The accuracy of biometrics depends on each biometric’s “degrees of freedom”

Facial and body behavior analytics can identify people “without interfering
with the pace of life”

Biometrics companies throughout the security marketplace are expanding the functionality of their systems for a variety of uses. This article will take a look at what several companies are up to.

SRI International’s identity solutions seek to bring convenience, speed and security to existing workflows. SRI’s Iris on the Move (IOM) biometric systems can add the value of knowing precisely “who” to an organisation’s specific applications – from physical access control and workforce management to logical access to digital content – without altering typical user behaviour or existing workflows. The multimodal systems are deployed globally in a wide variety of environments, including government facilities, corporate and college campuses, construction sites, and mission-critical data centers.

SRI’s IOM biometric solutions deliver the accuracy of iris recognition to many form factors. The systems meet the growing demand for seamless and convenient authentication in markets such as security, transportation and healthcare, according to the company.

Non-invasive biometric identification

FST Biometrics provides identity management solutions that deliver a high level of security “without interfering with the pace of life.” FST Biometrics’ In Motion Identification (IMID) technology uses a fusion of facial recognition and body behaviour analytics to deliver accurate, non-invasive biometric identification of authorised users to facilitate seamless access to entry points.  

Implementing FST Biometrics’ IMID system is not significantly more complicated than a card-based system, according to the company. Both types of systems require equipment to be installed and users to be registered. IMID says it is considerably more accurate than traditional systems, with a standard margin of error of three false accepts per 10,000 entries. The threshold can be adjusted to be more stringent depending on client needs.


HID Global biometric solutions feature liveness detection capabilities that ensure proof of presence by preventing the use of fake fingerprints
HID Global's biometric solutions are used in a variety of applications, including
accessing ATMs, securing access to controlled medicines and medical
records, and securing borders

HID Global’s biometric authentication makes it possible to know with certainty who is performing a transaction. Biometrics is the only authentication factor that can be directly coupled with a person’s unique physical identity and unequivocally validates it, according to the company. HID Biometrics offers this certainty along with greater security and convenience, and no additional complexity for the user. The company’s solutions are used worldwide in a variety of applications, including accessing ATMs, securing access to controlled medicines and medical records, and securing borders. Solutions include sensors and modules that use the company’s patented multispectral imaging technology that improves reliability, performance and security by using multiple sources and types of light. Advanced polarisation techniques extract additional, unique fingerprint characteristics from both the surface and subsurface of the skin. Solutions also feature liveness detection capabilities that ensure proof of presence by preventing the use of fake fingerprints or “spoofs.”

Readers, panels and portable scanners

ZKTeco designs and manufactures a variety of biometric readers and panels, distributed through a global network of resellers. Complementing an RFID product line, ZKTeco’s biometrics product lines consists of 1) stand-alone indoor and outdoor fingerprint readers; 2) access control panels that can store and match fingerprint templates on the panel itself; 3) non-intelligent slave fingerprint readers that merely forward fingerprints to the panel for subsequent matching and door-unlock decisions; and 4) two multi-biometric stand-alone readers— one recognises face and fingerprint, and the other recognises finger-vein and fingerprint. Most models can either be connected directly to a door lock (stand-alone) or they can be connected to a ZKTeco panel (or any third party access control panel) via Wiegand protocol.

Zwipe’s core technology of a low-power, biometric algorithm enables the company to incorporate its product into several form factors, including credentials, credit cards and wearables. Zwipe has taken global leadership in creating unique, low-energy, biometric algorithms, powered by internal battery or by advanced radio frequency energy harvesting technology. Without the need of a battery on board, the product can be implemented in products that previously would not have been able to have a biometric element.


The biometric template data for a Zwipe Access card owner only resides on the Zwipe device, not some external system database that can be hacked into
Zwipe’s portable access control device provides the benefits of biometrics
without needing to change out existing door readers

Zwipe’s access control product is essentially a small, portable biometric scanner that can fit in your pocket. The device provides the benefits of biometrics without needing to change out existing door readers, which saves the customer installation and integration cost that is usually more than the cost of the new reader. The only change is replacing the user’s current credential with the Zwipe Access card.

Zwipe’s ability to utilise the energy from the RF field, be it from POS terminals or any NFC/ISO14443 reader to conduct authentication directly on the batteryless device, has expanded its market reach. Plus, the biometric template data for that card owner only resides on the Zwipe device, not some external system database that can be hacked into or a wall-mounted reader that has hundreds of templates that can be stolen.

Higher “degrees of freedom”, better biometrics

The accuracy of biometrics depends on each biometric’s “degrees of freedom,” says Hoyos Labs. For example, the voice has 5 degrees of freedom; the face provides 20 degrees of freedom, while one fingerprint can provide 30 degrees of freedom. At the higher end of the spectrum, an iris scan can provide 245 degrees of freedom, enabling identification of one person among 10 million. Combining biometrics measures adds to the scope of accuracy. Scanning two eyes provides an iris scan accuracy of more people than the population of the planet. Hoyos Labs has a system that scans four fingerprints to provide 150 degrees of freedom. “The higher the degrees of freedom, the better the biometric,” says Hector Hoyos, CEO of Hoyos Labs, which provides software to enable every major biometric – face, iris, voice and fingerprint – to be captured with a smart phone and applied across a myriad of industries.  

Download PDF version

Author profile

Larry Anderson Editor, SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Live-streaming mobile surveillance takes cameras to the action
Live-streaming mobile surveillance takes cameras to the action

Video surveillance across the world is growing exponentially and its major application is in both public safety and law enforcement. Traditionally, it has been fixed surveillance where cameras provide live streams from fixed cameras situated in what is considered strategic locations. But they are limited in what they can see given by their very definition of being "fixed." The future of video surveillance includes the deployment of more mobile video surveillance with the benefits it offers. Instead of fixed cameras, this is the ability to live stream from mobile devices on the move such as body-worn cams, drones, motorbikes, cars, helicopters and in some cases, even dogs!Sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters Advantages of mobile surveillance The advantage of mobile surveillance is that the camera can go to where the action is, rather than relying on the action going to where the camera is. Also, sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters. The ability to live stream video from cars and helicopters in high-speed pursuits can be used to take some of the operational issues from the first responders on the ground and share that “life and death” responsibility with the operational team leaders back in the command centre. This allows the first responders in the pursuit vehicle to focus on minimising risk while staying in close proximity of the fleeing vehicle, with direction from a higher authority who can see for themselves in real time the issues that are being experienced, and direct accordingly. In addition to showing video live stream from a pursuit car or motorcycle, by using inbuilt GPS tracking, the video can be displayed on a map in real time, allowing a command chief to better utilise additional resource and where to deploy them, through the use of displaying mapping information with real time video feed. It allows police chiefs to make better informed decisions in highly-charged environments. The 4G phone network can now be used with compressed video to live stream cost effectively Application in emergency situations The same is true of first responders in many different emergency situations. Mobile surveillance opens up a new area of efficiencies that previously was impossible to achieve. For example, special operations can wear action body-worn cameras when doing raids, fire departments can live stream from emergency situations with both thermal and daylight cameras, and paramedics can send video streams back to hospitals allowing doctors to remotely diagnose and prepare themselves for when patients arrive at the hospital. How can special operations and emergency first responders live stream video from a mobile camera with the issues of weight, reliability and picture-quality being considered? H265 mobile video compression Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain The 4G phone network can now be used with compressed video to live stream cost effectively. The issue of course is that 4G is not always reliable. Soliton Systems has mitigated this risk of low mobile quality in certain areas, by building an H265 mobile video compression device that can use multiple SIM cards from different cellular providers simultaneously. H265 is the latest compression technique for video, that is 50% more effective than conventional H264, and coupling this with using multiple “bonded” SIM cards provides a highly reliable connection for live-streaming high-quality HD video. The 400-gram device with an internal battery can be connected to a small action cam, and can live-stream simultaneously over at least three different cellular providers, back to a command centre. Latency is typically less than a second, and new advance improvements are looking to reduce that latency further. Encrypted video transmission What about security? Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain, i.e. AES256.What about integration into existing video infrastructure at the command centre? It is not untypical for a police force to have an existing video management system (VMS) at their command centre such as Milestone System’s Xprotect. The Soliton range of products are ONVIF-compliant, a standard used by video surveillance cameras for interoperability, allowing cameras and video devices that are ONVIF-compliant to simply “plug&play” into existing video management systems. These mobile transmitters are deployed with law enforcement and first responders across the globe. Their ability to provide secure, full HD quality and highly-reliable video streaming within a small unit, and to enable it to be integrated into the current eco-system that is already installed at the receiving end, has made them a favourite choice with many companies and government agencies.

Impact of sophisticated IT technologies on the security market
Impact of sophisticated IT technologies on the security market

Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualisation and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being leveraged in real-world applications. That’s really where we can all see the true value of new solutions and concepts. We’re lucky enough to work with some leading organisations that want others to benefit from their experience and I’m happy to have the opportunity to share two of these applications with you. Protecting educational facilities UCF has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus Educational institutions face an increasingly complex risk environment. Recent high-profile incidents emphasise these risks and magnify the vulnerabilities that educational facilities face. These incidents have led to more public demand for improved security solutions across campuses. The primary mission of these organisations is to deliver quality education to students, and they face the challenge of balancing between a highly secure facility and one that supports open interaction. The University of Central Florida is no different. This organisation, one of the largest universities in the country, has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus. Active shooter incidents In March 2013, UCF faced an active shooter situation in which a former student planned to pull the fire alarm in a residence hall and then attack his classmates as the building was evacuated. However, the shooter’s gun jammed, and as officers were closing in on the gunman, he took his own life. During the university’s response to the incident, accessibility to critical video data was a major issue. Educational institutions face an increasingly complex risk environment UCF had cameras in the area where the incident took place, but first responders had no way of viewing the footage without being at the physical location of the video recorder. At the time, UCF had a wide variety of standalone systems in place, including non-integrated video surveillance, access control and intrusion systems. As a result, there was no way to centralise video management, viewing and analysis. Upgrading from analogue systems Altogether, its security system consisted of older analogue platforms that were reaching end of life, 58 standalone servers, 12,000 access points and a wide variety of DVRs — all being managed in a siloed manner. UCF needed a solution that would allow officials to centralise system management, store video data more effectively and reliably, and enable the security team to deliver situational awareness to responders when needed. Security leaders sought a way to further modernise its security, surveillance, access control and IT infrastructure The university deployed an HCI solution, one that is optimised for demanding, data-intensive workloads like video surveillance. Using standard off-the-shelf server hardware, the system aggregates the storage and compute resources from multiple servers into a single unified pool that all cameras can access, which maximises performance and storage capacity utilisation. The platform also hosts the university’s video management solution, which serves as a centralised source to manage video and effectively protect its security data. Because of the growing demand for video across UCF's campuses — for both safety and business purposes — the HCI solution’s ability to eliminate the opportunity for data loss and easily scale were key components in its selection. Protecting air travel and airports In 2012, Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program. The $200 million initiative was designed to modernise and expand the facility to meet increased passenger demand. While the aesthetics and amenities of the airport were under construction, security leaders sought a way to further modernise its security, surveillance, access control and IT infrastructure. The IT and security teams needed to address the challenges of their existing standalone server environment, which included siloed systems, management complexity and high administrative and equipment costs. Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program Considering the high value of the airport’s video, security and IT data, it required a solution that could deliver reliable data protection, system resiliency and fault tolerance. The airport is required to store video for 30 days, but it seeks to expand its retention time to 60 days. Therefore, technology that can scale simply was key in the selection process. Storage system updates It also required a storage platform that could manage the demanding and write-intensive nature of its nearly 250 IP surveillance cameras — a challenging task for traditional video recorders. The airport deployed HCI appliances to better manage captured video data and expand its archive capability for video surveillance. Users rely on video to validate whether something did or did not happen - and this is essential in airports HCI surveillance solutions are designed to provide industry-leading resiliency. Even if multiple hardware failures occur, including an entire appliance, video management servers will remain online and recording, and any previously recorded video will continue to be protected and accessible. Reducing expenses and costs The solution also reduced total cost of operations by consolidating servers, storage and client workstations into one enterprise-class solution that is easily managed from a single user interface, without the need for specialised IT skills. These use cases demonstrate the value emerging technologies bring to these types of modern environments. And they show that solutions like HCI are no longer simply much-talked about technology trends. Video, IT and security data is critical to organisations of all types and they need to ensure their investment in capturing this data is protected. From a security standpoint, users rely on video to validate whether something did or did not happen. If that video data isn’t protected, they lose a very valuable investigative tool. That isn’t an option in today’s complex environment. That’s is why it is paramount to understand how new technologies can help expand current capabilities and evolve security operations. This can’t be left to chance.

