Results 1 to 2 of 2

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

  1. #1
    Senior Member jp_48504's Avatar
    Join Date
    Apr 2005
    Location
    NC
    Posts
    19,168

    Acceptance and Accuracy in Biometrics North Carolina

    Acceptance and Accuracy in Biometrics North Carolina
    User acceptance of the access control device is one of the most critical factors in the success of a biometric-based implementation.


    Konnects-The Place for Professional Networking
    Acceptance and Accuracy in Biometrics
    provided by:

    Q: More biometric access control products than ever seem to be coming to market. What should installers and integrators look for as far as technical specifications or standards accompanying these particular devices?

    A: Selecting the appropriate biometric access control technology depends on a number of application-specific factors, including the environment in which the identity verification process is carried out, the user profile, accuracy requirements and overall system cost.

    User acceptance of the access control device is one of the most critical factors in the success of a biometric-based implementation. Part of this issue is common to the implementation of any security. However, some biometric technology adds an additional dimension of physical contact and/or interaction with a reader or terminal which some people could perceive as annoying.

    Acceptance also is an issue for those who will be managing the system. Ease of enrolling users, reliability of the readers and the ease of template management are critical since the end-user is not necessarily your client. The end-user is probably a customer of your client.

    Accuracy is vital to the acceptance of the biometric chosen. False positives, a.k.a. False Accept Rate (FAR), and false negatives, False Rejection Rate (FRR), occur as the biometric system inputs the biometric signature of the user and attempts to compare it to a template which is either stored in the terminal or resides in a network-connected database. These numbers represent a statistical probability that one of these will occur, and the ratio is a parameter set by the designer of the algorithm. FAR ranges from .0001 to 0.1 percent. FRRs vary from .00066 to 1.0 percent.

    Setting the system to produce a very low rate of false acceptance usually causes a higher rate of false rejects. The application determines the acceptable levels of false accepts and false rejects. Since it is virtually impossible to individually verify these stats, it is best to stick to reliable known manufacturers who adhere to recognized industry standards.

    Different types of biometric technologies on the market include:

    Hand geometry—This biometric unit evaluates a three-dimensional image of the four fingers and part of the hand. It was the technology used for the very first commercially available biometric device, which came to market in 1976.

    Fingerprint—Law enforcement agencies have used fingerprints for decades to identify individuals, but comparing the fingerprinting techniques employed by law enforcement with a biometric finger scanner may not be valid because the biometric scanner looks at only one finger and the number of sampling points on a fingerprint varies.

    Face—The shape of the face, determined by distances between the eyes, ears and nose and other characteristics are put into a template. When scanned, the image is matched against the template to verify a person's identity. It has the advantages of not requiring individual contact with a terminal and it can be used to screen individuals within a group, perhaps gearing it up to be considered a valuable anti-terrorism tool.

    Iris—Eye scanners typically store 247 traits of a person's iris into a template. Proponents believe the technique is more specific than fingerprinting.

    Another emerging biometric technique incorporates a finger-scanner onto an access credential. The credential becomes enabled when the authorized individual holds the credential and presents it to the card reader.

    The Security Industry Association offers a newsletter on smart cards and biometrics which keeps readers up to date on the technology and emerging standards. Go to http://go.reachmail.biz/sia/default.asp.

    Tim O'Leary is a 35-year veteran of the security industry. He has been a security consultant since 1986 and an independent security company owner/operator and product researcher.
    author: By Tim O'Leary

    Local Companies

    Cognos Business Intelligence Tools
    Single Web-based interface makes Cognos 8 BI easy to learn & use.
    www.Cognos.com
    Business Intelligence
    Get Better Business Outcomes with HP Business Intelligence Solutions.
    www.hp.com

    Brinks Security
    888-202-3672
    A Global Leader In Business & Security Services
    Call Now For $100 Off Connection Fee!

    CozyRoc LLC
    (800) 609-1445
    3426 Atlantic Ave
    Raleigh, NC

    Mark Champion
    336-749-8468
    4703 Bisbee Drive
    Greensboro, NC

    TEK-COLLECT
    866.652.6500 EXT 537
    NEWEST CHARLOTTE LOCATIONS
    CONCORD, NC

    Highland Computers
    866.406.9239
    9373 Meadowmont View Dr
    Charlotte, NC

    StreamLogic Inc.
    704-771-1090
    3030 Glen Summit Dr.
    Charlotte, NC

    USAT Corp.
    919-942-4214
    104 South Estes Drive, Stes. 202-205
    Chapel Hill, NC

    Vanguard Vista
    919-859-4001
    1100 Crescent Green
    Cary, NC

    Skylink Systems
    (704) 708-5106
    420 Belvedere Ln
    Waxhaw, NC

    Security Solutions Inc
    (910) 425-2736
    3531 Gillespie St
    Fayetteville, NC

    Saffer Security Systems Inc
    (82 264-1602
    243 Jefferson Rd
    Boone, NC


    http://articles.directorym.net/Acceptan ... olina.html
    I stay current on Americans for Legal Immigration PAC's fight to Secure Our Border and Send Illegals Home via E-mail Alerts (CLICK HERE TO SIGN UP)

  2. #2
    Senior Member Rockfish's Avatar
    Join Date
    Jun 2005
    Location
    From FLA to GA as of 04/01/07
    Posts
    6,640
    Thanks for this, JP!
    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •