Put those prox cards away! Traditional access control systems requiring a proximity card are increasingly being replaced with biometric security systems for good reason: no cards, keys or codes needed, as the user's actual unique body characteristics have become their access credential. Typically, biometric access systems require the user to present their fingerprint (or other biometric identifier, such as the iris of their eye, hand geometry or face). Far more secure than traditional access systems (where keys, codes and cards can be shared, lost or stolen), biometric access is based on a person proving their own physical identity before they are granted door access .  . . or gate access . . . or elevator access . . . or access to just about anything which is electrically or magnetically “operated.”

Biometrics refers to a category of technologies which measure and analyze human body characteristics such as DNA, fingerprints, eye retinas and irises, vein geometry, voice patterns and facial patterns. Since biometric identifiers are unique to every individual, they are more reliable in verifying identity than token (something you have) or password (something you know) methods. Like anything else though, embracing change is not always easy. But, transitioning from traditional card access to biometric access surprisingly is easy.

While some savvy security dealers and integrators have long since adopted biometrics as an important instrument in their “security tool bag,” still others harbor some reservations. The most common reservation: Installers fear their end-users will think upgrading to biometrics is too expensive, too complicated to operate or too invasive to their privacy. Many installers are still not really familiar with biometric technology and its advantages, and some fear losing control of their customers and the associated recurring card-replacement business.

The reality is, biometrics install no differently than simple keypad readers. Accuracy has improved tremendously, face recognition now exists and installers can charge for related management services. From a cost and use perspective, biometrics is now quite affordable and easy to operate. And, there are no privacy concerns. Unlike the technology used by Automated Fingerprint Identification Systems (AFIS) for law enforcement purposes, biometric terminals do not store actual fingerprint images. Instead, the biometric terminals capture only unique minutia points (in the fingerprint, face, hand, etc.) and convert those minutia points into binary computer data using proprietary mathematical algorithms. The resulting digital representation is commonly referred to as a “biometric template.” Only the user’s template (not an actual image) is stored on the terminal; thus, it is virtually impossible to recreate the original image. It’s like playing “connect the dots” as a kid. Can anyone actually recreate an entire fingerprint (or face) image if only allowed to draw a couple dozen points (and no lines in between) on the paper?  It’s impossible to recreate the original image from a biometric template.  As a result, there are no privacy issues regarding the use of biometric identification.

In today's culture, biometrics is everywhere - just look at smartphones and laptops. If installers don’t invest time learning about biometrics, their customers will seek out that installer’s competition. Biometrics will soon exist in most every consumer’s hand.

In terms of improved security and accuracy rates, The National Institute of Standards and Technology (NIST) conducted a study that showed single fingerprint biometric systems had a 98.6 percent accuracy rate. The accuracy rate increased to 99.6 percent when two fingerprints were used and jumped to an almost perfect 99.9 percent when 4 or more fingerprints were used.

The components of a typical keypad/card reader installation include:

  1. Reader (keypad or card reader);
  2. Electric (or magnetic) Door lock;
  3. 12V DC relay connects reader to door lock (or Wiegand Output to access control panel);
  4. Cat5e/6 cable for data communication (optional);
  5. Power for reader and door lock; and
  6. Program the PIN codes and/or cards.

The components of a biometric reader installation include:

  1. Reader (fingerprint and/or face reader);
  2. Electric (or magnetic) Door lock;
  3. 12V DC relay connects reader to door lock (or Wiegand Output to access control panel);
  4. Cat5e/6 cable for data communication (optional);
  5. Power for reader and door lock; and
  6. Program the fingerprints and/or faces.

The only difference between a traditional keypad/card reader and a biometric reader is the credentials used with the reader. Consequently, the learning curve involves only how to enroll fingerprints, faces, or any other body characteristics. The good news is today’s biometric readers are very intuitive, making enrollment quite simple by following audio and visual prompts available in most stand-alone terminals.

  1. Enter the Main Menu.
  2. Select “Add User.”
  3. Enter the user’s ID#.
  4. Select enroll fingerprint(s)/face.
  5. Place and remove the user’s finger on the fingerprint sensor 3 times (to obtain average image).
  6. Press “Save.”

That’s it. Simple. Quick. And, most fingerprint reader vendors offer software that allows fingerprint templates to be copied amongst multiple terminals so users only need to be enrolled once. Installers who wish to capture Recurring Monthly Revenue (RMR) simply maintain their customers' access control database including access control list, audit trail and biometric templates in the installer’s own office and provide their customers with reports whenever the customer makes a request.

Biometrics vs. Conventional Electronic Access Control (EAC)

More and more dealers and installers are discovering the benefits of biometric access solutions.  Just some of the many advantages which biometrics offer include: greater security, more flexibility, more cost effective, easy to install, easy to sell and convenience. Just ask any smartphone user about the freedom of no longer needing to enter/memorize their phone’s access code when powering on or downloading an app or song.

ZKAccess is pleased to offer a FREE, 3-CEU credit course, accredited by ESA and BICSI - Advanced Biometric Access Control. For more information, please visit http://www.zkaccess.com/.

About the Author

Manish Dalal is COO/Product Manager at ZKAccess.


  • Live From ISC West 2023: Day 1

    ISC West 2023 in Las Vegas, Nevada, has officially begun! Make sure to keep an eye on Security Today’s ISCW Live 2023 page, as well as our associated Twitter accounts—@SecurToday and @CampusSecur—for the latest updates from the show floor at the Venetian Expo. Read Now

    • Industry Events
    • ISC West
  • It Happened Again

    Just yesterday (as of this writing), it happened again. A 28-year-old woman shot her way into a Christian elementary school in Nashville, Tenn., on Monday and killed three children and three adults, according to national news. AP News reports that the victims were three 9-year-old children, a top school administrator, a substitute teacher, and a school custodian Read Now

  • Let's Get to Work

    You are standing at the conference center doors just waiting to get into the exhibit hall. I know you are because I’m standing next to you. This week at ISC West has been three years in the making. Last year was encouraging, and here we are waiting for the Big Show. Read Now

    • Industry Events
    • ISC West
  • Using Modern Technology

    Using Modern Technology

    Workplace violence is a serious and growing challenge for many organizations — including those in the healthcare industry. Read Now

Featured Cybersecurity

New Products

  • HID Signo Readers

    HID Signo Readers

    HID Global has announced its HID® Signo™ Biometric Reader 25B that is designed to capture and read fingerprints in real-world applications and conditions. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Dahua 2-Wire IP Video Intercom System

    Dahua 2-Wire IP Video Intercom System

    Dahua Technology is introducing a new line of expandable 2-wire IP video intercom solutions for the North America market. The New 2-wire IP video intercom is more advanced, cost effective, and designed to help businesses increase their security. 3