Fingerprint Biometrics for Access Control

Fingerprint – the secure way to verify a person’s identity

Fingerprint biometrics is a convenient, secure, easy to use and accurate form of identity authentication.

Fingerprint Access Control is the most popular form of biometric identification because it is the most developed and cost effective of the biometric technologies. A fingerprint scanner captures the fingerprint image, and converts it into a mathematical representation of the fingerprint called a template. The fingerprint image is stored as a template and cannot be back-engineered to reproduce the original fingerprint image, thus protecting the user.

Tokens, passwords and PINs can be shared, compromised, lost or stolen, while a fingerprint provides proof of identity and eliminates the cost and effort needed to administer, issue and replace lost and stolen keys, cards, PINs and tokens.

Biometric Enrolment – How it works

Biometric Fingerprint Enrolment Process

The enrolment of a user on the biometric fingerprint access control system is simple and secure.

Our range of biometric fingerprint readers and door controllers deliver cost effective identity authentication and access control solutions.

Fingerprint Access Control

Borer uses biometric technology and fingerprints to confirm a person’s identity before granting access. At each individual site, up to 5000 users can gain access by presenting their fingerprint alone. Additional users are required to enter a PIN or present an ID Card before presenting their finger. Users with more demanding security requirements can apply multiple checks including fingerprint plus identity card and/or PIN for proof of identity.

Biometric Fingerprint Access Control
  • Fully integrated solution

    Biometric fingerprint registration and authentication fully integrated into the access control system. The whole solution sits on a single database and communicate over a local or wide area network (LAN/WAN). This enables biometric finger print templates to be distributed to each door’s access reader over the LAN/WAN.

  • Reduction in the cost of ownership

    There is no ongoing requirement for consumer items such as proximity access cards, card printer ribbons, etc. There is little maintenance needed as all field devices are of solid state construction with no moving parts, not even relays.

  • Simple to manage

    Establish a set of security policies and set these up as rules so it is simple to manage the entire enterprise and all its sites from any workstation. Management of the system can be devolved to building managers.

  • Time limited access

    Short term contractors and visitors are accommodated by enrolling them on the system with time limited access and automatic expiry.

"Performance of biometric systems is dependent on the quality of the acquired input samples. Presenting the matcher with good quality fingerprint images will result in high matcher performance." ~ NIST (National Institute of Standards and Technology)

"As biometric template data is stored as a series of 1s and 0s no reference to the individual can be obtained from the data. " ~ British Security Industry Association

    How the system works

    • Biometric Enrolment

      Fingerprint templates of employees, contractors or visitors are enrolled onto the Access Control system by placing a finger onto an enrolment reader. After three successful scans of the person’s biometric fingerprint template is generated, it is encrypted and saved in the system’s database or written to a smart card’s memory.

    • The Granting of Access Permissions

      The person is then given access rights according to the security clearance and work activities by allocating them to a temporary or permanent access group or access profile.

    • Access Authorisation and Fingerprint Template Distribution

      A summary of the person’s details including identity number, biometric template and access credentials are downloaded to the door controllers via the LAN.

    • Fingerprint Authentication and Granting Access

      To gain access a person, once enrolled, simply present their finger to the door access biometric reader. Once their credentials and access authorisation have been checked and passed they will be given access.

    • Access Reports and Audit Trails

      The system maintains an audit trail of all access events and attempts which can be displayed in real time and also logged to the database for future referral.

    Levels of Identity and Authentication

    Biometric Fingerprint only
      • small to medium sized businesses - suitable for applications with fewer than 5,000 people, the biometric fingerprint template is held at the reader
      • simple solution - no hassle and costs associated with card systems, no codes to remember, no lost or stolen cards or tokens
      • high level of security - more secure and higher proof of identity than card only solutions
      • scalable and flexiblemore than 5,000 people can be accommodated when biometric is used together with a token or pin

      The process for finding a match for a person’s fingerprint in a database of many fingerprints is best undertaken at the point of validation because the validation process uses complex algorithms and takes time. The bigger the fingerprint database the more time required. There can be long delays when this is undertaken by central computer with more than one fingerprint reader connected to it.

      When the matching is done at the point of access, delays can occur if the fingerprint template database it too big. We are able to hold up to 64,000 templates on the reader’s database but we limit the number of the people who can participate in one to many matching (only need their finger to gain access) to 10,000 people. 

      Biometric Fingerprint and Card/PIN
      • large organisations - suitable for applications where the number of templates a reader must hold in its database exceeds its memory capacity
      • multi-factor authentication - biometric card or pin code references a specific biometric fingerprint template in the database, which must then match the user’s fingerprint
      • high level of security - card or pin is backed up by user’s fingerprint preventing user’s card being used by another person to gain entry
      • scalable, multi-site secure access control - control a few doors or a very large network of connected devices spanning many sites

      When more than 10,000 people need to be accommodated, then up to 10,000 people can use fingerprint only and the additional individuals will require a card, token or PIN to identify themselves. This enables the reader to provide the speed and convenience of fingerprint only solution (one to many match) for frequent users, while supporting a much bigger user population using a card, token or PIN to identify the relevant fingerprint template for a one-to-one match without impacting system performance.

      Biometric Fingerprint on Card
      • large organisations - suitable for applications with more than 5,000 people where multi-factor authentication and proof of identity is critical
      • dual verification - cardholder’s biometric credentials are encrypted and written to the card’s secure memory

      • very high level of security - user’s fingerprint is stored on the card as a template (similar to a card number), so the user’s fingerprint cannot be stolen – the card is backed up by cardholder’s fingerprint at access point, which needs to match the biometric record on the card

      In applications that require very high levels of security and the confidence of full user authentication, this is delivered by writing the cardholder’s Biometric template to a smart cards memory. This solution delivers a high level of security and confidence with proof of identity and multi-factor authentication.

      With Biometric fingerprint on card there is no practical limit to the number of cardholders that can be accommodated, as the person’s identity is cross-checked with their credentials which are written encrypted to the cards memory. In applications with a large mobile workforce, such as port or utility provider applications, the persons credentials travel with the person, thus eliminating network dependence and transmitting data from one site to another with its associated risks.