subject: Supplying Rapid Verification Of Identity Through Biometric Hand Terminals [print this page] More often than not, many companies and organizations that are just starting to deploy the biometrics technology throughout its premises will come across employee resistance at first, in particular with the issues of hygiene and confidentiality. This will consistently be the case if a union is involved and is searching for discussion subjects.
nonetheless, when searching more deeply into the concerns of the workers, companies report that the only real problem with the new biometric interface is that it is a new and unfamiliar technology that many of the employees are simply not accustomed to operating. Virtually all of these worries and concerns can be immediately removed if employees are taught how to deal with this new system as soon as it gets deployed. subsequent to having operated the biometric reader two or three times and realized how uncomplicated it is to operate, they favor the biometric systems over any other types of access security.
Upon setting up any system into a facility, it is extremely essential that the end users are taught how to operate it and maintain it. It is an understood fact that nobody loves changing their ways of operation. That is especially the case when it comes to biometric interfaces, due to the fact that there are several urban myths and false information in regards to biometric systems that seem to only get more popular, essentially for the reason that they are brought up over and over again, more than ever by worker groups who find the idea of change hard to swallow.
These worries include the possibility for incursion upon privacy and hygiene, neither of which should be a worry, due to the fact that that biometrics supply employees with a higher level of security in access control interfaces in addition to improved record-keeping in time and attendance applications.
Worries about confidentiality
A large number of individuals confuse biometrics with the applications they view on TV crime series. When taking into consideration privacy worries dealing with biometrics, an imperative distinction must be established between detection, a one-to-many match and verification? one-to-one match. It is essential that the users realize the distinction between the two.
A product set up to identify an individual compares a biometric presented by a person against all biometric models stored in the security records. The interface recognizes the person if the displayed biometric matches one of the many samples in the security database. This is known as a one-to-many match up. This sort of system is utilized by the police in order to make out criminals and is also utilized by governments in order to recognize qualified recipients for assistance programs and in registration systems for licensing drivers as well as voting. This is the sort of systems that can be seen on TV crime series.
On the other hand, the authentication procedure is based on a one-to-one search procedure. A live biometric supplied to the system by the user is match up to a stored sample, which was previously provided by that individual during staffing period, and the match is established. Contrary to the general beliefs, the hand geometry or fingerprint of the user is not saved on an ID card or in a database. as an alternative, a mathematical equation, or algorithm, is carried out with specific points and regions measured on the finger or hand of the user. The pattern or general layout that results from this equation is all that is saved on to the memory of the system.
if the user supplies an ID card or enters a designated PIN, only that template is transferred. as soon as the worker presents his or her hand or finger, the scanner immediately runs the authentication procedure in order to verify if the template that is stored matches the biometric being displayed. If a match is present, the person is validated.
To give further emphasis, the validation of the person has been previously established. The synchronization of the live biometric to the established stored example is all that is required in order to authenticate the individual as an adequate patron. No actual search procedure takes place to match a worker's information to a central records list. Palm prints or fingerprints of the "Law and Order" kind are not analyzed in any way.
In addition to that , contrasting the biometric identification on television shows, the verification procedure does not necessitate the template be saved in a central database. This information can be saved on a smart card and kept in the custody of the user.
In regards to matters of privacy, the majority of companies will find hand readers much more convenient to sell to workers than fingerprint scanners. In any case, hand scnners are never utilized in crime shows on TV.
As an example, a very popular and well known beach resort that provides close to three hundred rooms with lavish accommodations situated in a popular beach in the state of California utilizes a biometric Ingersoll Rand Recognition Systems HandPunch reader to key in time and attendance in order to be able to keep track of more than three hundred workers. According to the payroll administrator at the beach resort, when investigating which biometric to deploy, the resort's administration did not accept fingerprint readings due to the fact that the process was too similar to the fingerprinting procedure. The HandPunch scanner was viewed as much less invasive. And, for the reason that it plugged right into the application, the HandPunch supplied a smooth switch from the old magnetic ID card interface.
Despite of weather a hand geometry or fingerprint system is installed, an explanation of how the biometric authentication system functions will quiet the worries of people.
Dealing with doorknobs and hygiene issues
It is a true reality that users regularly touch objects or surfaces that may hold risks of contamination or even infection. To begin with, some hand geometry and fingerprint scanner users display an opposition toward this new technology, using hygiene worries as a beginning point for heated discussions. when all's said and done, a user is no more prone to pick up germs from a biometric scanning device than from other common articles or surfaces that the public may generally touch, which include countertops and doorknobs.
Nevertheless, in order to stay away from a perception of hygiene troubles, biometric utilities should be cleaned and disinfected on a frequent basis and in a higher rate than a doorknob would usually be, in addition to organizations should supply a dispenser with liquid hand disinfectant by each apparatus. These types of measures assist in increasing the confidence level the of users in the new set up.
A lately deployed production of Schlage hand readers meets this dilemma face-to-face. To be launched in a later time this year, it will exhibit an superior plastic technology that minimizes the spread of micro-organisms and other bacteria. A particular silver-based substance, utilizing BioCote silver anti-microbial technology, is entrenched into the plastics utilized to construct the hand scanners, supplying a hygienic finish that defends against bacterial degradation and minimizes bacteria levels on the reader's exterior. The active agents in BioCote products are integrated during the developed procedure and continue to be active for the life of the biometric scanner.