Biometric Authentication Systems for Identification, Authentication and Verification.
Either as two-factor or multi-factor authorisation access control systems, biometric devices provide an advanced method for uniquely identifying you based upon your unique biometrics.
What is Biometric Authentication?
Biometric authentication is a method used to identify you based upon your unique biological characteristics, such as fingerprints. Using biometrics in access control systems is rapidly becoming more popular. Biometric access control systems are used to compare your biometrics to an earlier stored data version. If both versions of characteristics match, the biometric authentication system can confirm authentication, verifying you are you. This form of access control is mostly used to manage access to physical and digital assets and to secure buildings, rooms and computing devices.
Types of Biometric Authentication Systems
Conventional access methods have their weaknesses – cards can be stolen, pins or keys can be forgotten. Biometric authentication systems use your biological traits, and so biometric devices can come in any of these forms:
- Eyes – iris scanners
- Eyes – retina scanners
- Fingerprint readers
- Hand geometry readers
- Facial recognition scanners
- Vein recognition scanners
How do Biometric Authentication Systems Work?
The system behind the biometric authentication device stores data from all authorised users. In this case, a signature containing your identity, job role and unique biometrics. Once you have registered, the physical security entrance will read your biometric signature, compare it to the stored version and grant you access. Based upon your job role, the system can grant or deny access to certain areas of a building.
Advanced Security by Pairing Biometric Authentication Systems and Security Entrances
Vice President of Technology and Product Support, Kurt Measom, walks you through just a few options of combining biometric authentication systems and security entrances for optimal security.
Entry Assurance with High Security Portals
A biometric device provides the biggest benefit when it is integrated with a security portal. This unique security entrance has been trusted to protect data centres and other sensitive locations across the globe. Here is how a high security portal works with biometrics:
- A user presents a credential outside the portal. This could be an access card or biological trait.
- Once inside the portal an overhead sensor system verifies that the person inside is alone.
- After the first door closes, an internal biometric device verifies that the person who presented their credential outside the portal is the same person inside the portal now.
- Once confirmation is granted, the second set of doors open to allow the user into the secure area.
- Why is this method of dual authentication so effective? Imagine this scenario. An employee’s husband decides to drive to your facility. He is determined to confront one of his wife’s colleagues. With his wife’s access badge in hand, he steps up to the portal, presents her credentials, and enters the door. The portal verifies that he is alone. An interior biometric device is the difference between this unauthorised person getting to his wife’s colleague, and not. How does it work?
- The biometric device is capable of detecting two things in this scenario: (1) the husband is not enrolled in the biometric system and (2) even if he was enrolled, his biometrics do not match the on-file biometrics of the badge owner.
In short, it is much harder for the husband to steal his wife’s eyes, fingerprint, face, etc. to gain access to the building.
Biometric Entrance Solutions
Biometric identifiers are all the measurable characteristics that can be used to describe human beings. Biometrics are increasingly popular in access control applications and Boon Edam products are designed to integrate with most third-party biometric technology. Some of the more popular biometric authentication systems integrated with our security access products include:
Facial Recognition Integration
This method of biometrics uses an algorithm to filter a human face from a video or photograph. Within milliseconds, the face's characteristics are recorded and converted into a unique code. After this code matching process, facial recognition software compares the code to a database. If it finds a match, this can be used to identify the individual in the image and determine whether or not to allow access.
Read moreIris Scanning Integration
Every human iris has its own unique traits. An iris scanner identifies pits, furrows and striations in the iris and converts these into an iris code. Comparing this code to a database subsequently determines whether to allow access. There are many advantages to this technology from being touchless and hygienic to a low false rejection rate.
Fingerprint Reader Integration
This technology works by registering the unique pattern of lines on the skin. The resulting data can be used to determine whether to allow access. Some advanced systems use four fingers in 3D for maximum accuracy - with only one pass of the hand over the sensor. This ergonomic touchless solution delivers an unmatched combination of security, convenience and throughput.
Looking for More Information About Biometric Authentication Systems?
If you need help in deciding which biometric authentication system is best suited to fit your entrance, contact your local Entry Expert for advice.
Facial Recognition Access Control
Touchless Biometric Authentication System
One of the major advantages of facial recognition access control is not having to wait at the point of entry. The software registers a person's face as they approach and can determine whether to allow access in the time needed to arrive at the gate. When the authorised person is near or at the access point, the system opens the gate. This prevents unauthorised individuals from slipping in through the open gate. Also, the person can proceed smoothly through the access point. Boon Edam's products support most third-party facial recognition systems to facilitate a touchless entrance.
Dexus Gateway Building
Location: Sydney, Australia - Product: Lifeline Speedlane Swing, The Power of Two PORT 4 mini, Lifeline Boost (MorphoWave Compact option)
The Gateway building In Sydney’s Circular Quay is Australia’s first office tower to use fully integrated touchless 3D fingerprint scanning to allow authorised office workers and guests into the building. The building’s new entrance involves a complex integration of security and technology experts, including Boon Edam, Schindler Lifts, Honeywell and IDEMIA (the manufacturers of MorphoWave fingerprint scanning technology).
Need Advice?
Contact our Entry Experts, who are ready to support you.