Initial installation costs may have been a stumbling block in convincing end users to take up biometric solutions, but installers can benefit from pointing out the long term administrative savings...
Driven by both security concerns and the desire for efficiency, biometric applications are growing faster than ever. According to Frost and & Sullivan's World Biometric Report 2002, hand geometry continues to be the dominant biometric technology for access control and time-and-attendance applications. It is especially well suited for handling large volumes of transactions where a high degree of reliability is required, writes Brian Wilkie.
Although biometrics was first seen as a high security solution, it is now being used more extensively in colleges, banks, corporate campuses, small businesses and similar everyday applications.
While installation costs for a biometric system may be higher than a card system, the estimated costs of £10 to £20 per card, in addition to the costs of administering the system, make biometrics a sound investment.
Biometric systems are also more secure than cards or keys, because they make it easy to remove someone from the system and be assured that they are out, and they eliminate the hassle of re-issuing credentials.
Access control issues focus primarily on security, and biometric data is gaining wider popularity because it shows who came through which opening and when. Keys or card-based systems only show that a card, key or PIN accessed the opening, but not who used that credential.
Recognition Systems Inc HandReaders from IR Security & Safety are currently in use by the Northern Ireland Prison Service. They form part of a full access control system and are used at all the main entry points to the prisons, and at the prison's education department and prisoner records storage. Over a thousand staff use the Handkeys, which handle hundreds of movements each day.
Time-and-attendance is perhaps the most straightforward use, where it can save up to 5 per cent of payroll costs by eliminating 'buddy punching', and removing the cost and administrative problems of badges. In typical applications, the payback can be measured in weeks.
Since biometric time-and-attendance is actually a transaction-verifying technology, it can also be used in a membership setting to validate that people actually are who they say they are. In health clubs, for example, it helps protect revenues and cut losses from people sharing a membership.
It can also reduce the manpower needed at the front desk to verify membership and reduce liability by enhancing security.
Another trend will be toward the greater use of biometric profiles, either in a network system or carried with the individual on a 'smart card'. IR Security & Safety, under the Recognition Systems brand, recently introduced a hand geometry reader that is integrated with a read/write contactless smart card, which eliminates the need to distribute biometric templates across a network of readers, or to create access control system to manage the templates.
For applications where access points are widespread and difficult or impossible to link in a network, the card will make the use of biometrics easier to implement and manage. In addition, since the template resides only on the card, this solution eases privacy concerns. For systems that are more contained, such as on a single campus, the use of network systems undoubtedly will continue.
For airports, government buildings and other high security areas, biometrics will continue to be the only practical solution to controlling access.
Below are some of the latest products in biometrics…
The irises have itPanasonic has a number of different iris recognition products available on the market.
The BMET300 Authenticam iris recognition camera combines high precision, faster iris recognition and flexible system architecture for state-of-the-art personal identification, Panasonic says. It features password replacement, a guide indicator, 12 language voice guidance, flexible registration software, easy operation and management from a PC display.
It is compatible with the standard Wiegand interface protocol for access control servers, and as it is designed for high security applications, includes encrypted registration data, tamperproof construction, alarm notification, a live indicator and an easy to optimise camera angle.
The BMET500 Authenticam iris recognition camera is similar to the BMET300, but features two cameras for automatic iris image capture.
"The Multi-Function Dual camera Iris Capture Unit can provide increased security measures," Panasonic says.
"Using the BMET500 system obviates the need for conventional passwords, key fobs and tokens, and will pay for itself by eliminating the need for replacement access tokens.
"Panasonic's vision systems expertise, combined with Iridian Technologies' proven developments in iris recognition technology produce highly accurate, easy to use, cost effective iris recognition systems that can be easily applied to a wide range of current and future security needs, with significant advantages over other biometric identification methods."
Reader Service No 122
Smart card integration
The V-Smart iClass from Bioscrypt is a two-in-one reader that provides the high security of Bioscrypt's proven fingerprint matching technology with support for iClass contactless smart cards from HID.
"Optimised for access control and multiple applications, it delivers the security and versatility of smart cards, yet retains the affordability and convenience of proximity cards," Bioscrypt says.
"Offering one-to-one biometric template authentification, the V-Smart iClass reader provides traditional access control customers fast throughput and individual privacy."
It features a portable database, which means that fingerprints are stored on the smart card, and not on the reader itself. Other features include dual-factor authentification, and what Bioscrypt describes as the "industry's most accurate fingerprint algorithm".
Unlimited users can be included in the system, and it has a compact modular design with a double gang surface mount.
"The VeriAdmin software included offers a simple approach to template management, and there is an intuitive user interface with red, amber and green LED and tone signals," Bioscrypt says. "There are flexible communications options supporting Wiegand formats up to 64 bits, as well as a duress finger option."
Reader Service No 123
Flexible solution
The BioProx 007 from Sensor Biometrics is an intelligent single door access controller with an integrated fingerprint scanner, proximity reader and keypad.
