Expanding Biometric Applications

April 1, 2006
Biometrics are replacing the traditional methods of tracking time, attendance and access control credentials.

Like many other technologies, biometric devices offered today are products that came about thanks to commercial companies capitalizing on military research and development.

Processes currently used to safeguard top secret military and government facilities that have migrated into the public sector include four types of biometric recognition: Finger scan, hand scan, iris scan and facial recognition.

Biometrics are replacing the traditional methods of tracking time and attendance as well as access control credentials.

The shortcoming of the traditional time cards and credentials in use today are that both are subject to fraudulent use. Because biometric characteristics are not transferable, fraudulent use is mitigated, if not eliminated completely.

The installation of biometrics will usually result in increased workers’ performance and reduced excessive overtime abuses.

For example, when finger imaging technology was used to track payments to recipients of public assistance in one California county, the program saved $5 million in fraudulent payments in the first six months.

If deployed statewide in Texas, it has been estimated that biometric scanning devices would save between $6 and $12 million annually on welfare payment.

Biometrics also streamlines accounting processes such as payroll. For example for a small business that has 10 hourly employees who are paid at $15 per hour, streamlining the process with biometrics and automated processing and eliminating the time card and the record keeping would result in savings of over $10,000 every year. In a larger company where 500 workers make $25 an hour, savings would exceed $650,000.

Below are examples of some of the biometric products available today.

Zodiac iClass™Fingerprint Verification Reader

Cansec’s new Zodiac iClass™ Fingerprint Readers utilize HID’s industry leading iClass™ contactless smart cards for template storage, allowing the use of HID iClass readers in locations where biometrics are not required. Zodiac allows biometrics to be seamlessly integrated into virtually all new and existing access control systems, while retaining affordability and increased security. Since Zodiac iClass does not store fingerprint templates in memory or on a PC, all privacy concerns are eliminated and cost of installation is kept to a minimum.

Zodiac uses an optical sensor which is physically stronger than semiconductor-based systems in terms of impact resistance, scratch resistance, all-weather durability, and corrosion resistance. Physical strength is a key factor for versatile outdoor usage. Semiconductor-based systems must apply special surface treatments to protect their inherently weak surfaces. Even then, they are far weaker than Zodiac’s optical-prism strength.

Zodiac’s unique design allows it to easily replace any conventional access control reader in minutes with no change required to the existing access control system. This is made possible by storing each user’s fingerprint template in their iClass smart card rather than storing it in the reader or a central database. Because templates do not have to be downloaded into every reader, no additional communication wiring is needed between readers or to a template management PC. Zodiac iClass is available with standard Wiegand or Magnetic Stripe emulation, allowing it to be used with virtually all access control and time and attendance systems.

Where a user does not wish to replace their existing access control cards, the stick-on BioPatch can be easily affixed to the existing card to provide the same functionality as the contactless SmartCard. BioPatch is the ultimate solution for integrating biometrics into existing systems where re-badging is not feasible.

Zodiac iClass™ Reader features include:

  • Portable template stored in HID iClass smart card or stick-on patch
  • Same iClass credential works on Zodiac and full range of iClass Readers
  • 26 to 64 Bit Wiegand or Magnetic Stripe output
  • Wiegand line encryption option available
  • User capacity of reader is unlimited
  • Plug-and-play installation
  • No extra communication wiring
  • Built-in visual and audible Indicators
  • Fast, accurate and easy to use
  • Quick and easy centralized enrollment
  • Compatible with all access control systems

For more information, contact CANSEC Systems Ltd., 3105 Unity Drive, Suite 9, Mississauga, ON L5L 4L2 Canada. Telephone: 877-545-7755 or 905-820-2404. Fax: 905-820-0301. Web site: www.cansec.com.

FaceKey Standard Biometric Access Control System

The FaceKey Standard Biometric Access Control System combines face recognition and fingerprint recognition to provide the highest level of security. There is no need for cards, keys or keypads. The combination of two biometrics makes it possible to have security with an error rate-approaching zero.

Each unit of the Biometric Access Control System can control up to two doors and multiple units can be networked to connect multiple doors at multiple sites – in the U.S. or internationally.

The FaceKey Standard Biometric Access Control System integrates a controller with a fingerprint reader and camera. Readers that accept proximity cards, swipe cards or keypads can be added for an additional charge. A standard UPS protects against power failures.

The system uses technology to identify an individual based upon both his or her face and fingerprints.

The system works by converting information about the individual’s face and fingerprints into a unique code.

Users register or enroll into the system by recording their facial and fingerprint patterns. As the user approaches the door, his or her live face and fingerprints are matched with the stored patterns. Face recognition requires proper lighting at each access point.

