Unlike keys, electronic swipe cards, proximity cards, chip and pin cards, or keypad number sequences, access through a biometric reader cannot be transferred from person to person unless explicitly authorized, it is unique, which is what makes biometric readers and biometric technology more secure.
From major government applications to commercial buildings, our biometric readers & biometric systems provide the ultimate in security, reliability and convenience. While perfect for applications large and small, their low error rates translate into incredible reliability. High volume, high throughput environments cannot tolerate errors, so the value of handreaders increases as the population grows.
The authorized person must subsequently provide the same physical characteristic, for example, their hand, to be read and recognized by the biometric reader before access is granted.
A fingerprint is made of a a number of ridges and valleys on the surface of the finger. Ridges are the upper skin layer segments of the finger and valleys are the lower segments. The ridges form so-called minutia points: ridge endings (where a ridge end) and ridge bifurcations (where a ridge splits in two). Many types of minutiae exist, including dots (very small ridges), islands (ridges slightly longer than dots, occupying a middle space between two temporarily divergent ridges), ponds or lakes (empty spaces between two temporarily divergent ridges), spurs (a notch protruding from a ridge), bridges (small ridges joining two longer adjacent ridges), and crossovers (two ridges which cross each other).
The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. There are five basic fingerprint patterns: arch, tented arch, left loop, right loop and whorl. Loops make up 60% of all fingerprints, whorls account for 30%, and arches for 10%.
Fingerprints are usually considered to be unique, with no two fingers having the exact same dermal ridge characteristics.
The main technologies used to capture the fingerprint image with sufficient detail are optical, silicon, and ultrasound.
There are two main algorithm families to recognize fingerprints:
Minutia matching compares specific details within the fingerprint ridges. At registration or enrollment, the minutia points are located, together with their relative positions to each other and their directions. At the matching stage, the fingerprint image is processed to extract its minutia points, which are then compared with the registered template. Pattern matching compares the overall characteristics of the fingerprints, not only individual points. Fingerprint characteristics can include sub-areas of certain interest including ridge thickness, curvature, or density. During enrollment, small sections of the fingerprint and their relative distances are extracted from the fingerprint. Areas of interest are the area around a minutia point, areas with low curvature radius, and areas with unusual combinations of ridges.
Any of our systems can operate as a complete stand alone access control station. Door lock operation and alarm monitoring of the door status is provided. An external alarm circuit is included for operating an audio or visual alarm.
Systems can be networked together using Windows software to accommodate larger applications.
Third Party System Interface
Our systems can easily be integrated into new or existing third party access control systems using an integrated interface. All Weigand, proximity and mag stripe formats can be accommodated, without modifications to the third party system.