Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical Security

Biometrics will enable many COVID-19 changes

By Mohammed Murad
biometrics
June 23, 2020

Expect the COVID-19 coronavirus pandemic to bring lasting changes to our lives, from the way we authenticate identity to how we open doors – and even use public restrooms. If there’s a theme among these changes, it’s that they will favor contactless solutions.

The use of biometrics to authenticate employees and customers has snowballed over the last decade. Expect demand from public and private organizations to grow even faster as they require accurate identification of workers, students, patients and many more people in response to new challenges resulting from the virus.

The potential spread of COVID-19 has people wary of touching keypads, card readers and other devices used for accurate identity authentication. The Centers for Disease Control and Prevention said people might become infected by touching a surface containing the virus, which may survive for hours outside a host.

Technologies, such as iris and facial recognition, offer accurate solutions to identify people in person and online. And, importantly, these contactless systems do not contribute to the spread of the coronavirus and other pathogens. 

Here are some examples of recent initiatives where biometrics are playing a role.

Correctional facilities house prisoners in very compact areas, creating an almost ideal environment for spreading disease. Prison and jail administrators are releasing many non-violent offenders to reduce their chances of becoming infected. Biometrics can eliminate mistaken identities during the release process as well as provide law enforcement with a tool to identify freed prisoners as part of their bail terms.

Social benefits, such as unemployment and nutritional programs, help millions of Americans impacted by layoffs and business failures. The use of biometrics can reduce fraud and ensure the benefits are going to the appropriate person. A good example comes from India with its iris-based national ID project that tops 1 billion enrolled residents. The program daily receives more than 4 million authentication requests.

Medical experts say people who’ve recovered from COVID-19 may safely re-enter the workplace. Some local health agencies issue employees card-based health certificates as proof of them having had the virus. The cards would include chips containing a template of the owner’s biometric. Employers can eliminate fraudulent use of the certificate by comparing a live biometric to the one stored in the card. A contactless biometric makes tremendous sense to avoid potential contamination.

Distance learning will continue this fall as millions of college students log into networks for virtual instruction. Professors and administrators need to verify attendance and the identity of those taking tests. Biometric readers linked to a student’s computer provide that required verification.  

During telemedicine sessions, healthcare practitioners use contactless biometrics to be confident patients are receiving proper treatments. Also, this practice helps ensure the protection of patients’ privacy.

While many employees have returned to the office, millions are still working from home using their own or company-provided computers and devices. Either way, employers need biometrics to know that only authorized workers are logging onto the corporate network. Law enforcement officials warn that experienced hackers know how to defeat tokens and multi-digit codes. That’s why the FBI last year recommended organizations add biometrics to their identification process.

Organizations are looking for ways to open doors without touching the hardware. Solutions may include sensors or foot pedals capable of electronically opening entries without the need to pull handles or twist knobs and levers. Touchless switches mounted at entry points could sense the wave of a hand. Motion detectors may also open doors. The use of contactless biometrics adds a layer of security and safety.

Biometrics are ideal for use with elevators. Readers will authenticate employees and call a car to take them to their floor without having to touch any buttons. Buildings may employ voice controls for visitors.

Even public restrooms will see changes, some of which are already in place. Sensors capable of detecting people will replace levers, buttons and knobs on toilets, sinks and soap dispensers. Locating hand-washing stations outside restrooms will relieve overcrowding. High-velocity, wall mounted hand dryers, capable of blowing germs across the room, will give way to dryers integrated into sinks.

Privacy is another issue when it comes to using digital identity technologies. Some options, such as iris recognition, are opt-in solutions – a person is aware of the system and agrees to enroll in the database. The use of biometrics ensures someone isn’t fraudulently using another person’s identity.

Market research companies are predicting significant growth of biometric solutions, particularly non-contact modalities. Also, look for combinations of biometric technologies employed as additional layers of ID authentication and security.

We may soon return to attending sporting events and concerts and traveling safely across the country and around the world. But many of the changes resulting from the coronavirus will last far into the future. The security industry will provide many of the solutions to meet these new challenges.

KEYWORDS: authentication biometrics COVID-19 iris recognition

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Murad crop

Mohammed Murad is vice president, global development and sales for Cranbury, N.J.-based Iris ID Systems. Murad was previously in charge of strategic business development for a biometric software provider and also served as director of technology services for a supplier of software solutions for value added resellers.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • election

    Black Hat research predicts significant changes to security operations post COVID-19 and exploit concerns for 2020 U.S. Election

    See More
  • thermal imaging

    How thermal imaging cameras will help facilities reopen in a COVID-19 world

    See More
  • Strong Cybersecurity: The Critical Role of Lifecycle Management - Security Magazine

    C-Suite executives expect changes made in response to COVID-19 to become permanent

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing