Fingerprint Readers & Scanners
Fingerprint Biometric Solutions
Biometric technology compares employees unique physical bio-metric details (like fingerprint, palm, face etc) to identify them, for the purpose of physical and logical access control, time and attendance systems and government criminal and record checks. There are many types of bio-metric technology available for companies to consider. The most mature technology is fingerprint reader systems; with two decades of developments and refinements to the technology.
Bio-metrics is the most secure and easy to use verification and authentication method. It can’t be borrowed, stolen, or lost. While methods do exist to spoof bio-metric readers, including fingerprint readers (Google “How to make a fake fingerprint“), the technology is aware of this and algorithms and systems have been developed which can detect fake fingerprints.
Would you like to start saving money today?
Fingerprint Verification and Recognition.
A fingerprint is the twirls, swirls and whirls on the tips of all your fingers. One of the reasons fingerprint biometric technology is the most mature technology available for biometric identification and verification, is that there are many different methods to approach fingerprint verification and recognition, and over the last 15+ years, this technology has been refined to where it is today. The most common method is the matching of various minutiae points which appear on your fingers, which are unique to every individual.
How fingerprint matching works
Fingerprint reader systems convert the actual image of a fingerprint into an electronic template.
The purpose of this is generally for registration, using a USB fingerprint scanner, or for identification and verification. The fingerprint reader or scanner uses an advanced image sensor to capture high resolution fingerprint images, with an exceptional contrast. These images are almost completely undistorted.
Using patented algorithms, the unique features of this image are turned into a digital constellation, and stored as a fingerprint template, unique to a specific user, and stored on the reader or in a software database.
Some users express privacy concerns regarding their fingerprint being stored in a database: the actual fingerprint image is never stored, and cannot be be reverse engineered from the fingerprint template or constellation.
When the fingerprint is placed on the fingerprint reader or USB-scanner again, these unique features are used for verification or identification.
Verification is the 1:1 matching process, where a user’s biometric information is compared to previously enrolled information. This process is normally used in conjuction with other identifying information, like a user ID, name or ID number.
Identification is the 1:N (one to many) matching process, where the user’s biometric information compared to the entire database of available templates, to identify the user in a physical access control system (turnstile, door, vehicle barriers), logical access control system (access to a server/PC/console or SSO solutions), or time and attendance systems.
There are four major brands in Southern Africa regarding fingerprint reader technology.
Blake Consultants is a product-independant company. What this means is, we work with our customers and partners to identify the best and right solution, considering every aspect of your project, all the while endeavouring to exceed your expectations and deliver only excellence.