ISC West 2018 day three: Biggest-ever show highlights emerging technologies
ISC West 2018 day three: Biggest-ever show highlights emerging technologies

Activity slowed on the last day of ISC West in Las Vegas, but there was plenty of momentum remaining and plenty more to see. In the end, Reed Exhibitions declared 2018 the biggest and most successful year to date for the show. There were an additional 4,000 square feet of exhibit space compared to last year and a 6 percent growth in overall attendance, according to Reed.  The cloud, biometrics, deep learning and other technologies were among the big topics at the show, and even smaller exhibitors were pleased with the results. In particular, emerging technologies were successfully highlighted. Cloud-based video systems Cloud video company Eagle Eye Networks announced multiple new offerings at ISC West. One was the first cloud-based video system that accommodates HD-over-coax cameras using the HD-TVI protocol to operate over existing coaxial cabling. In effect, cameras connect with an HD-TVI recorder, which plugs into Eagle Eye Networks’ on-site hardware “bridge” connecting to the Internet. Eagle Eye Networks has also integrated Hikvision body-worn cameras into their cloud system; transmitting video using the Eagle Eye Bridge ensures end-to-end encryption and the evidentiary integrity of the video. Analytics in the cloud can be turned on and off at will for each camera, and could be deployed over a weekend and switched off the following week “A few years ago, fewer customers were ready to adopt the cloud,” says Ken Francis, President of Eagle Eye Networks. “Now market adoption is changing, and customers don’t want on-site hardware. End-users are driving the move to cloud systems.” He estimates the evolution is about halfway complete, and Eagle Eye Networks continues to sign up new dealers every month because their customers are asking for the cloud. Eagle Eye Networks’ third new offering at ISC West is “analytics in the cloud,” including familiar analytics such as intrusion, people counting and loitering. Francis says the economics of the cloud make implementation of analytics much more affordable – about $4 per camera. Analytics in the cloud can be turned on and off at will for each camera. For example, analytics could be deployed over a weekend and then switched off the following week. “It’s a far more economically attractive and cost-effective service than on-site,” says Francis. the economics of the cloud make implementation of analytics much more affordable Augmented identity: biometrics in security Biometrics continue to make their way into the mainstream of the security market, and IDEMIA brought its message of “augmented identity” to ISC West. IDEMIA (formerly OT-Morpho) provides systems to the largest biometrics users in the world, including big customers such as the FBI and Interpol, and large-scale government projects around the globe. “If you can handle projects that big, enterprise applications are no problem,” says Gary Jones, Vice President, Global Channel & Marketing, Biometric Access & Time Solutions. He says that the company’s technologies apply to any vertical market, and they are especially common in major airports and big financial institutions, in addition to government. The company’s MorphoWave product allows users to wave their hand, and the system captures a three-dimensional shape of fingerprints. The touchless system is also “frictionless” -- it enables fast decision-making that promotes high throughput rates. Artificial intelligence applications AI and deep learning have been big topics of conversation at ISC West, and I saw a company on the last day of the show with a different take on the subject. BrainChip uses a type of AI called “spiking neural networking” that models the operation of neurons in the human brain - in contrast to “convolutional neural networks,” which use a series of math functions to train from pre-labelled data sets. The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects. Applications are in law enforcement, counter-terrorism and intelligence agencies.The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects “We search for specific things,” said Bob Beachler, Senior Vice President, Marketing and Business Development. The software can search hundreds of live or recorded camera feeds for a unique graphic pattern on an item of clothing or on a bag carried by a person, for example. The technology only requires modest processing power and consumes little energy, so it can be used with legacy systems without requiring hardware or infrastructure upgrades.  Emerging Technology Zone A new Emerging Technology Zone at ISC West included participation by around 40 companies that are startups and/or new to the security industry. The section opened an hour before the main show floor and was located near the registration area, which increased traffic. “Generally speaking some people said it was hard to find, but I think it’s better for us as someone new to the market, rather than being on the main floor where you can get lost in the shuffle,” said Jeffrey Weiner, Vice President, Networks & Business Solutions, at Mersoft. “It was really smart that they opened this an hour earlier.” Mersoft, one of the Emerging Technology Zone exhibitors, has developed a software product to help the security industry do a better job of streaming live video. The software eliminates the startup delay and lag in live video. With dedicated software, video can be consumed by a browser or mobile app more easily Live video streaming “We accomplish that in two ways,” says Weiner. “One, we don’t trans-code the video into another format. Instead, we convert a security camera’s video from RTSP (real time streaming protocol) to WebRTC (Web Real-Time Communication), an open-source technology that has been used extensively in video conferencing, but not so much in security. The video can be consumed by a browser or mobile app more easily, and we don’t need a player on the client, which is another way we reduce lag.” Another advantage is that WebRTC is natively encrypted; every packet is encrypted. In contrast, applications that transmit RTSP have to be wrapped in a VPN (virtual private network) tunnel, which takes some effort to maintain and is a battery hog on a mobile device. Also, multi-casting of video is easier, even using streams of various resolutions. Mersoft works through partnerships, offering a cloud-hosted service on Amazon and a version that can be installed on a local server. They have worked with several DIY camera sellers (who use cloud services), and with some major commercial service providers. “A new partnership strategy we are exploring is with systems integrators, who can incorporate Mersoft and provide a differentiator by improving their video performance,” says Weiner. The 22-year-old company is new to security, and ISC West provides opportunities for in-depth conversations preparing for a future in the security sector. Customisable turnstile solutions Delta highlighted their new designer series turnstiles, whose colourful appearance led booth visitors to ask about customisation Even the smaller companies, located toward the back of the hall, were enthusiastic about ISC West this year. “The show has been great,” says Vanessa Howell, project manager of Delta Turnstiles. “We did get a lot of traffic. I am a niche product, so it’s not so much about quantity as quality [of leads]. I had great quality at the show.” Being away from competitors, which are grouped next to each other in the front of the hall, was an upside of the turnstile company’s booth location toward the back. Delta highlighted their new designer series turnstiles, whose colourful appearance led booth visitors to ask about customisation. “They ask: ‘Why are turnstiles only sold in basic models?’” says Howell. “’Why can’t they look like a piece of art since they are the first thing people see when they enter a building?’ People are very open to making them prettier.”  Delta Turnstiles has been coming to ISC West since 2006. “I have manufacturer’s reps, and this is one of two times I get to see them in one place, and they bring a lot of customers to me at the booth,” says Howell. “This is my only face-to-face meetings with some customers. I speak mostly over the phone.” Valuable face-to-face engagement was a benefit of ISC West, and many of those meetings will likely set the stage for continuing successes in our vibrant market. Until next year.