Biometric SKUD terminals (fingerprint access control systems). Fingerprint Access Control Fingerprint Office Entry

Many biometric readers can be connected to the biometric access control system to scan fingerprints, iris, veins or face. Castle ACS can use any biometric readers with standard output interfaces

Biometrics ACS - fingerprint scanner

In biometric ACSs, a fingerprint scanner is often used, which is a special terminal (there are many models) that connects to the Castle ACS to restrict access to the premises according to various characteristics - access rights. Thanks to fingerprint recognition, the biometric scanner allows not only convenient access control without an access control card, but also performs time tracking functions.

For example, the following readers can be connected to the Castle ACS:

Biometric readers for ACS «Castle»

How the biometric access control system "Castle" works

Fingerprint scanners (readers) are connected to the Castle ACS controllers via a standard Wiegand interface. At the same time, each of the readers is connected to the object's IP network. The Castle ACS server interacts directly with biometric readers via an IP network, while for regular operation there is no need to install standard and not very functional software from the manufacturer of biometric readers.

Templates are added along with other employee data (name, position, department, etc.) using the Castle ACS software on the “Personnel” tab, while both a regular reader and a desktop USB reader can be used to obtain fingerprints, connected to the workplace.

Biometric ACS "Castle" supports the following access modes:

  • fingerprint only
  • only by ACS card
  • dual identification: access control card + fingerprint


Buy a biometric ACS Castle for time tracking. Calculation example

We offer you to get acquainted with the approximate cost of a biometric access control system. This calculation can be used both with and without connecting the front door, when employees will simply “check in”. The advantages of this identification method are that it completely eliminates the possibility of data falsification (for example, card cloning or registration using the same ACS cards for other employees). Fingerprints are individual for each person and do not change over time or after damage. Algorithms for the operation of biometric readers, such as fingerprint scanners, are provided free of charge and are included in any of the Castle ACS software packages.

For an individual calculation of the biometric access control system, please fill out a special form or call one of our offices.

Name Quantity, pieces Price

Price

Equipment for ACS

Network controller «Castle EP2». Ethernet communication interface.

Control reader BioSmart FS-80 with USB interface.

Biosmart 5-O-EM Em-Marine and biometric card reader, Wiegand-26 output protocol

Backup secondary power supply BBP-20

Lead-acid battery SF 1207

Software

Base module of Castle software, limited to 1000 access cards.

Additional module of the Castle software "Event monitoring (photo identification)".

Additional module of the Castle software "Accounting of working time".

Call us and we will help you choose the right biometric access control system and, if necessary, install it with the help of partners throughout Russia.

Fingerprint identification (dactyloscopy) is the most common technology used in today. The technology is based on the uniqueness of the pattern of papillary patterns on people's fingers.

The fingerprint obtained using the scanner is converted into a digital code, which is stored in the database, and then compared with previously entered and converted “fingerprint codes”.

Advantages biometric fingerprint access control - ease of use, convenience and reliability, high reliability and low cost of devices that scan the fingerprint image.

Among the shortcomings: violation of the papillary pattern with small scratches, cuts, chemical reagents; the impossibility of reading the print with some scanners with excessively dry skin.

The average fingerprint access control score is 0.001%. Stable operation of the identification system at FAR=0.001% is possible with the number of personnel N≈300.

Currently, fingerprint identification systems account for more than half of the market.

The world market of ACS by fingerprints

Grand View Research. World market of ACS by fingerprints 2015-2022

Grand View Research report forecasts global fingerprint access control market to grow to $4.4 billion by 2022 from current $2.51 billion in 2014

The market driver is the growth of e-commerce. The development of this market requires the implementation of secure online payments using new secure identification methods. The integration of fingerprint access control technology into a smartphone is designed to ensure when working with mobile applications.

