In recent months, manufacturers have been trying to reconcile new technologies. The biometrics (that is to say, the discipline that is used to identify individuals through the morphological characteristics that make them unique) entered in securing the doors, allowing the locking or unlocking a lock. Individuals, professionals, and even some administrative buildings (including schools, town halls) replace their old locks with brand new biometric locks.
Beyond the extremely modern aspect, is there a benefit in security? Are they less or more vulnerable than traditional closure systems? Should we say goodbye to our keys, locks, cylinders, and other mechanisms? Nothing is less sure. Last week I talked about locks connected, showing the many vulnerabilities that can affect the security of your home and facilitate the intrusion of unwanted people.
Access control in organizations is regularly evolving to adapt to new data in the environment in which it is deployed. This environment consists of:
- The company itself, the wealth it develops, the evolution of its organization, and its organization of work,
- The risks involved, and the level of the threat,
- The technological offer proposed by the access control manufacturer.
In just a few years, the security of physical flow control systems has benefited from advances in advanced fields such as telecommunications, networking, and multimedia voice/data/image convergence solutions. These new data flow transaction modes have also facilitated the integration of new identification methods such as biometric access control and contactless technologies.
It made its appearance in the 1990s and had continued to grow ever since. It is a simple and effective automatic system based on the comparison of distinctive elements of an individual stored in a database and compared to each request for identification/authorization. In the context of Biometric Access Control, the analysis concerns morphological data specific to an individual. Some companies specializing in the development of door opening control equipment offer biometric solutions by analyzing hand geometry or reading a fingerprint. Still, others provide a biometric access control device by identifying the individual by the iris of the eye, through a suitable reading system.
Once the identification has been completed, the initiated process remains standard and involves the usual steps of authorization of access and related data logging.
A Delicate Choice
Due to the increasingly important involvement of these technologies in the life of the company and their distinct contribution to the proper functioning of the various entities, the choice of a solution proposed by a manufacturer requires an accurate analysis of the context. Depending on the existing hardware and software configurations, the answer chosen by the company manager can range from a simple video doorkeeper, posted at the main entrance of the company, to exact management of access authorizations. This management can involve a particular treatment reserved for a set of rooms and employees, according to time schedules modeled on production processes of delivery or validation.