Biometric Ideas

Biometric Ideas

What every integrator should know about the solution

To best leverage the advantages of biometrics, integrators should follow the tips outlined below to take advantage of the primary benefits of biometrics, which are enhanced security and convenience. These two benefits are very important, as security prevents unauthorized access by someone misusing an authorized ID badge, and convenience prevents accidental lockout when a user forgets or loses their ID badge.

While fingerprint readers are becoming more accurate, there still may be times when some users’ fingerprints cannot be recognized. This is most often due to changing environmental variables and/or lack of user-training. Here are some useful tips to improve fingerprint recognition.

Be mindful if a user successfully enrolled their fingerprint, you should be able to match that same fingerprint 100 percent of the time. If however, a previous successfully enrolled finger cannot be subsequently matched, then assume something has changed since you last successfully enrolled that same user’s fingerprint. There are several possibilities.

  • The finger has become dirty. (Washing it should solve the problem.)
  • The finger has become scratched. (Try enrolling a different finger.)
  • The fingerprint sensor has become dirty. (Try cleaning it with a lint-free cloth.)
  • There is insufficient moisture on their finger. (They should rub their finger against their forehead or cheek to obtain oil from their skin and try again. Fingerprints are just like rubber stamps. If a rubber stamp has too little ink, then it makes a poor image. Rubber stamps need ink. Fingerprints need moisture.)
  • The biometric reader has become damaged. Contact your supplier to have the reader fixed or replaced.

If you are unable to enroll a user’s fingerprints, try lowering the threshold setting on the reader, which desensitizes the fingerprint scanner, or change from 1:N fingerprintmatching to 1:1 fingerprint-matching*.

It is possible the condition of the workplace (i.e. dirty/dusty), weather (very cold/ arid) or employee demographics (ages younger than 10 years or older than 65 years) may contribute to less than optimal fingerprint recognition results. If this is the case, then consider other biometric technologies that are not obscured by working conditions, such as face recognition, veinpattern recognition or iris recognition.

Lastly, it’s possible that based on your environment, users and/or budget that a traditional card-based access control system is best suited for you.

Biometrics is a “credential,” just as metal keys, access badges or PIN codes. Each credential has its advantages and disadvantages. Under certain circumstances, every type of credential can fail or have difficulty, including a metal key that wasn’t copied precisely and can’t open a door lock easily. Likewise, biometrics requires the cooperation of users. If they need access, they will learn how to “cooperate” with the biometric reader. But, unless the owner/manager ensures their employees are “cooperating,” employees will not often cooperate and claim the biometric reader doesn’t work.

Biometrics does provide the highest level of security and convenience. But just like a slightly imperfect metal key, biometrics requires the cooperation of users to make it work.

This article originally appeared in the November 2017 issue of Security Today.

About the Author

Larry Reed is CEO of ZKAccess.

Featured

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.