Consolidation of efforts of market participants, infrastructure development, activity from the public sector may contribute to the growth of the fingerprint access control market during the forecast period. The development of technologies and the growing popularity of new biometric technologies, such as vein pattern, imitation fingerprint– the main constraints on revenue growth over the next seven years.

Cost-Effectiveness of Fingerprint Biometrics

Fingerprint access control systems named more efficient from an economic point of view, despite the lower cost of traditional readers.

"The main reason for this is that fingerprint recognition systems can provide a greater return on your investment", says Richard Forsythe, ievo UK & Ireland Sales Manager.

First, there are potential disadvantages. protection against unauthorized access traditional access control systems, which biometrics can reduce.

Since the biometric identifier cannot be lost or forgotten anywhere - increases system reliability especially for large objects.

Reduced value added systems for sites with a high turnover of regular users, such as student residences, where changing identifiers can significantly increase the project budget

The inability to transfer the biometric identifier to a third party provides Accuracy in work time tracking systems, and, consequently, the calculation of the salary of employees.

In addition, fingerprint identification systems allow, at minimal cost, to implement solutions used for various additional purposes such as managing the power system, libraries, archives, etc.

Fingerprint authentication methods

Technology Match-on-Host is the industry standard. The system consists of a fingerprint sensor that reads biometric data and sends it to a central external processor. All processing and searching for matching fingerprints is done on an external server.

Such a fingerprint authentication system is affordable, economical, and can be quite simply and quickly integrated into any existing access control system.

The popularity of Match-on-Host technology has led to innovations in related fields such as Fast Identity Online ( FIDO) formed by the Universal Authentication Framework (UAF).

Technology Match-in-Sensor has an architecture closed on the chip itself (system-on-a-chip or SoC). Fingerprint reading and all subsequent processing of biometric data is carried out directly in the IC sensor. This architecture is more secure as the attendance patterns are encrypted and signed by the sensor and all information is stored in a private flash memory.

One of them is called fake-finger-detection(FFD), also known as Liveness Detection SDK, is developed by NexID Biometrics LLC. The company has its own lab and also collaborates with biometric labs at Clarkson University and West Virginia University.

"Our research has made it possible to identify additional features of the captured fingerprint image that are very effective in differentiating a genuine (live) print from fake ones. In essence, we simply expanded our portfolio of fingerprint features, which resulted in high accuracy of the software,"- NexID COO Mark Cornette talks about the technology.

Version 2.0 of the NextID SDK demonstrates the accuracy range of identity fraud detection from 96.5% to 99.5%, depending on the mechanisms for creating a fake print.

"We continue to explore ways to reduce error rates to zero so that customers deploying based on fingerprint recognition, were confident in the accuracy of the sensors," says Mark.

In addition to working to improve the accuracy of systems and the study of constantly changing spoofing methods, creators fake-finger-detection pay great attention to improving the technical characteristics of the software. Trying to reduce the requirements for computing performance and free resources, while maintaining a full set of analysis functions and counterfeit protection, NexID has successfully integrated Software with SoC systems("match-on-chip").

"To achieve this, we have created new and innovative methods for image enhancement, feature extraction and statistical analysis to perform counterfeit fingerprint identification algorithms in a resource-poor environment," says Cornett.

Due to the minimum system requirements, the SDK live fingerprint recognition technology can be successfully integrated into, including ATMs, POS terminals, etc. Fake-finger-detection can be used both on its own and as part of it (for example, in addition to a password or ). In addition, there is a solution specially created by NexID for mobile devices with fingerprint sensors, in particular smartphones from Apple and Samsung.

Regardless of whether the technologies for creating fake fingerprints for verification in biometric systems are considered simple or complex, expedient or not, one cannot but admit that such a threat exists. Back in 2014 Chaos Computer Club published information on the possibility of obtaining initial data for creating a fake not only by contact (if a person touched any object with a polished surface, whether it be a glass or a smartphone screen), but also using a conventional camera.

