Fingerprints for Access Control Guide

By: Brian Rhodes, Published on Sep 09, 2019

Users can lose badges, but they never misplace a finger, right?

The most common biometric used in access are fingerprints, and it has become one of the most trusted credentials used for access.

However, the biometric has limitations, often is more costly, and is not typically used as the only credential in access.

In this guide, we examine the biggest considerations and factors for using fingerprints:

  • The four factors that matter to fingerprint use
  • Fingerprint reader Pros vs. Cons
  • Why fingerprints do not typically replace other credentials
  • Fingerprint readers typically cost more
  • The three common fingerprint sensors used in access
  • Why Scanning time varies
  • Which specific environments are ideal for fingerprints
  • Which tough environments are not a good match
  • Fingerprint readers advantages over mobile access

***** *** **** ******, but **** ***** ******** a ******, *****?

******* ****** ************* ** ****** *** fingerprints, *** ** *** become *** ** *** most ******* *********** **** for ******.

*******, *** ********* *** limitations, ***** ** **** costly, *** ** *** typically **** ** *** only ********** ** ******.

** **** *****, ** examine *** ******* ************** and ******* *** ***** fingerprints:

  • *** **** ******* **** matter ** *********** ***
  • *********** ****** **** **. Cons
  • *** ************ ** *** typically ******* ***** ***********
  • *********** ******* ********* **** more
  • *** ***** ****** *********** sensors **** ** ******
  • *** ******** **** ******
  • ***** ******** ************ *** ideal *** ************
  • ***** ***** ************ *** not * **** *****
  • *********** ******* ********** **** mobile ******

[***************]

Fingerprint *********** ********

******** ***** ** ******** biometrics, ********* ************, **** as:

  • ****** ****: *********** ******* ********* cost **** ******** ** 'simple' ********* *********** ********** type *******.
  • ******** *********** ******: ** **** *****, fingerprints *** *** ******** enough ** ** **** as *** **** **********, and **** ** ****** with * ********* *** or **** **********.
  • ******** ****: ******** ** *** instant, *** ***** ****. More ******** ***** **** more ****, *** ******* in ***** ********* *** take **** ********** ******* compared ** *********** ***********.
  • ****** ***********:*** *** ******* *** rated *** *** ** harsh *******, ***** ************, or ***** **** ****** for ******* ** ****** impact ***********.

** *** ******** *****, we ******* *** **** and **** ** ************ where *********** ******* **** sense.

Advantages ************

********** ** *********** ******* have *** ***** ** some ****** ************:

  • *********** ****** *********: ******* do *** *** **** or ******.
  • **** ******** ************ ********: Because ************ *** *** general ******, **** ***** match ******** ***** ** credentials.
  • ***** ******* ********: *** of *** ******* ******** with ******** ****** ** sharing ***********. ************ ******* mitigate *** ****.

Downsides ************

** *** ***** ****, if *** ******* ****** for ******** **** ** convenience (**: "* ** longer **** ** ***** a ****"), *********** ******* frequently *** **** *********** due ** *********** ********** or ***** **** *** not ******** ******** ****** deployment.

**** ** ***** ***:

  • **** ************* & ********: Whether ********* ** ***, users ***** ***** ** are ********* *** ******** and ****** *********** **** is ****** *** ****.
  • **** ***********: *** *** openings *** ****** *** fingerprint *****. ******* **** and ******* ******** *** classic ****** ******** *** fingerprints.
  • ******** & ********* *********: What ******* **** ******* are ***, ******, ** users ***? ****** ************* often **** ************ **** one *** *** *** the ****.
  • ** **** ******* ***: Plastic ****** ***** *** used ** ********* ******* ID *****, *** *********** access **** *** *** them ** ***.
  • **** **** ********** *** Distinctive: ******* **** ************ are *** ***** *******, but **** ****** ******, the *********** ** **** uniqueness ****** *** *** be ***** *** ** only * *** ****** are *******.

Other *********** ***** ***** ******

******* ****** ******* ******, and ******* ** ******** fluctuations ** ******* *** the ***** ****, ********** fingerprint ***** ****** ****** take *****.

*** **** ****** ********** is **** **** **** of ****** ********** ** used, ** *********** ******* are ********* ******** *******-****** ****** ********** ***** ***** ************* options.

********** ** ************ ******, no *********** ****** ** accurate ***% ** *** time. ***** *** '***** positive' ****, ** ********** granting ****** ** ** unrecognized ******, ** *** there ** ********* *** frustrating '***** ********' *****, or ********** ******** * previously ********** ******. ** many *****, * ***** redundant ****** *** ** card *** ** **** instead.

*** ****** ***** ** one ******* ** * 'three ******' ******, *** products ********** *** ** five ******* *** ******:

***** ******** ******* ** often ******, **** ******** both ****** *** ********** management *****.

******** ******* **** *** useful *** ****-******** *********, where *** ***** ************ tightens ****** ** **** certain ******, *** **** specific *****.

*** **** *********** ************, not **** ** * valid **** ** *** required, *** ********* '*****' that *** *** *** person ****** **** ** also *****-******* *** *********** scan.

Fingerprint ******* **** ****

*** ******** ** **** for * *********** ******* is ~** ** *** more ********* **** ** equivalent *********** ******.

**** *** ******* *** (~$700) *** ****** ***** compared ** * (~$***) HID ****** ** ***, a ********** ** ***** 4.5X.

** ***** *****, **** expensive *********** ******* **** ZK ****'* ****** ****** cost ~$***, *** *******'* Bioentry * ****** **** ~$500. ** *******, **** these **** ****** *********** units *** **** ********* than ******* *********** **** readers.

*******, *****-****** ****** *** be ****** ******** *******, have **** ********** ******* some ****** ****** ****** (i.e., ****** *** ****** but ***** ******* *** more *********), *** ***** Wiegand **** (*** ******** high-security ****).

**** **** ******** *** additional ***** ** ********** cards (******* $* - $8 ****), *** *********** option *** ** ************* less *********.

Three ****** ****** *********** *******

*** ****** ***** **** in ****** ****** *** the ***** **** ** general ******** *******. *** three ***** **** ******* to ****** ***:

  • ******* / *******
  • ***********
  • **********

Optical / *******

**** *********** ****** ******* use ******* ** ******* sensors. ** *******, ******* sensors *** **** ******, although *********** *** ****** are ****** *** ****.

**** ***** ** ****** often ***** **** **** other ****** *****, *** scans * ****** ** a ***-****** *****, ******* it **** ****** ******** by ***** **** *** surface **** ** *******.

**** ***** ***** ***** finger ** *** ******, the ****** ******** ** 'image' ** *** ******, which ** **** ** a ********* *** ********** to * ******* ** images. *** *** ****** of **** ******* ******* in ****** **** ******** reads, *** ******** *** sensor ****** ** ****** protected **** ***** *******.

** *******, *** ****** is **** ** * time *** **** ** placed ** ******* **** the ******. ******* ****** from $*** ** **** than $*,*** *** ***** units.

***********

*** ** *** ******* issues **** **** *********** readers ** **** ********** is *** *** **** on ****** ** **** at * ****, *********** becoming * *** ********** for **** ****** ********.

*********** ******* ******** ***** this *****, ***** ******* multiple ******* '** *** fly' ******* ***** **** breaking ******.

*******, * *** ******** to ***** ******* ** cost, **** ******** ***** starting ** ~$*,*** *** stand ******** **** ********** models ******* ~$**,*** ** more.

**********

**** **** ********* **** of ****** ***** ** less *****, **** *****, and ** ****** **** in ******** ***** ********** devices *** ** **** common *** ********** ****** readers.

** ********** ************ **** contact **** *** *****, the ********** ******** ** a *********** **** ******* with *** ***** *** register * ****** '***********'. While ********** ** ** individual *********** ** ****, the ****** ** **** sensitive ** ******* ** the *****, *** **** materials ** ****** ** hand-lotion ***** ** ********* with ********** *****.

** *******, ********** ****** models ***** ** ~$** each *** *** ***** limited ** *** ******* they **** ****** ** how **** ****** **** can **** *** ******.

Scanning **** ******

*********** ******* **** ********** prints ** * ***** number ** ********* ('******') and **** ***** *** characteristics ** ***** ********** sampled ****** ** ********* to ******* ********** ****** scans. '*********** *******' ** identity ************* *** **** when ********** **** **** points ***** ** **** templates, *** *** ********* do *** ******* '***** print' *******.

*** ****** *** *********** scan **** *****, *** more ********** **** ** required ** ***** ***********. Because *** ***** ** biometric ************* ** ****** a '****' *** ********* it ******* * '*****' library ** ******* (** even **** * **** record ******* ** * card), *** ****** ** time * **** ***** to ******** ***** ***.

*** ********** **** ** often *** *********** *** less **** *** *******, but ******* ***** ********* tends ** ** **** shorter **** * **** is ******** ** * locked ****, *********** ******* in **** ** **** environments, ******** ** *** near-instantaneous ******* ** ******* and ********* * ********** card.

Environmental ***********

*** **** ** *** readers ********** ******* ********** from ******* *******, ************ themselves ******* ******* ***********.

