Fingerprints for Access Control Guide

By Brian Rhodes, Published Sep 09, 2019, 11:00am EDT

Users can lose badges, but they never misplace a finger, right?

The most common biometric used in access are fingerprints, and it has become one of the most trusted credentials used for access.

However, the biometric has limitations, often is more costly, and is not typically used as the only credential in access.

In this guide, we examine the biggest considerations and factors for using fingerprints:

  • The four factors that matter to fingerprint use
  • Fingerprint reader Pros vs. Cons
  • Why fingerprints do not typically replace other credentials
  • Fingerprint readers typically cost more
  • The three common fingerprint sensors used in access
  • Why Scanning time varies
  • Which specific environments are ideal for fingerprints
  • Which tough environments are not a good match
  • Fingerprint readers advantages over mobile access

Fingerprint *********** ********

******** ***** ** ******** biometrics, ********* ************, **** as:

  • ****** ****: *********** ******* ********* cost **** ******** ** 'simple' ********* *********** ********** type *******.
  • ******** *********** ******: ** **** *****, fingerprints *** *** ******** enough ** ** **** as *** **** **********, and **** ** ****** with * ********* *** or **** **********.
  • ******** ****: ******** ** *** instant, *** ***** ****. More ******** ***** **** more ****, *** ******* in ***** ********* *** take **** ********** ******* compared ** *********** ***********.
  • ****** ***********:*** *** ******* *** rated *** *** ** harsh *******, ***** ************, or ***** **** ****** for ******* ** ****** impact ***********.

** *** ******** *****, we ******* *** **** and **** ** ************ where *********** ******* **** sense.

Advantages ************

********** ** *********** ******* have *** ***** ** some ****** ************:

  • *********** ****** *********: ******* do *** *** **** or ******.
  • **** ******** ************ ********: Because ************ *** *** general ******, **** ***** match ******** ***** ** credentials.
  • ***** ******* ********: *** of *** ******* ******** with ******** ****** ** sharing ***********. ************ ******* mitigate *** ****.

Downsides ************

** *** ***** ****, if *** ******* ****** for ******** **** ** convenience (**: "* ** longer **** ** ***** a ****"), *********** ******* frequently *** **** *********** due ** *********** ********** or ***** **** *** not ******** ******** ****** deployment.

**** ** ***** ***:

  • **** ************* & ********: Whether ********* ** ***, users ***** ***** ** are ********* *** ******** and ****** *********** **** is ****** *** ****.
  • **** ***********: *** *** openings *** ****** *** fingerprint *****. ******* **** and ******* ******** *** classic ****** ******** *** fingerprints.
  • ******** & ********* *********: What ******* **** ******* are ***, ******, ** users ***? ****** ************* often **** ************ **** one *** *** *** the ****.
  • ** **** ******* ***: Plastic ****** ***** *** used ** ********* ******* ID *****, *** *********** access **** *** *** them ** ***.
  • **** **** ********** *** Distinctive: ******* **** ************ are *** ***** *******, but **** ****** ******, the *********** ** **** uniqueness ****** *** *** be ***** *** ** only * *** ****** are *******.

Other *********** ***** ***** ******

******* ****** ******* ******, and ******* ** ******** fluctuations ** ******* *** the ***** ****, ********** fingerprint ***** ****** ****** take *****.

*** **** ****** ********** is **** **** **** of ****** ********** ** used, ** *********** ******* are ********* ******** *******-****** ****** ********** ***** ***** ************* options.

********** ** ************ ******, no *********** ****** ** accurate ***% ** *** time. ***** *** '***** positive' ****, ** ********** granting ****** ** ** unrecognized ******, ** *** there ** ********* *** frustrating '***** ********' *****, or ********** ******** * previously ********** ******. ** many *****, * ***** redundant ****** *** ** card *** ** **** instead.

