The evolution of biometrics

October 2008 Access Control & Identity Management

According to a recent Gartner study in the US, roughly 15 million people were victims of identity theft in 2006. To put it into perspective that means there was a new victim every two seconds. With this statistic it is clear to see it is only a matter of time before the world advanced its technologies to achieve accurate identification.

The world's answer to the identification issue was biometrics, developed to consistently identify people both accurately and quickly, with security being the key motivator. From access to your work or using credit cards right through to using biometric chips embedded to reduce passport fraud, the ability to manage identity securely remains a fundamental issue.

The past

Biometrics developed as the art of identification by either behavioural or physiological patterns. Physiological identification involves any of the following aspects: the face, fingerprint, hand, iris or DNA while behavioural biometrics looks at signature, keystroke or voice recognition. It was developed out of criminal investigation, in response to requirements for accelerated fingerprint identification and management through automated electronic systems.

As biometrics technologies advance they need to be compared with each other and measured against certain criteria to establish the most suitable technology for a specific environment. The technologies are measured against criteria such as whether every person has a certain characteristic, whether the characteristic alters with age, whether it can be easily falsified or substituted and whether it successfully separates individuals.

The present

In today's market, all industries are benefiting from biometrics technology. We have solutions installed across the board from healthcare, mining to supermarket and retail and manufacturing. The driving factor being it is a very flexible solution with benefits such as eliminating buddy punching and fraudulent clocking in the time and attendance industry, to ensuring positive identification in the security industry.

Because it relies on accuracy biometrics gives the end user an almost 100% positive identification of the person transacting on a system, be that an access control system, time and attendance or logging onto a PC. It can even go as far as positively identifying visitors who come onto your premises and even a person transacting with their department store card or loyalty card.

There are many emerging technologies in today's biometrics environment, such as facial, iris and vein recognition, but the current technology of choice is fingerprint technology. Hand and finger geometry systems really have no place in the modern workplace, simply because they cannot match the competencies of the leading fingerprint technology.

The future

In the future I foresee biometrics gaining extended usage across all types of workplace environments and increasing, continued dominance of fingerprint biometrics. Amongst both vendors and end users, we foresee an expanding understanding of how to work effectively with biometrics. We see this particularly in relation to enrolment and ensuring that the biometric data is of the correct quality and securely managed and in a nutshell, a wider and deeper understanding in general of how to fully capitalise on all the benefits created by biometric technology.

For more information contact Dana Jedrisko, divisional manager: Marketing and Communications, Bytes Systems Integration, +27 (0)11 205 7000, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Palm-vein biometric kiosks secure SAP at Transnet Engineering
Access Control & Identity Management Transport (Industry) Videos
Securing access to SAP is essential to avoid fraud or corruption. Ensuring that users can access the software quickly, easily, and conveniently to do their jobs is also essential.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Towards a global digital passport?
Access Control & Identity Management
In a world where borders are more connected and closely monitored, the idea of a universal digital passport could revolutionise how we travel, work, and even perceive citizenship.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
A platform for access and identity at Securex 2025
Securex South Africa Access Control & Identity Management Facilities & Building Management
South African companies involved in supplying access control technology, security services, and data management are well-positioned to tap into the expanding access control market at Securex 2025.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...