Making biometric systems meaningful

August 2003 Access Control & Identity Management

The buzz word in access control the world over is 'biometrics'. Simply put this means that one uses certain unique elements of the human body - the most fundamental being the fingerprint - in a line up of many such as the eye retina, the iris, facial geometry, hand geometry, voice patterns and the like, to act as the identifier or the credentials for computer processor-based systems to typically grant access into a secure operation or environment for specific authorised individuals. In theory, this means that only the correct person will be allowed in as these credentials are unique and as such cannot be stolen, loaned (or sold) to others, or accidentally lost, thereby placing them at the disposal of others.

Biometric access control systems are generally deployed in environments where security is of paramount importance. This could be in the protection of assets, processes, operations, intellectual property and the like which are core elements of successful business or institutional operations.

The reality is that biometrics on their own are pretty meaningless unless they are coupled to devices which ensure that only one person at a time with the correct and verified credentials actually gains access to the secure area.

Too often one finds that such a system merely controls conventional doors which unwanted and unauthorised people can sneak through by merely putting their foot in the door (so-to-speak) as the authorised person, who just validly entered the building, disappears down the corridor in haste. In most modern day operations where speed is of the essence and people come and go seemingly without end, not everyone can be relied upon to be vigilant and ensure these things do not happen. This leaves a huge loophole for the criminal or industrial espionage agent to find their way into the heart of the operation with the greatest of ease.

With this in mind Transaction Control Technologies (TCT) introduced the internationally patented selector door which addresses the problem in a very practical manner by not only controlling access to those with verified credentials only but also making the passage of bulk items and wheelchairs possible under controlled circumstances.

The selector door is an innovative product that aims to make the application of biometric access control systems meaningful, thereby offering discerning clients the high level of secure access control their operations demand without compromise.

The selector door has not only found success in the South African market but has also become the secure access control door of choice by leading international companies, the most recent of which being a leading world banking group which has selected the Versamax model of the selector door to control access to various high security areas in its London operation.

The Versamax model
The Versamax model





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Palm-vein biometric kiosks secure SAP at Transnet Engineering
Access Control & Identity Management Transport (Industry) Videos
Securing access to SAP is essential to avoid fraud or corruption. Ensuring that users can access the software quickly, easily, and conveniently to do their jobs is also essential.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Towards a global digital passport?
Access Control & Identity Management
In a world where borders are more connected and closely monitored, the idea of a universal digital passport could revolutionise how we travel, work, and even perceive citizenship.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
A platform for access and identity at Securex 2025
Securex South Africa Access Control & Identity Management Facilities & Building Management
South African companies involved in supplying access control technology, security services, and data management are well-positioned to tap into the expanding access control market at Securex 2025.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...