Preventing biometric breakdown

Access & Identity Management Handbook 2011 Access Control & Identity Management

Michael Horvitch, technical advisor at Regal Security, discusses some solutions for preventing biometric reader tampering and destruction.

The past few years have seen a steady increase in the demand of biometric readers for access control systems. The reasoning is simple, if a person’s fingerprint is not registered on the system then he cannot open the door. There are no cards or keys to be lost, stolen or duplicated. There are no PIN codes that could be given to somebody else.

While the above is true, it is only true when people are using the system as intended. Criminals are only concerned with gaining access, not with following rules. They will try anything to find a way in.

A common scenario is to have a fingerprint reader at the main access to a building. The relay inside this reader is then wired up to control an electronic lock. Simple, quick, cheap.

But, what happens if this reader is broken off the wall? All the wires are exposed, and the would-be intruder just has to cut or short the correct wires to unlock the door. And most readers are made of plastic and held closed with one or two screws that can be easily removed. Often, neither the installer nor the client realise the risks of a seemingly secure installation, until the worst happens.

Securing security equipment

Fortunately, there are ways to secure this installation. Firstly, many fingerprint readers have anti-tamper sensors. These can, and should be wired up to some sort of warning system such as a siren in the security office, or a zone on the alarm panel. This will not prevent people from vandalising and overriding the system, but it will ensure a speedy reaction to deter or apprehend the intruder.

The second step would be to connect the fingerprint reader to a proper access control system. Most biometric readers have a Weigand output. This is an industry standard communication protocol for readers to communicate with access control systems.

Most access control systems have Weigand inputs. The reader now no longer controls the electronic lock. All the reader does is send a user ID code to the controller. The controller then makes the decision about this user and decides whether or not he can enter. The controller then switches the lock if access is granted. The controller is securely located inside the premises and nobody can gain unauthorised access to it. If the reader were broken off the wall, the intruder could cut or short wires, but this will not activate the lock.

Companies offer various controllers that can control one, two, four or eight doors. Multiple controllers can then be linked together to control any number of doors on a premises. Software packages would even allow one to expand this system nationally or internationally. And the humble fingerprint reader can be linked to these controllers just by a simple, yet secure interface.

When specifying an access control system, a proper access control backbone should always be included in the quote. Biometrics on its own is not always secure.

For more information contact Regal Distributors, +27 (0)11 553 3300, [email protected], www.regalsecurity.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.