SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Healthcare security
  • Home
  • About
  • News
  • Expert commentary
  • Case studies
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

How are biometrics companies expanding system functionalities for better security and identification?

Larry Anderson
Larry Anderson
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Biometric systems enhance security and convenience, integrating seamlessly into existing workflows.
  • Non-invasive identification technology utilises facial recognition for accurate, seamless user authentication.
  • Advanced biometric features ensure precise identification, enhancing access control and transaction security.
Related Links
  • Breakthrough in smart phone technology to replace proprietary biometrics hardware in the next few years?
The accuracy of biometrics depends on each biometric’s “degrees of freedom”

Facial and body behavior analytics can identify people “without interfering
with the pace of life”

Biometrics companies throughout the security marketplace are expanding the functionality of their systems for a variety of uses. This article will take a look at what several companies are up to.

SRI International’s identity solutions seek to bring convenience, speed and security to existing workflows. SRI’s Iris on the Move (IOM) biometric systems can add the value of knowing precisely “who” to an organisation’s specific applications – from physical access control and workforce management to logical access to digital content – without altering typical user behaviour or existing workflows. The multimodal systems are deployed globally in a wide variety of environments, including government facilities, corporate and college campuses, construction sites, and mission-critical data centers.

SRI’s IOM biometric solutions deliver the accuracy of iris recognition to many form factors. The systems meet the growing demand for seamless and convenient authentication in markets such as security, transportation and healthcare, according to the company.

Non-invasive biometric identification

FST Biometrics provides identity management solutions that deliver a high level of security “without interfering with the pace of life.” FST Biometrics’ In Motion Identification (IMID) technology uses a fusion of facial recognition and body behaviour analytics to deliver accurate, non-invasive biometric identification of authorised users to facilitate seamless access to entry points.  

Implementing FST Biometrics’ IMID system is not significantly more complicated than a card-based system, according to the company. Both types of systems require equipment to be installed and users to be registered. IMID says it is considerably more accurate than traditional systems, with a standard margin of error of three false accepts per 10,000 entries. The threshold can be adjusted to be more stringent depending on client needs.


HID Global biometric solutions feature liveness detection capabilities that ensure proof of presence by preventing the use of fake fingerprints
HID Global's biometric solutions are used in a variety of applications, including
accessing ATMs, securing access to controlled medicines and medical
records, and securing borders

HID Global’s biometric authentication makes it possible to know with certainty who is performing a transaction. Biometrics is the only authentication factor that can be directly coupled with a person’s unique physical identity and unequivocally validates it, according to the company. HID Biometrics offers this certainty along with greater security and convenience, and no additional complexity for the user. The company’s solutions are used worldwide in a variety of applications, including accessing ATMs, securing access to controlled medicines and medical records, and securing borders. Solutions include sensors and modules that use the company’s patented multispectral imaging technology that improves reliability, performance and security by using multiple sources and types of light. Advanced polarisation techniques extract additional, unique fingerprint characteristics from both the surface and subsurface of the skin. Solutions also feature liveness detection capabilities that ensure proof of presence by preventing the use of fake fingerprints or “spoofs.”

Readers, panels and portable scanners

ZKTeco designs and manufactures a variety of biometric readers and panels, distributed through a global network of resellers. Complementing an RFID product line, ZKTeco’s biometrics product lines consists of 1) stand-alone indoor and outdoor fingerprint readers; 2) access control panels that can store and match fingerprint templates on the panel itself; 3) non-intelligent slave fingerprint readers that merely forward fingerprints to the panel for subsequent matching and door-unlock decisions; and 4) two multi-biometric stand-alone readers— one recognises face and fingerprint, and the other recognises finger-vein and fingerprint. Most models can either be connected directly to a door lock (stand-alone) or they can be connected to a ZKTeco panel (or any third party access control panel) via Wiegand protocol.

Zwipe’s core technology of a low-power, biometric algorithm enables the company to incorporate its product into several form factors, including credentials, credit cards and wearables. Zwipe has taken global leadership in creating unique, low-energy, biometric algorithms, powered by internal battery or by advanced radio frequency energy harvesting technology. Without the need of a battery on board, the product can be implemented in products that previously would not have been able to have a biometric element.


The biometric template data for a Zwipe Access card owner only resides on the Zwipe device, not some external system database that can be hacked into
Zwipe’s portable access control device provides the benefits of biometrics
without needing to change out existing door readers

Zwipe’s access control product is essentially a small, portable biometric scanner that can fit in your pocket. The device provides the benefits of biometrics without needing to change out existing door readers, which saves the customer installation and integration cost that is usually more than the cost of the new reader. The only change is replacing the user’s current credential with the Zwipe Access card.

Zwipe’s ability to utilise the energy from the RF field, be it from POS terminals or any NFC/ISO14443 reader to conduct authentication directly on the batteryless device, has expanded its market reach. Plus, the biometric template data for that card owner only resides on the Zwipe device, not some external system database that can be hacked into or a wall-mounted reader that has hundreds of templates that can be stolen.

Higher “degrees of freedom”, better biometrics

The accuracy of biometrics depends on each biometric’s “degrees of freedom,” says Hoyos Labs. For example, the voice has 5 degrees of freedom; the face provides 20 degrees of freedom, while one fingerprint can provide 30 degrees of freedom. At the higher end of the spectrum, an iris scan can provide 245 degrees of freedom, enabling identification of one person among 10 million. Combining biometrics measures adds to the scope of accuracy. Scanning two eyes provides an iris scan accuracy of more people than the population of the planet. Hoyos Labs has a system that scans four fingerprints to provide 150 degrees of freedom. “The higher the degrees of freedom, the better the biometric,” says Hector Hoyos, CEO of Hoyos Labs, which provides software to enable every major biometric – face, iris, voice and fingerprint – to be captured with a smart phone and applied across a myriad of industries.  

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Biometrics
  • Physical security
  • Healthcare security
  • Security devices
  • Security access systems
  • Iris recognition systems
  • Identity management
  • Fingerprint reader
  • Door access control
  • Related links
  • HID Access control software
  • HID Access control readers
  • HID Access control cards/ tags/ fobs
  • Biometric Access control software
  • Biometric Access control readers
  • Face Recognition Software Access control software
  • ID Badging Software License Access control software
  • Articles by Larry Anderson
  • Related categories
  • Audio, video or keypad entry
  • Mechanical digital locks
  • Access control system accessories
  • Access control software
  • Electronic locking devices
  • Access control readers
  • Access control cards/ tags/ fobs
  • Electronic keypads
Related white papers
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Amthal celebrates 25 years in security excellence

Amthal celebrates 25 years in security excellence

Detection Technology wins 2025 GE HealthCare Award

Detection Technology wins 2025 GE HealthCare Award

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Healthcare security
  4. News
  5. Expert commentary
About this page

Explore emerging biometric technologies, expanding system functionalities, and innovative security solutions for diverse industries. Stay ahead with cutting-edge insights.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec