Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

From Casinos to ‘Multi-cards’

July 1, 2005
Finger biometrics is embedded in a cellular phone.
Hollywood would have its viewers believe that facial recognition can pick a person out of a crowd in a casino, find that person’s driver’s license record, learn his or her behavioral patterns, and then be able to identify that individual while they were disguised. Relax, Mr. Bond, we’re not there yet.

Much of what’s happening centers on mutli-technology cards including biometrics and smart chips.

Which technology should be chosen: fingerprint, hand geometry, voice verification, retinal or facial recognition? Which one is accurate? Which is least expensive? What does it take to have a solution implemented? Is the information secure?

Multi-cards can include biometrics on a smart card.

PC-based

The PC-based approach is where the biometric identifier is gathered from a remote source and sent to an application that resides on a PC for verification or identification.

Most biometrics started out using this configuration, and as optimization and algorithms were improved, dedicated hardware components took over.

This configuration has an advantage in that memory and storage space is abundant and cost effective. The disadvantages are numerous. Because this configuration requires the use of the PC for access, the biometric PC, the PC that is running the access control software and the network between them must be 100-percent operational at all times that the biometric devices could be in use. Additionally, a limited number of devices are supported, sometimes just one device per biometric PC.

Standalone

The standalone approach is a simple way to add a biometric layer to an existing access control system. The output from this device is typically Wiegand and is compatible with the majority of existing access control systems. This is a simple configuration to implement and can be retrofitted quite easily.

The standalone unit can use a common credential (card or PIN) to perform verification at the unit. Upon successful verification, the initiating credential is output to the access control system as a Wiegand card.

This is an attractive option on a few doors for which only a handful of individuals require access. Due to the enrollment/deletion process, limited reporting capabilities, and the potential for complete biometric bypass, this configuration is not suitable for exterior doors or larger installations.

Portable database

The portable database approach involves the storage of the biometric template on a credential (i.e. smart card) and not in the access control system or the biometric device. The biometric device verifies the biometric template on the card and outputs a Wiegand card swipe.

Integrated template management

The integrated template management approach involves the storage of the biometric templates at the intelligent controller of the access control system. These templates are enrolled at the PC using the access control system software and downloaded to the controller over the existing communications path. There is no need for a separate network and additional software to download templates. The templates are always available and stored in a secure location. Adding encryption to the communications path, such as FIPS 197 AES 128 bit, which is used by the federal government, will encrypt the biometric templates as well.

Sidebar: Wedded to Embedded

So says Scott Moody, president and CEO, AuthenTec, Melbourne, Fla. “In the enterprise and commercial markets, biometric sensors can restrict access to specific devices and files, as well as identify ‘who’ is accessing the network and ‘when’ – both crucial aspects of new IT security initiatives like Sarbanes Oxley or HIPAA compliance.”

What’s more important, this additional level of security is also enabling new mobile applications – such as m-commerce – and features and functions such as fast user switching, fast application switching, secure password replacement and scrolling capabilities, all at the simple swipe of a finger on a cellular phone or PDA.

According to Moody, some new advanced sensors even read below the surface of the skin – making them more secure, and capable of reading virtually every finger – under any conditions.

Bill Spence of Recognition Systems (IR Security, Carmel, Ind.) sees value from embedded biometrics at the door. He believes that, when biometrics is embedded, neither PC nor other IT elements are involved in managing the database at the door. In some instances, this level of integration can be achieved without reporting to an external access control system. If one is not authorized to enter, the reader at the location, without checking elsewhere, tells that person that they cannot enter. Likewise, if authorized, that person can enter without the reader having to verify from a remote location.

In addition, smart cards can store both the user’s ID number and a biometrics template on the card. Because of this, there is no need to distribute templates across a network of readers or require the access control system to manage biometric templates.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Multi-tech Cards Bridge to Smart Ones

    See More
  • Multi-tasking – It’s in the Cards

    See More
  • Photo courtesy of G4S Secure Integration; access control, ID badges, security integration, university security, security technology

    Access Control is Only the Beginning for Multi-Function Cards

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Optimizing Social Media from a B2B Perspective

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing