reliance on human observation and physical presence for security is being complemented and, in many cases, replaced by biometric technology to enhance risk management and ensure comprehensive protection.

Read more...
Access to nuclear plants
Suprema Access Control & Identity Management
Korea Hydro & Nuclear Power was in need of a fully redundant access control system that should provide enhanced performance while still being able to interoperate with existing equipment.

Read more...
Secure your site during outages
Paxton Access Control & Identity Management
The PaxLock Pro range is our collection of wireless, battery powered smart door handles. They are efficiently designed to consume minimal energy to operate, and the batteries generally last around two years.

Read more...
Securing data centres and control rooms
Access Control & Identity Management
The demand for data centres and control rooms to store and manage digital information is at an all-time high, however, the rise in cyber threats and physical security risks has raised concerns about how companies can effectively protect these vital infrastructures.

Read more...