Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Main Line Biometrics

By Bill Zalud
September 20, 2001
Who ever said "cutting edge" had to be complicated "bleeding edge"? In the electronic access control domain, some of the up-and-coming technologies sound to some like futuristic James Bond systems. But when it comes right down to it, they might not be so different than that proximity reader you're using right now.

Biometrics, which replace a card with a unique characteristic of a person's body (such as hand, fingerprint, voice or face), have made the most inroads in U.S. applications. Biometric readers today are protecting everything from server rooms to computer access to daycare facilities.

Why Consider Biometrics?

It is a strong indication of the main line nature of today's biometrics that resellers and systems integrators of numerous sizes are eagerly handling products based on the personal identifier technology. Take for example Henry Olivares of A-Professional Locks, Inc., Gilbert, Ariz. He says his company has been selling biometrics for two years. "Most of it has been at the customer's request," he says. "They didn't want to carry any credentials or codes and wanted to ensure the person gaining access was that person. That's where biometrics typically come into play. We sell fingerprint and hand geometry readers. I know as time moves on others, such as retina, face and voice, will gain popularity."

Olivares observes, "Years ago it was all magnetic stripe or bar code. Now it's all proximity. In a few years we see biometrics replacing proximity."

In some instances, that evolution already has started to happen. "We've seen people use this for single door systems," says Bill Spence of Identix, Los Gatos, Calif. Identix fingerprint readers aim at the physical and logical access control markets. One of the firm's offerings, the V20, integrates into existing proximity card systems so end users can apply it in either standalone or network configurations. Such emerging biometrics device capabilities allows end users to leverage the increased convenience and security of biometrics into more and more access control solutions, even those for smaller and mid-sized systems.

Robert Sawyer of Group 4 Securitas Technology Corp., Torrance, Calif., believes that biometrics are definitely being end user driven. "The customer sees the availability of biometrics in different trade magazines, the general press and television...[so] it is becoming more widely accepted."

Interfaces also drive more use of biometrics. For example, a special interface to the hand reader from Recognition Systems, Inc. (Ingersoll-Rand, Campbell, Calif.) makes it easier to retrofit to access control panels. Adds Sawyer, "The size of the template required fits in with panel technology very easily. We've networked with probably most of the biometric technologies available."

While Sawyer notes that interest is increasing. "It's primarily security-driven right now on the customer end. The end user is looking for a higher degree of security than provided with a normal proximity card."

The technological approaches to biometrics vary but there also are common elements for all of them.

Concerning a person's eyes, there are retinal and iris based systems. Concerning a person's hands and fingers, there are systems that measure and compare a person's finger or hand, but, especially in the law enforcement arena, there are systems that measure and compare a full set of fingers. Most finger biometrics depend on one finger, however.

There are voice-based systems as well as systems that use the ways a person types a password or phrase on a keyboard.

There are facial recognition systems that measure a number of biometric items within a person's face.

Depending on the type of biometric approach, readers also vary - with finger biometrics boasting the smallest reader being applied to laptop computers, for example, as compared to special data collection devices for iris and retinal scanning and hand geometry, for example.

The Biometrics Sell

Of course, for some end users appreciate more education and explanation than with traditional card-based systems. Adds Mike Dismore of Ener-Tel, San Angelo, Texas, "[Corporate end users] don't realize that it's available and affordable for them, and that they can put it on their buildings now."

The cost differential between biometrics and more traditional access control technologies has long been a concern. But one that is diminishing with time.

Spence says, "The cost differential between cards and biometrics isn't that great."

"The challenge...is that many end users managed a card system before, so they need to be educated about the potential recurring costs."

Many times with biometrics, you don't have to have people administering card functions full time . You don't have to buy any cards. That's certainly a savings. Those savings are recurring costs and customers should weigh that against the additional cost of the readers when they look at systems.

In addition, when viewing the cost equation, the size of the installation is not the important issue when it comes to biometrics. A SECURITY survey of end users as part of its annual Industry Forecast research showed that there are a growing number of buildings with proximity that also includes several doors with biometrics.

Dismore adds that the cost of biometrics can also be offset in applications where several departments are using the readers. "We can go into a hospital setting and do door security with security on computers, as well as time clock and get three departments to share the cost of the system. There we certainly have a competitive edge. No one else can bring so many budget centers together on a single system."

Installing Biometrics

Installing biometrics is not much different from installing a card reader. Many biometrics readers, for example, use a standard Wiegand interface and can easily integrate into existing proximity card systems. Many units offer internal user memory, with room for hundreds of users, and can be optionally expanded as well as networked with distributed database capability.

Still, there are some differences that add to end user benefits. Even though you are interfacing with the reader like you would with any system, you still have to network within the readers so there is one source of enrollment. Even here, an end user can easily phase in biometrics into an existing system, one reader at a time.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Security’s 2025 Women in Security

Security’s 2025 Women in Security

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Voice Biometrics to Address On-Line Banking Fraud

    See More
  • Security check 1

    Where to Draw the Line for Standing in Line

    See More
  • ID Management security default

    Survey Finds Biometrics More Secure than Usernames and Passwords

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • effective.jpg

    Effective Physical Security, 5th Edition

See More Products

Events

View AllSubmit An Event
  • May 7, 2012

    AXIS Cross Line Detection

    AXIS Cross Line Detection is a trip-wire application that will increase system efficiency by reducing bandwidth and storage needs and facilitate search of recorded events.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing