When convenience is key biometrics makes life easier

November 2006 Access Control & Identity Management

Biometrics offer an easy to use, ­affordable alternative to traditional ­locking systems.

The next time you are considering installing a new access control system, you might want to think out of the box - and go biometric. Although biometrics might seem, at first glance, out of reach financially, or like space-age overkill, such systems are actually affordable and practical. Not to mention, they are easy to install for integrators and convenient for users, who do not have to worry about carrying a card. With biometric handreaders, your hand is your credential. With fingerprint readers, your finger is your card or key. Such technology is becoming ubiquitous in applications large and small, indoors and out. You find them everywhere.

End-users ranging from small private schools to restaurants, day spas and sororities to large installations such as military bases and major airports worldwide, are all finding biometrics to be an effective, affordable and convenient form of access control. Although biometrics might initially cost more than a standard locking system, they offer many inherent advantages that are worth considering. That is why you are seeing them used increasingly for installations both large and small, and not just for high security - but for the high level of convenience they offer.

Biometrics simply make sense

Biometrics are easy to use. Compared with other security systems, biometrics typically require little or no physical contact or data entry by users and operators. They also minimise the number of pieces of identification a user may need to carry and process to verify their identity. Biometrics are also cost-effective. Because they require minimal operator assistance, businesses and government agencies that use biometrics can save money by devoting customer service and other personnel to activities other than screening individuals requesting access to restricted areas.

Both industry and government are increasingly adopting biometrics as a tool for enhancing security. However, it is no surprise to those in the biometrics industry that a major use of biometric access control today is actually in applications requiring minimal security. For instance, health clubs are major users because handreaders easily let customers into the club. The customer does not need to carry another card or remember it and the club does not have to issue and administrate a card system.

Implementing a biometric solution is easy

Biometric readers can be standalone, networked and integrate easily into all popular access control and/or time and attendance systems. In most cases, they look just like a card reader to an access control system. They are already working with all of the leading time and attendance software packages.

Standalone readers. Many biometrics are available in a standalone configuration. These devices are not only a biometric, but a complete door controller for a single door. Users are enrolled at the unit and their biometric template is stored locally for subsequent comparison. A lock output is energised depending on the outcome.

Networked systems. Many access control applications have a need to control more than one door. While multiple standalone units could be employed, a network of biometric readers is more common. By networking the systems together and then to a computer, several advantages are available to users. The most obvious is centralised monitoring of the system. Alarm conditions and activity for all the doors in the system are reported back to the PC. All transactions are stored on the computer's disk drive and can be recalled for a variety of user-customised reports. Networked systems also provide for template management. This process allows a user to enroll at a single location and have their template available at other locations.

Card reader emulation. Biometric manufacturers offer a variety of different methods to integrate into conventional access control systems. The most common way is referred to as 'card reader emulation'. In this mode, the biometric device essentially works with the access control panel in the same way a card reader does. The 'card reader output port' of the biometric is connected to the panel's card reader port. This method is very effective when integrating into existing card-based systems. The wiring to the access control panel is identical to the card reader's wiring. Integrating biometrics with cards and/or smartcards is becoming de facto. There is a very good reason. Once a badge is lost, the time from when the badge is misplaced to the time that it is subsequently reported, that badge is still alive and active in the access control system. By adding a biometric to the access control system, a badge alone cannot be used to gain access. Both the badge and the person's biometric are required, eliminating this prospective breach, one so probable.

Biometrics ensure accuracy

Of course, the goal of any access control system is to let authorised people, not just their keys or credentials, into specific places. Only with the use of a biometric device can this goal be achieved.

Think about it. A card-based access system will control the access of authorised pieces of plastic, but not who is in possession of the card. Systems using PINs (personal identification numbers) require that an individual only know a specific number to gain entry. But, who actually entered the code cannot be determined. On the contrary, biometric devices verify who a person is by what they are, whether it be their hand, eye, fingerprint or voice.

But, convenience is the biggest selling point for biometrics because they can eliminate the need for keys or cards. While keys themselves do not cost much and dramatic price reductions have lowered the capital cost of the cards in recent years, the true benefit of eliminating them is realised through reduced administrative efforts.

For instance, a lost card or key must be replaced and re-issued by someone. Just as there is a price associated with the time spent to complete this seemingly simple task, when added together, the overall administration of a key or card system is costly. Hands and fingers are not lost, stolen or forgotten. They also do not wear out or need to be replaced.

Choosing the right biometric

The ability to articulate the pros and cons of each of the biometric technologies as they apply to the end user's application will separate the order takers from the true solutions providers. A dealer should review the following five items to ensure that the right biometric is being employed. First of all, the device must cause no discomfort or concern for the user. This may be a subjective issue, but it is important to fully explain any concerns users may have. If people are afraid to use the device, they most likely will not use it properly and that may result in them not being granted access. Privacy concerns must be addressed satisfactorily. Typically, the higher the level of security, the more intrusive the biometric can be while still being accepted by the users.

Secondly, the biometric must be easy to use. People like things that are simple and intuitive. How many times have users been frustrated with a card reader that gives no indication of which way to swipe the card? The larger the population, the more critical this factor becomes. For hundreds of people, 10 extra minutes of training time per person can add up quickly making the enrolment process a nightmare. Thirdly, the biometric must work correctly. This seems obvious, but how well the biometric works will determine if it stays on the job. In the most basic sense, if a biometric is working properly, it does two things. It keeps bad guys out and lets good guys in. Yet, no device is perfect. Typically much attention is given to how well bad guys are repelled, but it is equally important to ensure that the authorised users are consistently recognised and allowed access.

Lastly, a logistical issue that should be considered carefully is throughput, the total time it takes for a person to use the device. This is difficult for manufacturers to specify since it is application dependent. Most manufacturers specify the verification time for the reader, but that is only part of the equation.

When a person uses a biometric reader, they typically enter an ID number on an integral keypad, swipe a card or use proximity. The reader prompts them to position their hand, finger or eye where the device can scan physical details. The elapsed time from presentation to identity verification is the 'verification time'. Most biometric readers verify identity in a second.

Last, but not least, to be successful, the biometric must allow people to reasonably and easily use the technology. If the technology is not as simple as turning a key in a lock, it is going to result in unhappy users. Simply placing a hand on a reader could not be easier.

Bashar Masad is the marketing manager, Ingersoll Rand Security Technologies, Schlage Recognition Systems.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...