Biometrics Come Calling

Biometrics offer easy to use, affordable alternatives to traditional locking systems

The next time you consider installing a new access control system, you might want to think out of the box and go biometric. Although biometrics might seem, at first glance, out of reach financially or like space-age overkill, such systems are actually affordable and practical. Not to mention, they are easy to install for integrators and convenient for users who do not have to worry about carrying a card. With biometric hand readers, your hand is your credential. With fingerprint readers, your finger is your card or key.

End users, ranging from small private schools to restaurants, day spas and sororities to large installations, such as military bases and major airports worldwide, are all finding biometrics to be an effective, affordable and convenient form of access control.

Such technology is becoming ubiquitous in applications large and small, indoors and out. You find them everywhere.

End users, ranging from small private schools to restaurants, day spas and sororities to large installations, such as military bases and major airports worldwide, are all finding biometrics to be an effective, affordable and convenient form of access control. Although biometrics might initially cost more than a standard locking system, they offer many inherent advantages that are worth considering. That's why you're seeing them used increasingly for installations both large and small, and not just for high security -- but for the high level of convenience they offer.

Biometrics Simply Make Sense
Biometrics are easy to use. Compared with other security systems, biometrics typically require little or no physical contact or data entry by users and operators. They also minimize the number of pieces of identification a user may need to carry and process to verify their identity.

Biometrics also are cost effective. Because they require minimal operator assistance, businesses and government agencies that use biometrics can save money by devoting customer service and other personnel to activities other than screening people requesting access to restricted areas.

Both industry and government are increasingly adopting biometrics as a tool for enhancing security. According to an April 2003 report by the Business Communications Co. Inc., the global market for biometrics was $946 million in 2002. By 2007, the market is expected to be $3.4 billion worldwide.

It is no surprise to those in the biometrics industry that a major use of biometric access control today is actually in applications requiring minimal security. For instance, health clubs are major users because hand readers easily let customers into the club. The customer doesn't need to carry another card or remember it, and the club doesn't have to issue and administrate a card system.

Implementing a Solution is Easy
Biometric readers can be standalone, networked and integrate easily into all popular access control and/or time and attendance systems. In most cases, they look just like a card reader to an access control system. They are already working with all of the leading time and attendance software packages.

Standalone readers. Many biometrics are available in a standalone configuration. These devices are not only a biometric, but a complete door controller for a single door. Users are enrolled at the unit, and their biometric template is stored locally for subsequent comparison. A lock output is energized depending on the outcome.

Networked systems. Many access control applications have a need to control more than one door. While multiple standalone units can be employed, a network of biometric readers is more common. By networking the systems together and then to a computer, several advantages are available to users. The most obvious advantage is centralized monitoring of the system. Alarm conditions and activity for all the doors in the system are reported back to the PC. All transactions are stored on the computer's disk drive and can be recalled for a variety of user-customized reports.

Networked systems also provide for template management. This process allows a user to enroll at a single location and have their template available at other locations.

Card reader emulation. Biometric manufacturers offer a variety of different methods to integrate into conventional access control systems. The most common way is referred to as "card reader emulation." In this mode, the biometric device essentially works with the access control panel in the same way a card reader does. The card reader output port of the biometric is connected to the panel's card reader port. This method is very effective when integrating into existing card-based systems. The wiring to the access control panel is identical to the card reader's wiring.

Integrating biometrics with cards and/or smart cards is becoming de facto. There's a very good reason. Once a badge is lost, the time from when the badge is misplaced to the time that it is subsequently reported, that badge is still alive and active in the access control system. By adding a biometric to the access control system, a badge alone cannot be used to gain access. Both the badge and the person's biometric are required, eliminating this prospective breach, one so probable.

Biometrics Ensure Accuracy
Of course, the goal of any access control system is to let authorized people, not just their keys or credentials, into specific places. Only with the use of a biometric device can this goal be achieved.

Think about it. A card-based access system will control the access of authorized pieces of plastic, but not who is in possession of the card. Systems using a PIN require that a person only know a specific number to gain entry. But, who actually entered the code cannot be determined. On the contrary, biometric devices verify who a person is by what they are, whether it be their hand, eye, fingerprint or voice.

But, convenience is the biggest selling point for biometrics because it can eliminate the need for keys or cards. While keys themselves don't cost much and dramatic price reductions have lowered the capital cost of the cards in recent years, the true benefit of eliminating them is realized through reduced administrative efforts.

For instance, a lost card or key must be replaced and reissued by someone. Just as there is a price associated with the time spent to complete this seemingly simple task, when added together, the overall administration of a key or card system is costly. Hands and fingers are not lost, stolen or forgotten. They also don't wear out or need to be replaced.

The Right Biometric
The ability to articulate the pros and cons of each of the biometric technologies as they apply to the end user's application will separate the order takers from the true solutions providers. A dealer should review the following five items to ensure that the right biometric is being employed.

First of all, the device must cause no discomfort or concern for the user. This may be a subjective issue, but it is important to fully explain any concerns users may have. If people are afraid to use the device, they most likely will not use it properly, and that may result in them not being granted access. Privacy concerns must be addressed satisfactorily. Typically, the higher the level of security, the more intrusive the biometric can be while still being accepted by the users.

Second, the biometric must be easy to use. People like things that are simple and intuitive. How many times have users been frustrated with a card reader that gives no indication of which way to swipe the card? The larger the population, the more critical this factor becomes. For hundreds of people, 10 extra minutes of training time per person can add up quickly, making the enrollment process a nightmare.

Third, the biometric must work correctly. This seems obvious, but how well the biometric works will determine if it stays on the job. In the most basic sense, if a biometric is working properly, it does two things. It keeps bad guys out and lets good guys in. Yet, no device is perfect. Typically much attention is given to how well bad guys are repelled, but it is equally important to ensure that the authorized users are consistently recognized and allowed access.

Fourth, a logistical issue that should be considered carefully is throughput, the total time it takes for a person to use the device. This is difficult for manufacturers to specify since it is application-dependent. Most manufacturers specify the verification time for the reader, but that is only part of the equation.

When a person uses a biometric reader, they typically enter an ID number on an integral keypad, swipe a card or use proximity. The reader prompts them to position their hand, finger or eye where the device can scan physical details. The elapsed time from presentation to identity verification is the "verification time." Most biometric readers verify identity in a second.

Last, but not least, to be successful, the biometric must allow people to reasonably and easily use the technology. If the technology is not as simple as turning a key in a lock, it is going to result in unhappy users. Simply placing a hand on a reader cannot be easier.

Spot the Biometric
From banks to spas to golf clubs, spas and restaurants, more and more, the convenience of biometrics is being used to get people into facilities. Look for one on your next visit to SeaWorld, Busch Gardens and other major public venues. They've become the entrance pass for season ticket holders.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.