When convenience is key biometrics makes life easier

November 2006 Access Control & Identity Management

Biometrics offer an easy to use, ­affordable alternative to traditional ­locking systems.

The next time you are considering installing a new access control system, you might want to think out of the box - and go biometric. Although biometrics might seem, at first glance, out of reach financially, or like space-age overkill, such systems are actually affordable and practical. Not to mention, they are easy to install for integrators and convenient for users, who do not have to worry about carrying a card. With biometric handreaders, your hand is your credential. With fingerprint readers, your finger is your card or key. Such technology is becoming ubiquitous in applications large and small, indoors and out. You find them everywhere.

End-users ranging from small private schools to restaurants, day spas and sororities to large installations such as military bases and major airports worldwide, are all finding biometrics to be an effective, affordable and convenient form of access control. Although biometrics might initially cost more than a standard locking system, they offer many inherent advantages that are worth considering. That is why you are seeing them used increasingly for installations both large and small, and not just for high security - but for the high level of convenience they offer.

Biometrics simply make sense

Biometrics are easy to use. Compared with other security systems, biometrics typically require little or no physical contact or data entry by users and operators. They also minimise the number of pieces of identification a user may need to carry and process to verify their identity. Biometrics are also cost-effective. Because they require minimal operator assistance, businesses and government agencies that use biometrics can save money by devoting customer service and other personnel to activities other than screening individuals requesting access to restricted areas.

Both industry and government are increasingly adopting biometrics as a tool for enhancing security. However, it is no surprise to those in the biometrics industry that a major use of biometric access control today is actually in applications requiring minimal security. For instance, health clubs are major users because handreaders easily let customers into the club. The customer does not need to carry another card or remember it and the club does not have to issue and administrate a card system.

Implementing a biometric solution is easy

Biometric readers can be standalone, networked and integrate easily into all popular access control and/or time and attendance systems. In most cases, they look just like a card reader to an access control system. They are already working with all of the leading time and attendance software packages.

Standalone readers. Many biometrics are available in a standalone configuration. These devices are not only a biometric, but a complete door controller for a single door. Users are enrolled at the unit and their biometric template is stored locally for subsequent comparison. A lock output is energised depending on the outcome.

Networked systems. Many access control applications have a need to control more than one door. While multiple standalone units could be employed, a network of biometric readers is more common. By networking the systems together and then to a computer, several advantages are available to users. The most obvious is centralised monitoring of the system. Alarm conditions and activity for all the doors in the system are reported back to the PC. All transactions are stored on the computer's disk drive and can be recalled for a variety of user-customised reports. Networked systems also provide for template management. This process allows a user to enroll at a single location and have their template available at other locations.

Card reader emulation. Biometric manufacturers offer a variety of different methods to integrate into conventional access control systems. The most common way is referred to as 'card reader emulation'. In this mode, the biometric device essentially works with the access control panel in the same way a card reader does. The 'card reader output port' of the biometric is connected to the panel's card reader port. This method is very effective when integrating into existing card-based systems. The wiring to the access control panel is identical to the card reader's wiring. Integrating biometrics with cards and/or smartcards is becoming de facto. There is a very good reason. Once a badge is lost, the time from when the badge is misplaced to the time that it is subsequently reported, that badge is still alive and active in the access control system. By adding a biometric to the access control system, a badge alone cannot be used to gain access. Both the badge and the person's biometric are required, eliminating this prospective breach, one so probable.

Biometrics ensure accuracy

Of course, the goal of any access control system is to let authorised people, not just their keys or credentials, into specific places. Only with the use of a biometric device can this goal be achieved.

Think about it. A card-based access system will control the access of authorised pieces of plastic, but not who is in possession of the card. Systems using PINs (personal identification numbers) require that an individual only know a specific number to gain entry. But, who actually entered the code cannot be determined. On the contrary, biometric devices verify who a person is by what they are, whether it be their hand, eye, fingerprint or voice.

But, convenience is the biggest selling point for biometrics because they can eliminate the need for keys or cards. While keys themselves do not cost much and dramatic price reductions have lowered the capital cost of the cards in recent years, the true benefit of eliminating them is realised through reduced administrative efforts.

For instance, a lost card or key must be replaced and re-issued by someone. Just as there is a price associated with the time spent to complete this seemingly simple task, when added together, the overall administration of a key or card system is costly. Hands and fingers are not lost, stolen or forgotten. They also do not wear out or need to be replaced.

Choosing the right biometric

The ability to articulate the pros and cons of each of the biometric technologies as they apply to the end user's application will separate the order takers from the true solutions providers. A dealer should review the following five items to ensure that the right biometric is being employed. First of all, the device must cause no discomfort or concern for the user. This may be a subjective issue, but it is important to fully explain any concerns users may have. If people are afraid to use the device, they most likely will not use it properly and that may result in them not being granted access. Privacy concerns must be addressed satisfactorily. Typically, the higher the level of security, the more intrusive the biometric can be while still being accepted by the users.

Secondly, the biometric must be easy to use. People like things that are simple and intuitive. How many times have users been frustrated with a card reader that gives no indication of which way to swipe the card? The larger the population, the more critical this factor becomes. For hundreds of people, 10 extra minutes of training time per person can add up quickly making the enrolment process a nightmare. Thirdly, the biometric must work correctly. This seems obvious, but how well the biometric works will determine if it stays on the job. In the most basic sense, if a biometric is working properly, it does two things. It keeps bad guys out and lets good guys in. Yet, no device is perfect. Typically much attention is given to how well bad guys are repelled, but it is equally important to ensure that the authorised users are consistently recognised and allowed access.

Lastly, a logistical issue that should be considered carefully is throughput, the total time it takes for a person to use the device. This is difficult for manufacturers to specify since it is application dependent. Most manufacturers specify the verification time for the reader, but that is only part of the equation.

When a person uses a biometric reader, they typically enter an ID number on an integral keypad, swipe a card or use proximity. The reader prompts them to position their hand, finger or eye where the device can scan physical details. The elapsed time from presentation to identity verification is the 'verification time'. Most biometric readers verify identity in a second.

Last, but not least, to be successful, the biometric must allow people to reasonably and easily use the technology. If the technology is not as simple as turning a key in a lock, it is going to result in unhappy users. Simply placing a hand on a reader could not be easier.

Bashar Masad is the marketing manager, Ingersoll Rand Security Technologies, Schlage Recognition Systems.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...