Fingerprints for Access Control Guide

By: Brian Rhodes, Published on Sep 09, 2019

Users can lose badges, but they never misplace a finger, right?

The most common biometric used in access are fingerprints, and it has become one of the most trusted credentials used for access.

However, the biometric has limitations, often is more costly, and is not typically used as the only credential in access.

In this guide, we examine the biggest considerations and factors for using fingerprints:

  • The four factors that matter to fingerprint use
  • Fingerprint reader Pros vs. Cons
  • Why fingerprints do not typically replace other credentials
  • Fingerprint readers typically cost more
  • The three common fingerprint sensors used in access
  • Why Scanning time varies
  • Which specific environments are ideal for fingerprints
  • Which tough environments are not a good match
  • Fingerprint readers advantages over mobile access

***** *** **** ******, but **** ***** ******** a ******, *****?

******* ****** ************* ** ****** *** fingerprints, *** ** *** become *** ** *** most ******* *********** **** for ******.

*******, *** ********* *** limitations, ***** ** **** costly, *** ** *** typically **** ** *** only ********** ** ******.

** **** *****, ** examine *** ******* ************** and ******* *** ***** fingerprints:

  • *** **** ******* **** matter ** *********** ***
  • *********** ****** **** **. Cons
  • *** ************ ** *** typically ******* ***** ***********
  • *********** ******* ********* **** more
  • *** ***** ****** *********** sensors **** ** ******
  • *** ******** **** ******
  • ***** ******** ************ *** ideal *** ************
  • ***** ***** ************ *** not * **** *****
  • *********** ******* ********** **** mobile ******

[***************]

Fingerprint *********** ********

******** ***** ** ******** biometrics, ********* ************, **** as:

  • ****** ****: *********** ******* ********* cost **** ******** ** 'simple' ********* *********** ********** type *******.
  • ******** *********** ******: ** **** *****, fingerprints *** *** ******** enough ** ** **** as *** **** **********, and **** ** ****** with * ********* *** or **** **********.
  • ******** ****: ******** ** *** instant, *** ***** ****. More ******** ***** **** more ****, *** ******* in ***** ********* *** take **** ********** ******* compared ** *********** ***********.
  • ****** ***********:*** *** ******* *** rated *** *** ** harsh *******, ***** ************, or ***** **** ****** for ******* ** ****** impact ***********.

** *** ******** *****, we ******* *** **** and **** ** ************ where *********** ******* **** sense.

Advantages ************

********** ** *********** ******* have *** ***** ** some ****** ************:

  • *********** ****** *********: ******* do *** *** **** or ******.
  • **** ******** ************ ********: Because ************ *** *** general ******, **** ***** match ******** ***** ** credentials.
  • ***** ******* ********: *** of *** ******* ******** with ******** ****** ** sharing ***********. ************ ******* mitigate *** ****.

Downsides ************

** *** ***** ****, if *** ******* ****** for ******** **** ** convenience (**: "* ** longer **** ** ***** a ****"), *********** ******* frequently *** **** *********** due ** *********** ********** or ***** **** *** not ******** ******** ****** deployment.

**** ** ***** ***:

  • **** ************* & ********: Whether ********* ** ***, users ***** ***** ** are ********* *** ******** and ****** *********** **** is ****** *** ****.
  • **** ***********: *** *** openings *** ****** *** fingerprint *****. ******* **** and ******* ******** *** classic ****** ******** *** fingerprints.
  • ******** & ********* *********: What ******* **** ******* are ***, ******, ** users ***? ****** ************* often **** ************ **** one *** *** *** the ****.
  • ** **** ******* ***: Plastic ****** ***** *** used ** ********* ******* ID *****, *** *********** access **** *** *** them ** ***.
  • **** **** ********** *** Distinctive: ******* **** ************ are *** ***** *******, but **** ****** ******, the *********** ** **** uniqueness ****** *** *** be ***** *** ** only * *** ****** are *******.

Other *********** ***** ***** ******

******* ****** ******* ******, and ******* ** ******** fluctuations ** ******* *** the ***** ****, ********** fingerprint ***** ****** ****** take *****.

*** **** ****** ********** is **** **** **** of ****** ********** ** used, ** *********** ******* are ********* ******** *******-****** ****** ********** ***** ***** ************* options.

********** ** ************ ******, no *********** ****** ** accurate ***% ** *** time. ***** *** '***** positive' ****, ** ********** granting ****** ** ** unrecognized ******, ** *** there ** ********* *** frustrating '***** ********' *****, or ********** ******** * previously ********** ******. ** many *****, * ***** redundant ****** *** ** card *** ** **** instead.

