Pointing fingers at access control

February 2009 Access Control & Identity Management

Biometric technology – the analysis of unique physical characteristics such as fingerprints, DNA, veins, voice, hand geometry, iris or retinal patterns – has long been used for the purpose of access control, but is now also playing a significant role in complete workplace access management. In addition to controlling the access of employees and visitors into certain areas, workplace access management can integrate solutions for time and attendance, access control, job costing, alarm monitoring, HR information processing, payroll interfaces and other ERP, planning and reporting packages.

The benefit of a biometric access control system is that only authorised people – not merely their credentials – are granted access to specific places. A card-based system will only control the access of authorised pieces of plastic, but not who is in possession of the card, which can be shared or stolen. Similarly, the use of PINs requires an individual to punch in a specific number to gain entry, but who actually entered the code cannot be determined as PINs can also be shared.

Typically, a building’s access control system focuses on controlling the access rights of people whose identities are already known: employees. These identities need to be known for a variety of reasons that have nothing to do with controlling access – payroll, taxation, medical schemes, employment contracts and so on.

For most companies, payroll is the single largest expense so this is where the greatest protection is required against threats of fraud, corruption and theft. Workplace access management systems have therefore become a crucial element of financial control in companies of all sizes.

Payroll and HR applications can be seamlessly linked to biometric fingerprint readers. Employees then scan their fingers when they arrive at the office and again when they leave at the end of the day or shift. At the end of the month the company payroll is automatically calculated based on the employees’ attendance as registered by the fingerprint reader.

Unauthorised entry into the workplace creates potential threats of theft, injury to people and damage to property. With a biometric access control system, instead of visitors writing in a visitor book, the visitor’s ID number, car registration and contact details are entered on a terminal and a fingerprint is used to ‘sign’. Within seconds, the visitor’s details are checked against a national database and his identity confirmed. The terminal then prints a gate pass with the visitor’s name and the site conditions and he is cleared to proceed.

Crucial factors in the success of a biometric system are the enrolment procedure and user acceptance of the device.

With modern technology, there is no reason why everybody cannot be enrolled on a biometric fingerprint system. Enrolment of all end-users should be regarded as a crucial part of the installation process.

Education about fingerprint technology is also important so that the users know how and what information is collected, what it is used for and how and where it is stored. All this will help in reassuring users and making them feel more comfortable in using the technology.

Biometrics capabilities go way beyond mere access control – integrated into other business solutions, a comprehensive business tool can be created, with which companies can reduce labour costs, increase efficiency and output and drive business value throughout the organisation.

Benefits of biometrics

Accuracy – increases corporate vigilance through precise control of key outcomes in payroll, safety and security. Eliminates constantly recurring costs imposed by access cards, PINS, passwords, logbooks and registers.

Capacity – comprehensive access protection that identifies and records everyone entering and leaving the workplace, including visitors and contractors. Supports existing investments when systems are upgraded to meet changing access needs, without additional per-user charges.

Security – more effective risk management and reduced exposure to potential loss and liability through consistent control of access. Cuts overall losses caused by unauthorised access, including accidents, theft and fraud.

Integrity – protects every part of a business through universal control of physical and logical access. Eradicates duplicate costs for multiple access systems and databases, minimising integration costs across different business functions.

Speed – accelerates administration processes with reliable, realtime data for workforce management. Minimises the impact on productivity by cutting queue times and clocking times.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...