BIOMETRICS
Most of us think of biometrics as a finger print identification. We may have heard about the military using facial recognition or retinal scan but for us the finger print was it.
Today we have may more options for biometrics.
My trade magazine Locksmith Ledger International has an article about these advancements I wanted to share with you. Written by Tim O’leary.
One key point was that if biometrics are used with additional credentials like pin number or swipe cards it greatly increases the security.
We all have a biometric signature. This is what the system uses to identify us with. Our biological characteristics are broken down and a digital file is created.
The digital file is called a template that will be stored in the memory and used to compare to you when needed.
A term 1:N (one to many) is used when a persons identity is compared to in a data base of people.
1:1 is when a persons template is stored on a credential (card or fob) when the person presents the credential the persons bio is then compared at site to be matched or denied.
Many systems allow for two biometric signatures in case one gets damaged or becomes unreadable. I.e. If a finger print had a cut or scrape on it the print becomes unreadable.
As of today and as we know it the biometric signature is safer than a pin number, fob, card, or any other tangible credential that is prone to theft. Our biometrics are more secure with us…don’t lose a finger.
According to the article there are three different elements to Biometric access control systems:
- A reading or scanning device that can capture the image of personnel.
- The software algorithm which created each individuals biometric template which is stored in a database or on a credential and determines if the scanned signature matched the stored template.
- Access control controllers and software which manage the users the templates the access rules and control and record activities and the locking and unlocking of the doors.
Some biometric technologies are open platform in that they present a Wiegand output to a access control system. One example would be that my fingerscan would create a Wiegand data string the same as a credential would create and the access control system would act on this data as if it were a credential based transaction.
Some of the different biometric scanning devices such as: Fingerprints, hand geometry, veins, voices, faces, irises, retinas, and even signatures, keystrokes, and DNA all can be measures and digitized to be stored and retrieved and matched in order to verify your identity.
You can go to http://www.nist.gov/itl/iad/biometric-120611.cfmto
The iris recognition is one of the most accurate biometrics currently available.
Retina recognition is also precise though it is the most invasive due to the light being shone into the back of the eye.
The hand scanner is not intrusive and also reliable.
If you are in need of some form of biometrics some factors to be considered are:
Throughput required: This means how many individuals the system will be required to screen and how fast must this be accomplished without creating delays and user frustration.
Existing system capabilities: Many biometric upgrades are totally possible without having to run cabling or changing other system assets.
Reliability and efficiency of the reader: Every person who will use the system will have to be enrolled the identity every person using the system must be verified Misreads or malfunctions will cause big problems.
Price: The cost of the hardware and the amount of technical support required to keep biometrics lowering and thereby making the technology more feasible.
Reliability: Improved technology results in fewer hardware failures and security lapses. Reader throughput rivals keypad and credential based system speeds.
Convenience: Newer biometrics are less intimidating that earlier efforts, less body contact, no laser beams in the eye: no hygiene issues, makes the biometric interface more friendly to users.
Some of the units can be tuned for less misreads. They can have the criteria lowered reducing false negatives. This could also allow for more false positives as well though.
I was really impressed with Mr. O’Leary’s article; he did a great job describing so much detail. If you would like to read the actual article let me know.