The accuracy of biometrics depends on each biometric’s “degrees of freedom”

Facial and body behavior analytics can identify people “without interfering
with the pace of life”

Biometrics companies throughout the security marketplace are expanding the functionality of their systems for a variety of uses. This article will take a look at what several companies are up to.

SRI International’s identity solutions seek to bring convenience, speed and security to existing workflows. SRI’s Iris on the Move (IOM) biometric systems can add the value of knowing precisely “who” to an organisation’s specific applications – from physical access control and workforce management to logical access to digital content – without altering typical user behaviour or existing workflows. The multimodal systems are deployed globally in a wide variety of environments, including government facilities, corporate and college campuses, construction sites, and mission-critical data centers.

SRI’s IOM biometric solutions deliver the accuracy of iris recognition to many form factors. The systems meet the growing demand for seamless and convenient authentication in markets such as security, transportation and healthcare, according to the company.

Non-invasive biometric identification

FST Biometrics provides identity management solutions that deliver a high level of security “without interfering with the pace of life.” FST Biometrics’ In Motion Identification (IMID) technology uses a fusion of facial recognition and body behaviour analytics to deliver accurate, non-invasive biometric identification of authorised users to facilitate seamless access to entry points.  

Implementing FST Biometrics’ IMID system is not significantly more complicated than a card-based system, according to the company. Both types of systems require equipment to be installed and users to be registered. IMID says it is considerably more accurate than traditional systems, with a standard margin of error of three false accepts per 10,000 entries. The threshold can be adjusted to be more stringent depending on client needs.


HID Global biometric solutions feature liveness detection capabilities that ensure proof of presence by preventing the use of fake fingerprints
HID Global's biometric solutions are used in a variety of applications, including
accessing ATMs, securing access to controlled medicines and medical
records, and securing borders

HID Global’s biometric authentication makes it possible to know with certainty who is performing a transaction. Biometrics is the only authentication factor that can be directly coupled with a person’s unique physical identity and unequivocally validates it, according to the company. HID Biometrics offers this certainty along with greater security and convenience, and no additional complexity for the user. The company’s solutions are used worldwide in a variety of applications, including accessing ATMs, securing access to controlled medicines and medical records, and securing borders. Solutions include sensors and modules that use the company’s patented multispectral imaging technology that improves reliability, performance and security by using multiple sources and types of light. Advanced polarisation techniques extract additional, unique fingerprint characteristics from both the surface and subsurface of the skin. Solutions also feature liveness detection capabilities that ensure proof of presence by preventing the use of fake fingerprints or “spoofs.”

Readers, panels and portable scanners

ZKTeco designs and manufactures a variety of biometric readers and panels, distributed through a global network of resellers. Complementing an RFID product line, ZKTeco’s biometrics product lines consists of 1) stand-alone indoor and outdoor fingerprint readers; 2) access control panels that can store and match fingerprint templates on the panel itself; 3) non-intelligent slave fingerprint readers that merely forward fingerprints to the panel for subsequent matching and door-unlock decisions; and 4) two multi-biometric stand-alone readers— one recognises face and fingerprint, and the other recognises finger-vein and fingerprint. Most models can either be connected directly to a door lock (stand-alone) or they can be connected to a ZKTeco panel (or any third party access control panel) via Wiegand protocol.

Zwipe’s core technology of a low-power, biometric algorithm enables the company to incorporate its product into several form factors, including credentials, credit cards and wearables. Zwipe has taken global leadership in creating unique, low-energy, biometric algorithms, powered by internal battery or by advanced radio frequency energy harvesting technology. Without the need of a battery on board, the product can be implemented in products that previously would not have been able to have a biometric element.


The biometric template data for a Zwipe Access card owner only resides on the Zwipe device, not some external system database that can be hacked into
Zwipe’s portable access control device provides the benefits of biometrics
without needing to change out existing door readers

Zwipe’s access control product is essentially a small, portable biometric scanner that can fit in your pocket. The device provides the benefits of biometrics without needing to change out existing door readers, which saves the customer installation and integration cost that is usually more than the cost of the new reader. The only change is replacing the user’s current credential with the Zwipe Access card.

Zwipe’s ability to utilise the energy from the RF field, be it from POS terminals or any NFC/ISO14443 reader to conduct authentication directly on the batteryless device, has expanded its market reach. Plus, the biometric template data for that card owner only resides on the Zwipe device, not some external system database that can be hacked into or a wall-mounted reader that has hundreds of templates that can be stolen.

Higher “degrees of freedom”, better biometrics

The accuracy of biometrics depends on each biometric’s “degrees of freedom,” says Hoyos Labs. For example, the voice has 5 degrees of freedom; the face provides 20 degrees of freedom, while one fingerprint can provide 30 degrees of freedom. At the higher end of the spectrum, an iris scan can provide 245 degrees of freedom, enabling identification of one person among 10 million. Combining biometrics measures adds to the scope of accuracy. Scanning two eyes provides an iris scan accuracy of more people than the population of the planet. Hoyos Labs has a system that scans four fingerprints to provide 150 degrees of freedom. “The higher the degrees of freedom, the better the biometric,” says Hector Hoyos, CEO of Hoyos Labs, which provides software to enable every major biometric – face, iris, voice and fingerprint – to be captured with a smart phone and applied across a myriad of industries.  

Download PDF version Download PDF version

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

How should the security industry promote diversity?
How should the security industry promote diversity?

Diversity in a company’s workforce is arguably more important now than ever. Societal awareness of the importance of diversity has grown, and many people see diversity as an important factor that reflects positively (or negatively) on a company’s culture and image in the marketplace. We asked this week’s Expert Panel Roundtable: What should the security industry do to promote workplace diversity?

Why face recognition as a credential is the ideal choice for access control?
Why face recognition as a credential is the ideal choice for access control?

In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialised equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair colour, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.

What are the challenges and benefits of mobile access control?
What are the challenges and benefits of mobile access control?

There is a broad appeal to the idea of using a smartphone or wearable device as a credential for physical access control systems. Smartphones already perform a range of tasks that extend beyond making a phone call. Shouldn’t opening the door at a workplace be among them? It’s a simple idea, but there are obstacles for the industry to get there from here. We asked this week’s Expert Panel Roundtable: What are the challenges and benefits of mobile access control solutions?