Fingerprints for Access Control Guide

By: Brian Rhodes, Published on Sep 09, 2019

Users can lose badges, but they never misplace a finger, right?

The most common biometric used in access are fingerprints, and it has become one of the most trusted credentials used for access.

However, the biometric has limitations, often is more costly, and is not typically used as the only credential in access.

In this guide, we examine the biggest considerations and factors for using fingerprints:

  • The four factors that matter to fingerprint use
  • Fingerprint reader Pros vs. Cons
  • Why fingerprints do not typically replace other credentials
  • Fingerprint readers typically cost more
  • The three common fingerprint sensors used in access
  • Why Scanning time varies
  • Which specific environments are ideal for fingerprints
  • Which tough environments are not a good match
  • Fingerprint readers advantages over mobile access

Fingerprint *********** ********

******** ***** ** ******** biometrics, ********* ************, **** as:

  • ****** ****: *********** ******* ********* cost **** ******** ** 'simple' ********* *********** ********** type *******.
  • ******** *********** ******: ** **** *****, fingerprints *** *** ******** enough ** ** **** as *** **** **********, and **** ** ****** with * ********* *** or **** **********.
  • ******** ****: ******** ** *** instant, *** ***** ****. More ******** ***** **** more ****, *** ******* in ***** ********* *** take **** ********** ******* compared ** *********** ***********.
  • ****** ***********:*** *** ******* *** rated *** *** ** harsh *******, ***** ************, or ***** **** ****** for ******* ** ****** impact ***********.

** *** ******** *****, we ******* *** **** and **** ** ************ where *********** ******* **** sense.

Advantages ************

********** ** *********** ******* have *** ***** ** some ****** ************:

  • *********** ****** *********: ******* do *** *** **** or ******.
  • **** ******** ************ ********: Because ************ *** *** general ******, **** ***** match ******** ***** ** credentials.
  • ***** ******* ********: *** of *** ******* ******** with ******** ****** ** sharing ***********. ************ ******* mitigate *** ****.

Downsides ************

** *** ***** ****, if *** ******* ****** for ******** **** ** convenience (**: "* ** longer **** ** ***** a ****"), *********** ******* frequently *** **** *********** due ** *********** ********** or ***** **** *** not ******** ******** ****** deployment.

**** ** ***** ***:

  • **** ************* & ********: Whether ********* ** ***, users ***** ***** ** are ********* *** ******** and ****** *********** **** is ****** *** ****.
  • **** ***********: *** *** openings *** ****** *** fingerprint *****. ******* **** and ******* ******** *** classic ****** ******** *** fingerprints.
  • ******** & ********* *********: What ******* **** ******* are ***, ******, ** users ***? ****** ************* often **** ************ **** one *** *** *** the ****.
  • ** **** ******* ***: Plastic ****** ***** *** used ** ********* ******* ID *****, *** *********** access **** *** *** them ** ***.
  • **** **** ********** *** Distinctive: ******* **** ************ are *** ***** *******, but **** ****** ******, the *********** ** **** uniqueness ****** *** *** be ***** *** ** only * *** ****** are *******.

Other *********** ***** ***** ******

******* ****** ******* ******, and ******* ** ******** fluctuations ** ******* *** the ***** ****, ********** fingerprint ***** ****** ****** take *****.

*** **** ****** ********** is **** **** **** of ****** ********** ** used, ** *********** ******* are ********* ******** *******-****** ****** ********** ***** ***** ************* options.

********** ** ************ ******, no *********** ****** ** accurate ***% ** *** time. ***** *** '***** positive' ****, ** ********** granting ****** ** ** unrecognized ******, ** *** there ** ********* *** frustrating '***** ********' *****, or ********** ******** * previously ********** ******. ** many *****, * ***** redundant ****** *** ** card *** ** **** instead.

*** ****** ***** ** one ******* ** * 'three ******' ******, *** products ********** *** ** five ******* *** ******:

***** ******** ******* ** often ******, **** ******** both ****** *** ********** management *****.

******** ******* **** *** useful *** ****-******** *********, where *** ***** ************ tightens ****** ** **** certain ******, *** **** specific *****.

*** **** *********** ************, not **** ** * valid **** ** *** required, *** ********* '*****' that *** *** *** person ****** **** ** also *****-******* *** *********** scan.