Material of the special project "Without a key"

The special project "Without a key" is an accumulator of information about ACS, converged access and personalization of cards

For several years now, I have not used ordinary keys for locks in everyday life.
All these keychains are successfully replaced by one RFID card, but technology does not stand still and in my opinion it's time to abandon the access card.
For testing, I bought several models of access controllers with a fingerprint scanner.
I will now tell you more about one of them.

The first step is to scan the fingerprints of users.
The general menu looks like this

Fingerprint scan menu

For each user, you can scan all 10 fingers, in the same menu you can set the name and access rights.
In addition, the device has a built-in RFID card reader, and the access method can be combined


According to the manufacturer, 800 users are supported.

The scanning process is simple, each finger needs to be applied with a little effort 3 times. Upon successful verification of all three fingerprints, the finger is recorded in the database, and a confirmation message appears.
The reading process is very fast, less than a second.
Most of all I was worried about the quality of reading, as it turned out, there are no problems with this. The device confidently recognizes fingerprints, empirically established that there are 1-2 failures for 50 correct readings.

A typical wiring diagram for controlling an electromagnetic lock looks like this

There are two options for connecting or pairing devices over a network

The device maintains extensive log files, which can be obtained both over the network and via the USB port.

I used this device for a slightly different purpose, with its help I control the arming / disarming of the house.
Unfortunately, in my version, the lion's share of the device's capabilities is not used.
If this review is read by a person for whom the words UDP, PHP and script are not empty words, then please respond. Need advice on writing a small script for a package and writing its contents to the database.

And now it's time to look under the lid.

Everything is assembled well, soldering quality.
A speaker is visible on the left, the device announces the result of the scan with a voice, unfortunately in English.
There is a technological marking on the processor, but according to the manufacturer, this

RFID reader frame

In general, the device is well thought out and of high quality. All declared functions work both offline and online.
The device stays cold when used for a long time. You can activate the power saving mode, in which after a set period of time the screen becomes monochrome and the fingerprint scanner goes into standby mode.
Detailed instructions deserve special praise, which in itself is a rarity for devices from China.

I plan to buy +73 Add to favorites Liked the review +51 +122

In today's world, security plays a very important role. To ensure it, enterprises and the private sector use all kinds of security tools, united in a common network. Although it includes a certain set of security tools, individual elements can be distinguished from it, for example, fingerprint access control.

Special characteristics of surveillance and security equipment

A simple layman may not understand what ACS is in full and how it works. The security and control equipment, in accordance with the established algorithm of actions, performs the tasks of registering and accounting for certain objects, persons that pass through the specified checkpoints.

The photo shows a fingerprint ID

In addition to the main control tasks, additional goals are also set for the ACS:

  • Accounting for the time of work of employees;
  • Payroll (if there is integration with the accounting system);
  • Making lists of staff and visitors;
  • General connection with the security system (video surveillance, fire alarm).

The brain of this system can conditionally be called a certain type of controller. It is in it that all information data about the personnel is stored, which, when read from the device, is granted access.

Information reading devices

The device that transmits the information received from the user to the controller is the reader. There are various variants and modifications of this technique. The instrument is not a one-size-fits-all tool as it depends on the system within a particular area or building. The device itself can be in the form of a pair of electronic contacts or a device for reading the user's card, where his data is stored. As a rule, if the type of such systems is installed outdoors, then additional protection is required for it. This is due to the possibility of causing harm to equipment by hooligan actions, adverse weather conditions, etc.

Among the most common ways to read in the ACS are the following:

  • Use of special barcodes;
  • RFID readers;
  • Magnetic or special contact cards (reader);
  • Biometric reading system.

In the photo you see an image of a magnetic card for an access system

It is the latter that serve as an integral part of advanced developments for ACS and are, as a rule, built into it. A biometric reader is a device that serves to manage access control and identify individuals based on their unique physiological information.

