Biometric Ideas

Biometric Ideas

What every integrator should know about the solution

To best leverage the advantages of biometrics, integrators should follow the tips outlined below to take advantage of the primary benefits of biometrics, which are enhanced security and convenience. These two benefits are very important, as security prevents unauthorized access by someone misusing an authorized ID badge, and convenience prevents accidental lockout when a user forgets or loses their ID badge.

While fingerprint readers are becoming more accurate, there still may be times when some users’ fingerprints cannot be recognized. This is most often due to changing environmental variables and/or lack of user-training. Here are some useful tips to improve fingerprint recognition.

Be mindful if a user successfully enrolled their fingerprint, you should be able to match that same fingerprint 100 percent of the time. If however, a previous successfully enrolled finger cannot be subsequently matched, then assume something has changed since you last successfully enrolled that same user’s fingerprint. There are several possibilities.

  • The finger has become dirty. (Washing it should solve the problem.)
  • The finger has become scratched. (Try enrolling a different finger.)
  • The fingerprint sensor has become dirty. (Try cleaning it with a lint-free cloth.)
  • There is insufficient moisture on their finger. (They should rub their finger against their forehead or cheek to obtain oil from their skin and try again. Fingerprints are just like rubber stamps. If a rubber stamp has too little ink, then it makes a poor image. Rubber stamps need ink. Fingerprints need moisture.)
  • The biometric reader has become damaged. Contact your supplier to have the reader fixed or replaced.

If you are unable to enroll a user’s fingerprints, try lowering the threshold setting on the reader, which desensitizes the fingerprint scanner, or change from 1:N fingerprintmatching to 1:1 fingerprint-matching*.

It is possible the condition of the workplace (i.e. dirty/dusty), weather (very cold/ arid) or employee demographics (ages younger than 10 years or older than 65 years) may contribute to less than optimal fingerprint recognition results. If this is the case, then consider other biometric technologies that are not obscured by working conditions, such as face recognition, veinpattern recognition or iris recognition.

Lastly, it’s possible that based on your environment, users and/or budget that a traditional card-based access control system is best suited for you.

Biometrics is a “credential,” just as metal keys, access badges or PIN codes. Each credential has its advantages and disadvantages. Under certain circumstances, every type of credential can fail or have difficulty, including a metal key that wasn’t copied precisely and can’t open a door lock easily. Likewise, biometrics requires the cooperation of users. If they need access, they will learn how to “cooperate” with the biometric reader. But, unless the owner/manager ensures their employees are “cooperating,” employees will not often cooperate and claim the biometric reader doesn’t work.

Biometrics does provide the highest level of security and convenience. But just like a slightly imperfect metal key, biometrics requires the cooperation of users to make it work.

This article originally appeared in the November 2017 issue of Security Today.

About the Author

Larry Reed is CEO of ZKAccess.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities