hand being scanned
Many forward-thinking organisations are rightly reassessing their security options
In many industries, security and dependability are at the forefront of customers’ minds. But the fact is that firewalls and encryptions will only ever form part of the solution. Jon Mooney and Dave Bulless, security experts at Ingersoll Rand in the US and UK respectively, discuss the benefits of biometric technology in the protection of people, businesses and assets. Highlighting the many advantages of hand readers and fingerprint recognition scanners used in conjunction with access control / identity management software, the writers state that biometric access control is one of the most secure options available.

The key challenge for offsite storage and information handling facilities has always been to provide employees and customers with immediate access, while maintaining a high level of security. However, a simple access card-based system, where cards can be lost or stolen, is not the answer. You can’t rely on your customers to remember their card each time they visit your facility.

Using biometrics for reliable access control

The reality is that although biometrics
is arguably the most secure option in terms of people and assets, many still don’t understand the mechanics behind it and often perceive
it as a threat...

Many forward-thinking organisations are rightly reassessing their security options after realising that card-based systems no longer provide the required protection or the level of convenience to meet their needs. For data industry leaders, when assessing the questions of physical access control, the overwhelming answer is biometric technology.

Hand recognition readers and fingerprint recognition scanners, in particular, provide a level of security beyond that of a conventional card system by verifying the identity of the person. At the same time they eliminate the burden and expense of a card-based system.

For some, hand readers and finger scanners sound like the stuff of Bond movies but the reality is, this is where security teams arguably need to be focusing their efforts. Hand readers and finger scanners make up 80 per cent of biometric access control applications. They are complementary, as each meets specific needs of the market.

Biometric fingerprint readers - advantages

Fingerprint recognition scanners are currently being used most successfully in smaller organisations. Best suited to low volume openings, for instance where doors are accessed by less than 100 people or at a slower rate, finger recognition technology offers a secure option where cost is a key consideration. It is often employed for the protection of sensitive documents and for high-value storage.

A biometric hand scanner
Larger installations use biometric hand readers at the entrance

Biometric hand readers – advantages in identity management

Hand reader technology, by contrast, presents an ideal solution for many larger organisations. Due to its accuracy and speed with which user identification can be assessed, it provides essential control without slowing the flow of a large group of people. Typically, larger installations use biometric hand readers at the entrance, on the security corridor and at individual customer areas. Administration of the system is handled by access control/ identity management software, which can be tailored to the client’s specific requirements including remote enrolment for multi-facility management and expiring privileges for temporary access. The hand readers interface directly with their access control panels and can be configured to control a lock independent of a panel.

The set-up process for adding someone to a hand reader system is simple. Once a person has enrolled in the hand reader software, the system creates a similar account in the primary access control system and the user’s hand effectively acts as a badge. The hand reader then compares the hand template with the stored biometric template triggered by a card or pin and, if it matches, sends an output representing the badge or pin number to the primary system. The primary system then decides whether the person is allowed entry.

Dispelling the myths surrounding biometric solutions

The reality is that although biometrics is arguably the most secure option in terms of people and assets, many still don’t understand the mechanics behind it and often perceive it as a threat...

The fundamental point about hand recognition readers and finger recognition scanners is that they recognise people, not plastic cards. This is paramount for organisations that require high security, and absolutely critical to the prevention of unauthorised access to hardware and sensitive information. They provide an additional layer of security, ensuring that lost or stolen cards are not later used to access facilities. Crucially, they ensure that ‘you are you.’

For some, hand readers and finger scanners sounds like the stuff of Bond movies but the reality is, this is where security teams arguably need to be focusing their efforts

Biometrics, such as hand readers do not require any details about an individual other than their name. Details of home addresses, bank account numbers or other personal information are not stored in any file or database. The measurements taken of an individual’s hand are simply converted through a unique algorithm into a number, which is stored in the database. In fact, even if someone gained entry to thePC that the software is stored on, they would not find any personal information. It must also be remembered that the main organisations will be using biometrics once individuals have pre-registered within their facilities either as employees or contractors. The finger, palm, iris or face is then used merely to confirm the individual is who they say they are and genuinely does require access.

There’s no doubt that there are data protection issues in many schools and other organisations, particularly in relation to personal information, addresses and other confidential information from social services for example. But, biometrics is not part of this problem and should not be lumped together with wider computer security issues.

The reality is that biometrics is safe, cost effective and it does what alternatives, such as card-based access systems can’t do, and that’s keep people and assets fully secure. The fact is, whether you’re an educational institute or a data organisation, investment in the right security technology is vital. Biometrics is not the problem. In fact, in security terms, it is the answer.
Nurses rushing through hospital doors
The fundamental point about biometric hand readers and finger scanners is that they recognise people, not plastic cards

Biometric systems checklist:

Investigation – Where are you now? Has your organisation recently grown or accumulated new assets and are you fully protected? Be honest, interrogate your levels of access and protection and ensure that your systems are fit for purpose.

Records – do you have a series of auditable checks and records in place? Make sure that your security systems offer you a complete view of access patterns and potential issues across all of your facilities.

Scalability – perhaps you require increased security but can’t afford a significant investment? If so, make sure that you start with a secure, scalable platform as a minimum which can be built upon over time, as funds allow.

Technology – is there a better biometric system out there for your needs? Keep on top of the latest technology news and be open about the needs of your organisation. Don’t wait until it’s too late.

 

Share with LinkedIn Share with Twitter Share with Facebook Share with What's App Share with Facebook
Download PDF version Download PDF version

In case you missed it

Which security markets are embracing touchless and contactless systems?
Which security markets are embracing touchless and contactless systems?

The idea of touchless systems has gained new levels of prominence during the last year, driven by the global COVID-19 pandemic. Contactless systems have been part of the industry’s toolbox for decades, while technologies like facial and iris recognition are finding new uses every day. We asked this week’s Expert Panel Roundtable: Which security markets are embracing touchless, contactless systems and why? 

How body worn cameras and AI can curb the issue of abusive behaviour
How body worn cameras and AI can curb the issue of abusive behaviour

Amongst the many negative consequences of the pandemic is a rise in violent and abusive behaviour across society. Health workers have experienced it on a regular basis. So too have police officers and public transport workers. Unfortunately, violence and abuse towards shop workers is also endemic in British society. To address this problem which, in truth, has been on the rise since long before the emergence of COVID-19, we need better deterrents. The ability to prosecute these offences is one such deterrent, but just as important is the ability to deescalate situations before they spill over into unacceptable or unlawful behaviour. Major retail customers In both instances, organisations of all sizes are now recognising that the answer could involve greater use of rapidly advancing body worn camera technology. Andy Marsh, the Chief Constable of Avon and Somerset Police, is one of the police officers responsible for introducing body worn cameras to the UK police force, where they are now in widespread use. Andy Marsh is one of the police officers responsible for introducing body worn cameras to the UK police force He explains that “The reason the majority of people don’t speed or drink-drive is that rational human beings weigh up the risk and consequences of breaking the law and getting caught. Body worn cameras help provide appropriate ‘desistance’, especially where there are forward-facing screens so the person interacting with the wearer can see themselves and their behaviour.” Evidence shows that if a forward-facing camera is switched on before the intervention becomes hostile, it will generally lead to a de-escalation – as often as 90% of the time, according to one of our major retail customers. Digital evidence investigations Only a tiny handful of abusive incidents ever translate into arrests and prosecutions. A key issue is a lack of clear evidence – how to get past the usual impasse of one person’s word against the other. Body worn cameras break the deadlock and allow organisations to report incidents to the police with confidence, knowing that they will lead to action. Marsh suggests that “We usually see an earlier admission, an earlier guilty plea and a more appropriate sentence, where body worn camera footage is in play.” The technology has come on in leaps and bounds in recent years. For example, it’s now possible to record high-definition footage on a lightweight device that’s barely the size of a palm. And it’s not just about the evidence organisations gather themselves. Many police forces are looking at ways to make it easier for businesses and the public to collaborate on digital evidence investigations. Body worn cameras This is good for the victims of crime because it means we get the evidence more quickly" “We’ve created an online crime portal in Avon and Somerset which people can use to pass digital evidence and material to us without an officer having to attend their premises. This is good for the victims of crime because it means we get the evidence more quickly and can take action more swiftly to resolve that issue,” adds Marsh. Our body worn cameras can now even support facial recognition thanks to new, smart AI on the devices themselves, which can scan and process faces within a three-metre distance against a pre-defined database of people (which we call a watchlist). Any matches trigger alerts or additional camera activity such as recording and streaming, while the facial recognition data of people not on the watchlist itself is not recorded or saved to assuage privacy concerns. Similar criminal behaviour Where could this technology come in handy? Well, staff at gambling venues or in-store retail workers could undoubtedly benefit from the ability to quickly spot known fraudsters or addicts who have requested that venues refuse their custom. Stewards at mass sporting events could play a key role in helping to identify people who have been banned from attending. The primary reason for using body worn cameras is to increase the safety of frontline workers The primary reason for using body worn cameras is to increase the safety of frontline workers, deescalating confrontations and limiting the use of force. AI-powered facial recognition can also serve this purpose by helping them make better-informed choices about how to handle specific situations. For example, it is a massive advantage to police officers on the beat to understand that the person they are dealing with may have a history of similar criminal behaviour. Facial recognition technology But it’s also an advantage within retail, where aggressive incidents are on the rise and staff need all the help they can get to determine what an appropriate response should be to a particular customer incident. In fact, extensive consultation with our retail, police, transport and gambling customers indicates that introducing facial recognition technology to body worn cameras could be instrumental, not just in helping to prevent crime, but in tracking down vulnerable and missing people too. Of course, facial recognition technology has to be balanced against the need to protect the privacy of ordinary citizens. Video recording using body worn cameras has to be done proportionately – the same is true for the use of facial recognition technology. The technology also has to be compliant with GDPR, Data Protection, the Information Commissioners recommendations and so on. Positive working environment Violent and abusive incidents affect everyone in the immediate vicinity and create a culture of fear Importantly, it should be for a specific, proportionate and justifiable reason which, of course, means it should never be used for indiscriminate mass surveillance. Every organisation using this technology must remember that a facial recognition system match is not proof of someone’s identity, but rather, an indication of likelihood to help inform the user rather than dictate the course of action. Violent and abusive incidents affect everyone in the immediate vicinity and create a culture of fear and apprehension. This is why it’s so important to get on top of the problem – both on a societal and at an organisational level. Body worn cameras have a vital role to play, as an evidence-gathering tool and as a deterrent that empowers the wearer and creates a more positive working environment. Deterring unlawful behaviour One of the critical roles these cameras play is in staff training, providing real-world video evidence that can be used to educate and upskill workers across a variety of industries. Society’s problem with abusive and violent behaviour cannot be solved by technology alone. But with exceptional quality camera footage now a reality, and the possibility of AI technology at the device level in real-time, body worn cameras will only get better at deterring unlawful behaviour and helping to protect hardworking frontline staff. Alasdair Field is CEO of video technology provider Reveal, which works with UK police forces and major brands such as Matalan, JD Sports and Boots to help them improve staff safety, deescalate confrontations and reduce violent and abusive incidents.

ASSA ABLOY Opening Solutions embraces BIM to smooth specification and installation of door security solutions
ASSA ABLOY Opening Solutions embraces BIM to smooth specification and installation of door security solutions

BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud  BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualisation and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralised data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralised data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A mobile app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.