*** ****** ***** ** one ******* ** * 'three ******' ******, *** products ********** *** ** five ******* *** ******:

***** ******** ******* ** often ******, **** ******** both ****** *** ********** management *****.

******** ******* **** *** useful *** ****-******** *********, where *** ***** ************ tightens ****** ** **** certain ******, *** **** specific *****.

*** **** *********** ************, not **** ** * valid **** ** *** required, *** ********* '*****' that *** *** *** person ****** **** ** also *****-******* *** *********** scan.

Fingerprint ******* **** ****

*** ******** ** **** for * *********** ******* is ~** ** *** more ********* **** ** equivalent *********** ******.

**** *** ******* *** (~$700) *** ****** ***** compared ** * (~$***) HID ****** ** ***, a ********** ** ***** 4.5X.

** ***** *****, **** expensive *********** ******* **** ZK ****'* ****** ****** cost ~$***, *** *******'* Bioentry * ****** **** ~$500. ** *******, **** these **** ****** *********** units *** **** ********* than ******* *********** **** readers.

*******, *****-****** ****** *** be ****** ******** *******, have **** ********** ******* some ****** ****** ****** (i.e., ****** *** ****** but ***** ******* *** more *********), *** ***** Wiegand **** (*** ******** high-security ****).

**** **** ******** *** additional ***** ** ********** cards (******* $* - $8 ****), *** *********** option *** ** ************* less *********.

Three ****** ****** *********** *******

*** ****** ***** **** in ****** ****** *** the ***** **** ** general ******** *******. *** three ***** **** ******* to ****** ***:

  • ******* / *******
  • ***********
  • **********

Optical / *******

**** *********** ****** ******* use ******* ** ******* sensors. ** *******, ******* sensors *** **** ******, although *********** *** ****** are ****** *** ****.

**** ***** ** ****** often ***** **** **** other ****** *****, *** scans * ****** ** a ***-****** *****, ******* it **** ****** ******** by ***** **** *** surface **** ** *******.

**** ***** ***** ***** finger ** *** ******, the ****** ******** ** 'image' ** *** ******, which ** **** ** a ********* *** ********** to * ******* ** images. *** *** ****** of **** ******* ******* in ****** **** ******** reads, *** ******** *** sensor ****** ** ****** protected **** ***** *******.

** *******, *** ****** is **** ** * time *** **** ** placed ** ******* **** the ******. ******* ****** from $*** ** **** than $*,*** *** ***** units.

***********

*** ** *** ******* issues **** **** *********** readers ** **** ********** is *** *** **** on ****** ** **** at * ****, *********** becoming * *** ********** for **** ****** ********.

*********** ******* ******** ***** this *****, ***** ******* multiple ******* '** *** fly' ******* ***** **** breaking ******.

*******, * *** ******** to ***** ******* ** cost, **** ******** ***** starting ** ~$*,*** *** stand ******** **** ********** models ******* ~$**,*** ** more.

**********

**** **** ********* **** of ****** ***** ** less *****, **** *****, and ** ****** **** in ******** ***** ********** devices *** ** **** common *** ********** ****** readers.

** ********** ************ **** contact **** *** *****, the ********** ******** ** a *********** **** ******* with *** ***** *** register * ****** '***********'. While ********** ** ** individual *********** ** ****, the ****** ** **** sensitive ** ******* ** the *****, *** **** materials ** ****** ** hand-lotion ***** ** ********* with ********** *****.

** *******, ********** ****** models ***** ** ~$** each *** *** ***** limited ** *** ******* they **** ****** ** how **** ****** **** can **** *** ******.

Scanning **** ******

*********** ******* **** ********** prints ** * ***** number ** ********* ('******') and **** ***** *** characteristics ** ***** ********** sampled ****** ** ********* to ******* ********** ****** scans. '*********** *******' ** identity ************* *** **** when ********** **** **** points ***** ** **** templates, *** *** ********* do *** ******* '***** print' *******.

*** ****** *** *********** scan **** *****, *** more ********** **** ** required ** ***** ***********. Because *** ***** ** biometric ************* ** ****** a '****' *** ********* it ******* * '*****' library ** ******* (** even **** * **** record ******* ** * card), *** ****** ** time * **** ***** to ******** ***** ***.

*** ********** **** ** often *** *********** *** less **** *** *******, but ******* ***** ********* tends ** ** **** shorter **** * **** is ******** ** * locked ****, *********** ******* in **** ** **** environments, ******** ** *** near-instantaneous ******* ** ******* and ********* * ********** card.

Environmental ***********

*** **** ** *** readers ********** ******* ********** from ******* *******, ************ themselves ******* ******* ***********.

************* **** ***** *****, cuts *** ******* ** finger ****, *** *** age ** *** ****** bearer *** ****** ** how ****** *** ********** the ***** ** ****. Likewise, ******* ********* ** wet ** ***** ************ face ********* ********.

***** **** ****** *********** factors, ***** *** '********' considerations ** ****. *** example, ******** *********** **** gloves **** ** ** removed ** ***** ** read * *****. ***** a ***** *************, **** used ** **** ** sterile ************ ****** ***** to ****** ****** ****** entry ** * ********* problem.

** ********, ****** ******** a ******* ***** *** susceptible ** ******* ****, moisture, *** ******* **** to ****** **** ** the ******* ** ************, and **** ********* ***** readers *** ********* ** 'potted' ********* **** ** not *** *********** **** while ****** **** ********* to ***** *******.

Most ****** *********** ************

***** *** ******* ************** for *********** *******, ******* use ** ***** *** compared ** **** *** fob *******.

** **** *****, *********** readers *** **** **** for ****** ****, ****** openings **** ******* ** individual ***** **** **** a ***** ********** ** many ***** ******* ****** at **** *** **** are ********* **** *******.

*** **** ********** ********, traditional *********** *** *** a ***** ********* ** users, *** ***** ** weak ************* ** '*** something **** ** *** broken' ***** *** **** relative **** ** *********** readers.

******* ************ *** ******* alike *** ******* ** environmental *******, **** ********* are **** ** '**** security' ****** ************ ***** 'multi-factor' *********** *** *********.

Special ************

*******, ************* ***** ** fingerprints **** ****** ** new ************ *** *** equipment. ***** *** '********' applications ** **** *****:

  • ******* ****** / ***:******* *****-** ***** ** fingerprints, ********* *** *** and *********** ******* ******* of ******** ***** ********.
  • ********* **********: ** ***** ** retrieve ********, * **** must **** * *********** that ******* *** '******** to ****-** ********' ****. This ******** ** ********** important ***** ******* ** children ** * *********** legal ***** *** **** people.
  • ****-******* *******: *** *********** ** are ******** **** ******* access ** **** *** and **** ** ********* based ** *********** **.

Fingerprints **. ****** ******

*** ****** ************ **** high ******** *** **********, like ************, *** ****** where ***** ******* ***** cards **** ***********.

** *******, ** ***** are ***** ***** ****** for ******, ****** ******* do *** ******* ************ too. *** *******, ** our ************ ****** ********, **** ** *** readers ** ****** ******** fingerprints ** **** *** the ****** ** ** fingerprint *******.

*******, ** **** *****, the ************ *** **** together ** *********** ***** include * *********** ********* unlock.

*** **** ********* ** mobile ****** ****** ** users ****** *********** *******, while *********** ******* ******* no ******.

*** ****-******** *********** ***** user ****** *** ********** or ***** *********** ****** credentials **** * ****** risk ** ***** ******/******, fingerprint ******* (********** **** in *********** ************** ***********) are **** ******.

[****: **** ***** *** initially ******* ** ****, and ************* *******/******* ** 2019.]

Comments (5)

**** *** **** ** technology ****** ****,fingerprint ******* **** *** ** ** * **** ********** ***** ***** ****** vs traditional readers/keypad.

****** *** **** *********** really ** *** *******/****** security ******* ****** **** for *******/**** ****** ********* that *** ***** ****** in ***** *** ** read **** *** ******* errors. * ***** ** not **** ** ****** access ** ** **** that ****** ***** **** to **** ** ******** their ****** *** **** would *** **** ** mix ***** ******** ***** for *** ** *** company's ******** *******.

* ** **** **** that ****** *********** **** be *** ****** ** access *******. ** *** be * ********** ** reader ** * **** view ****** ******* ** multiple ***** **** *** accomodate * ***** ****** of ***-********** ****** *** hold ******* ** * man **** **** ** individual ***** ** ***** in **** *** *****.

* ** ******* ******* in *** ****** ****** that **** *** ***** way *** ******** *** opened ** ** ********** me **** **** ** an ********** ******.

***, **** ********!

* ** **** **** that ****** *********** **** be *** ****** ** access *******

* ** ****** ***** this. *****'* ********** * lot ** ******** ****** this *** **** ****** opposition ** **** ** technical ***** ** **** systems ****** *** ****.

