5/17/2023 0 Comments Biometric fingerprintIn identification mode, the process of checking a scan result against a large database will invariably increase time. In verification mode, for example, the user is required to carry out a minimum of two actions: presenting a credential or entering the code, and undergoing a fingerprint scan. It is common to see arguments for one approach over the other, but in real world applications it is more likely than not that the use of fingerprint readers of any type will slow down throughput. If used as an identification device, the biometric reader simply scans the fingerprint and compares the results to a database of users. In effect, this means the reader will be carrying out a one-to-one comparison. Verification requires multi-factor authentication, using a card, tag or code to identify the authorised individual, and the fingerprint is typically used to verify their identity. The latter is a very important point as it will affect throughput times. When considering standalone devices, consideration must be given to the number of users that can be supported, and as to whether the readers will be used in verification or identification roles. The reality is that installers and integrators must carry out a thorough risk assessment of any site, understand the requirements and expectations of the end-user and specify an appropriate device that meets their demands. Others focus on the high security benefits of a biometric-based solution. Some promote fingerprint readers as a low-cost approach to eliminate the need to purchase and manage credentials. The problem has less to do with the technologies involved and more to do with the marketing messages that accompany the various products. Whenever Benchmark tests fingerprint readers, we receive a flurry of comments from manufacturers who want to stress that not all fingerprint scanners are equal. It is less invasive, or at least perceived to be less invasive, than some of the other technologies and few people have concerns about medical and cleanliness issues when it comes to their fingertips. Of the various biometric technologies available, the most common and arguably the most acceptable to users is fingerprint scanning. There were a few reasons for this: they had the budget for the high-priced devices, they had a requirement for absolute identification and they placed the need for total security above that of convenience and throughput times. When the technology first came to prominence, it was aimed at high-risk applications. In next month’s issue, we will look at readers integrated with a full access control system.īiometric technology is nothing new it has been available in the security market for decades. Here, in the first part of a biometric fingerprint reader test, Benchmark looks at devices designed to be used in standalone mode. Typically such readers fall into one of two camps: standalone products or readers designed for integration with full access control solutions. Provide guidance on how biometric systems are to be tested, and how results should be calculated and reported so that the performance of one system can be compared to the performance of another system ĭefine methods for assessing the quality of the biometrics that are collected Īnd ensure interoperability, i.e., making sure that all biometric systems used in the government work well together.In the world of biometric-based access control, the fingerprint reader is the most common device available for mainstream applications. The open exchange of biometric data between different agencies and their biometric systems which are built by different companies Standards (and their guidance), are vital for building effective biometric systems. This includes:īiometrics are used to manage identities for:įirst responders at the scene of a natural disaster, NIST partners with virtually every agency in the Government that uses large biometric systems to assist with their mission. Standards development at the national and international level Īnd technology testing and evaluation, which leads to innovation. Research on the various biometric modalities: fingerprint, face, iris, voice, DNA, and multimodal NIST (because of its mission and track record) supports the government-wide effort to increase the collection of good quality biometrics, to see that the data collected is appropriately shared with other agencies, and to make sure biometric systems are accurate and interoperable. With the need for improved homeland security, biometrics were identified as a key enabling technology.
0 Comments
Leave a Reply. |