*** ****** ***** ** one ******* ** * 'three ******' ******, *** products ********** *** ** five ******* *** ******:

***** ******** ******* ** often ******, **** ******** both ****** *** ********** management *****.

******** ******* **** *** useful *** ****-******** *********, where *** ***** ************ tightens ****** ** **** certain ******, *** **** specific *****.

*** **** *********** ************, not **** ** * valid **** ** *** required, *** ********* '*****' that *** *** *** person ****** **** ** also *****-******* *** *********** scan.

Fingerprint ******* **** ****

*** ******** ** **** for * *********** ******* is ~** ** *** more ********* **** ** equivalent *********** ******.

**** *** ******* *** (~$700) *** ****** ***** compared ** * (~$***) HID ****** ** ***, a ********** ** ***** 4.5X.

** ***** *****, **** expensive *********** ******* **** ZK ****'* ****** ****** cost ~$***, *** *******'* Bioentry * ****** **** ~$500. ** *******, **** these **** ****** *********** units *** **** ********* than ******* *********** **** readers.

*******, *****-****** ****** *** be ****** ******** *******, have **** ********** ******* some ****** ****** ****** (i.e., ****** *** ****** but ***** ******* *** more *********), *** ***** Wiegand **** (*** ******** high-security ****).

**** **** ******** *** additional ***** ** ********** cards (******* $* - $8 ****), *** *********** option *** ** ************* less *********.

Three ****** ****** *********** *******

*** ****** ***** **** in ****** ****** *** the ***** **** ** general ******** *******. *** three ***** **** ******* to ****** ***:

  • ******* / *******
  • ***********
  • **********

Optical / *******

**** *********** ****** ******* use ******* ** ******* sensors. ** *******, ******* sensors *** **** ******, although *********** *** ****** are ****** *** ****.

**** ***** ** ****** often ***** **** **** other ****** *****, *** scans * ****** ** a ***-****** *****, ******* it **** ****** ******** by ***** **** *** surface **** ** *******.

**** ***** ***** ***** finger ** *** ******, the ****** ******** ** 'image' ** *** ******, which ** **** ** a ********* *** ********** to * ******* ** images. *** *** ****** of **** ******* ******* in ****** **** ******** reads, *** ******** *** sensor ****** ** ****** protected **** ***** *******.

** *******, *** ****** is **** ** * time *** **** ** placed ** ******* **** the ******. ******* ****** from $*** ** **** than $*,*** *** ***** units.

***********

*** ** *** ******* issues **** **** *********** readers ** **** ********** is *** *** **** on ****** ** **** at * ****, *********** becoming * *** ********** for **** ****** ********.

*********** ******* ******** ***** this *****, ***** ******* multiple ******* '** *** fly' ******* ***** **** breaking ******.

*******, * *** ******** to ***** ******* ** cost, **** ******** ***** starting ** ~$*,*** *** stand ******** **** ********** models ******* ~$**,*** ** more.

**********

**** **** ********* **** of ****** ***** ** less *****, **** *****, and ** ****** **** in ******** ***** ********** devices *** ** **** common *** ********** ****** readers.

** ********** ************ **** contact **** *** *****, the ********** ******** ** a *********** **** ******* with *** ***** *** register * ****** '***********'. While ********** ** ** individual *********** ** ****, the ****** ** **** sensitive ** ******* ** the *****, *** **** materials ** ****** ** hand-lotion ***** ** ********* with ********** *****.

** *******, ********** ****** models ***** ** ~$** each *** *** ***** limited ** *** ******* they **** ****** ** how **** ****** **** can **** *** ******.

Scanning **** ******

*********** ******* **** ********** prints ** * ***** number ** ********* ('******') and **** ***** *** characteristics ** ***** ********** sampled ****** ** ********* to ******* ********** ****** scans. '*********** *******' ** identity ************* *** **** when ********** **** **** points ***** ** **** templates, *** *** ********* do *** ******* '***** print' *******.

*** ****** *** *********** scan **** *****, *** more ********** **** ** required ** ***** ***********. Because *** ***** ** biometric ************* ** ****** a '****' *** ********* it ******* * '*****' library ** ******* (** even **** * **** record ******* ** * card), *** ****** ** time * **** ***** to ******** ***** ***.

*** ********** **** ** often *** *********** *** less **** *** *******, but ******* ***** ********* tends ** ** **** shorter **** * **** is ******** ** * locked ****, *********** ******* in **** ** **** environments, ******** ** *** near-instantaneous ******* ** ******* and ********* * ********** card.

Environmental ***********

*** **** ** *** readers ********** ******* ********** from ******* *******, ************ themselves ******* ******* ***********.

************* **** ***** *****, cuts *** ******* ** finger ****, *** *** age ** *** ****** bearer *** ****** ** how ****** *** ********** the ***** ** ****. Likewise, ******* ********* ** wet ** ***** ************ face ********* ********.

***** **** ****** *********** factors, ***** *** '********' considerations ** ****. *** example, ******** *********** **** gloves **** ** ** removed ** ***** ** read * *****. ***** a ***** *************, **** used ** **** ** sterile ************ ****** ***** to ****** ****** ****** entry ** * ********* problem.

** ********, ****** ******** a ******* ***** *** susceptible ** ******* ****, moisture, *** ******* **** to ****** **** ** the ******* ** ************, and **** ********* ***** readers *** ********* ** 'potted' ********* **** ** not *** *********** **** while ****** **** ********* to ***** *******.

Most ****** *********** ************

***** *** ******* ************** for *********** *******, ******* use ** ***** *** compared ** **** *** fob *******.

** **** *****, *********** readers *** **** **** for ****** ****, ****** openings **** ******* ** individual ***** **** **** a ***** ********** ** many ***** ******* ****** at **** *** **** are ********* **** *******.

*** **** ********** ********, traditional *********** *** *** a ***** ********* ** users, *** ***** ** weak ************* ** '*** something **** ** *** broken' ***** *** **** relative **** ** *********** readers.

******* ************ *** ******* alike *** ******* ** environmental *******, **** ********* are **** ** '**** security' ****** ************ ***** 'multi-factor' *********** *** *********.

Special ************

*******, ************* ***** ** fingerprints **** ****** ** new ************ *** *** equipment. ***** *** '********' applications ** **** *****:

  • ******* ****** / ***:******* *****-** ***** ** fingerprints, ********* *** *** and *********** ******* ******* of ******** ***** ********.
  • ********* **********: ** ***** ** retrieve ********, * **** must **** * *********** that ******* *** '******** to ****-** ********' ****. This ******** ** ********** important ***** ******* ** children ** * *********** legal ***** *** **** people.
  • ****-******* *******: *** *********** ** are ******** **** ******* access ** **** *** and **** ** ********* based ** *********** **.

Fingerprints **. ****** ******

*** ****** ************ **** high ******** *** **********, like ************, *** ****** where ***** ******* ***** cards **** ***********.

** *******, ** ***** are ***** ***** ****** for ******, ****** ******* do *** ******* ************ too. *** *******, ** our ************ ****** ********, **** ** *** readers ** ****** ******** fingerprints ** **** *** the ****** ** ** fingerprint *******.

*******, ** **** *****, the ************ *** **** together ** *********** ***** include * *********** ********* unlock.

*** **** ********* ** mobile ****** ****** ** users ****** *********** *******, while *********** ******* ******* no ******.

*** ****-******** *********** ***** user ****** *** ********** or ***** *********** ****** credentials **** * ****** risk ** ***** ******/******, fingerprint ******* (********** **** in *********** ************** ***********) are **** ******.

[****: **** ***** *** initially ******* ** ****, and ************* *******/******* ** 2019.]

