Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Biometrics as a Convenience

By Sapna Capoor
December 1, 2006


The genesis of biometrics has been in the government sphere. Traditionally, biometrics was used for the identification and verification of criminals. This was primarily aligned with forensic activity. However, since 2004 the adoption of biometric security solutions has begun to take shape both in the commercial and consumer sphere heralding the value and benefits of biometric technologies both as a convenience and security solution.

Let’s focus on implementation and adoption of fingerprint-enabled biometric solutions in the business world. The adoption of biometrics solutions has been primarily on physical access control and PC/network security applications in the business area. Adoption of more innovative solutions such as biometrically-enabled printers to secure confidential data is also beginning to take shape. Emerging application markets include biometrically-enabled transactional payment solutions and biometrically-enabled wireless devices for business use.

DOMINANCE OF FINGERPRINT

 Fingerprint biometrics is the dominant biometric technology for business use. However, iris, face and increasingly voice verification biometric solutions have found niche applications markets as well. For example, a growing trend is the implementation of voice verification biometric technologies in financial institutions for remote access telephone services.


PHYSICAL ACCESS CONTROL

Biometrically-enabled physical access control solutions are typically used to secure restricted access areas such as safe deposit lockers in banks. Regulatory activity in the United States, such as HIPAA compliance, has augmented the importance of finger-scan in healthcare institutions to protect patient data. In North America this has acted as a catalyst in the uptake of finger-scan in healthcare institutions in North America. For example, use of fingerprint-enabled solutions to access electronic medical records has resulted in increased activity in this vertical. Globally, implementation of fingerprint recognition systems for clinical data management is providing further impetus for growth. In addition, hospitals and surgical centers in Asia-Pacific are beginning to adopt finger-scan for physical access control systems in restricted areas such as Intensive Care Units (ICU).

In addition, all geographic regions are beginning to experience high adoption levels of finger-scan for PC/network security applications, and will continue to do so throughout the forecast period. This is because of the need for higher levels of security to protect sensitive and confidential information. Use of finger-scan to secure access to drug development and clinic data trials is on the rise in all geographic regions.

LOGICAL ACCESS CONTROL

Corporate enterprises are beginning to use finger-scan authentication to secure corporate networks and prevent unauthorized access. Replacing IT systems that require employees to frequently change their corporate passwords by using fingerprint-enabled authentication is beginning to take shape. The main benefits of implementing finger-scan technology for a corporate enterprise include employee convenience of not having to constantly change and remember passwords, cost savings to the company from decreased password management, and improved corporate security.

The use of fingerprint-enabled laptops, notebooks and IT peripherals such as mice, keyboards and USB flash drives is providing further momentum to growth. Major PC manufacturers have introduced silicon fingerprint-enabled laptops and notebooks since 2004. Demand is expected to grow significantly for fingerprint-enabled portable PCs throughout the forecast period. In addition, the development of finger-scan technology for applications such as online transactions in the medium to long-term are expected to pave the way for e-commerce activity. Innovative applications such as fingerprint authentication enabled secure online trading are in the nascent phase.

TRANSACTIONAL PAYMENT AUTHENTICATION

Biometrically-enabled payment solutions have forayed into the retail segment predominantly in North America and partially in Europe. North America is the most advanced in installing finger-scan enabled payment options and check-cash payment systems. Successful pilot projects have led to numerous retail stores implementing finger-scan technologies. Trials are being conducted in Europe and Asia-Pacific as well. The advantage of finger-scan payment systems for customers is the convenience of “paying with your finger” - the finger is linked to your registered account. For the retailer it results in reduced fraudulence and check-out queues. In specific stores there are loyalty programs in operation. The main benefit of a check-cashing solution is to lower fraud as verification of an individual ensures that the person says who they say they are before a payment is made.

WIRELESS DEVICES

FIngerprint-enabled silicon sensors are the prevalent technology being integrated in wireless devices. Adoption of fingerprint-enabled cell phones is primarily being witnessed in South-East Asia, in particular in Japan and South Korea. This has encouraged mobile operators to introduce fingerprint-enabled cell phones globally but limited activity, has been seen so far. In addition, the release of fingerprint-enabled personal digital assistants that are more user-friendly and lower in cost compared to previous models is expected to increase usage from the business community.

Increased penetration levels of biometrically-enabled cell phones are expected to raise confidence levels of both business and consumers to make payment transaction via cell phones. This is expected to pave the way for m-commerce activity.

In commercial applications, 3D facial readers such as this one from A4Vision and Premier Electronics Ltd. secure entrance areas of a building in combination with other security components of the installation. Speed and accuracy is a main requirement where an enterprise has high volume users.

Sidebar: Banks Bank on 3D Biometrics

Still new, three-dimensional face recognition is a modality of facial recognition methods in which the system uses the three-dimensional geometry of the human face.

As a business or financial transaction tool, 3D face recognition can achieve significantly higher accuracy than its 2D counterparts by measuring geometry of rigid features on the face. This can overcome such pitfalls as change in lighting, different facial expressions, make-up and head orientation.

One approach: Implementing depth perception by projecting a grid onto the face and integrating video capture of it into a high-resolution 3D model.

Some European banks, seeking access control that operates completely without ID cards, keys or PIN technology, use 3D facial recognition of employees into bank buildings. Eliminating the risk of tokens and keys being lost, stolen or misused, this system uses only biometric verification methods with speed being a very important factor especially in the morning rush. At one European bank, 80 3D facial recognition systems are at entrances and combine with speed gates to ensure that there is no delay or hold up during peak times, especially in the morning when most of the 1,500 employees enter the building.

The 3D face recognition readers have been applied to physical access and time and attendance recording, too. The 3D facial recognition system directs structured, invisible light onto a subject''s face to create a facial grid of 40,000 measurable data points. Such systems perform multiple facial scans and comparisons against a database of stored images and corresponding data, performing accurate identification at sub-second speeds, from which authorized persons are confirmed for access.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

About the Author

Industry Analyst Sapna Capoor is with Automation & Electronics at Frost & Sullivan. More information at www.frost.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Biometrics as a Convenience

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!