Biometrics Come Calling

Biometrics offer easy to use, affordable alternatives to traditional locking systems

The next time you consider installing a new access control system, you might want to think out of the box and go biometric. Although biometrics might seem, at first glance, out of reach financially or like space-age overkill, such systems are actually affordable and practical. Not to mention, they are easy to install for integrators and convenient for users who do not have to worry about carrying a card. With biometric hand readers, your hand is your credential. With fingerprint readers, your finger is your card or key.

End users, ranging from small private schools to restaurants, day spas and sororities to large installations, such as military bases and major airports worldwide, are all finding biometrics to be an effective, affordable and convenient form of access control.

Such technology is becoming ubiquitous in applications large and small, indoors and out. You find them everywhere.

End users, ranging from small private schools to restaurants, day spas and sororities to large installations, such as military bases and major airports worldwide, are all finding biometrics to be an effective, affordable and convenient form of access control. Although biometrics might initially cost more than a standard locking system, they offer many inherent advantages that are worth considering. That's why you're seeing them used increasingly for installations both large and small, and not just for high security -- but for the high level of convenience they offer.

Biometrics Simply Make Sense
Biometrics are easy to use. Compared with other security systems, biometrics typically require little or no physical contact or data entry by users and operators. They also minimize the number of pieces of identification a user may need to carry and process to verify their identity.

Biometrics also are cost effective. Because they require minimal operator assistance, businesses and government agencies that use biometrics can save money by devoting customer service and other personnel to activities other than screening people requesting access to restricted areas.

Both industry and government are increasingly adopting biometrics as a tool for enhancing security. According to an April 2003 report by the Business Communications Co. Inc., the global market for biometrics was $946 million in 2002. By 2007, the market is expected to be $3.4 billion worldwide.

It is no surprise to those in the biometrics industry that a major use of biometric access control today is actually in applications requiring minimal security. For instance, health clubs are major users because hand readers easily let customers into the club. The customer doesn't need to carry another card or remember it, and the club doesn't have to issue and administrate a card system.

Implementing a Solution is Easy
Biometric readers can be standalone, networked and integrate easily into all popular access control and/or time and attendance systems. In most cases, they look just like a card reader to an access control system. They are already working with all of the leading time and attendance software packages.

Standalone readers. Many biometrics are available in a standalone configuration. These devices are not only a biometric, but a complete door controller for a single door. Users are enrolled at the unit, and their biometric template is stored locally for subsequent comparison. A lock output is energized depending on the outcome.

Networked systems. Many access control applications have a need to control more than one door. While multiple standalone units can be employed, a network of biometric readers is more common. By networking the systems together and then to a computer, several advantages are available to users. The most obvious advantage is centralized monitoring of the system. Alarm conditions and activity for all the doors in the system are reported back to the PC. All transactions are stored on the computer's disk drive and can be recalled for a variety of user-customized reports.

Networked systems also provide for template management. This process allows a user to enroll at a single location and have their template available at other locations.

Card reader emulation. Biometric manufacturers offer a variety of different methods to integrate into conventional access control systems. The most common way is referred to as "card reader emulation." In this mode, the biometric device essentially works with the access control panel in the same way a card reader does. The card reader output port of the biometric is connected to the panel's card reader port. This method is very effective when integrating into existing card-based systems. The wiring to the access control panel is identical to the card reader's wiring.

Integrating biometrics with cards and/or smart cards is becoming de facto. There's a very good reason. Once a badge is lost, the time from when the badge is misplaced to the time that it is subsequently reported, that badge is still alive and active in the access control system. By adding a biometric to the access control system, a badge alone cannot be used to gain access. Both the badge and the person's biometric are required, eliminating this prospective breach, one so probable.

Biometrics Ensure Accuracy
Of course, the goal of any access control system is to let authorized people, not just their keys or credentials, into specific places. Only with the use of a biometric device can this goal be achieved.

Think about it. A card-based access system will control the access of authorized pieces of plastic, but not who is in possession of the card. Systems using a PIN require that a person only know a specific number to gain entry. But, who actually entered the code cannot be determined. On the contrary, biometric devices verify who a person is by what they are, whether it be their hand, eye, fingerprint or voice.

But, convenience is the biggest selling point for biometrics because it can eliminate the need for keys or cards. While keys themselves don't cost much and dramatic price reductions have lowered the capital cost of the cards in recent years, the true benefit of eliminating them is realized through reduced administrative efforts.

For instance, a lost card or key must be replaced and reissued by someone. Just as there is a price associated with the time spent to complete this seemingly simple task, when added together, the overall administration of a key or card system is costly. Hands and fingers are not lost, stolen or forgotten. They also don't wear out or need to be replaced.

The Right Biometric
The ability to articulate the pros and cons of each of the biometric technologies as they apply to the end user's application will separate the order takers from the true solutions providers. A dealer should review the following five items to ensure that the right biometric is being employed.

First of all, the device must cause no discomfort or concern for the user. This may be a subjective issue, but it is important to fully explain any concerns users may have. If people are afraid to use the device, they most likely will not use it properly, and that may result in them not being granted access. Privacy concerns must be addressed satisfactorily. Typically, the higher the level of security, the more intrusive the biometric can be while still being accepted by the users.

Second, the biometric must be easy to use. People like things that are simple and intuitive. How many times have users been frustrated with a card reader that gives no indication of which way to swipe the card? The larger the population, the more critical this factor becomes. For hundreds of people, 10 extra minutes of training time per person can add up quickly, making the enrollment process a nightmare.

Third, the biometric must work correctly. This seems obvious, but how well the biometric works will determine if it stays on the job. In the most basic sense, if a biometric is working properly, it does two things. It keeps bad guys out and lets good guys in. Yet, no device is perfect. Typically much attention is given to how well bad guys are repelled, but it is equally important to ensure that the authorized users are consistently recognized and allowed access.

Fourth, a logistical issue that should be considered carefully is throughput, the total time it takes for a person to use the device. This is difficult for manufacturers to specify since it is application-dependent. Most manufacturers specify the verification time for the reader, but that is only part of the equation.

When a person uses a biometric reader, they typically enter an ID number on an integral keypad, swipe a card or use proximity. The reader prompts them to position their hand, finger or eye where the device can scan physical details. The elapsed time from presentation to identity verification is the "verification time." Most biometric readers verify identity in a second.

Last, but not least, to be successful, the biometric must allow people to reasonably and easily use the technology. If the technology is not as simple as turning a key in a lock, it is going to result in unhappy users. Simply placing a hand on a reader cannot be easier.

Spot the Biometric
From banks to spas to golf clubs, spas and restaurants, more and more, the convenience of biometrics is being used to get people into facilities. Look for one on your next visit to SeaWorld, Busch Gardens and other major public venues. They've become the entrance pass for season ticket holders.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3