Physical access control systems are being used increasingly more by a diverse range of large and small organisations. One of the primary drivers for this growth is to improve security. Convenience is still important though so, for this reason, biometric access control is particularly on the rise. Depending on the technology you choose, you can achieve high levels of security while still offering convenience to users.
There are three main types of identification for access control systems:
- Object-based identification uses what the person has – eg a key or card.
- Information-based identification uses what the person knows – eg a password or PIN.
- Biometric-based identification uses what the person is – eg their fingerprint or iris.
For high-risk and low-risk environments
One of the benefits of a biometric access control system is that it’s far more difficult for someone to gain entry using someone else’s ID. A key or access card can be passed on or stolen, and information such as passwords and PINs can be shared, seen or overheard. But it’s much harder to use someone else’s fingerprint or iris to gain access.
Biometric access control solutions have, traditionally, been used to increase security levels by creating a layer of verification. So, for example, someone uses their card to identify themselves and then presents their fingerprint to prove that they are who they claim to be. As biometric access control devices improve and become more convenient, however, they’re being used increasingly more in low-risk environments.
How can biometric access control balance security and convenience for you?
The options for access control biometrics now range from face recognition to vein recognition, with DNA recognition on the horizon. When it comes to choosing a biometric technology, it really depends on balancing the security you need with the convenience you want.
Our ethos focuses on ‘Security for life’ because we believe security should give you the freedom to get the most out of life. You shouldn’t need to worry about, or being inconvenienced by, security systems, and access control biometrics are a great example of this ‘Security for life’ approach.
Let’s look at the current most common options and the pros and cons for each.
Fingerprint recognition
How it works:
A fingerprint scanner takes an enhanced image featuring grid lines. This image is converted into a template showing fingerprint characteristics such as ridge endings and bifurcations. This template is then compared with the finger presented.
Pros:
- Accuracy is good.
- Relatively low price.
- A technology people are familiar with.
- Contactless and multi-spectral fingerprint technologies are overcoming some of the downsides of fingerprint identification.
Cons:
- Dirt, wetness and damage to the finger can affect accuracy.
2D face recognition
How it works:
An image of the person’s face is captured by camera and then converted into a mathematical code, which is stored as a template. When the person requests access, the stored template is compared with their actual face.
Pros:
- Easy to use.
- High recognition speed.
- Can be used in video surveillance systems to track people on a black or white list.
Cons:
- Accuracy isn’t as high as some other biometric technologies so it’s best for additional identification or verification measures.
3D face recognition
How it works:
A three-dimensional map of the face is created via infrared grids or the merging of multiple images.
Pros:
- Very user friendly.
- Fast identification.
- Contains more unique characteristics, so recognition accuracy is higher than with 2D face recognition.
Cons:
- Glasses and beards can have a negative effect on accuracy.
- Although it’s improving, accuracy isn’t yet as high as for eye or fingerprint recognition.
Iris recognition
How it works:
The iris’s unique features are captured in an image, converted into a mathematical code and stored as a template.
Pros:
- Accuracy levels are high, so it’s a strong option for high-security applications.
- Recognition distance is now at around two metres.
Cons:
- Less user friendly as the image needs to be taken in a well-lit environment so the pupil is small and the optimal amount of iris is showing. Glasses also need to be removed to capture the image, but not when gaining access.
Hand geometry
How it works:
A hand reader takes a three-dimensional image of the hand and measures the shape, length of fingers and knuckles. These 3D measurements are then converted into a mathematical identifier and a template is created.
Pros:
- Large volumes of people can be identified quickly.
- Convenient to use.
- Suitable for harsh environments as dirt and wetness barely affect performance.
Cons:
- Not the highest levels of accuracy.
Hand and finger vein recognition
How it works:
Each person’s unique pattern of veins, in either a finger or hand, is captured using infrared light. This pattern is then recognised by a vein reader, which shines infrared light on the hand or finger to make the vein pattern visible.
Pros:
- High accuracy levels.
- The correct person must be physically present with blood flowing through their veins.
- Surface dirt or damage has little influence on the reading.
Cons:
- The positioning of the finger or hand has to be so precise that it’s less user friendly.
- Cold temperatures can affect the recognition of finger veins as blood flow to the veins is reduced.
DNA
How it works:
A sample of the person’s DNA is stored and then matched against them when they attempt to gain access.
Pros:
- Potential to offer high levels of accuracy for high-security environments.
Cons:
- Although human DNA can now be analysed within ten minutes, the process isn’t yet sufficiently automatic to rank as a biometric technology for security purposes.
Secuway makes biometric integrations easy
Of course, to make the most of biometric access control software, devices and solutions, you need to integrate it successfully with your access control system. The beauty of the Secuway access control system is that, as an open platform, it integrates with a wide variety of third-party systems – including those from the leading biometric technology suppliers. And it offers you the flexibility to use more traditional identifiers such as access cards alongside the latest biometric identifiers.