When access has been granted, the unit will produce a signal to open the door and the name of the user, the location and the date will be logged. If an unauthorized person attempts access, the door does not open and that event is recorded as an “unknown user.” If an enrolled user attempts to access a location that he or she is not authorized to access, that person’s name, the location and the date will be logged.

If communication with the server is lost, the controller will continue to identify authorized users, grant access and record the events. The server will be updated with information collected at the door when communication is restored.

Features include:

  • Combination of two biometrics for the highest levels of security available
  • Each unit accommodates up two bolts, two door strikes or two magnetic locks
  • Steel tamperproof enclosure
  • Connects to network or used as standalone units
  • Up to four programmable time slots in a 24-hour day
  • Business operation features
  • No practical limit to the number of units/doors
  • Proximity or swipe cards or PINs can be added
  • Server utilizes Microsoft Access or SQL database, client utilizes Microsoft Access database
  • All events are recorded (audit trail)
  • If communication with server is lost, users will be identified, access granted and events recorded
  • System operated by FaceKey – Manager software

FaceKey EntryGuard™ Time and Attendance System

Use of the EntryGuard™ Time and Attendance System will deliver significant ROI. While accuracy and ease of use have their own payback, the use of our innovative biometric technology will eliminate “buddy punching” and quickly reduce losses to the bottom line from fraud.

The advanced features of the EntryGuard™ System provide today’s manager the best of all worlds: accurate information which reduces payroll reconciliation errors, provides correct time to be fed into the payroll system and ensures that the company is getting the hours it is paying for, all at a cost effective price. Other intangible benefits cover such areas as the ability to have correct time and labor data without conflict and to be fair to those employees that are already delivering the hours being paid for.

The EntryGuard™ System can be networked to interconnect multiple time clocks or sites. Each time clock is TCP/IP addressable and utilizes multi factor authentication.

Each unit can be configured to identify authorized users by their fingerprint only, fingerprint and ID code (system generated) or ID code and PIN.

The system is network-based, with each unit having its own unique TCP/IP address. Data collected at each time clock is automatically upload to the server, while data information or configurations made at the network level such as additions or deletions of users, may be selectively distributed to each time clock unit. The FaceKey Manager software supports any number of time clock units. In the event that communication with the network fails, the time clock units will continue to operate and collect data, which will be uploaded when communication with the server is reestablished. The Manager software automatically synchronizes all time clocks with the network.

For more information, contact FaceKey Corporation, 3463 Magic Drive, Suite 259, San Antonio, TX 78229. Telephone: 210-826-8811. Web site: www.facekey.com. E-mail: [email protected].

Recognition Systems’ Biometric HandReaders

Recognition Systems’ biometric HandReaders simultaneously analyze more than 31,000 points and instantaneously records more than 90 separate measurements of an individual’s hand - including length, width, thickness and surface area -- to verify that the person using the device is really who he or she claims to be. The HandReader compares this information with a “template” of the individual’s hand that has previously been stored in the reader, on a server or on a card. Once the person has been identified as a valid user, a door can be opened, access can be provided, or time recorded. The reading and verification process takes less than a second with impeccable reliability.

Time & Attendance: Improved payroll accuracy is guaranteed by the elimination of “buddy-punching;” stopping time fraud thereby lowering labor costs and providing a fast ROI (return on investment).

Costs are further reduced by eliminating badges. With the HandPunch, your hand is your badge.

Access Control: From major government applications to commercial buildings, HandKey hand geometry products provide security, reliability and convenience. Their low, field proven error rates translate into high reliability.

High volume, high throughput environments cannot tolerate errors, so the value of HandRreaders increases as the population grows. HandKeys protect 95 percent of all nuclear power plants in the United States.

Identity Verification: This is a project-oriented market. The HandKey is used as a means to positively identify a person holding a transaction card, driver’s license, national ID card, passport, Visa, or other documents. Current installations are in place at the Immigration and Naturalization INSPASS stations at JFK, Newark and Toronto airports; as well as in the food services systems at the University of Georgia. Banks, both domestic and international, are looking into this approach as a way to put a person’s bank account on a memory card. Programs are also being planned for biometric identification and verification of government benefits recipients.

For more information, contact Recognition Systems, Ingersoll-Rand Security Technologies, 1520 Dell Ave., Campbell, CA 95008. Telephone: 408-341-4100 or 800-700-7447. Web site: www.handreader.com.

About the Author

Tim O'Leary

Tim O'Leary is a security consultant, trainer and technician who has also been writing articles on all areas of locksmithing & physical security for many years.