** *** **** ** that ****** ****** (** devices *********) ** ******** access *********** **** ****** most ****** ** * decade, ***** *** **** ubiquity ** ******** ****** phones (** ******** ****** evolve ** ** * decade) *** **** ** eliminates *** ******* *** technical ****** ** ***** facial ***********. ********** ***** be *****, ******* *** us **** ** ***** from *** :)

* ** ******* ******* in *** ****** ****** that **** *** ***** way *** ******** *** opened ** ** ********** me **** **** ** an ********** ******.

*** ******** **** ** probably **** **** ********** than *** ******* ****, unless ******* *** ******** on ***** ******** ** a *** ******** *** door. :) ***:**** ********* ****** ******* Tutorial

********* **** *** ******* fingerprint *******. *** **** this ********...******* ******** ******** '****** a ******* ************' - BBC ****

******* *** **-***** ******** of:******* ********* **** **** Examined

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Installation Course - Last Chance - Register Now on Sep 12, 2019
Last Chance - Register Now - September 2019 Video Surveillance Install Course. Thursday, September 12th is your last chance to register for the...
Mobotix First CNPP CCTV Cybersecurity Certification Examined on Sep 05, 2019
Mobotix recently became the first video surveillance manufacturer to receive the CNPP cybsersecurity certification for its cameras, in which they...
Assa Acquires LifeSafety Power on Sep 04, 2019
Assa Abloy is acquiring LifeSafety Power, adding to their growing collection of access control brands like Mercury, August, Pioneer Doors, and...
Register Now - October 2019 IP Networking Course on Aug 28, 2019
Register now for the Fall 2019 IP Networking Course. This is the only networking course designed specifically for video surveillance...
Mobile Access Control Guide on Aug 28, 2019
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this...
UK Facewatch GDPR Compliance Questioned on Aug 27, 2019
Even as the GDPR strictly regulates biometrics, a UK company called Facewatch is selling anti-shoplifter facial recognition systems to hundreds of...
ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Suprema Biometric Mass Leak Examined on Aug 19, 2019
While Suprema is rarely discussed even within the physical security market, the South Korean biometrics manufacturer made global news this past...
Biometrics Usage Statistics 2019 on Aug 13, 2019
Biometrics are commonly used in phones, but how frequently are they used for access? 150+ integrators told us how often they use biometrics,...

Most Recent Industry Reports

How Cobalt Robotics May Disrupt Security on Sep 13, 2019
While security robots have largely become a joke over the last few years, one organization, Cobalt Robotics, has raised $50+ million from top US...
Panasonic 4K Camera Tested (WV-S2570L) on Sep 13, 2019
Panasonic has released their latest generation 4K dome, the WV-S2570L, claiming "Extreme image quality allows evidence to be captured even under...
ASIS GSX 2019 Show Report Final on Sep 12, 2019
IPVM went to Chicago for ASIS GSX 2019, with many exhibitors disappointed about traffic and the exhibitor schedule changing next year. Inside we...
Installation Course - Last Chance - Register Now on Sep 12, 2019
Last Chance - Register Now - September 2019 Video Surveillance Install Course. Thursday, September 12th is your last chance to register for the...
Commend ID5 Intercom Tested on Sep 12, 2019
Commend touts the new ID5 intercom as 'timelessly elegant' and the slim body, glass front touchscreen indeed looks better than common, but ugly,...
US State Department: "Chinese Tech Giants" "Tools of the Chinese Communist Party" on Sep 12, 2019
The US State Department has called out "Chinese tech giants" for being "tools of the Chinese Communist Party" in a blunt new speech that makes...
Uniview OEM Directory on Sep 11, 2019
This directory lists 20+ companies that OEM products from Uniview, with a graphic and links to company websites below. It does not cover all...
Yi Home Camera 3 AI Analytics Tested on Sep 10, 2019
Yi Technology is claiming "new AI features" in its $50 Home Camera 3 "eliminates 'false positives' caused by flying insects, small pets, or light...
Hanwha Announces 32MP Camera + AI Line on Sep 10, 2019
In the first rise in maximum megapixel resolution in 5 years, Hanwha has announced a 32MP / 8K camera directly competing with Avigilon's H4 30MP /...
Fingerprints for Access Control Guide on Sep 09, 2019
Users can lose badges, but they never misplace a finger, right? The most common biometric used in access are fingerprints, and it has become one...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact