Locksmiths who are just getting into biometrics need answers to some key questions. “Why should I be interested? What exactly is biometrics? Can I make money providing this service? How hard is it to learn?” and “How practical is it for some of my customers?”
A biometric system eliminates the need for carrying a key, fob, badge, card or other item that can be given away, lost or stolen. Biometrics is designed to disallow unauthorized people from gaining access using unauthorized information (password/PIN) or equipment (ID badge/card).
Biometrics is the science of measuring human characteristics. Biometrics is divided into two general categories; physiological (body) and behavioral (actions). Physiological characteristics are unique to every person and include DNA, face shapes, eye (retina or iris), fingerprint and hand/palm geometry.
Behavior characteristics include actions such as writing your signature and voice patterns. Again, according to scientists, these actions are unique and no two people perform these actions in exactly the same way. Even identical twins do not have identical characteristics.
For this article we will discuss biometrics of the physiological characteristics, beginning with fingerprints, the well-used science for determining whether a suspect was actually at a crime scene or whether a person is who he or she says. According to historical references, the Babylonians (almost 4,000 years ago) were the first known civilization to use fingerprints to identify criminals.
Have you ever wondered why fingers, thumbs, hands and toes have ridged patterns from which prints can be taken? These ridged patterns have a biological purpose. They provide assistance when gripping objects and probably amplify the tactile vibrations (notifying the person) that are triggered when these appendages contact uneven surfaces.
Finger/thumb prints are the most common. The fingerprint area usually refers to the “pad” above the last joint of thumb and the fingers. A fingerprint is an impression of the friction ridges of a finger/thumb. Friction ridges are the raised portions of the outer layers of the skin (epidermis) on the fingers (digits) that usually appear like adjacent lines. They generally follow common shapes. They appear to run parallel in expanding and contracting configurations to each other.
There are three basic fingerprint ridge patterns: Arch, Loop, and Whorl. Each of these ridge patterns enters on one side of the finger pad and exits on the same or opposite side. The ridges of an Arch pattern rise in the center and slope back down to exit the other side. The ridges of a Loop pattern form a curve and usually exit on the same side they entered. The ridges of a Whorl pattern form circularly around a central point on the finger.
A fingerprint consists of one or more connected ridge patterns. Within each pattern, there are many ridges which vary slightly, yet follow somewhat continuous patterns. These variations, known as Minutia, individualize each fingerprint.
A person’s fingerprints can vary by factors including hormonal changes, weight gain or loss, aging, etc. To ensure accurate reading, fingerprinting methods/analysis must be capable of taking these variations into consideration.
You are watching a police drama. The good guy/gal is examining the crime scene, grabs a roll of clear tape, tears off a segment and places it onto a smooth surface. Lifting the tape, the viewing audience is able to get a glimpse of fingerprint. Here is why it’s possible.
Fingers naturally produce a glandular secretion from within the skin’s friction ridges. These secretions are deposited when the finger pads contact a surface when the conditions are appropriate. If the surface is smooth and the fingers do not slide as they are lifted from the surface, they will form an image of the friction ridges. The secretion will dry, leaving a residual pattern that can be carefully collected.
As a society that needs a faster and more permanent method for collecting fingerprints, we use ink.
Once a fingerprint has been collected, the next step is identifying the unique characteristics of the ridge patterns and the minutia. In the days before computers, an army of people would compare the questionable fingerprint against all of the fingerprints on record.
Once the computer became a practical tool, scientific calculations replaced the human eye and fingerprints could be compared faster. These computerized calculations use the characteristics, a measuring/analyzing system (originally made up of 12 points) and properties of human skin set-up the different methods of fingerprint recognition.
Once computer processors became fast enough, optical fingerprint readers (sensors) were developed. Specialized digital cameras capture a digital image of the pad’s ridge pattern(s) and minutia when the finger pad is placed against or slid along a touch surface. The method and the touch surface can vary by product and design. Once the finger pad is placed in the proper position, a light source illuminates the area from beneath and an electronic image is captured. The captured image is processed, creating an electronic template using a predetermined number of extracted features in order to compare and identify the match. This fingerprint has been enrolled into the system.
The fingerprint reader’s software program preforms two functions. First, it enrolls the fingerprint, which involves obtaining (reading) the biometric data from the finger pad. This data is analyzed, a template is created and stored. A template is a manageable package of the chosen characteristics extracted from the details collected from the finger pad. If the number of characteristic compared is too many, the matching can become extremely cumbersome and the comparison time becomes excessive. If the package contains too few characteristics, comparison time is shortened and there may not be enough information to prevent a wrong fingerprint to be considered the right fingerprint.
The second function is comparing all of the stored templates with the new biometric information detected (fingerprint scan). For the purpose of authentication, the test biometric template is compared to all templates within the database and the closest match score is determined. If the closest match is within the adjusted threshold, the software deemed that it belongs to the individual and is authenticated. If the threshold is adjusted too open, there can be more than one match, creating false positives.
