Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Biometrics as a Convenience

By Sapna Capoor
December 1, 2006

The genesis of biometrics has been in the government sphere. Traditionally, biometrics was used for the identification and verification of criminals. This was primarily aligned with forensic activity. However, since 2004 the adoption of biometric security solutions has begun to take shape both in the commercial and consumer sphere heralding the value and benefits of biometric technologies both as a convenience and security solution.

Let’s focus on implementation and adoption of fingerprint-enabled biometric solutions in the business world. The adoption of biometrics solutions has been primarily on physical access control and PC/network security applications in the business area. Adoption of more innovative solutions such as biometrically-enabled printers to secure confidential data is also beginning to take shape. Emerging application markets include biometrically-enabled transactional payment solutions and biometrically-enabled wireless devices for business use.

DOMINANCE OF FINGERPRINT

Fingerprint biometrics is the dominant biometric technology for business use. However, iris, face and increasingly voice verification biometric solutions have found niche applications markets as well. For example, a growing trend is the implementation of voice verification biometric technologies in financial institutions for remote access telephone services.

PHYSICAL ACCESS CONTROL

Biometrically-enabled physical access control solutions are typically used to secure restricted access areas such as safe deposit lockers in banks. Regulatory activity in the United States, such as HIPAA compliance, has augmented the importance of finger-scan in healthcare institutions to protect patient data. In North America this has acted as a catalyst in the uptake of finger-scan in healthcare institutions in North America. For example, use of fingerprint-enabled solutions to access electronic medical records has resulted in increased activity in this vertical. Globally, implementation of fingerprint recognition systems for clinical data management is providing further impetus for growth. In addition, hospitals and surgical centers in Asia-Pacific are beginning to adopt finger-scan for physical access control systems in restricted areas such as Intensive Care Units (ICU).

In addition, all geographic regions are beginning to experience high adoption levels of finger-scan for PC/network security applications, and will continue to do so throughout the forecast period. This is because of the need for higher levels of security to protect sensitive and confidential information. Use of finger-scan to secure access to drug development and clinic data trials is on the rise in all geographic regions.

LOGICAL ACCESS CONTROL

Corporate enterprises are beginning to use finger-scan authentication to secure corporate networks and prevent unauthorized access. Replacing IT systems that require employees to frequently change their corporate passwords by using fingerprint-enabled authentication is beginning to take shape. The main benefits of implementing finger-scan technology for a corporate enterprise include employee convenience of not having to constantly change and remember passwords, cost savings to the company from decreased password management, and improved corporate security.

The use of fingerprint-enabled laptops, notebooks and IT peripherals such as mice, keyboards and USB flash drives is providing further momentum to growth. Major PC manufacturers have introduced silicon fingerprint-enabled laptops and notebooks since 2004. Demand is expected to grow significantly for fingerprint-enabled portable PCs throughout the forecast period. In addition, the development of finger-scan technology for applications such as online transactions in the medium to long-term are expected to pave the way for e-commerce activity. Innovative applications such as fingerprint authentication enabled secure online trading are in the nascent phase.

TRANSACTIONAL PAYMENT AUTHENTICATION

Biometrically-enabled payment solutions have forayed into the retail segment predominantly in North America and partially in Europe. North America is the most advanced in installing finger-scan enabled payment options and check-cash payment systems. Successful pilot projects have led to numerous retail stores implementing finger-scan technologies. Trials are being conducted in Europe and Asia-Pacific as well. The advantage of finger-scan payment systems for customers is the convenience of “paying with your finger” - the finger is linked to your registered account. For the retailer it results in reduced fraudulence and check-out queues. In specific stores there are loyalty programs in operation. The main benefit of a check-cashing solution is to lower fraud as verification of an individual ensures that the person says who they say they are before a payment is made.

WIRELESS DEVICES

Fingerprint-enabled silicon sensors are the prevalent technology being integrated in wireless devices. Adoption of fingerprint-enabled cell phones is primarily being witnessed in South-East Asia, in particular in Japan and South Korea. This has encouraged mobile operators to introduce fingerprint-enabled cell phones globally but limited activity, has been seen so far. In addition, the release of fingerprint-enabled personal digital assistants that are more user-friendly and lower in cost compared to previous models is expected to increase usage from the business community.

Increased penetration levels of biometrically-enabled cell phones are expected to raise confidence levels of both business and consumers to make payment transaction via cell phones. This is expected to pave the way for m-commerce activity.

In commercial applications, 3D facial readers such as this one from A4Vision and Premier Electronics Ltd. secure entrance areas of a building in combination with other security components of the installation. Speed and accuracy is a main requirement where an enterprise has high volume users.

Sidebar: Banks Bank on 3D Biometrics

Still new, three-dimensional face recognition is a modality of facial recognition methods in which the system uses the three-dimensional geometry of the human face.

As a business or financial transaction tool, 3D face recognition can achieve significantly higher accuracy than its 2D counterparts by measuring geometry of rigid features on the face. This can overcome such pitfalls as change in lighting, different facial expressions, make-up and head orientation.

One approach: Implementing depth perception by projecting a grid onto the face and integrating video capture of it into a high-resolution 3D model.

Some European banks, seeking access control that operates completely without ID cards, keys or PIN technology, use 3D facial recognition of employees into bank buildings. Eliminating the risk of tokens and keys being lost, stolen or misused, this system uses only biometric verification methods with speed being a very important factor especially in the morning rush. At one European bank, 80 3D facial recognition systems are at entrances and combine with speed gates to ensure that there is no delay or hold up during peak times, especially in the morning when most of the 1,500 employees enter the building.

The 3D face recognition readers have been applied to physical access and time and attendance recording, too. The 3D facial recognition system directs structured, invisible light onto a subject''s face to create a facial grid of 40,000 measurable data points. Such systems perform multiple facial scans and comparisons against a database of stored images and corresponding data, performing accurate identification at sub-second speeds, from which authorized persons are confirmed for access.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

About the Author

Industry Analyst Sapna Capoor is with Automation & Electronics at Frost & Sullivan. More information at www.frost.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Biometrics as a Convenience

    See More
  • biometrics-freepik1170x658v8502.jpg

    Biometrics as a foundation of zero trust: How do we get there?

    See More
  • Biometrics as an Integration Tool

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing