Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Down to Business: The Analytics of Biometrics

Time and attendance, physical and logical access control applications, together and separately, are emerging as drivers in biometrics.

By Bill Zalud
Biometrics slide 1

Healthcare requirements to protect patient information encourage biometrics. One example: HT Systems, a healthcare technology leader that provides patient identity management solutions, uses Fujitsu’s PalmSecure, biometric palm vein sensors as a positive patient identification.

Photo courtesy of PRNewsFoto/Fujitsu

Biometrics slide 2

At Allam Marine office building in East Yorkshire, UK, a fingerprint biometric install involves a Boon Edam entrance, which provided standard access along with secondary opening actions from dedicated readers elsewhere in the building.

Photo courtesy of Lumidigm

Biometrics slide 3

Simple, fast enrollment is one key to effective biometrics. The ports of Antwerp and Zeebrugge in Belgium replaced an older biometric system at registration stations with fingerprint readers.

Photo courtesy of Lumidigm

Biometrics sidebar 1

Keystroke dynamics, a behavioral biometric, may grow as an effective approach to identify people accessing an enterprise network through a keyboard or keypad. The keyboard pictured is a ruggedized unit with a small footprint suited for high data entry.

Photo courtesy of PRNewsFoto/iKey, Ltd.

Biometrics slide 1
Biometrics slide 2
Biometrics slide 3
Biometrics sidebar 1
May 8, 2013

Time and attendance, physical and logical access control applications, together and separately, are emerging as drivers in biometrics. Some enterprises have augmented traditional cards with biometrically-enhanced smart cards or moving further away from employee ID cards, replacing them with biometric systems. Such approaches reduce the overall cost of issuing, replacing and managing the physical cards with the added benefit of improved security, in some cases.

Then there is the impact of BYOD or “Bring Your Own Device.” Employees, especially the younger or tech-savvy ones, are using their own devices to interact with enterprise networks. As rumors swirl that the next iPhone will feature higher level authentication technology, there’s an increasing chance that BYOD will push biometrics into many enterprise businesses as well. Check elsewhere in this issue of Security magazine for more on BYOD.

Yet another identity advance is the CIV card.

Spurred in part by the Smart Card Alliance, enterprises can take advantage of the federal government’s PIV (Personal Identity Verification) standards and technology with the Commercial Identity Verification (CIV) credential, which leverages PIV-I specifications, technology and data model without the requirement for cross-certification built in for government workers. Any enterprise can create, issue and use CIV credentials according to requirements established within that enterprise’s unique corporate environment.

 

CIV Cards Bundled with Biometrics

While CIV is technically compatible with PIV-I, a CIV issuer need not comply with the strict policy framework associated with issuance and use of the PIV and PIV-I credentials. This allows corporate enterprises to deploy the standardized technologies in a manner that is suitable for their own corporate environments.

Specific to biometrics, PIV and CIV can use finger biometrics and soon iris, too.

Securitymagazine, by the way, hosted a recent Webinar on CIV credentials, sponsored by Quantum Secure. The briefing is available for free viewing at www.securitymagazine.com.

No doubt, however, biometrics has a checkered past with high error rates, expense, challenging enrollment procedures and concerns by some over the intrusiveness of various types of designs.

But times and technology have changed.

The systems are much more accurate. Some uses are more for convenience than higher security. People more clearly see advantages thanks to finger readers on laptops and cellphones, within passports as they have gone “e,” the evolution of healthcare systems that protect patient records and the threats from identity theft. 

There is also now a diversity of biometrics approaches that, depending on the application, can more easily customize a balance among convenience, higher security and lowered intrusiveness.

 

Popularity, Convenience, Security

Finger and, to a lesser degree, hand geometry are most popular, with the latter a time and attendance long-timer. Still, there are plenty of users of iris, retinal, palm vein and facial solutions. There are also behavioral biometric technologies such as voice recognition (analyzing a speaker’s vocal behavior), keystroke (measuring the time spacing of typed words), gait recognition (manner of walking) and signature (analyzing the way you sign). Other developing techniques include DNA biometrics, ear shape, fingernails and even body odor.

Among the choices, there are numerous advantages and disadvantages. But, when it comes to security, accuracy plays the key role. For example, retinal has a vastly more accurate rate when compared to finger; but, at the same time, retinal is perceived as more “uncomfortable” than finger to some users.

Yet fingerprint biometrics, however, can provide a very high level of security.

For instance, Alfapass, provider of the security smart card system at the Ports of Antwerp and Zeebrugge in Belgium, is replacing an older biometric system at the ports’ registration stations with Lumidigm fingerprint readers. The Port of Antwerp is Europe’s second largest port, while Zeebrugge is the central port for Europe’s automotive industry and has the largest liquefied natural gas terminal complex in Europe.

 

Biometrics Across Myriad Facilities

A major access control need at the port facilities is unique identification of individuals in a more efficient manner, especially for those who travel between multiple port facilities. The solution: A single ID card covers all facilities rather than a different entrance card for each company at the port. Therefore, visitors to both ports carry a smart card from Alfapass, which includes the visitor’s biometric template. When reading the card, each facility has the option of also verifying the fingerprint stored on the card. By checking and verifying the fingerprint, facility personnel can assure that the card is being presented by its rightful owner.

“We have been using biometrics since 2005, but we needed a better solution to provide increased security that is easier for port visitors to use,” explains Piet Hadermann, operations manager. “Our former technology could not differentiate one person from another at the level of certainty and security we require. The false acceptance rate was much too high. Plus, some people, especially infrequent visitors, would forget how to use it from visit to visit.”

Another fingerprint solution is at Allam Marine offices building in East Yorkshire, United Kingdom. The install involves a Boon Edam Circlelock entrance, which provided standard access along with secondary opening actions from dedicated readers elsewhere in the building. One of the main benefits of the system is the ability to “latch” open the circle lock in the event of corporate open days, together with full biometric accountability, according to Martin Conley, IT manager at Allam Marine.

 Hand geometry readers integrated with door controls also provides a nifty solution.

That is the case with Grand Rapids Community College (GRCC), which serves nearly 22,000 full- and part-time students in an eight-block campus located in the heart of the Michigan city’s downtown.

Of particular interest: the main computer data center and the cashier’s office, where substantial amounts of cash are handled. According to Scott Martin of GRCC’s facilities department, “Because we had a number of specific issues at play, the board of trustees asked us to investigate enhanced security measures. The first step in that initiative was to determine what access level and credentials were needed.”

Working with Ingersoll Rand Security Technologies, Martin selected HandKey readers, and each reader is a complete door controller that provides door lock operation, request for exit and alarm monitoring. All biometric data and decision-making capabilities reside locally to ensure that the doors are secure and will continue to operate properly even if all communications to the main access control computer are lost.

 

Impact of Tech Advances

A lot of what is being used or coming over the horizon depends on a small group of companies invested in algorithms that are at the heart of biometrics and the integrators that design biometrics into government, military and enterprise systems.

One example, Samsung Techwin America has partnered with FaceFirst to supply megapixel video surveillance cameras for a facial recognition system. The platform uses Samsung cameras to complement the proprietary facial recognition software system. Facial images captured by the cameras are automatically matched with watch list photos, and when a person of interest is identified, alerts are instantly sent directly to pre-provisioned computers, cellphones or cash registers.

A so-called military-grade system identifies individuals matching client records at the rate of millions of comparisons per second for transportation facilities and sports arenas or for entrances where people normally pass through without stopping such as at school and college campuses, corporate headquarters, financial institutions, warehouses and hospitals.

The concept of biometrics can also apply to data management security.

For example, Trianz, a global consulting and turnkey execution services firm, has a partnership with Watchful Software, with its data-centric information security solutions including automated watermarking and fingerprinting features. The approach allows dynamic classification and encryption of information to prevent unauthorized access to sensitive and confidential corporate information, not only within the corporate network perimeter but also when moved or sent externally.

Ira Horowitz, vice president – global alliances at Trianz and a former IBM executive, sees a growing need for diverse access identity management or AIM measures including advanced encryption algorithms, digital rights management and e-biometrics. “There are random numbers generating secure ID cards, of course. But some solutions can include pattern matching on a keyboard that are increasingly sophisticated,” he says.   


 

 

Behavioral Biometric of Keystroke Dynamics

Around for a number of years, the approach uses the manner and rhythm in which an individual types characters on a keyboard or keypad. The keystroke rhythms of a user are measured to develop a unique biometric template of the typing pattern for future authentication.

Raw measurements available from most every keyboard can be recorded to determine dwell time (the time a key pressed) and flight time (the time between “key up” and the next “key down”). In addition, vibration information may be used to create a pattern in identification and authentication tasks.

KEYWORDS: biometric security CIV card

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0819-Profile1-Feat-slide1_900px

    At the Intersection of Business, Analytics and Security

    See More
  • Surveillance, video wall

    Improving situational awareness via video content analytics is the key to business safety and compliance for COVID-19

    See More
  • behavioral biometrics

    How biometrics are shaping the future of authentication

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing