Technology has achieved significant advances in the field of physical security, with the invention of reliable equipment and devices that facilitate control and supervision tasks keeping us informed of what takes place in company facilities even without human presence.
In order to illustrate our readers on the working features and utility of these preventive security devices, this edition includes comments on biometric identification systems, especially the fingerprint recognition system.
Biometric security technology is based on the recognition of people’s unique and nontransferable physical features, such as: the shape of their faces, the geometry of some parts of the human body such as hands, eyes, and fingerprints. These are some of the features that differentiate a human being from another.
Fingerprint identification is one of the oldest and certainly most spread out techniques used today. An individual’s fingerprint is defined by a complex combination of line, arch, bow and circle patterns. An optical scanner reads fingerprints using an intermittent light through a transparent plate over which users place one of several of their fingers, thus digitalizing their reflection on the plate. An existing computer software codifies the different patterns found in the digital image and the resulting templates can be optionally encrypted and stored in a central database or on each user’s individual card. These systems have a wide range of applications: from safe access to computers, networks, protection of electronic files, to physical access control in a restricted-access environment.
The implementation of fingerprint biometrics in companies’ access control systems is currently considered to be a valuable investment, due to the benefits obtained in automated security in the access control to restricted spaces and areas.
Fingerprint biometrics systems are a means to identify people safely, as compared to other means, and offer the following advantages and disadvantages:
Every individual’s fingerprint is unique and inalterable for life.
Large amounts of money have been invested in developing and improving fingerprint processing techniques.
It’s a non-intrusive technique; placing a finger on a reader does not make the user feel violated.
The margin of error of the algorithms used to identify or authenticate fingerprints is extremely low.
Scanned images may be blurry or inaccurate due scars or dirt on the persons finger or the scanner’s plate.
For additional information on this or any other topic related to electronic security systems, contact us at: