Biometrics In Access Control

Authentication is the essential ingredient in all access control, determining if the individual is authorized to enter. The more authentication factors used, the more effective the access control.


Security awareness may be at the highest levels ever. Just about everyone shares concerns over national security, identity theft, school and public safety, protecting their property, or keeping their homes and workplaces safe. Logical access control addresses the issues associated with...


To access the remainder of this piece of premium content, you must be registered with Locksmith Ledger. Already have an account? Login

Register in seconds by connecting with your preferred Social Network.

OR

Complete the registration form.

Required
Required
Required
Required
Required
Required
Required
Required
Optional
Required
Required

Automated Positive Identification: When a standalone biometric reader is used without a credential containing a template, it is used for identification. The finger or hand is compared with database of enrolled templates. In some cases, the database is stored right in the door unit. Most systems of this type have a limit to how many templates they can store due to memory constraints. “On line” biometric readers, which are connected to a host computer database, compare the entrant’s biometric profile with those stored in the biometric database.

A number of biometric technologies and characteristics are in use. Which one is the best? This is the subject of much contention between not only vendors but also consortiums that make studies and comparisons.

There are number of human characteristics which have been studied and implemented into Biometrics.

•           finger print
•           hand scan
•           iris scan
•           retinal scan
•           hand vascular
•           facial recognition
•           Infrared imaging
•           voice, handwriting/keyboard dynamics and other behavioral pattern analysis

Biometrics can be further divided into the following three categories.

Behavioral Traits are activities which a person does in a regular, learned or otherwise consistent manner. Examples are handwriting, keyboard dynamics and voice verification.

Topological Traits are physiological characteristics which remain reasonably stable enough throughout an individual’s lifetime to serve as bioidentifiers. Examples are fingerprints, hand geometry and facial features.

Discrete Traits are neither behavioral nor topological. Discrete traits may not be acquired without the knowledge and consent of users nor be used to track persons. Retinal vasculature is an example of a discrete trait.

SELECTING BIOMETRIC TECHNOLOGY
The factors which the locksmith can take in to consideration when selecting or recommending biometrics include:

Risk Assessment: What budget amount can be justified based on the perceived level of threat to which the target is exposed?

Throughput Required: This means how many individuals the system will be required to screen, and how fast must this be accomplished without creating delays and user frustration.

Existing system capabilities: Many Biometric upgrades are possible without having to run cabling or changing system head-ends. Many Biometric deployments involve totally new installation, while others are standalones with minimal infrastructural requirements.

End-User Reaction: Some people don’t want to touch things Many view Biometrics and actually any form of security as an intrusion on their privacy and freedom, rather than systems intended to ensure their safety and security

Reliability, Efficiency and Ease of Use: Every person who will use the system will have to be ‘enrolled’. The identity of every person using the system must be verified. Misreads or malfunctions will cause big problems.

ERROR RATES
In a biometric device, the False Accept and False Reject Rates can be affected by increasing or decreasing the sensitivity of the device. The two rates are inversely proportional and can be likened to an alarm system. When your alarm is very sensitive, the probability of a success burglary (a false accept) is very low. Yet the chances of accidentally setting off the alarm (a false reject) are higher. Reduce the sensitivity and the number of false alarms will go down, but then you increase the chances of being robbed.

How much each error rate is affected by altering the sensitivity is a characteristic of each manufacturer’s device. A device may offer an extremely low False Accept Rate at a given sensitivity, but the corresponding False Reject Rate may be totally unacceptable. The balance of the two error rates for a given application is critical to the success of a biometric installation.

Equal Error Rate is the point where the two error rates equal one another. The corresponding sensitivity setting for the Equal Error Rate is found on the lower axis. The Equal Error Rate can be a good indication of the biometrics’ all around performance. The smaller the Equal Error Rate, the better.

Many physical security providers have missed the reported stampede towards some of the market leaders, as reported by some of the trades, and of course by the manufacturers of these products.

Our own company installed a Korean Biometric standalone lock a couple of years ago, and immediately began regretting it. The moral here is: pick hardware from a reputable manufacturer with warranty protection and technical expertise.

But then again, the head locksmith for one of our major accounts, (a state university) dropped by the shop recently and remarked to me that he was using those very same locks, and he was getting great pricing and support and dealing with the Korean company’s New Jersey headquarters direct.

TIME & ATTENDANCE
Physical and logical access control actually converge with a time and attendance system, because the same unit may be used to both control entry into a premises and also provide enter employee attendance data into the employer’s database.

As we remarked in a recent review of the CCTV Imports Time & Attendance Unit; biometrics can be used in these situations to reduce abuses which might occur if a non-authenticated credential or password is used with the system.
The trend is undeniably towards an increased deployment of Biometric-based access controls. This is fueled by federally propelled mandates, and the inescapable fact that biometrics works and it will continue to become more reliable and economical.

We Recommend