Biometric Access Control
Your Fingerprint – Always with you!

Identity Management is about proving you are who you say you are.

Biometric Fingerprint Access Control



WHY USE BIOMETRICS?

  • TO IDENTIFY A PERSON

Identification answers the question: "Who is this person?"

Identification (one to many) consists of matching a fingerprint captured by the fingerprint reader to a fingerprint template in a library of biometric templates held in the reader's memory.

  • TO AUTHENTICATE A PERSON'S IDENTITY

Authentication answers the question: "Is this person really Mr X?"

Authentication (one to one) consists of verifying that biometric data held in the ID Card, National ID Card or Passport chip's memory or held in a local database and identified by the card, relates to the document holder.


The process for finding a match for a person's fingerprint in a database of many thousands of fingerprint templates is complex and can be time consuming. There are two approaches to matching fingerprints:

  1. Put the fingerprint matching software and template database on a central computer with a network of connected fingerprint readers. The readers scan fingers and transmit the fingerprint images to the central computer's software for matching.
  2. Put the fingerprint matching software and template database at the fingerprint reader. The reader matches and validates the fingerprint at source. This does not require the fingerprint images to be held at the reader as it only uses templates which are a mathematical representation of a fingerprint that can't be turned back into an image.

Risks when matching is done by a single computer with a number of connected fingerprint readers:

  • A single resource is shared across a number of competing readers, resulting in response delays when all readers are used concurrently at times of peak activity;
  • Network availability and transmission speed limit the resilience of the system;
  • All connected fingerprint readers will stop working when the central computer or a network connection fail.

Borer's Biometric Solutions do the fingerprint matching and authentication at the reader, avoiding single point of failure and slow response during fingerprint matching.


Biometric Enrolment – How it works

Biometric Enrolment

The enrolment of a user on the biometric fingerprint access control system is simple and secure.

Fingerprint Biometrics is a convenient, secure, easy to use and accurate form of identity authentication.

Fingerprint Access Control is the most popular form of biometric identification because it is the most developed and cost effective of the biometric technologies.

Tokens, passwords and PINs can be shared, compromised, lost or stolen, while a fingerprint provides proof of identity and eliminates the cost and effort needed to administer, issue and replace lost and stolen keys, cards, PINs and tokens.

Borer uses biometric technology and fingerprints to confirm a person’s identity before granting access. At each individual site, up to 5000 users can gain access by presenting their fingerprint alone. Additional users are required to enter a PIN or present an ID Card before presenting their finger. Users with more demanding security requirements can apply multiple checks including fingerprint plus identity card and/or PIN for proof of identity.

Our range of biometric fingerprint readers and door controllers deliver cost effective identity authentication and access control solutions.


Advantages of Borer Fingerprint Access Control



  • Fully Integrated Solution

    Biometric fingerprint registration and authentication fully integrated into the access control system. The whole solution sits on a single database and communicate over a local or wide area network (LAN/WAN). This enables biometric finger print templates to be distributed to each door’s access reader over the LAN/WAN.

  • Reduction in Cost of Ownership

    There is no ongoing requirement for consumer items such as proximity access cards, card printer ribbons, etc. There is little maintenance needed as all field devices are of solid state construction with no moving parts, not even relays.

  • Simple to Manage

    Establish a set of security policies and set these up as rules so it is simple to manage the entire enterprise and all its sites from any workstation. Management of the system can be devolved to building managers.

  • Time Limited Access

    Short term contractors and visitors are accommodated by enrolling them on the system with time limited access and automatic expiry.


    LEVELS OF IDENTITY AND AUTHENTICATION


    Biometric Fingerprint only

    Fingerprint only identification delivers speed and convenience without the hassle and cost associated with card systems - no codes to remember, no lost or stolen cards or tokens. The number of people who can participate in one to many match, needing only their finger to gain access, is currently limited to 10,000.

    • Schools, Colleges and Nurseries
    • Retail Outlets and Retail Chains
    • Offices, Warehouses and Factories
    • Condominiums
    • Leisure Centres and Gyms
    • Hospitals and Clinics
    • Laboratories and Research and Development Centres

    Biometric Fingerprint and Card or Pin

    When a system has to accommodate more than 10,000 people, then the reader's database of up to 64,000 templates can be grouped into frequent and occasional users. Of those, up to 10,000 frequent users gain access using fingerprint only, while the remaining occasional users require a card, token or PIN combined with a fingerprint. The tapping of a proximity or smart card or input of a PIN at the reader will identify the user and load their biometric template for a 'one to one match'. This enables Borer FUSION to support a much larger user population than would be possible with fingerprint alone. Possible applications include:

    • Universities
    • Public Buildings
    • Public Utilities
    • Stadia and all large Business and Factories

    Biometric Fingerprint on Card

    Fingerprint on card delivers multi-factor authentication combining high level security with proof of identity. A cardholder's biometric template together with related information such as photograph and security credentials are written to a smart card's chip.

    With the biometric fingerprint encrypted and held on the card, there is no practical limit to the number of cardholders a system can accommodate, since a person's identity is verified using credentials carried in their card. This eliminates network dependency and the risks and time it takes to transmit biometric templates and identity credentials between locations.

    Biometric template on card is appropriate whenever there is a need for proof of identity and high levels of security. This includes any organisation needing high levels of personnel authentication, or with a large and mobile workforce, including:

    • Police and Military
    • Nuclear
    • Air or Sea Ports with large personnel base and many access points;  the need for mobile terminals to validate personnel while they travel around the site and between sites is also accommodated
    • Utility Providers such as Water, Telecoms and Energy with a mobile workforce operating across many sites and substations


    4 factor authentication access control

    Multi Factor Identity Authentication


    HOW THE SYSTEM WORKS


    • Biometric Enrolment

      Fingerprint templates of employees, contractors or visitors are enrolled onto the Access Control system by placing a finger onto an enrolment reader. After three successful scans of the person’s biometric fingerprint template is generated, it is encrypted and saved in the system’s database or written to a smart card’s memory.

    • Granting of Access Permissions

      The person is then given access rights according to the security clearance and work activities by allocating them to a temporary or permanent access group or access profile.

    • Access Authorisation and Fingerprint Template Distribution

      A summary of the person’s details including identity number, biometric template and access credentials are downloaded to the door controllers via the LAN.

    • Fingerprint Authentication and Granting Access

      To gain access a person, once enrolled, simply present their finger to the door access biometric reader. Once their credentials and access authorisation have been checked and passed they will be given access.

    • Access Reports and Audit Trails

      The system maintains an audit trail of all access events and attempts which can be displayed in real time and also logged to the database for future referral.

    Borer Fingerprint Sensors



    The sensors, which use patented optical technology and biometric algorithms, deliver high levels of performance and robustness.

    Sensor Features include:
    • High quality fingerprint acquisition
    • Embedded processing capabilities: MINEX compliant Coder & Matcher inside
    • FBI PIV IQS certification and fake finger detection option available
    • Security features include encryption and digital signature
    • Image Compression using WSQ algorithm from FBI/NIST
    • Biometric Feature Extraction to generate templates, Feature Extractor is MINEX/FIPS 201 compliant
    • Support for ISO 19794-2 or ANSI 378 formatted templates
    • Templates held in the reader's database
    • The sensor's generous capture surface (14x22mm) ensures that the richest area on the fingerprints is captured. The larger the acquisition, the better the overall biometric performance, as this determines the number of minutiae captured. Other smaller sensors allow different areas of the same finger to be presented with each placement, leading to poor data acquisition, narrow areas of overlap and more chance of matching failures.

    Technology Standards

    "Performance of biometric systems is dependent on the quality of the acquired input samples. Presenting the matcher with good quality fingerprint images will result in high matcher performance." ~ NIST (National Institute of Standards and Technology)

    "As biometric template data is stored as a series of 1s and 0s no reference to the individual can be obtained from the data. " ~ British Security Industry Association