Biometric Access Control
Your Fingerprint – Always with you!

Identity Management is about proving you are who you say you are.

Fingerprint Access Control as part of Multi Factor Authentication is the most reliable way to verify a person’s identity.

Biometric Access Control is important in identifying users and giving them appropriate access to –
Premises – Physical Access Control and
Information – Logical Access Control

Fingerprint Biometrics is the most popular form of biometric technology for attendance registration and access control applications because it is the most technologically developed and cost effective of the biometric technologies. A fingerprint scanner captures the fingerprint image, and converts it into a mathematical representation of the fingerprint called a template. To allay privacy concerns, fingerprint images are not stored and templates cannot be back-engineered to reproduce the original fingerprint image.

Biometric Enrolment – How it works

Biometric Fingerprint Enrolment Process

The enrolment of a user on the biometric fingerprint access control system is simple and secure.


Fingerprint Biometrics

Borer specialises in biometric technology, which is great for security access control and attendance registration applications because it is secure, easy to use and accurate.

The convenience of biometric access control using fingerprint authentication is obvious to anyone who regularly uses keys, cards or tokens to register attendance or access their premises. Tokens, passwords and PINs can be shared, compromised, lost or stolen while a fingerprint provides proof of identity and eliminates the cost and effort needed to administer, issue and replace lost and stolen keys, cards, PINs and tokens.

Multi Factor User Authentication and Identification


4 factor fingerprint identification authentication access control

Biometric Fingerprint only


  • Connector.

    small to medium sized businesses

    suitable for applications with fewer than 5,000 people, the biometric fingerprint template is held at the reader

  • Connector.

    simple solution

    no hassle and costs associated with card systems, no codes to remember, no cards that could be lost or stolen

  • Connector.

    high level of security

    more secure and higher proof of identity than card only solutions

  • Connector.

    scaleable and flexible

    more than 5,000 people can be accommodated when biometric is used together with a token or pin

Biometric Fingerprint and Card/Pin


  • Connector.

    large organisations

    suitable for applications where the number of templates a reader must hold in its database exceeds its memory capacity

  • Connector.

    multi factor authentication

    biometric card or pin code references a specific biometric fingerprint template in the database, which must then match the user’s fingerprint

  • Connector.

    high level of security

    card or pin is backed up by user’s fingerprint preventing user’s card being used by another person to gain entry

  • Connector.

    scaleable, multi-site secure access control

    control a few doors or a very large network of connected devices spanning many sites

Biometric Fingerprint on Card


  • Connector.

    large organisations

    suitable for applications with more than 5,000 people where multi-factor authentication and proof of identity is critical

  • Connector.

    dual verification

    cardholder’s biometric credentials are encrypted and written to the card’s secure memory

  • Connector.

    very high level of security

    user’s fingerprint is stored on the card as a template (similar to a card number), so the user’s fingerprint cannot be stolen – the card is backed up by cardholder’s fingerprint at access point, which needs to match the biometric record on the card

  • Connector.

    online or offline

    break in network communication is not a problem, as biometric record is stored on the card and does not need to be checked against a server database