When convenience is key biometrics makes life easier

November 2006 Access Control & Identity Management

Biometrics offer an easy to use, ­affordable alternative to traditional ­locking systems.

The next time you are considering installing a new access control system, you might want to think out of the box - and go biometric. Although biometrics might seem, at first glance, out of reach financially, or like space-age overkill, such systems are actually affordable and practical. Not to mention, they are easy to install for integrators and convenient for users, who do not have to worry about carrying a card. With biometric handreaders, your hand is your credential. With fingerprint readers, your finger is your card or key. Such technology is becoming ubiquitous in applications large and small, indoors and out. You find them everywhere.

End-users ranging from small private schools to restaurants, day spas and sororities to large installations such as military bases and major airports worldwide, are all finding biometrics to be an effective, affordable and convenient form of access control. Although biometrics might initially cost more than a standard locking system, they offer many inherent advantages that are worth considering. That is why you are seeing them used increasingly for installations both large and small, and not just for high security - but for the high level of convenience they offer.

Biometrics simply make sense

Biometrics are easy to use. Compared with other security systems, biometrics typically require little or no physical contact or data entry by users and operators. They also minimise the number of pieces of identification a user may need to carry and process to verify their identity. Biometrics are also cost-effective. Because they require minimal operator assistance, businesses and government agencies that use biometrics can save money by devoting customer service and other personnel to activities other than screening individuals requesting access to restricted areas.

Both industry and government are increasingly adopting biometrics as a tool for enhancing security. However, it is no surprise to those in the biometrics industry that a major use of biometric access control today is actually in applications requiring minimal security. For instance, health clubs are major users because handreaders easily let customers into the club. The customer does not need to carry another card or remember it and the club does not have to issue and administrate a card system.

Implementing a biometric solution is easy

Biometric readers can be standalone, networked and integrate easily into all popular access control and/or time and attendance systems. In most cases, they look just like a card reader to an access control system. They are already working with all of the leading time and attendance software packages.

Standalone readers. Many biometrics are available in a standalone configuration. These devices are not only a biometric, but a complete door controller for a single door. Users are enrolled at the unit and their biometric template is stored locally for subsequent comparison. A lock output is energised depending on the outcome.

Networked systems. Many access control applications have a need to control more than one door. While multiple standalone units could be employed, a network of biometric readers is more common. By networking the systems together and then to a computer, several advantages are available to users. The most obvious is centralised monitoring of the system. Alarm conditions and activity for all the doors in the system are reported back to the PC. All transactions are stored on the computer's disk drive and can be recalled for a variety of user-customised reports. Networked systems also provide for template management. This process allows a user to enroll at a single location and have their template available at other locations.

Card reader emulation. Biometric manufacturers offer a variety of different methods to integrate into conventional access control systems. The most common way is referred to as 'card reader emulation'. In this mode, the biometric device essentially works with the access control panel in the same way a card reader does. The 'card reader output port' of the biometric is connected to the panel's card reader port. This method is very effective when integrating into existing card-based systems. The wiring to the access control panel is identical to the card reader's wiring. Integrating biometrics with cards and/or smartcards is becoming de facto. There is a very good reason. Once a badge is lost, the time from when the badge is misplaced to the time that it is subsequently reported, that badge is still alive and active in the access control system. By adding a biometric to the access control system, a badge alone cannot be used to gain access. Both the badge and the person's biometric are required, eliminating this prospective breach, one so probable.

Biometrics ensure accuracy

Of course, the goal of any access control system is to let authorised people, not just their keys or credentials, into specific places. Only with the use of a biometric device can this goal be achieved.

Think about it. A card-based access system will control the access of authorised pieces of plastic, but not who is in possession of the card. Systems using PINs (personal identification numbers) require that an individual only know a specific number to gain entry. But, who actually entered the code cannot be determined. On the contrary, biometric devices verify who a person is by what they are, whether it be their hand, eye, fingerprint or voice.

But, convenience is the biggest selling point for biometrics because they can eliminate the need for keys or cards. While keys themselves do not cost much and dramatic price reductions have lowered the capital cost of the cards in recent years, the true benefit of eliminating them is realised through reduced administrative efforts.

For instance, a lost card or key must be replaced and re-issued by someone. Just as there is a price associated with the time spent to complete this seemingly simple task, when added together, the overall administration of a key or card system is costly. Hands and fingers are not lost, stolen or forgotten. They also do not wear out or need to be replaced.

Choosing the right biometric

The ability to articulate the pros and cons of each of the biometric technologies as they apply to the end user's application will separate the order takers from the true solutions providers. A dealer should review the following five items to ensure that the right biometric is being employed. First of all, the device must cause no discomfort or concern for the user. This may be a subjective issue, but it is important to fully explain any concerns users may have. If people are afraid to use the device, they most likely will not use it properly and that may result in them not being granted access. Privacy concerns must be addressed satisfactorily. Typically, the higher the level of security, the more intrusive the biometric can be while still being accepted by the users.

Secondly, the biometric must be easy to use. People like things that are simple and intuitive. How many times have users been frustrated with a card reader that gives no indication of which way to swipe the card? The larger the population, the more critical this factor becomes. For hundreds of people, 10 extra minutes of training time per person can add up quickly making the enrolment process a nightmare. Thirdly, the biometric must work correctly. This seems obvious, but how well the biometric works will determine if it stays on the job. In the most basic sense, if a biometric is working properly, it does two things. It keeps bad guys out and lets good guys in. Yet, no device is perfect. Typically much attention is given to how well bad guys are repelled, but it is equally important to ensure that the authorised users are consistently recognised and allowed access.

Lastly, a logistical issue that should be considered carefully is throughput, the total time it takes for a person to use the device. This is difficult for manufacturers to specify since it is application dependent. Most manufacturers specify the verification time for the reader, but that is only part of the equation.

When a person uses a biometric reader, they typically enter an ID number on an integral keypad, swipe a card or use proximity. The reader prompts them to position their hand, finger or eye where the device can scan physical details. The elapsed time from presentation to identity verification is the 'verification time'. Most biometric readers verify identity in a second.

Last, but not least, to be successful, the biometric must allow people to reasonably and easily use the technology. If the technology is not as simple as turning a key in a lock, it is going to result in unhappy users. Simply placing a hand on a reader could not be easier.

Bashar Masad is the marketing manager, Ingersoll Rand Security Technologies, Schlage Recognition Systems.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Unlock data insights and integration
Gallagher Access Control & Identity Management Products & Solutions
Gallagher Security announced the release of its security site management software, Command Centre v9.20, which enables integration with Microsoft Entra ID, a cloud-based identity and access management system that provides seamless synchronisation of cardholders across systems.

Read more...
Gallagher Security opens Cape Town office
Gallagher News & Events Access Control & Identity Management
Acknowledging a significant period of growth for the company in South Africa, opening a second office will enable Gallagher to increase its presence across the region with staff based in Johannesburg and Cape Town.

Read more...
Securing access against unwanted visitors
Intelliguard Access Control & Identity Management Residential Estate (Industry) Products & Solutions
In today's residential estates and complexes, one of the biggest concerns is preventing unauthorised access, while ensuring a smooth and convenient experience for residents and approved visitors.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Suprema's BioEntry W3 integrates AI-powered facial authentication into a sleek design that prioritises security, privacy and user experience, and even allows users to store their facial templates on their mobiles instead of external devices.

Read more...
Effortless and secure visitor management
Secutel Technologies Access Control & Identity Management Residential Estate (Industry)
Secutel Ventures has introduced SecuVisit, an access control solution designed to simplify visitor management while enhancing security. With two innovative components onboard, SecuVisit ensures seamless visitor check-ins anytime, anywhere.

Read more...
Glovent’s SOS Suite triple protects estate residents
News & Events Access Control & Identity Management Residential Estate (Industry)
One hundred and fifty-three years since the world’s first panic button was introduced in New York City, Glovent offers estate residents three different ways of summoning emergency assistance at the touch of a button.

Read more...
Security professionals gather at Integrate 360
Gallagher Access Control & Identity Management News & Events
Gallagher Security’s Integrate 360 brought together some of the best minds in security, innovation, and technology for two days full of insights, demonstrations, and future-focused discussions.

Read more...
Suprema showcases enterprise security at Integrate 360
Suprema News & Events Access Control & Identity Management
Since 2006, neaMetrics, Suprema’s distributor in Africa, has worked closely with Gallagher, building a robust partnership resulting in seamless integration between Suprema’s advanced biometric readers and Gallagher’s security management platform.

Read more...
New ASSA ABLOY facility opens in South Africa
ASSA ABLOY South Africa iDSystems Impro Technologies Access Control & Identity Management News & Events
ASSA ABLOY announced the opening of its new facility in Durban, South Africa. This new site unites IDS and Impro operations, bringing both manufacturing plants under one roof to create a hub for innovative access solutions.

Read more...
iProov achieves FIDO Remote Identity Verification certification
News & Events Access Control & Identity Management
iProov, iiDENTIFii’s technology partner in Africa, is the first to achieve the new, global certification in face biometric identity verification from the FIDO Alliance, an open industry association whose mission is to reduce the world’s reliance on passwords.

Read more...