www.edsuk.com




Access Control Biometrics

Access Control Biometrics

Unlike keys, electronic swipe cards, proximity cards, chip and pin cards, or keypad number sequences, access through a biometric reader cannot be transferred from person to person unless explicitly authorized, it is unique, which is what makes biometric readers and biometric technology more secure.

  • Increase Security & Reduce Costs
  • Incorporate into any Security System.
  • Stand Alone Biometric System
  • Highly Secure Technology
  • Trusted & Reliable Technology
  • Networked Multi-User Biometric System

From major government applications to commercial buildings, our biometric readers & biometric systems provide the ultimate in security, reliability and convenience. While perfect for applications large and small, their low error rates translate into incredible reliability. High volume, high throughput environments cannot tolerate errors, so the value of handreaders increases as the population grows.

Access Control - What is a Biometric Reader

Access Control Biometrics

What is a Biometric Reader? Biometric comes from the Greek word bios meaning "life" and metron "measure". A biometric reader recognizes humans based on intrinsic physical traits. For example, a biometric reader can read eye retinas or irises, facial patterns, hand measurements or fingerprints or all of them combined together for a high security system.

Access Control - How Does a Biometric Reader Work



Access Control Biometrics

A biometric reader can be used as a stand-alone or a networked operation. An authorized person has their physical characteristic scanned and turned into a numerical code or algorithm, which is then entered into a system database.

The authorized person must subsequently provide the same physical characteristic, for example, their hand, to be read and recognized by the biometric reader before access is granted.

Principles of Fingerprint Biometrics

Access Control Biometrics

A fingerprint is made of a a number of ridges and valleys on the surface of the finger. Ridges are the upper skin layer segments of the finger and valleys are the lower segments. The ridges form so-called minutia points: ridge endings (where a ridge end) and ridge bifurcations (where a ridge splits in two). Many types of minutiae exist, including dots (very small ridges), islands (ridges slightly longer than dots, occupying a middle space between two temporarily divergent ridges), ponds or lakes (empty spaces between two temporarily divergent ridges), spurs (a notch protruding from a ridge), bridges (small ridges joining two longer adjacent ridges), and crossovers (two ridges which cross each other).

The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. There are five basic fingerprint patterns: arch, tented arch, left loop, right loop and whorl. Loops make up 60% of all fingerprints, whorls account for 30%, and arches for 10%.

Fingerprints are usually considered to be unique, with no two fingers having the exact same dermal ridge characteristics.


How Does Fingerprint Biometrics Work

Access Control Biometrics

The main technologies used to capture the fingerprint image with sufficient detail are optical, silicon, and ultrasound.

There are two main algorithm families to recognize fingerprints:
Minutia matching compares specific details within the fingerprint ridges. At registration or enrollment, the minutia points are located, together with their relative positions to each other and their directions. At the matching stage, the fingerprint image is processed to extract its minutia points, which are then compared with the registered template. Pattern matching compares the overall characteristics of the fingerprints, not only individual points. Fingerprint characteristics can include sub-areas of certain interest including ridge thickness, curvature, or density. During enrollment, small sections of the fingerprint and their relative distances are extracted from the fingerprint. Areas of interest are the area around a minutia point, areas with low curvature radius, and areas with unusual combinations of ridges.


Stand Alone Biometric Systems

Access Control Biometrics

Any of our systems can operate as a complete stand alone access control station. Door lock operation and alarm monitoring of the door status is provided. An external alarm circuit is included for operating an audio or visual alarm.
Systems can be networked together using Windows software to accommodate larger applications.

Third Party System Interface

Our systems can easily be integrated into new or existing third party access control systems using an integrated interface. All Weigand, proximity and mag stripe formats can be accommodated, without modifications to the third party system.

Click on the image to view images or datasheet icon to view datasheet

Access Control Biometrics

Sign up for our newsletter