Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics and point of sale (POS) applications. In addition to security, the driving force behind biometric verification has been convenience. Biometric readers are part of a Door Entry system and can be part of a larger Access Control System.
Biometric devices, such as finger scanners, consist of:
- A reader or scanning device
- Software that converts the scanned information into digital form and compares match points
- A database that stores the biometric data for comparison
To prevent identity theft, biometric data is usually encrypted when it’s gathered.
The term door entry refers to the practice of restricting entrance to a property, a building, or a room to authorized persons. Electronic door entry uses computers to solve the limitations of mechanical locks and keys.
For a Biometric Reader call us today on 01224 710014 or:
Advantages of biometrics
Identification using biometric characteristics is preferred over traditional passwords and PIN-based methods for various reasons, example, the person to be identified is required to be physically present at the time of identification, prevents ‘buddy punching’ which is a common term used to describe unauthorised persons using a valid card or fob to gain access into a restricted area. Identification based on biometric fingerprint scanning removes the need to remember a password or carry a token which also eliminates theft of cards or fobs and therefore constant replacements. Biometric options are also more cost-effective as individuals can be easily removed from the system at no extra cost. Whereas in card-based systems the organisation will have to issue a new card to all newcomers.
Everyone has a unique, unchanging fingerprint. A fingerprint is made of a series of ridges and furrows on the surface of the finger and these are used to determine the uniqueness of the fingerprint. Once registered on the fingerprint scanner, the image of these patterns is converted into a code through a mathematical sequence called an algorithm which effectively becomes a digital form of you. This is stored on a database for comparison which grants authentication and access through the secured door.