Education and medical care markets have an increasingly important need to merge comfort and security while validating "true identity" rather than identity that is simply associated with the possession of an identification card.
Biometric technology is rapidly proliferating in consumer applications, such as those in the financial market, for the authentication of customers in payment services, as well as in ATMs, especially in high fraud markets.
The adoption of biometrics As an additional authentication factor for physical access control systems (PACS) and other business applications it has been much slower. However, there are numerous reasons why this is changing, especially in the education and medical care markets, where there is an increasingly critical need to merge comfort and security while validating the "true identity" instead of Identity that is simply associated with the possession of a card ID.
First, biometric solutions are now available with new anti-spoofing capabilities. They are also being integrated into secure trusted platforms that protect privacy, and support a variety of RFID credential technologies while offering a much higher match rate and better overall performance than before.
This will dramatically improve the security of an organization while increasing user comfort. These capabilities are critically important in today's educational and healthcare environments.
Barriers to campus adoption
Biometric technology is particularly suitable for university campuses and hospital applications due to its inherent ability to prevent a user from taking another person's card and obtaining access to privileged resources. When used for authentication, it adds the human element to strengthen security by combining something that the user "is" with something that the user "has" or "knows".
Clearly, being able to identify people with 100% accuracy is essential in medical care so that medical professionals can properly diagnose and treat people according to the correct medical history of the patient. But while the analyst firm Verified Market Research has estimated that the total global market for biometric systems is more than $ 13 billion in 2017, it only valued the health biometrics market at $ 1,182.4 million in 2016. At the same time, However, the company expects a healthy market. Compound annual growth rate (CAGR) of 19.9 percent in this market, at USD 5,701.25 million through 2025.
Moving fingerprint authentication beyond numerous consumer applications for broader adoption in health, education and other business applications will require several obstacles to growth to be removed. While the price has been a major obstacle, historically there have also been other reasons for its slower growth than expected.
First, many biometric technologies remain vulnerable to fakes and hackers when scammers create a fake fingerprint and present it to a reader. In addition, older products have led users through doors much more slowly than ID cards and readers. There may be significant differences in performance between various fingerprint capture technologies.
The newest solutions are overcoming these safety and convenience obstacles in three key ways:
- How fingerprint images are captured (if the image cannot be captured correctly, the rest of the process fails)
- The implementation of life detection to improve confidence (even if the image is captured correctly, if it is false, the system cannot be trusted)
- Performance optimization through a combination of new technologies and algorithms while ensuring interoperability so that performance can be trusted.
Solving the capture problem
The quality of the captured image is critical in all types of fingerprints and in a wide range of environments.
Many customers choose sensors that use multispectral images because they collect information from the inside of the finger to increase available surface fingerprint data. The mask is illuminated at different depths to offer much richer data on the surface and surface characteristics of the fingerprint.
In addition, the sensor collects finger data, even if the skin has poor contact with the sensor due to environmental conditions such as water or finger contamination.
Multispectral sensors work for the widest range of people with normal, wet, dry or damaged fingers, in the widest range of conditions of use, from lotions or grease to sunlight or wet or cold conditions. The sensors also resist damage from aggressive cleaning products and contamination of dirt and sunlight.
Improvement of trust through life detection
Vitality detection is the ability to determine that the biometric data captured by the fingerprint reader comes from a real person, not a fake plastic or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, life detection is critical to preserve confidence in the integrity of biometric authentication.
At the same time, it should not impede performance or lead to excessive false rejections by the user.
The most reliable multi-spectral image fingerprint sensors with life detection provide a real-time determination that biometric captures are genuine and are being presented by the rightful owner, rather than someone who personifies them.
This capability takes advantage of the image capture approach of using different colors or spectrum of light to measure surface and subsoil data within a fingerprint.
In addition to this optical system, the biometric sensor features several main components, including an integrated processor that analyzes raw image data to ensure that the sample being photographed is a genuine human finger rather than an artificial or false material. Advanced machine learning techniques are used so that the solution can adapt and respond to new threats and counterfeits as they are identified.
Life detection gives health care organizations the security, for example, that they are complying with HIPAA regulations to verify identity without fear that someone will gain access using a false fingerprint.
On the university campus, this capability is similarly defended against someone who steals and uses someone's campus ID card to, for example, gain unauthorized access to their dormitory or buy meals in the cafeteria fraudulently using their account .
Performance optimization requires life detection and underlying capture technology, but it is also important to ensure that this performance can be trusted.
Increasing the performance you can trust
Providing superior performance requires the ability to always capture usable biometric data in the first attempt for each user.
It is also necessary to speed up the process of determining that biometric data is not false, and to match templates to reject impostors and match legitimate users.
However, being able to rely on this performance requires a focus on interoperability with template matching algorithms.
Independent third-party testing laboratories such as the National Institute of Standards and Technology (NIST) conduct extensive interoperability tests so that performance data is more than a supplier's claim and can really be trusted.
The first step to incorporate biometrics into a physicist access control The solution is to choose a secure trust platform that meets the accessibility and data protection requirements in a connected environment.
The platform's credential technology must employ encryption, and there must be a software-based infrastructure to ensure reliable identities in any form factor for physical access control, as well as access to IT networks and more.
Man attacks in the middle can be prevented by cryptography, which also protects the biometric database. Other important features of the system include the remote management of all readers and users from the incorporation to the loading of templates and the registration activities for the supported authentication modes.
Configuration and administration are also important considerations, along with how records, reports and monitoring are implemented.
System administrators will want to manage biometric readers as groups or individually across the network, and they must have tools to manage all configuration settings, from time and data to language, security and synchronization.
Other important features of the system include software tools to configure and manage one or more readers, including the registration of user fingerprints and the assignment of access rights. These tools can also be used to securely record all gate events where readers have been installed and to update readers in the field remotely through a TCP / IP connection.
Back-end implementation decisions include how to seamlessly integrate the biometric authentication system into third-party systems. Until recently, this was an important point in the implementation of biometric technology, but now application programming interfaces (APIs) are available for the direct integration of the biometric authentication solution with the access control infrastructure.
Improved privacy protection is a great benefit of biometric solutions properly implemented with life detection. Since they make it impossible to use a fake finger, they make sure that even if a scammer got the data from someone's fingerprints, it makes no sense. Solid and updatable life protection is a key prerequisite for using biometrics to eliminate the need for PINs or passwords.
Biometric data should be handled like all sensitive and identifying information. When system designs are designed correctly, they protect against internal and external threats and attacks.
The latest system architectures and data models today have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available to build highly secure and well protected systems.
As an example, the use of multifactor and even multimodal authentication is a proven way to maintain security, even if some identification data is compromised.
Modern fingerprint authentication solutions are prepared to provide physical access control systems in educational and healthcare settings with a unique combination of ease of use, availability, convenience and increased security.
They present significant improvements in life detection, system architectures, performance and the ability to easily incorporate into access control solutions. This allows them to perfectly combine security and convenience so that they become a viable option when accessing campus facilities and a wide variety of networks and services.
These solutions offer greater confidence of "who" is being admitted to a university residence or classroom or to the entrance door of a hospital and other restricted areas, all places where this trust really matters.
Wayne Pak is the director of product marketing for HID Global.
This article was originally published in the sister publication of Security Sales & Integration. Campus security.