Fingerprint ******* **** ****

*** ******** ** **** for * *********** ******* is ~** ** *** more ********* **** ** equivalent *********** ******.

**** *** ******* *** (~$700) *** ****** ***** compared ** * (~$***) HID ****** ** ***, a ********** ** ***** 4.5X.

** ***** *****, **** expensive *********** ******* **** ZK ****'* ****** ****** cost ~$***, *** *******'* Bioentry * ****** **** ~$500. ** *******, **** these **** ****** *********** units *** **** ********* than ******* *********** **** readers.

*******, *****-****** ****** *** be ****** ******** *******, have **** ********** ******* some ****** ****** ****** (i.e., ****** *** ****** but ***** ******* *** more *********), *** ***** Wiegand **** (*** ******** high-security ****).

**** **** ******** *** additional ***** ** ********** cards (******* $* - $8 ****), *** *********** option *** ** ************* less *********.

Three ****** ****** *********** *******

*** ****** ***** **** in ****** ****** *** the ***** **** ** general ******** *******. *** three ***** **** ******* to ****** ***:

  • ******* / *******
  • ***********
  • **********

Optical / *******

**** *********** ****** ******* use ******* ** ******* sensors. ** *******, ******* sensors *** **** ******, although *********** *** ****** are ****** *** ****.

**** ***** ** ****** often ***** **** **** other ****** *****, *** scans * ****** ** a ***-****** *****, ******* it **** ****** ******** by ***** **** *** surface **** ** *******.

**** ***** ***** ***** finger ** *** ******, the ****** ******** ** 'image' ** *** ******, which ** **** ** a ********* *** ********** to * ******* ** images. *** *** ****** of **** ******* ******* in ****** **** ******** reads, *** ******** *** sensor ****** ** ****** protected **** ***** *******.

** *******, *** ****** is **** ** * time *** **** ** placed ** ******* **** the ******. ******* ****** from $*** ** **** than $*,*** *** ***** units.

***********

*** ** *** ******* issues **** **** *********** readers ** **** ********** is *** *** **** on ****** ** **** at * ****, *********** becoming * *** ********** for **** ****** ********.

*********** ******* ******** ***** this *****, ***** ******* multiple ******* '** *** fly' ******* ***** **** breaking ******.

*******, * *** ******** to ***** ******* ** cost, **** ******** ***** starting ** ~$*,*** *** stand ******** **** ********** models ******* ~$**,*** ** more.

**********

**** **** ********* **** of ****** ***** ** less *****, **** *****, and ** ****** **** in ******** ***** ********** devices *** ** **** common *** ********** ****** readers.

** ********** ************ **** contact **** *** *****, the ********** ******** ** a *********** **** ******* with *** ***** *** register * ****** '***********'. While ********** ** ** individual *********** ** ****, the ****** ** **** sensitive ** ******* ** the *****, *** **** materials ** ****** ** hand-lotion ***** ** ********* with ********** *****.

** *******, ********** ****** models ***** ** ~$** each *** *** ***** limited ** *** ******* they **** ****** ** how **** ****** **** can **** *** ******.

Scanning **** ******

*********** ******* **** ********** prints ** * ***** number ** ********* ('******') and **** ***** *** characteristics ** ***** ********** sampled ****** ** ********* to ******* ********** ****** scans. '*********** *******' ** identity ************* *** **** when ********** **** **** points ***** ** **** templates, *** *** ********* do *** ******* '***** print' *******.

*** ****** *** *********** scan **** *****, *** more ********** **** ** required ** ***** ***********. Because *** ***** ** biometric ************* ** ****** a '****' *** ********* it ******* * '*****' library ** ******* (** even **** * **** record ******* ** * card), *** ****** ** time * **** ***** to ******** ***** ***.

*** ********** **** ** often *** *********** *** less **** *** *******, but ******* ***** ********* tends ** ** **** shorter **** * **** is ******** ** * locked ****, *********** ******* in **** ** **** environments, ******** ** *** near-instantaneous ******* ** ******* and ********* * ********** card.

Environmental ***********

*** **** ** *** readers ********** ******* ********** from ******* *******, ************ themselves ******* ******* ***********.

************* **** ***** *****, cuts *** ******* ** finger ****, *** *** age ** *** ****** bearer *** ****** ** how ****** *** ********** the ***** ** ****. Likewise, ******* ********* ** wet ** ***** ************ face ********* ********.

***** **** ****** *********** factors, ***** *** '********' considerations ** ****. *** example, ******** *********** **** gloves **** ** ** removed ** ***** ** read * *****. ***** a ***** *************, **** used ** **** ** sterile ************ ****** ***** to ****** ****** ****** entry ** * ********* problem.

** ********, ****** ******** a ******* ***** *** susceptible ** ******* ****, moisture, *** ******* **** to ****** **** ** the ******* ** ************, and **** ********* ***** readers *** ********* ** 'potted' ********* **** ** not *** *********** **** while ****** **** ********* to ***** *******.

Most ****** *********** ************

***** *** ******* ************** for *********** *******, ******* use ** ***** *** compared ** **** *** fob *******.

** **** *****, *********** readers *** **** **** for ****** ****, ****** openings **** ******* ** individual ***** **** **** a ***** ********** ** many ***** ******* ****** at **** *** **** are ********* **** *******.

*** **** ********** ********, traditional *********** *** *** a ***** ********* ** users, *** ***** ** weak ************* ** '*** something **** ** *** broken' ***** *** **** relative **** ** *********** readers.

******* ************ *** ******* alike *** ******* ** environmental *******, **** ********* are **** ** '**** security' ****** ************ ***** 'multi-factor' *********** *** *********.

Special ************

*******, ************* ***** ** fingerprints **** ****** ** new ************ *** *** equipment. ***** *** '********' applications ** **** *****:

  • ******* ****** / ***:******* *****-** ***** ** fingerprints, ********* *** *** and *********** ******* ******* of ******** ***** ********.
  • ********* **********: ** ***** ** retrieve ********, * **** must **** * *********** that ******* *** '******** to ****-** ********' ****. This ******** ** ********** important ***** ******* ** children ** * *********** legal ***** *** **** people.
  • ****-******* *******: *** *********** ** are ******** **** ******* access ** **** *** and **** ** ********* based ** *********** **.

Fingerprints **. ****** ******

*** ****** ************ **** high ******** *** **********, like ************, *** ****** where ***** ******* ***** cards **** ***********.

** *******, ** ***** are ***** ***** ****** for ******, ****** ******* do *** ******* ************ too. *** *******, ** our ************ ****** ********, **** ** *** readers ** ****** ******** fingerprints ** **** *** the ****** ** ** fingerprint *******.

*******, ** **** *****, the ************ *** **** together ** *********** ***** include * *********** ********* unlock.

*** **** ********* ** mobile ****** ****** ** users ****** *********** *******, while *********** ******* ******* no ******.

*** ****-******** *********** ***** user ****** *** ********** or ***** *********** ****** credentials **** * ****** risk ** ***** ******/******, fingerprint ******* (********** **** in *********** ************** ***********) are **** ******.

[****: **** ***** *** initially ******* ** ****, and ************* *******/******* ** 2019.]

Comments (12)

**** *** **** ** technology ****** ****,fingerprint ******* **** *** ** ** * **** ********** ***** ***** ****** vs traditional readers/keypad.

****** *** **** *********** really ** *** *******/****** security ******* ****** **** for *******/**** ****** ********* that *** ***** ****** in ***** *** ** read **** *** ******* errors. * ***** ** not **** ** ****** access ** ** **** that ****** ***** **** to **** ** ******** their ****** *** **** would *** **** ** mix ***** ******** ***** for *** ** *** company's ******** *******.

* ** **** **** that ****** *********** **** be *** ****** ** access *******. ** *** be * ********** ** reader ** * **** view ****** ******* ** multiple ***** **** *** accomodate * ***** ****** of ***-********** ****** *** hold ******* ** * man **** **** ** individual ***** ** ***** in **** *** *****.

* ** ******* ******* in *** ****** ****** that **** *** ***** way *** ******** *** opened ** ** ********** me **** **** ** an ********** ******.

***, **** ********!

* ** **** **** that ****** *********** **** be *** ****** ** access *******

* ** ****** ***** this. *****'* ********** * lot ** ******** ****** this *** **** ****** opposition ** **** ** technical ***** ** **** systems ****** *** ****.

** *** **** ** that ****** ****** (** devices *********) ** ******** access *********** **** ****** most ****** ** * decade, ***** *** **** ubiquity ** ******** ****** phones (** ******** ****** evolve ** ** * decade) *** **** ** eliminates *** ******* *** technical ****** ** ***** facial ***********. ********** ***** be *****, ******* *** us **** ** ***** from *** :)

* ** ******* ******* in *** ****** ****** that **** *** ***** way *** ******** *** opened ** ** ********** me **** **** ** an ********** ******.

*** ******** **** ** probably **** **** ********** than *** ******* ****, unless ******* *** ******** on ***** ******** ** a *** ******** *** door. :) ***:**** ********* ****** ******* Tutorial

********* **** *** ******* fingerprint *******. *** **** this ********...******* ******** ******** '****** a ******* ************' - BBC ****

******* *** **-***** ******** of:******* ********* **** **** Examined

****** *** *** ******. Will ***** ** *** on ****** ****? ** maybe * ***** ** face, ****** *** ****** for ****** ******* ******?

****** *** *** ****. We **** ********** ********* doing *** *** **** proceed. ****** ******* ***** this ****/******.

*** ***** *** ******** face *** ******* ***'** interested **?

*'* ******* ******** ** see ****'* *** *****, if ***** *** *** new ******* ** *** good **** **** ****** use ****** *** *** access *******. ********* ? Stonelock? **** **** ** there?

** **** ** ******* ZK **** *** ****** Hikvision *** *****'* ********* too. ********* ** * good **********. *'** ** checking ** **** ****** and ******* ***. ****** for *** ********!

*** *** **** ******* Identity *****?

** ** **** ** fake * ****** ***** on * ******?

[****:**** ************ - ******** Detection *********]

* ****** **** ******* with ** *********** **** I ******* **** ** the *******

Read this IPVM report for free.

This article is part of IPVM's 6,534 reports, 880 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Keypads For Access Control Tutorial on Jul 28, 2020
Keypad readers present huge risks to even the best access systems. If...
Door Fundamentals For Access Control Guide on Aug 24, 2020
Doors vary greatly in how difficult and costly it is to add electronic access...
Access Visitor Management Systems Guide on Jul 22, 2020
"Who are you, and why are you here?" Facilities that implement Visitor...
Mobile Access Control Usage Statistics 2020 on Sep 21, 2020
Most smartphones can be used as access control credentials, but how...
Favorite Access Control Credentials 2020 on Sep 15, 2020
Credential choice is more debated than ever, with hacking risk for 125kHz and...
Free Online NFPA, IBC, and ADA Codes and Standards 2020 on Sep 03, 2020
Finding applicable codes for security work can be a costly task, with printed...
Forced Door Alarms For Access Control Tutorial on Aug 17, 2020
One of the most important access control alarms is also often ignored....
Bias In Facial Recognition Varies By Country, NIST Report Shows on Jul 15, 2020
While many argue that face recognition is inherently racist, results from one...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
FLIR A Series Temperature Screening Cameras Tested on Jun 04, 2020
FLIR is one of the biggest names in thermal and one of the most conservative....
Risks Of Managing End User Passwords (Statistics) 2020 on Sep 11, 2020
Alarmingly, most integrators used spreadsheets to manage passwords, IPVM...
AHJ / Authority Having Jurisdiction Tutorial on Aug 06, 2020
One of the most powerful yet often underappreciated characters in all...
Exit Devices For Access Control Tutorial on Aug 25, 2020
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety...
Directory of 206 "Fever" Camera Suppliers on Aug 04, 2020
This directory provides a list of "Fever" scanning thermal camera providers...

Recent Reports

OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
The Future of Metalens For Video Surveillance Cameras - MIT / UMass / Immervision on Sep 25, 2020
Panoramic cameras using 'fisheye' lens have become commonplace in video...
Hikvision Sues Over Brazilian Airport Loss on Sep 24, 2020
Hikvision was excluded from a Brazilian airport project because it is owned...
China General Chamber of Commerce Calls Out US Politics on Sep 24, 2020
While US-China relations are at an all-time low, optimism about relations...
Verkada Disruptive Embedded Live Help on Sep 24, 2020
Call up your integrator? Have someone come by the next day? Verkada is...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Norway Council of Ethics Finds Hikvision Human Rights Abuses "Ongoing" on Sep 23, 2020
Hikvision's involvement in "serious human rights abuse" in Xinjiang is...
IPVM Camera Calculator User Manual / Guide on Sep 23, 2020
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The...
Installation Course Fall 2020 - Save $50 - Last Chance on Sep 22, 2020
This is a unique installation course in a market where little practical...
SimpliSafe Business Security Launched Examined on Sep 22, 2020
SimpliSafe has launched "SimpliSafe Business Security" that the company...
FLIR CEO: Many New Fever Entrants "Making Claims That The Science Just Won't Support" on Sep 22, 2020
FLIR's CEO joins a growing number calling out risks with fever / screening...
China Bems Temperature Measurement Terminal Tested on Sep 22, 2020
Guangzhou Bems (brand Benshi) is the manufacturer behind temperature...
Axis Exports To China Police Criticized By Amnesty International on Sep 21, 2020
Axis Communications and other EU surveillance providers are under fire from...
Milestone XProtect on AWS Tested on Sep 21, 2020
Milestone finally launched multiple cloud solutions in 2020, taking a...