************* **** ***** *****, cuts *** ******* ** finger ****, *** *** age ** *** ****** bearer *** ****** ** how ****** *** ********** the ***** ** ****. Likewise, ******* ********* ** wet ** ***** ************ face ********* ********.

***** **** ****** *********** factors, ***** *** '********' considerations ** ****. *** example, ******** *********** **** gloves **** ** ** removed ** ***** ** read * *****. ***** a ***** *************, **** used ** **** ** sterile ************ ****** ***** to ****** ****** ****** entry ** * ********* problem.

** ********, ****** ******** a ******* ***** *** susceptible ** ******* ****, moisture, *** ******* **** to ****** **** ** the ******* ** ************, and **** ********* ***** readers *** ********* ** 'potted' ********* **** ** not *** *********** **** while ****** **** ********* to ***** *******.

Most ****** *********** ************

***** *** ******* ************** for *********** *******, ******* use ** ***** *** compared ** **** *** fob *******.

** **** *****, *********** readers *** **** **** for ****** ****, ****** openings **** ******* ** individual ***** **** **** a ***** ********** ** many ***** ******* ****** at **** *** **** are ********* **** *******.

*** **** ********** ********, traditional *********** *** *** a ***** ********* ** users, *** ***** ** weak ************* ** '*** something **** ** *** broken' ***** *** **** relative **** ** *********** readers.

******* ************ *** ******* alike *** ******* ** environmental *******, **** ********* are **** ** '**** security' ****** ************ ***** 'multi-factor' *********** *** *********.

Special ************

*******, ************* ***** ** fingerprints **** ****** ** new ************ *** *** equipment. ***** *** '********' applications ** **** *****:

  • ******* ****** / ***:******* *****-** ***** ** fingerprints, ********* *** *** and *********** ******* ******* of ******** ***** ********.
  • ********* **********: ** ***** ** retrieve ********, * **** must **** * *********** that ******* *** '******** to ****-** ********' ****. This ******** ** ********** important ***** ******* ** children ** * *********** legal ***** *** **** people.
  • ****-******* *******: *** *********** ** are ******** **** ******* access ** **** *** and **** ** ********* based ** *********** **.

Fingerprints **. ****** ******

*** ****** ************ **** high ******** *** **********, like ************, *** ****** where ***** ******* ***** cards **** ***********.

** *******, ** ***** are ***** ***** ****** for ******, ****** ******* do *** ******* ************ too. *** *******, ** our ************ ****** ********, **** ** *** readers ** ****** ******** fingerprints ** **** *** the ****** ** ** fingerprint *******.

*******, ** **** *****, the ************ *** **** together ** *********** ***** include * *********** ********* unlock.

*** **** ********* ** mobile ****** ****** ** users ****** *********** *******, while *********** ******* ******* no ******.

*** ****-******** *********** ***** user ****** *** ********** or ***** *********** ****** credentials **** * ****** risk ** ***** ******/******, fingerprint ******* (********** **** in *********** ************** ***********) are **** ******.

[****: **** ***** *** initially ******* ** ****, and ************* *******/******* ** 2019.]

Comments (11)

**** *** **** ** technology ****** ****,fingerprint ******* **** *** ** ** * **** ********** ***** ***** ****** vs traditional readers/keypad.

****** *** **** *********** really ** *** *******/****** security ******* ****** **** for *******/**** ****** ********* that *** ***** ****** in ***** *** ** read **** *** ******* errors. * ***** ** not **** ** ****** access ** ** **** that ****** ***** **** to **** ** ******** their ****** *** **** would *** **** ** mix ***** ******** ***** for *** ** *** company's ******** *******.

* ** **** **** that ****** *********** **** be *** ****** ** access *******. ** *** be * ********** ** reader ** * **** view ****** ******* ** multiple ***** **** *** accomodate * ***** ****** of ***-********** ****** *** hold ******* ** * man **** **** ** individual ***** ** ***** in **** *** *****.

* ** ******* ******* in *** ****** ****** that **** *** ***** way *** ******** *** opened ** ** ********** me **** **** ** an ********** ******.

***, **** ********!

* ** **** **** that ****** *********** **** be *** ****** ** access *******

* ** ****** ***** this. *****'* ********** * lot ** ******** ****** this *** **** ****** opposition ** **** ** technical ***** ** **** systems ****** *** ****.

** *** **** ** that ****** ****** (** devices *********) ** ******** access *********** **** ****** most ****** ** * decade, ***** *** **** ubiquity ** ******** ****** phones (** ******** ****** evolve ** ** * decade) *** **** ** eliminates *** ******* *** technical ****** ** ***** facial ***********. ********** ***** be *****, ******* *** us **** ** ***** from *** :)

* ** ******* ******* in *** ****** ****** that **** *** ***** way *** ******** *** opened ** ** ********** me **** **** ** an ********** ******.

*** ******** **** ** probably **** **** ********** than *** ******* ****, unless ******* *** ******** on ***** ******** ** a *** ******** *** door. :) ***:**** ********* ****** ******* Tutorial

********* **** *** ******* fingerprint *******. *** **** this ********...******* ******** ******** '****** a ******* ************' - BBC ****

******* *** **-***** ******** of:******* ********* **** **** Examined

****** *** *** ******. Will ***** ** *** on ****** ****? ** maybe * ***** ** face, ****** *** ****** for ****** ******* ******?

****** *** *** ****. We **** ********** ********* doing *** *** **** proceed. ****** ******* ***** this ****/******.

*** ***** *** ******** face *** ******* ***'** interested **?

*'* ******* ******** ** see ****'* *** *****, if ***** *** *** new ******* ** *** good **** **** ****** use ****** *** *** access *******. ********* ? Stonelock? **** **** ** there?

** **** ** ******* ZK **** *** ****** Hikvision *** *****'* ********* too. ********* ** * good **********. *'** ** checking ** **** ****** and ******* ***. ****** for *** ********!

*** *** **** ******* Identity *****?

** ** **** ** fake * ****** ***** on * ******?

[****:**** ************ - ******** Detection *********]

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Nortek Mobile Access Reader BluePass Examined on Feb 12, 2019
Nortek's Linear access control division claims to make mobile credentials "more secure and easier to use than ever before" with their BluePass...
Proxy Access Control Tested on May 09, 2019
Silicon Valley Access Startup Proxy raised $13.6 Million in May 2019, focusing on mobile physical access control. Beyond the fund raising, Proxy...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Nortek Blue Pass Mobile Access Reader Tested on Jul 11, 2019
Nortek claims BluePass mobile readers are a 'more secure and easy to use approach to access', but our testing uncovered security problems and...
Mobile Access Control Shootout - Farpointe, HID, Openpath, Nortek, Proxy on Jul 29, 2019
One of the biggest rising trends in access control is using phones as credentials but which offering is best? IPVM has tested five of the...
Mobile Access Control Guide on Aug 28, 2019
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this...
HID Fingerprint Reader Tested on Oct 09, 2019
HID has released their first access reader to use Lumidigm optical sensors, that touts it 'works with anyone, anytime, anywhere'. We bought and...
Directory of Access Reader Manufacturers on Nov 27, 2019
Credential Readers are one of the most visible and noticeable parts of access systems, but installers often stick with only the brand they always...

Most Recent Industry Reports

"Hikvision Football Arena" Lithuania Causes Controversy on Jan 24, 2020
Controversy has arisen in Lithuania over Hikvision becoming a soccer team's top sponsor and gaining naming rights to their arena, with one local MP...
Axis and Genetec Drop IFSEC 2020 on Jan 23, 2020
Two of the best-known video surveillance manufacturers are dropping IFSEC International 2020, joining Milestone who dropped IFSEC in 2019. The...
Multipoint Door Lock Tutorial on Jan 23, 2020
Despite widespread use, locked doors are notoriously weak at stopping entry, and thousands can be misspent on locks that leave doors quite...
Avigilon Shifts Cloud Strategy - Merges Blue and ACC on Jan 23, 2020
Avigilon is shifting its cloud strategy, phasing out its Blue web-managed surveillance platform as a stand-alone brand and merging it with its ACC...
Verkada Paying $100 For Referrals Just To Demo on Jan 22, 2020
Some companies pay for referrals when the referral becomes a customer. Verkada is taking it to the next level - paying $100 referrals fees simply...
Camera Analytics Shootout 2020 - Avigilon, Axis, Bosch, Dahua, Hanwha, Hikvision, Uniview, Vivotek on Jan 22, 2020
Analytics are hot again, thanks to a slew of AI-powered cameras, but whose analytics really work? And how do these new smart cameras compare to top...
Intersec 2020 Final Show Report on Jan 21, 2020
IPVM spent all 3 days at the Intersec 2020 show interviewing various companies and finding key trends. We cover: Middle East Enterprise...
Vehicle & Long Range Access Reader Tutorial on Jan 21, 2020
One of the classic challenges for access control are parking lots and garages, where the user's credential is far from the reader. With modern...
Clearview AI Alarm - NY Times Report Says "Might End Privacy" on Jan 20, 2020
Over the weekend, the NY Times released a report titled "The Secretive Company That Might End Privacy as We Know It" about a company named...
Favorite Camera Manufacturers 2020 on Jan 20, 2020
The past 2 years of US bans and sanctions have shaken the video surveillance industry but what impact would this have on integrators' favorite...