The use of biometric technology for access control has gained acceptance in the industry and by the public for applications where verification of identity or authentication is required. Security industry surveys report that about 75 percent of those polled currently use biometrics or plan to...
To access the remainder of this piece of premium content, you must be registered with Locksmith Ledger. Already have an account? Login
Register in seconds by connecting with your preferred Social Network.
Complete the registration form.
Voter Registration: Eliminates issues relating to ‘proxy’ voting and resulting disputes.
Benefit Payments: Huge savings as a result of welfare abuse by means of positive identification of beneficiaries.
Time & Attendance and Payroll Processing: Dramatic increases in efficiency and decreases in losses through automated identity verification.
Workstation and Network Access: A proliferation of inexpensive finger scan devices used to provide access.
The biometric template is sample of the user which will form the basis of identification or authentication.
Biometric devices perform either identification or authentication roles. For large populations of users, the size of the database and the time required for a reader or a system to compare the live scan with the ones on file can prove problematical for several reasons.
One reason is that added comparisons increase the possibility of a False Positive (unauthorized scan is mistaken for an authorized one); or False Negative (an authorized scan is rejected).
Another is the amount of time it takes for the comparisons to be processed. Finally, the size of the database may make it impractical for local storage and mandate that readers be connected to networks and stored in centrally located storage devices or servers.
Authentication, as in the FIPS-201 standard, requires that the template be conveyed on the credential and when the finger or other body part presented to the reader, that a relatively quick 1 to 1 comparison occur at the terminal. The weakness of this system is that templates may not be archived and therefore a central record of all templates may not exist. While this might be observes as a preservation of individual privacy, the loss of the template may require that the individual submit to the creation of a new template, and the lost template could be used in some way to compromise the security management system.
Biometrics eliminates system abuses associated with PIN (personal Identification number) and credential single authentication based systems.
Biometrics are replacing the traditional methods of tracking time, attendance and access control credentials.