The manufacturer says it is designed to meet an extremely high level of security while remaining cost effective and user friendly.
"The user-friendly system allows you to register up to 4,500 individual users," Sensor says. "Administration of the system can be done either at the BioProx or by connecting to a PC or laptop and using the powerful but simple software to enable full PC-based access control.
"Using a TCP/IP interface, the 007 can be connected to the LAN/WAN, making the device a very flexible solution to network applications. The software also supports remote site dial-up, and includes time and attendance and single door anti-passback."
The device can be programmed to accept a set combination of finger scan, proximity or PIN access modes - to this end, there is a built-in 10cm proximity reader, and an additional proximity reader port for the single door anti-passback application. There are also four independent input ports allowing users to connect an exit button, door contact, PIR sensor, etc.
Reader Service No 124
Hands-on systems
IR Recognition Systems' biometric HandReaders simultaneously analyse more than 31,000 points and instantaneously record more than 90 separate measurements of an individual's hand - including length, width, thickness, and surface area - to verify that the person using the device is really who he or she claims to be.
The HandReader compares this information with a 'template' of the individual's hand that has previously been stored in the reader, on a server, or on a card. Once the person has been identified as a valid user, a door can be opened, access can be provided, or time recorded.
"The reading and verification process takes less than a second, with impeccable reliability," IR says.
The company claims its HandKey products provide "security, reliability and convenience". The HandKey CM is a stand alone door controller that can be programmed with LockLink or LockLink Express access control management software by Locknetics. It allows users to download information directly to and from the HandReader using a PDA running Windows CE.
The HandKey CM offers a 512-user memory, which is expandable to 1,000 users. It provides door operation and monitoring, a card reader input, tamper switch, and integrated wall mount design.
Reader Service No 125
Simple biometric lock
Sitel Electronics has launched an advanced range of locks, safes and door access interface systems using cutting edge biometric technology. Fingerlocks combine biometric technology, electronics and high quality engineering with procedures for enrolling or deleting of fingerprints made simple via LCD window exhibits. Once installed, authentication for access is completed within a second to open the door.
The electronics will allow an interface to a BMS programme where security management programmes are used. Fingerlocks are not susceptible to varying weather conditions and will not be affected by exposure to ultra violet. "
The user number is shown on an LED window for easy management of users, and in an emergency the lock can be opened using a password," Sitel says.
Reader Service No 126
Biometrics going Dutch
Dutch manufacturer Integrated Engineering responded to the demands for intelligent biometric verification with a combined finger scan/Mifare reader – SmartTOUCH.
A scan of the pass-holder's fingerprint is written into a 'biotemplate' in the chip of the Mifare card. The green light is only given if the template and the finger scan made by the reader match.
The combination of a Mifare reader and finger scanner is claimed to be both easy to use and highly reliable. Both the false rejection rate and the false acceptance rate are low.
A choice was made to use the robust CMOS sensor, which makes a template of the fingerprint by measuring the interference in an electrical field. The whorls of a finger interfere with the electrical field when the finger is placed on the surface.
Small wounds or dirty fingers do not affect the result. Even a dirty surface will not cause an incorrect rejection, says the manufacturer. Another advantage of CMOS sensors is that they last longer than optical sensors.
There is also an ergonomic design. With the SmartTOUCH housing, the user's finger is automatically forced into the correct position, minimising the risk of incorrect rejection.
Reader Service No 127
Biometrics at a glance
MSI's Database: Electronic Security Systems UK 2004 survey looked at current trends in biometrics. Here are some of its observations…
- Biometric access control systems are very difficult to cheat, as they rely on the personal features of the user
- They offer very high security in selected locations by demanding the physical presence of the authorised user
- They eliminate disadvantages of other systems such as lost, stolen or damaged cards and badges; shared PIN codes; and tailgating
- They are extremely fast
- The end user does not need to remember to carry their card with them
- Low risk of unauthorised access as no duplication can be made, as no cards are used
- Despite end user concerns, the actual error rate for biometric systems in commercial applications ranges from 0.2per cent to 0.01per cent
- But they are still expensive compared to other access control systems and so not a viable option to many end users
- The data that needs to be stored can take up a large amount of computer space
- Many people are still wary of biometric technology and believe it to be an invasion of privacy
- Many potential end users question the accuracy of biometric readers
- There needs to be the correct level of obtaining a correct response (entry when the person is allowed and no entry when the person is not permitted to enter the area), including a balance between the two possible incorrect possibilities (false rejection and false acceptance)
- Not suitable for outdoor use
- The most widely used biometric techniques in recent times have been fingerprint and facial recognition
- Fingerprint recognition is most common, as fingerprints are unique to an individual and fingerprint scanning is not seen as being too intrusive
- Retina or iris biometrics are reported to be the most reliable form of biometrics, but there is still some resistance
- Many people are cautious that the data is being held for other purposes
Source
Security Installer
Postscript
Brian Wilkie is marketing director for IR Security & Safety
No comments yet