Biometrics Pros and Cons For Electronic Access Control

Author: Brian Rhodes, Published on Jun 26, 2017

Biometrics has been long sought as an alternative to the security risks of cards, pins and passwords. While biometrics has improved somewhat over the past decade and has some clear advantages, other problems or limitations remain. In this post, we compare the key pros and cons of biometrics.

The Pros

Advantages of biometrics have key value is some access applications. While manufacturer marketing often blurs the claims and overstate the advantages, biometrics can offer:

  • Credentials Always Available
  • User Identity Verification
  • High Credential Validity
  • Tough Against Passback

The Cons

On the other hand, there are operational weaknesses or risks that are not commonly realized before deployment. Some of those are:

  • User Unwillingness & Distrust
  • User Biometric Incompatibility
  • User Removal of Clothing
  • User Positioning
  • Injuries & Biometric Stability
  • Lengthy Authentication Cycletimes
  • No More Picture IDs
  • Myth: Biometrics Are Distinctive

Inside, we explain and examine each one.

********** *** **** **** ****** ** ** *********** ** *** security ***** ** *****, **** *** *********. ***** ********** *** improved ******** **** *** **** ****** *** *** **** ***** advantages, ***** ******** ** *********** ******. ** **** ****, ** compare *** *** **** *** **** ** **********.

The ****

********** ** ********** **** *** ***** ** **** ****** ************. While ************ ********* ***** ***** *** ****** *** ********* *** advantages, ********** *** *****:

  • *********** ****** *********
  • **** ******** ************
  • **** ********** ********
  • ***** ******* ********

The ****

** *** ***** ****, ***** *** *********** ********** ** ***** that *** *** ******** ******** ****** **********. **** ** ***** are:

  • **** ************* & ********
  • **** ********* ***************
  • **** ******* ** ********
  • **** ***********
  • ******** & ********* *********
  • ******* ************** **********
  • ** **** ******* ***
  • ****: ********** *** ***********

******, ** ******* *** ******* **** ***.

[***************]

Biometrics ** **** **** ************

*** ** *** ************ ************** **** ********** ** *** ***** number ** ************ **** *** ********** ******* ** ****** *** same ******* ********* *** **********.

** ***** *** **** ****** ********* **** ** ************** *** ****** ***********, *** ***** ****** *** ******** ************ *******:

  • **** ******: *** ***** ****** ** **** **** * ******** contoured ** * ******* ****** ** *******.
  • ******/ **** *****: ****** **** **** *** ***** ****** ** skin, ***** ******* ***** *** ***** ***** ** *********** **** under ****** ** ****. ***** ***** ***** *** ********* ** a ****** ***, *** *** ****** ****** ** **** ***** to ******* ****** ** ************.
  • ****/******: **** **** ** ****** ***** ** ***** ** *** inside ** **** ****. **** ****** *** ******* *** ** used ** *********** ***********.
  • **** ***********: ****** ** ***** ** * **** *** ********* the **** *** ********* ******* ****, ****, *****, *** ***** identifying ******** **** **** ******** *** ********* ** ******** **** common.

*** ***** *** * ****** ** ****** ****, *** ***** 'user ******' ********* *****. *** ****, ***** *********** **************.

Biometric ********

** *** ******** *****, ** **** * **** ** **** advantages ** **********. ***** ********** ******* *** ******* *** ***** distinct **** ******** ** ******, ********** ** * ******* ******* offer **** ** ******** *** **** ** ***** ********** *****:

Credentials ****** *********

**** **********, *** **** ********** *** *** **********, *** ********** a *** ** ****** * ***** ** ****** *** * risk. ******* ************* ******** *** ****** **** ** ****** *****, biometric *********** *** ********* **** ****** *** ***** ******** ********** management ** *********** ***, *****, *** ***** **** *** ** misplaced ** *********.

User ******** ************

******* ***** ****** **** ** **** *********** *** ****** ** misuse, ********** *** ****** ** ******* ***** *** ************ **********. Just ** ***** *** ***** ***** ** ****, **** ****** lend ** ************ ** ******, ********** *** ********** **** **** authorized ***** *** ******** ** ****.

High ********** ********

****** ****** ********** ***** ********** ** ******* ** ******** ******* notice (**** **** ****** ******* **** **** $** *** ****** **** Copier), ********** ********* ******** *** *******. ***** ******* **** *** ones ***** ****** ** **** ** **** **********:

***** '*******' *** ***-******* ********** ****** *** ** ********** ** low-level ******, *** ***** **** ** ****** ********* ****** *** or ******* ****** ********** ******************* ** ***** ********* ********** **** ***.

Tough ******* ********

********** *********** ********* *** **** ** ********** ******* ** ***** cannot ****** **** *** ***** ********* *********** ** ******* ** coworkers. ** ******* ** ****** ******** ***********, *** ******* ** *** ****** ****** **** ***** ********** methods *** ***** ******** ******** ****** ************* ** ****. ********** often *** **** ********* ** ********* *** *** **** ******* to *********.

Biometric **********

*******, ***** ********** *** ***** **** ********, **** ******* ** create ******. ** *** ******** *****, ** ****** ***** ****** issues **** *** ** ************ ******** ** *** ********** **********:

User ************* & ********

*** *** ***** *** *********** *** ******* ** **** ********* traits **** ** **************. * ****** ** ********, *********, *********, or ******* **** ** ***** ** *** ********** ****** ** enterprise ** *** *** ******* ********* *********** *** ** * factor.

********* ** '*** **********' ** ********** *** ** ******** ******** is *** ****** ****** ** ****** **** ***** ******* **** private ******* ** ****. *** ***** ***** ** **** ******* ******** ** *******:

User ********* ***************

***** ******, *** *** ***** *** ****** ******* ** **** satisfactory ******** ** *** ******** ********* ***** **** ** ****** identity. **** ***** *** **** *** ******** ******* ********, ***** others *** ********** * '*********' **** ** ******* *** ** injury ** *********. **** * ********* ** ****** ** ************ assume **** *** ***** **** *******, ******* ******* ** ************ on, *** ***** ******* ** *********** **** ** ******** *** when **** ** ***. **** ********* ******* ** ***** ******** credential ******* **********.

User ******* ** ********

******* *** ********* *** ********** ** *** ********** *** *********** or ******** **** *** **** **** ********** ** **** ********* in *** ********* ***** ***** ********. **** ** ***** *** the ****, ** ********* ** ****** ** ***** ******* ****** in **** ******* *** ** * ***** ****** ** ****** for ************, ** ********** *** ****/****** ********, ** **** ** rain, *** ** **.

User ***********

*** *** ********** *** ******** *** *** ** ***** *********, and *** ***** **** ******** **** '***********' ****, *****, ** PINs. *** *******, ******* ************ ***** ***** *** ****** ** vehicles ** ****** *********** *** ** *** ******** ******** *** hand *********** ******, ***** ****** ******** * *********** **** ** much ******.

********* ************** ****, *** *** ****** ********** ** ********* ** ***** *** *** *****, ********** ***** who **** ******** ** ********** ******.

Injuries & ********* *********

******* ******* ** * ********* ***** *** ** ************ *** multiple *******, **** ************* ******* *** ** ***** ** ****** are ******. *** *******, ******** ********** *** ******* ******* **** time, ** **** '******' ******** **** ************ ****** **** *** course ** *****, *** ********* **** ********* ** ****** ********** to ****. ***** ******* **** *** ********, **** ********, ** even ****** ********** *** ****** **** ****. **** ********** ** biometric ******** ** ***** * *********, ** *** ******, ****.

Lengthy ************** **********

***** ****** * ***** ** ******** ** * *** *** take *******, ******** *********** * ********* *** **** **** ******, even * ****** ** ****** ** ******* *** ******. *** high-volume *********, ******** **** ****** ******** *** ****** ******** ** users *** ****, *** * ********* ****** **** ************ *** handle * ******** ** *** ****** ***** ** ***** **** must ******* * ******** ***** ** * ******** *** ***** time.

No **** ******* ***

*******, *** ****** *** ********* ******** ** ***** ***** ** factors *** ***** ** ** ******** **********. ***** **** ***** picture ** ******** *** ***** ******* ** *** **** **** as * *********** **** *** **** ************ ******* ****** **** necks ** ******** *** ***** ****** **************, **** ***** ** forfeited **** ******** ********** *** **** ** *********** ********.

Myth: ********** *** ***********

*** ** *** ******* ****** ***** **** **** ******** ********** is ******** *** ***** **** ** ******** ******** *** ** one **** ** ******** *** ******* ****. **** ***** ******* in ********* *********, ******* *** ********* ** **** ** '******' as *** ****** ** ******** ****** ********* *** ****.

*** *******, ***** * *********** ** **** *** ****** ** unique, ** **** **** ****** ** **** **** ******** ****** before ** ** ********** ** '********' ** * ********. ***** users *** **** ******* ********* **********, **** *** **** ******** between ******** ** ******* (*** *** *****) ******** ******, ********** in ***** **** *********.

** **** *****, *** '********** ********' ** ******* ********* ******** or ****** ******** *********** *** ****** ** ****** ** ***** more **** ********** ****. *** ********* **** **** *** ******* impact **** ********** *** **** **** **** ******* ******* ******* an *******, *** **** ****** **** *********** ***** *** ****, increasing *** '***************' ** *** ********* **********.

Comments (11)

** **** * *** ********* **** *** ********** *** **** of **** ***'*. *** ******* ********* *** **** ** *** system *** ********** ********* ** *** ******** *** **** *** inconvenience. ********* ** **** ******* *** **** ****** ***** **** server ***** *** **********. *** ******** ** **** ******** **** works ********** ****** ** *********. ******** ** ** ****** ********* per **** ** ***** ****** ****. *** ********** **** ** less **** ** ******* *** ***** ********* **** ** ****** non-existent *** *** ***'* **** ** *** **** ****** ** palm ** * ******.

********** *** * **** **** .... *** **** ****** ******** that *** ****** ***** ****** ** ****** **** ** **** on **** ******* ****** *** *** ****. ** **** ** is "********* *** ***". **** ******** **** **** *** ** add "********* *** ****" *** "********* *** ****".

**** * ***** ***.

* ******** *** **** ***** ** ************ *** ****** ******* and *** ***** ** ********** ****** ** ********* *** **** negative ************** **** ** ** ****** ** * *** ****.

* **** ********** ******* *** ** **** ********* *********** ************** System ********. ********* ************ ************** *** ********** ** ** ************** authority.

*** ***** ** **** ******** ******** **** * ** * % ** **** ********** **** ************ **** *** *** ****** difficult ** ****.

******* ***:

*** - ***** ********** *** ****** *** ** ****** ** pronounced ** **** **** ** **. ** ******* *** *******, persons ******* ** ********* ** **** **** ******** **** **** a ********** ************** ***** ********* ******. ****** * ****** ***** base ** ******* ******* *** *** ***** ** ********* ***** time, **** ** ***** ** ************** ********* *** ************ *** yield ** ********** ******** ** ***** ***. *** ** *** tricks ** *** ***** ** ** *** "******* ***" ** the ***** ** **** ***** ** *** ******, ***** ***** but *** ****** *** ***** ***.

*** **** ********** ******* *** ****** **** ** ***** ****.

********** - ******* *** **** **** ***** ***** *** ****** coarse ** ******* ******** **** **** **** *** **** *****.

******** **** *** *** *********** *** **** **** *********** **** and ****** ****** ** ***** *****

******* - *********** - *********** - ******* ******** ***** ** paper ********** *** **** **** ********** ******.

****** - **** - *********** - ***...

***** **, ********* **** *** *** ** **** **********, ***** Fingerprints *** * ****** ****** ************** *** ** ***** ***********.

*'** ***** ** ***** **** * **** *** * ********* provider.

*'** **** **** **** ***** ********* *** **** ************ **** are ********* ** ****. *** *******, ***** *** * ******** an *** ************ ** **** ****** ** ***** ** ***** a ********* ********* **** *** ******** *****: *** *********** ******* were ******* **** *** ***** ** ******* ****** ** *** Midwest, *** *** ****** *** **** *** ******* ****** ** be *****. *** *********** ** **** ************ *** ******* ************ made ******* ************ *********. *** ** **** ****, ****** * background *****, *** ************ **** ***** ******** ** * ******* basis. ********** *** ******** ***** ****, *** ***'** ***** ***** to *** ***.*****% ******* *****.

*** ********* ******** (***** *******) ** *** ***** ** ******** fingerprints ** ** ******* ******** ********** - ** ***** ** difficulty ** ********* *** *********, ******* *** ** ****. ** course, **** ********* *** **** ** *** ******.

(****** ***** *******)

* ********** ****** **** ***** ****** *** ***** *** * 26 *** ******* ***** **** * ***** ** *** *********** secure. ** *** ** *******. *** ********** ********* ****** *** a ****** *** ** **** ****** ******* **** ** **** cardholder ********. *********** **** **** **** ** ******** ***** *** rev-locks *** *-* ******** ****.

(****** *********** *********** *******)

*********** ********* *** ********** *******:

*** **** ****** *** "**** ** ***** **** *******" ********.

** ***** **** ** *** ********** **** *******.

** *** *********** **** *** ******* ******* (******* *****'* ** ethernet ***** ***** **** *** ***** ** *** ******* ****.)

*** **** **** ****** ******** ******* ***/** ******** ************.

** *** *** (** **** **** **** **) ******** *********. See ** **** **** **** ***** **. ** **** **********. Or ****** ****/*******.

** **** **** *** ********** ********** ****** *********** (**** *** units **** ******* ** ********** **** ****** *** **** ** Prox...)

* ** ******* *** * ********* ****** ***** ** *** connected ** *** *******, *** ******* ******** *******.

***** ** *** **** ***************.

***** *******:

*** *** ****** ** *********** ********* ****** **********, *** *** operation? (*** ******** ** ****?) *** ****** * ***** **** up ** ******* **** * *** **** ** ********, ******* the *** ******** ** *** ******* ** ******/******* **** ********* in **** ****** **********.

*** *** ********, ***** *** **** ******** ** ******* **** operate ** '**********' (*** *********) ****. ****** ************/******,*******, *********** **** ***** **** ** *** **** ** ** ******** networked ** *******, *** *** ******* ** * ******** ****** control ****** ********** *** *******, ** ** **** ***** ****.

**** * **** ** ***** ****. ** *** **** ***** questions, ****** ***!

** *****,

****** *** *** ****.

*** ****** **** ****** ***** *** **** *** ********** ******, so ********* ** *** ****** ****** ** *** ** ******, but * ***** ***'* *** ******* ************.

** ***** ******* ********? **** ***** ******* *** ******** ** the **** ****?

*** **. *** ****** ******/**** **** **** ******* *** ******** on *** **** ** ****** '************ ****', ** *:* ** similar.

**** **** *********** ****** *** ********* ******** ** *** ********* (iClass ** *******), *** **** *** **** ** *******, *** biometric ******** ** *********** ** *** ****** ***** **** *** card ****** *******.

** ***** *** *** **** ****** ******* ** ** **** by *** ****** ** *** ******, *** ********* (***********) **** has ** ***** *** ******** ****** ** *** ****. ** the ****** ****** ****** *** **** ** *** *** *** card ****** **, *** ****** **** *** **** **** ******* and *** **** ******* ******.

*'** **** ** *********** ******** ****** **** ******* **** **** of '************ ****' **** ***** ** ** *** ****** *****, but ** ** *** ********* ** **** *** ** ********** common.

*** **** ********** **** ** **** ** ******** *** ***** to ***** *** **** * **** *****, ***** ** *** need ** ********** *** **** ** * ******* **********.

*** ***** **** *********'* *********** ***************, ** ** ******** * ***** *********** ** ******** *** card, *** ** ********* * ******** **** *** * ***-********* access ******.

** *** *:* ****** *** ********* ****** ***, ******* ******* the ****** *** ******** ** *** **** ******.

** * ********** *********, *** *** ******* *** **** *** template **** *** *********. ** **, * ******* **** ***** be * **** ********.

*'** ******** *** *****'* ****, **** **** ***** ****.

** **** **** **** ***********, ** *** *** ** ** integrated ** ** **** ******.

****** *****! *'** ****** ***.

***** *******,

** *** **** **** *** ********* *** ************ ** ** a *:* **** *** (****** ** ****, *********** ******** *** PAC **** ***** ****** ** ****) **** *** ** *** need *** ********* ******* ********* ** ***/**.

**** *** ** **** **** *********** (******* ********* *** *** big *** ******** ***~*** *****). ****'* ********** **** **** *** difficult **** **** ******* *** **** **** *********** ** ***** to ****** ************* *****.

***** **** *** ****** ** ***** *********** *********** *** **** less ** **** *******:

- ****** **, **

- ****** *******

- *** ****** **, ****** ******* *** (**, **)

- *** **** ***** (**** ******* *** *********), *** *******, Seos ** + **** = **** ****** **********-** (***** ** means **'* ***** *** **********)

***** *** ** ***** **** ** *** ************ **** * did ** **** (*** ******* *** ***** *****)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Access Control

Favorite Request-to-Exit (RTE) Manufacturers 2018 on Sep 19, 2018
Request To Exit devices like motion sensors and lock releasing push-buttons are a part of almost every access install, but who makes the equipment...
Door Fundamentals For Access Control Guide on Sep 12, 2018
Assuming every door can be secured with either a maglock or an electric strike can be a painful assumption in the field. While those items can be...
Access Control Course Fall 2018 on Sep 06, 2018
Registration IS CLOSED ends this Thursday. Register now. If you are looking to strengthen your ability to design and deploy access systems or...
Drain Wire For Access Control Reader Tutorial on Sep 04, 2018
An easy-to-miss cabling specification plays a key role in access control, yet it is commonly ignored. The drain wire offers protection for readers...
Directory Of 110+ Video Management Software (VMS) Suppliers on Aug 30, 2018
This directory provides a list of Video Management Software providers to help you see and research what options are available. Listing...
Exit Devices For Access Control Tutorial on Aug 28, 2018
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety codes the world over, and become integral parts of electronic access...
Assa Aperio Wireless Access Reader R100 Tested on Aug 23, 2018
Wireless access control is frequently promoted by manufacturers as a way to cut installation costs. Perhaps the biggest proponent of this is mega...
Synology Surveillance Station VMS Tested on Aug 22, 2018
With so many low-cost NVRs and enterprise VMSes, is there any place in the market for NAS-based VMSes? Recently, IPVM bought a Synology NAS for...
Backup Power For Maglocks Guide on Aug 20, 2018
When the main power fails, many believe maglocks must leave doors unlocked. However, battery backed up maglocks are allowed according to IBC /...
ISS VMS / Video Analytics Company Profile on Aug 16, 2018
Who is ISS? In the past few months, they had one of the craziest ISC West promo items in years. Then, they hired industry veteran and ex-Dahua...

Most Recent Industry Reports

Avigilon Announces AI-Powered H5 Camera Development on Sep 19, 2018
Avigilon will be showcasing "next-generation AI" at next week's ASIS GSX. In an atypical move, the company is not actually releasing these...
Favorite Request-to-Exit (RTE) Manufacturers 2018 on Sep 19, 2018
Request To Exit devices like motion sensors and lock releasing push-buttons are a part of almost every access install, but who makes the equipment...
25% China Tariffs Finalized For 2019, 10% Start Now, Includes Select Video Surveillance on Sep 18, 2018
A surprise move: In July, when the most recent tariff round was first announced, the tariffs were only scheduled for 10%. However, now, the US...
Central Stations Face Off Against NFPA On Fire Monitoring on Sep 18, 2018
Central stations are facing off against the NFPA over what they call anti-competitive language in NFPA 72, the standard that covers fire alarms....
Chinese Government Praises Hikvision Following Xi Jinping on Sep 17, 2018
The Chinese government council responsible for managing China's state-owned companies praised Hikvision’s obedience to China’s authoritarian leader...
Amazon Ring Spotlight Cam Tested on Sep 17, 2018
Amazon's Ring has released their latest camera entry, the Spotlight Cam, which we bought and tested in our Consumer IP Camera Analytics...
European Mega Security Firm Verisure Pushing Security Fog on Sep 17, 2018
The European mega security firm Verisure (Securitas Direct), with a reported 2 million customers, is pushing security fog, as shown in this BBC...
IP Camera Cable Labeling Guide on Sep 14, 2018
Labeling cables can save a lot of money and headaches. While it is easy to overlook, taking time to label runs during installation significantly...
Favorite Intercom Manufacturers 2018 on Sep 14, 2018
Intercoms are certainly increasing in popularity, driven by the integration of video and IP networking. But who is the favorite? On the one side,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact