Fingerprint Biometrics for Access Control

Fingerprint – the secure way to verify a person’s identity


Fingerprint biometrics is a convenient, secure, easy to use and accurate form of identity authentication.

Fingerprint Access Control is the most popular form of biometric technology because it is the most developed and cost effective of the biometric technologies. A fingerprint scanner captures the fingerprint image, and converts it into a mathematical representation of the fingerprint called a template. The fingerprint image is stored as a template and cannot be back-engineered to reproduce the original fingerprint image, thus protecting the user.

Tokens, passwords and PINs can be shared, compromised, lost or stolen while a fingerprint provides proof of identity and eliminates the cost and effort needed to administer, issue and replace lost and stolen keys, cards, PINs and tokens.

Biometric Enrolment – How it works

Biometric Fingerprint Enrolment Process

The enrolment of a user on the biometric fingerprint access control system is simple and secure.

Our range of biometric fingerprint readers and door controllers deliver cost effective identity authentication and access control solutions.

Fingerprint Access Control


Borer uses biometric technology and fingerprints to confirm a person’s identity before granting access. At each individual site, up to 5000 users can gain access by presenting their fingerprint alone. Additional users are required to enter a PIN or present an ID Card before presenting their finger. Users with more demanding security requirements can apply multiple checks including fingerprint plus identity card and/or PIN for proof of identity.

Biometric Fingerprint Access Control
  • Connector.

    Fully integrated solution

    Biometric fingerprint registration and authentication fully integrated into the access control system. The whole solution sits on a single database and communicate over a local or wide area network (LAN/WAN). This enables biometric finger print templates to be distributed to each door’s access reader over the LAN/WAN.

  • Connector.

    Reduction in the cost of ownership

    There is no ongoing requirement for consumer items such as proximity access cards, card printer ribbons, etc. There is little maintenance needed as all field devices are of solid state construction with no moving parts, not even relays.

  • Connector.

    Simple to manage

    Establish a set of security policies and set these up as rules so it is simple to manage the entire enterprise and all its sites from any workstation. Management of the system can be devolved to building managers.

  • Connector.

    Time limited access

    Short term contractors and visitors are accommodated by enrolling them on the system with time limited access and automatic expiry.

How the system works


  • Connector.

    Biometric Enrolment

    Fingerprint templates of employees, contractors or visitors are enrolled onto the Access Control system by placing a finger onto an enrolment reader. After three successful scans of the person’s biometric fingerprint template is generated, it is encrypted and saved in the system’s database or written to a smart card’s memory.

  • Connector.

    The Granting of Access Permissions

    The person is then given access rights according to the security clearance and work activities by allocating them to a temporary or permanent access group or access profile.

  • Connector.

    Access Authorisation and Fingerprint Template Distribution

    A summary of the person’s details including identity number, biometric template and access credentials are downloaded to the door controllers via the LAN.

  • Connector.

    Fingerprint Authentication and Granting Access

    To gain access a person, once enrolled, simply present their finger to the door access biometric reader. Once their credentials and access authorisation have been checked and passed they will be given access.

  • Connector.

    Access Reports and Audit Trails

    The system maintains an audit trail of all access events and attempts which can be displayed in real time and also logged to the database for future referral.

Technical
  • Sensor technology: High-performance optical sensor (500 dpi) with false acceptance rate (FAR) up to 10-8
  • Fingerprint technology: Compliance with ISO SC37 197994-2, ANSI/INCITS 378
  • Smartcard technology: MIFARE® DESFire® (13.56mHz) ISO 14443A and 7816-4 standard cards/tokens
  • Read range: Up to 80mm for MIFARE® and 40mm for MIFARE® DESFire®
  • Network connections: Controller Area Network (CAN), ISO 11898 standard for serial data communications
  • Data retention without power: 10 years
  • Cable type: CAT5e/6 Cable, max. cable length 300m from Midspan Bridge
  • Operating temperature range: -25 to 60 C (-13 to 140 F)
  • Power supply: 220mA quiescent, 300mA @ 12 Volts DC
  • Dimensions/weight: 130mm x 81mm x 43mm / 240g
  • Installation range: Potted with rubber compound suitable for indoor installation

MIFARE® and MIFARE® DESFire® are registered trademarks of NXP B.V. and are used under license. Borer Data Systems retains the rights to make changes to these specifications at any time, without notice.