The vexing issue with biometrics

1 October 2014 Access Control & Identity Management

Fingerprint biometric systems have, in recent years stormed the access control and time & attendance market becoming the mainstream devices to use for identification and verification of users of the system. Very few access control systems are installed these days without at least one biometric device being connected to the solution with these devices replacing proximity readers to a large extent.

Time & attendance solution providers have all but disregarded any other form of electronic clocking system. This is mainly due to biometrics offering two invaluable aspects of either an access control or time & attendance solution – security and convenience. No more shared numerical pins, no lost proximity cards and no more buddy clocking.

This however does not mean that biometrics, and fingerprint biometrics in particular, are foolproof. Quite the contrary, a little mentioned fact of fingerprint biometrics are that only an estimated 95% of people can utilise a fingerprint biometric system. This estimation differs from vendor to vendor as the industry strives to make the biometric market more useable by utilising differing technologies.

Reasons for failure

From using multispectral response fingerprint scanning modules to incorporating scar tissue on the actual fingerprint template these technologies, some proprietary, helps the usability of the fingerprint biometric system. Fact is, not one vendor has been able to achieve a 100% usability rate unless they fake it until they make it.

Tier 1 vendors can claim up to a 98% usability rate by the use of proprietary technologies, but there always remains a percentage of people that are unable to use a fingerprint biometric system. I have interacted with individuals that have not one single useable fingerprint due to various reasons – wear and tear being the foremost.

Some individuals, contrary to popular belief, just do not have fingerprints. This seems to be a quirk of nature as normally this phenomenon occurs in industries where the individuals’ fingerprints are subject to abrasive or corrosive materials. In numerous instances individuals exist that have no contact in either their professional or personal lives with any material that could explain them not having at least one single usable fingerprint.

The usability rate of 95% does not necessarily translate into real word usability rates. Some systems have a rate as low as 70% when deployed in the field and this translates to one very simple fact – the biometric system is delinquent. It has the potential but is not performing as expected. The reasons for this may be numerous. It may be attributed to environmental factors, the wrong solution for the application, outdated algorithms, archaic but cheap technologies and training on the correct usage of the biometric device. The biggest culprit however seems to be situated at the source of the fingerprint database – initial enrolment of user’s fingerprints on the systems.

Enrolment issues

The mantra for biometric vendors and installers alike should be: ‘If you have a poor enrolment, you have a poor system’; or in IT parlance: ‘Junk in, junk out’. No amount of tweaking after the fact will make the system perform any better and will in fact open the system to abuse negating the raison d’ître for making use of a biometric fingerprint system in the first instance.

Various vendors provide for different fingerprint enrolment methods. Some only allow for enrolment on the field based biometric device itself and then transferring the template to the software where additional information is captured. Others allow for enrolment on both the biometric device and on the software via a take-on reader.

The issue with enrolling the fingerprint onto the system via the field based biometric device is the inherent difficulty with judging how good or bad a fingerprint template is. There is no way to know if the fingerprint template will be useable and invariably – due to not being able to ‘score’ the fingerprint – this leads to a low usage rate, multiple scans, long transaction times and complaints from users that the system does not work. These complaints are certainly justified since the optimum for access control systems are to keep bad guys out and give good guys access whilst doing it as speedily and accurately as possible. The same applies to time & attendance systems.

The correct enrolment procedure is to use a system that allows for enrolment directly onto the software via a take-on biometric device. These systems allow for the fingerprint to be scored on a percentage basis and will automatically indicate that a fingerprint does not conform to the required levels of usability. This in turn allows the administrator of the system to take steps to ensure that the user will be able to use the system without hindrance. Typically, this is done by adjusting the software to lessen or heighten the amount of identifiable features that the system looks for when matching a user’s fingerprint from the database.

Some vendors allow this to be done on a global scale and some vendors allow this to be done on an individual basis. The former poses a security risk due to every user’s profile being amended according to a lowered matching standard. Being able to amend the enrolment and matching levels on an individual basis is therefore desirable since only the single user – or a small group of users at least – uses less or more identifiable features which translates to a higher level of security. Sometimes however, the problem with a poor fingerprint exists simply because the fingerprint is dry or wet and these are easily solved.

By addressing enrolment issues, 8 out of 10 delinquent biometric systems can be rectified to operate optimally and as advertised. This is true for all Tier 1 vendors. Unfortunately, it will not resolve all issues with delinquent systems due to all systems not being equal. Environment and embedded technology will always play a major role in the usability of the system just as with everything else.

For more information contact Deon van Rensburg, Virdi Distribution, +27 (0)82 820 0887, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...