Comments (15)

**** *** **** ** technology ****** ****,fingerprint ******* **** *** ** ** * **** ********** ***** ***** ****** vs traditional readers/keypad.

****** *** **** *********** really ** *** *******/****** security ******* ****** **** for *******/**** ****** ********* that *** ***** ****** in ***** *** ** read **** *** ******* errors. * ***** ** not **** ** ****** access ** ** **** that ****** ***** **** to **** ** ******** their ****** *** **** would *** **** ** mix ***** ******** ***** for *** ** *** company's ******** *******.

* ** **** **** that ****** *********** **** be *** ****** ** access *******. ** *** be * ********** ** reader ** * **** view ****** ******* ** multiple ***** **** *** accomodate * ***** ****** of ***-********** ****** *** hold ******* ** * man **** **** ** individual ***** ** ***** in **** *** *****.

* ** ******* ******* in *** ****** ****** that **** *** ***** way *** ******** *** opened ** ** ********** me **** **** ** an ********** ******.

***, **** ********!

* ** **** **** that ****** *********** **** be *** ****** ** access *******

* ** ****** ***** this. *****'* ********** * lot ** ******** ****** this *** **** ****** opposition ** **** ** technical ***** ** **** systems ****** *** ****.

** *** **** ** that ****** ****** (** devices *********) ** ******** access *********** **** ****** most ****** ** * decade, ***** *** **** ubiquity ** ******** ****** phones (** ******** ****** evolve ** ** * decade) *** **** ** eliminates *** ******* *** technical ****** ** ***** facial ***********. ********** ***** be *****, ******* *** us **** ** ***** from *** :)

* ** ******* ******* in *** ****** ****** that **** *** ***** way *** ******** *** opened ** ** ********** me **** **** ** an ********** ******.

*** ******** **** ** probably **** **** ********** than *** ******* ****, unless ******* *** ******** on ***** ******** ** a *** ******** *** door. :) ***:**** ********* ****** ******* Tutorial

********* **** *** ******* fingerprint *******. *** **** this ********...******* ******** ******** '****** a ******* ************' - BBC ****

******* *** **-***** ******** of:******* ********* **** **** Examined

****** *** *** ******. Will ***** ** *** on ****** ****? ** maybe * ***** ** face, ****** *** ****** for ****** ******* ******?

****** *** *** ****. We **** ********** ********* doing *** *** **** proceed. ****** ******* ***** this ****/******.

*** ***** *** ******** face *** ******* ***'** interested **?

*'* ******* ******** ** see ****'* *** *****, if ***** *** *** new ******* ** *** good **** **** ****** use ****** *** *** access *******. ********* ? Stonelock? **** **** ** there?

** **** ** ******* ZK **** *** ****** Hikvision *** *****'* ********* too. ********* ** * good **********. *'** ** checking ** **** ****** and ******* ***. ****** for *** ********!

*** *** **** ******* Identity *****?

** ** **** ** fake * ****** ***** on * ******?

[****:**** ************ - ******** Detection *********]

* ****** **** ******* with ** *********** **** I ******* **** ** the *******

**** ** **** *** limitations ** ***** ************ access.

** *** ******* ************ reader ** ****** ******. is ** ******** **** someone ***** **** ***** smartphone's ****** ***** ******* with * ********** ********* reader ** **** ******? With ******* ***** ****** a *** ** ****** are *** ******* ** touch * ******* ***** other ****** *** ********.

** ** ******** **** someone ***** **** ***** smartphone's ****** ***** ******* with * ********** ********* reader ** **** ******?

***, ** **** ****** access ******* ** ********** to **** '****' ****** details **** * *********** is ****. *******, *** phone ****** **** ** able ** *******.

*** *******, ** ***** is *** (** ******) equipped **** * *********** reader ** ***** ***** 'biometric' ** ** ****, it **** *** **** fingerprints.

Read this IPVM report for free.

This article is part of IPVM's 6,728 reports, 907 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now
Loading Related Reports