Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Biz Backs Biometrics

By Bill Zalud
October 4, 2006
Biometrics-based readers can provide a diversity of applications from physical access control and identification to time and attendance.


Security industry reporters have been writing about “this is the year of biometrics” for about 15 years. But, according to Security Magazine research and experts in the field, biometrics may finally have emerged – or not.

For example, the silicon chip fingerprint sensor market, swipe and area sensors, lies in applications different to those of optical sensors. The last 12 months have seen a flurry of activity in this market. It is believed that silicon chip sensors have finally come of age. Silicon fingerprint participants have carved their niche in wireless applications and are making considerable in-roads in the network security application. Demand has predominantly been for swipe sensors in fingerprint-enabled cell phones, laptops and notebooks. Frost & Sullivan, the international research firm, believes growth lies with swipe sensors.

This includes the integration of sensors in silicon fingerprint-enabled cell phones for the wireless market and for laptops and notebooks in the PC/network security market. In the physical access control market, fingerprint-enabled door locks are expected to have an impact. The initial offering of silicon fingerprint sensors has been positioned as a convenience solution both in the wireless and network security markets. It is expected that phase two will result in application focused security solutions.

Many biometrics-based systems has simplified enrollment so as to encourage more people to sign up.

DIFFERENT REQUIREMENTS

Within wireless and network security, price, size and durability are key priorities. However, within the physical access control market accuracy, performance, product durability and reference sites take precedence, according to Frost & Sullivan.

Without a doubt, there are standards being set for biometrics. Last month, the National Biometric Security Project (NBSP) published the Biometric Technology Application Manual (BTAM), a comprehensive reference manual on biometric technology applications. This reference work, in two volumes, has been compiled for biometric technology users and for those who are evaluating the integration of biometrics into new or existing security systems. The BTAM is intended to be a rational and practical tool for those who specify, buy, integrate, operate, and manage biometric technology-based systems.

According to John E. Siedlarz, NBSP chairman and CEO, “With the expanded deployment of biometric technologies to achieve greater identity assurance the need for an authoritative and regularly updated reference and database on virtually all aspects of biometrics is a pressing requirement.”

NBSP is a not-for-profit test, research and analysis organization focused on the application of biometrics to improve the security of the U.S. civil infrastructure.

There are additional introductions centering on business use of biometrics.

A new biometric security solution from Diebold, for instance, increases consumer and financial institution protection against identity theft and fraud by verifying account holders’ identities by their unique fingerprint profile.

Called identiCenter, and powered by US Biometrics, it’s an integrated system for identity verification and branch traffic management built around fingerprint-reading hardware and software. It’s designed to quickly, accurately and securely identify consumers who enter a financial institution and increase efficiencies within the branch.

Dennis Moriarty of Diebold Global Security said they are working with financial institutions to transform branch operations to meet the needs of tomorrow’s retail banking consumer by streamlining operations, personalizing customer service and enabling faster, more secure transactions.

In many applications, biometrics fights identity fraud.

The Federal Trade Commission reported that 10 million Americans were victims of identity theft in 2002, the most updated numbers available, with a total cost impact of $50 billion annually. In addition, the fraudulent use of victims’ personal information to obtain goods and services cost businesses and financial institutions $33 billion in 2002.

At the same time, industry research shows that more than half of American consumers say a bank branch is their preferred mode of interaction with their financial institution. Further, according to Accenture, 42 percent of consumers visit their branch at least once per week and 86 percent visit at least once per month.

“In a world where PINs, bank cards, Social Security numbers and account numbers too often fall into the wrong hands, biometrics can reduce fraudulent transactions, minimize losses from fraud and increase consumer confidence by verifying consumers’ identities using their own unique biometric information,” said Brad Stephenson, vice president of Diebold’s Physical Security Group.

LINKING DATABASES

At its basic level, identiCenter links an individual’s identity and account information to his or her unique fingerprint profile. Upon initiating a transaction at the teller station, enrolled consumers place their finger on an optical-scan fingerprint reader to verify their identity. Once verified, their account information automatically appears on the teller’s screen.

Some biometric-enabled devices aim at more traditional physical access control needs.

AuthenTec, for example, has sensors designed into a wide range of access control devices, including multiple biometric door locks, smart cards, remote RF entry keys, time and attendance readers and other devices. Its TruePrint technology creates solutions specifically tailored for access control devices.

Then there are military applications for biometrics.

One example: The U.S. military is using Schlage Recognition Systems hand geometry readers housed inside a custom portal to ensure only authorized individuals access base camps in the Middle East. Handreaders automatically take a three-dimensional reading of the size and shape of a hand and verify the user’s identity in less than one second. They are not affected by dust, dirty hands, and minor injuries, which can cause false rejects with other biometric technology.

“The military used the hand geometry readers as a beta test in the theater for nine months and had excellent results,” says David Slagel, president of Modular Security Systems, the integrator from Ironton, Ohio. “They specifically requested the HandKey model because of its reliability, accuracy and durability. The HandKey unit is then placed inside our proprietary Modular Access Control (MAC) portal, which provides turnstiles and an access control infrastructure.”

The resulting portable, turnkey access control portals are plug-and-play, fully integrated security systems planned for military bases throughout the world. To install a MAC portal, military personnel simply set it in place and plug it into 220-power in a junction box. Since the units are portable, the military can establish a “moving perimeter,” widely used in base construction.

“When they finish with one site, they can simply pick up the portal and move it to the next site,” Slagel emphasizes. “For the military, it represents zero construction process. They used to spend $80,000 to $100,000 rebuilding these ‘brass shacks’ each time the perimeter changed.”

Using the portals is also easy. Military personnel enter the portal through one of five roll-up doors. They walk up to the entrance and present a proximity card and then their hand to the Handreader. If the light turns green, they are allowed entrance through the turnstiles. If the light is red, an alarm is sounded that alerts a guard, who then investigates.

Government and military end-users are high on biometrics.

MILITARY USES

Another firm, Sense Holdings, received multiple new orders from the United States Army for its proprietary biometric identification solution ISO-TRACK. The U.S. Army purchased Sense’s ISO TRACK security solution to strength security at a military facility based in Fort Carson, Colorado. Sense combined its DTU-100 biometric fingerprint reader, signature recognition pad USB digital camera, and the company’s custom ISO-TRACK software.

Financial institutions and other retail operations now see biometrics as a way to combine security and convenience for their customers.
The ISO-TRACK technology will replace current hand written registration procedures, incorporating proprietary software with digital fingerprint imaging devices, digital photography and signature analysis tablets. The complete system provides precise electronic captures made of this vital biometric information, while speeding up the registration process and creating more trustworthy data analysis

SIDEBAR 1
Major Participants

The major market participants within this market are:
  • AuthenTec
  • Atmel Corporation
  • Fujitsu Microelectronics America
  • Sony
  • Silex
  • UPEK Inc.
  • Validity Sensors Inc.
  • Veridicom
Source: Frost & Sullivan

SIDEBAR 2
Business Drivers

Network Security Usage is Spurring Demand for Swipe Sensors

  • Adoption of Silicon Fingerprint-Enabled Cell Phones is Driving Demand for Swipe Sensors
  • Lower Prices of Swipe Sensors Steering Uptake
  • Fingerprint Evaluation Platforms Verifying Performance Levels
  • Navigational and Personalization Features Boost Demand
  • Development of USBs is Encouraging Market Growth
  • Some of the market restraints are as follows:
  • Credibility of Technology Performance Levels
  • Stiff Competition from Alternative Technologies
  • Some of the industry challenges are as follows:
  • Cell Phone Market is Price Sensitive
  • On-going Requirement for High Investments in Technological Development
  • Key Partnerships and Alliances Critical to Success
  • Inaccurate Supplier Claims Likely to Cause Customer Confusion Delaying Projects
  • Real-world Performance and Strategic Reference Sites is Expected to Determine the Adoption of Biometric Systems
  • Essential Training in Use of Fingerprint Technologies

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Red laptop

Cybersecurity leaders discuss Oracle’s second recent hack

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Multi-tasking – It’s in the Cards

    See More
  • Smartphone used for security

    Another Evolution?

    See More
  • Photo courtesy of G4S Secure Integration; access control, ID badges, security integration, university security, security technology

    Access Control is Only the Beginning for Multi-Function Cards

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!