In equipment of this type, to a greater extent, the following methods of personality recognition are used:

  • Fingerprint reader;
  • Scanning the lining of the eye;
  • Retina;
  • Physical features of the hand;
  • Human voice;
  • Reading handwriting under certain conditions.

This video shows the principle of the hand physical feature scanning system:

The fingerprint access control network is the most common among others.

Classification of scanning equipment

There are three general types of fingerprint scanners available today:

  1. With the use of optics;
  2. Use of semiconductor means;
  3. Ultrasonic scanner.

At the root of the first type of scanner lies the principle of obtaining an image using optics. Such devices also have their own subgroups. The first of these includes an FTIR scanner, that is, a fingerprint access control system in which the effect of a complete violation of the internal pattern is applied. This means that when light hits the surface, its beam is divided into two components, one of which penetrates the other medium. Such a beam of light overcomes the border when the fingerprint comes into contact with the surface of the device. A specially built-in video camera will be used to fix the imprint.

The second subgroup is represented by fiber optic scanners. On the surface of the device there are special fibers, upon contact with which the necessary information begins to be read.

The principle of operation of a fiber optic scanner is shown in this video:

The third subgroup consists of the so-called roller scanners. Here you need to swipe your finger over the surface of the ACS in a peculiar way.

The next type of experts include flint fingerprint readers. A feature of their work is the reading of papillary finger patterns. Among them are capacitive, pressure-sensitive and thermal scanners. The first group of semiconductors is the most common among other ACS devices. When a finger touches the surface, a certain container appears, the matrix of which is converted into an image.

And last but not least is the ultrasonic scanner. Fingerprint access control is carried out using ultrasonic waves and measuring the distance between them. This type is the safest and highest quality of all presented, since in addition to the print, even the pulse on the finger can be checked.

Complex based on readers and biometric terminals

The ZK F7 reader and its older counterparts F702S and F10 are typical examples of devices designed both to control the system autonomously and included in a centralized network. The first apparatus mentioned has a rather small template database (600 in total), that is, the storage data of the apparatus can have no more than 600 users. F702S in this regard has 1500 templates, which is a good and sufficient indicator for many enterprises and organizations using recognition devices.

How to connect and work with a biometric reader is shown in this video:

These access control systems or similar ones have specialized software that has an intuitive interface and in many cases has a Russian-language menu, which provides the user with fairly comfortable conditions for its operation. The software supplies the device with a set of information about users, taking into account their access level, providing real-time monitoring of processes with the ability to display various information and generate analytical reports.

The F10 optical reader stands out in this category. This model has a Wiegand-interface, which is able to integrate as much as possible into the system of almost any manufacturer. These components, like any other, are programmed via an Ethernet network. The Wiegand format is subject to arbitrary configuration by the user, having a code length of 26-64 bits. Most fingerprint readers operate in several object identification modes. The 1:N mode serves only for identification, while the 1:1 mode can carry out a full verification of the object (additional entry of a PIN code for users with advanced access).


The photo shows a biometric identifier

If we consider a budget fingerprint reader for accounting for operating time, then the U160 and iClock360 IP terminals or similar devices with similar characteristics stand out here. Biometric systems (terminals) themselves serve, like other equipment similar to them, to collect information about the arrival or departure of employees, generate reports for enterprise security structures or for accounting. The volume of user data storage in the terminal is more than the above examples and is about 2200 templates. This category is necessarily equipped with a built-in keyboard, a display with information output, as well as the ability to work in several user identification modes. A feature of the terminals is considered to be their ability to work offline, which greatly facilitates the maintenance process.

Of course, with a large selection of equipment for monitoring and access, it is difficult to make a choice on something specific, because all devices of one type or another have their pros and cons. But what primarily distinguishes a system with a fingerprint reader is the highest level of security in comparison with other options. As for the financial side, the price range in this area allows a potential ACS buyer to choose the most suitable product for themselves.