Note: For consistent detection, it is recommended that hands are clean without markings on the finger pads. It is also important to keep the surface of the reader’s sensor clean without any scratches.
Two forms of fingerprint identification are in use today - authentication and identification. Authentication is where the test fingerprint characteristics alone are compared to all biometric templates within the database. The closest match within the determined threshold is deemed the individual and is authenticated.
When a secondary form of identification, such as PIN, user name or password is made part of the identification process, authentication becomes identification. The process is as follows. When enrollment occurs, each fingerprint template is stored within the secondary form of identification. When a fingerprint is tested, the secondary form of identification is entered. This identification is used to identify the person’s fingerprint template. Once the template has been identified, the test fingerprint is compared to the recorded fingerprint template. If the chosen characteristics are within the determined threshold, the test fingerprints are identified as from the same person.
Identification eliminates searching and comparing the all of the enrolled templates. This saves time. Processing speed is an important consideration. To check a new fingerprint against all of the fingerprints on record can be very time consuming.
Employees do not want to wait for several minutes before gaining access, especially if a significant number of employees enter at one time. Using an authentication- based biometric system is practically limited to the expensive units whose components are part of a system. On less sophisticated (inexpensive) systems, the processing speed is comparably slower or the number of templates is more limited.
IMPORTANT: Before selling a biometric reader/lock, test an existing system that has a similar number of templates (users) to the number your client is considering. Discuss the time requirements before installing a unit.
If a secondary form of authentication is part of the process, the time required usually decreases as the analysis searches the second form first to narrow the search parameters. Only the fingerprint data associated with this identification is compared with the new fingerprint. This form of authentication is considered verification.
The greatest number of fingerprint readers are incorporated into computers. Fingerprint recognition devices for desktop and laptop computers are available as a standalone device for older computers and built into newer computers ,eliminating the need to type passwords.
The most common locksmith application for fingerprint lock mechanisms are safes. Several years ago I wrote about the GunVault, a fingerprint recognition lock mechanism having a 30-user capacity. Since then Sargent & Greenleaf has introduced the Biometric Keypad, a replacement keypad that works with many Sargent and Greenleaf electronic safe locks. The Biometric Keypad lets the end-user operate the lock by authorized fingerprint alone, or by code and fingerprint.
Door lock (access control) related biometric systems have previously been limited to larger networked systems requiring a high level of security where money is not a major consideration.
Today, fingerprint readers are available for locksmith related applications sold through locksmith distribution. The General Lock Helix 100 fingerprint reader can be wired into a single door or networked electronic access control system. Using the Helix 100 in a single-door system has the capacity for 100 fingerprint templates.
The MARKS USA 195 BIO - Fingerprint Reader with lockset provides biometric access control using a self-standing optical reader and an electrified Grade 1 cylindrical Survivor Series leverset. This battery powered single door system has a capacity for storing 100 finger templates with a FRR of .1% and an FAR of .001%.
Knowing the terminology is important to understanding how biometrics function and whether the system you are considering using will properly satisfy the needs of your customers. We have discussed time as a factor.
However, another important consideration is accuracy. Will the fingerprint reader correctly identify the enrolled template with the test template? Two rate percentages explain the accuracy of the fingerprint reader.
False Reject Rate (FRR) is the probability that the fingerprinting software “incorrectly determines the failure” of a match between the test fingerprint template and the same person’s enrolled template that is in the same database. The FRR indicates the percent of valid inputs being rejected.
False Accept Rate (FAR) is the probability that the fingerprinting software “incorrectly determines the successful” of a match between the test fingerprint template and a non-matching enrolled template that is in the same database. The FAR measures the percent of invalid matches being accepted.
Remember, for most vehicle mechanical key codes, there are approximately 2000 codes within a code series. In addition, some key codes are so similar that there can be unwanted ghost keys, keys not designed to open codes other than the one they were cut for, but capable of operating other locks. If we use 2000 key codes as an example and if 100,000 vehicles were built using this code series and the same number of key codes, each key code would operate 50 vehicles. Lets us further assume that some of the key codes could act as a ghost and operate a key code or two that were similar. There would be several key codes that could operate up to 150 vehicles. This would be a False Acceptance Rate of approximately 0.1%.
Unlike mechanical locks, many of the fingerprint readers can be adjusted to increase or decrease the sensitivity. As the sensitivity of fingerprint reader increases, it decreases the False Acceptance Rate, but can increase the False Reject Rate, making it harder for the correct persons to gain access.
Security today can easily be compromised because passwords, identification badges and other forms can be stolen (identity theft), freely given or lost. The built-in resistance of biometrics can offer a significant amount of protection that is much more difficult to circumvent.
As a secondary benefit, job attendance can be tied into a biometric system. This eliminates the possibility of a second employee clocking in or out for another employee.
Software determines whether the fingerprint being used is a live finger or a spoof