Biometrics In Physical Access Control Issues, Status and Trends

advertisement
Biometrics In Physical Access Control
Issues, Status and Trends
Bill Spence
Recognition Systems, Inc.
Biometrics identify people by a unique human characteristic. The size and shape of a
hand, a fingerprint, the voice and several aspects of the eye are just some unique
attributes. No longer are these devices found only in James Bond movies and Star Trek
reruns. They are used on the front door of thousands of businesses around the world.
Modern biometrics actually got their start in access control applications as far back as the
mid 1970s. The early installations were typically very high security in nature, due
primarily to the high cost of biometric devices. In recent years, the advent of inexpensive
microprocessors and advanced imaging electronics have dramatically reduced the cost
and increased the accuracy of biometric devices. These changes have allowed biometrics
to become more and more a part of the commercial access control landscape. Today,
thousands of businesses use biometrics for all or part of their access control needs.
Biometrics are not just for nuclear power plants any more!
This paper will examine how biometrics are integrated into access control applications
and the key issues to be considered when using a biometric device. We will also
summarize the devices currently available on the commercial market and take a brief look
at what the future may hold for the industry.
The Benefits of Biometrics in Access Control
The goal of any access control system is to let authorized people into specific places.
Only with the use of a biometric device can this goal be achieved. A card-based access
system can control the access of authorized pieces of plastic, but not who is in possession
of the card. Systems using PINs (personal identification numbers) require that an
individual only know a specific number to gain entry. Who actually enters the code can
not be determined. Biometric devices verify who a person is by what they are, whether it
be their hand, eye, fingerprint or voice.
Biometrics also can eliminate the need for cards. While dramatic price reductions have
lowered the initial cost of the cards in recent years, the true benefit of eliminating them is
realized through a reduced administrative effort. A lost card must be replaced and
reissued by someone. There is a cost associated with the time spent to complete the task.
Eyes and hands are seldom lost, stolen or forgotten. They also don’t wear out and need to
be replaced.
Integration
The primary function of any biometric device is to verify the identify of an individual.
Access control requires the ability to not only identify the person, but unlock a door,
grant or deny access based on time restrictions, and monitor door alarms. There are
several ways biometrics can accomplish this task.
Standalone Systems
Many biometrics are available in this type of configuration. These devices are not only a
biometric, but also a complete door controller for a single door. Users are enrolled at the
unit and their biometric template is stored locally for subsequent comparison. The actual
comparison is accomplished within the unit and a lock output is energized depending on
the outcome. Input points are available to monitor the door switch for “door open too
long” and “door forced open” conditions. Outputs are provided to signal a bell or alarm
panel if an alarm condition is detected by the system. An audit trail, if required, is
available by connecting a printer to the unit. Time restrictions are programmed through
the integrated keypad for individual users. The number of users is limited by the
available memory and varies from manufacturer to manufacturer.
Example of a Standalone Configuration
Networked Systems
Many access control applications have a need to control more than one door. While
multiple standalone units could be employed, a network of biometric readers is more
common. By networking the systems together and then to a computer, several advantages
are available to users. The most obvious is centralized monitoring of the system. Alarm
conditions and activity for all the doors in the system are reported back to the PC. All
transactions are stored on the computer’s disk drive and can be recalled for a variety of
user customized reports. Networked systems also provide for template management.
This process allows a user to enroll at a single location and have their template available
at other locations. Deletion of a user or changes in their access profile need only be
entered at the PC. Some biometric systems such as the one offered by Voice Strategies
store all information in the PC and template comparison is also performed there. Others
distribute template information to the individual readers at each door. Either way, the net
effect of template management is the same. The connection between units is typically
accomplished via RS485 or over a modem connection. In the case of voice systems,
telephone lines are used.
Example of a Network Configuration
Third Party System Integration
Biometric manufacturers offer a variety of different methods to integrate into
conventional access control systems. The most common way is referred to as “card
reader emulation”. In this mode, the biometric device essentially works with the access
control panel in the same way a card reader does. The “card reader output port “ of the
biometric is connected to the panel’s card reader port. This method is very effective
when integrating into existing card based systems. The wiring is identical to the card
reader’s wiring. When a person uses the biometric, it outputs the ID number of the
individual if and only if they are verified. The format of the output is consistent with the
card technology used by the access control panel. Once an ID number reaches the panel, it
is handled as if it came from a card reader. The determination of granting access is made
by the panel. Door control and monitoring is all handled by the access control panel, not
the biometric. As an alternative to a keypad, some biometrics have card reader input
capability. At the biometric, the user swipes their card which contains their ID number.
If verified, that card number is sent up to the panel for a decision. Various card
technologies are supported by biometric manufacturers and include smart cards, Wiegand
formats, magnetic stripe and bar code. The most two commonly available formats are 26
bit Weigand with an 8 bit facility code and ANSI Track 2 for magnetic stripe. Proximity
cards can also be used as an input since they usually have the ability to output in a
Weigand format.
In all card reader emulation systems, template management is not handled by the access
control panel. If there are multiple biometric units in the system, this can be an issue to
consider depending on the size of the biometric user population. The larger the number
of templates to manage, the larger the issue. In some biometrics, it is possible to link the
biometric units together and let them handle the template management. This network is
separate from the access control system, but does allow users to enroll at a single location
and have their template information distributed to other readers.
A few access control manufacturers have fully integrated biometrics into their access
control systems. The ID3D HandKey from Recognition Systems for example is
integrated with Monitor Dynamics Inc., Sensormatic/Software House and Westinghouse.
In this type of integration, the access control software handles the template management
and communications to the biometric units.
Example of a Third Party System Integration
Issues to Consider
Acceptance
The most critical factor in the success of a biometric system is user acceptance of the
biometric device. There are several factors which have an impact on acceptance. First,
the device must cause no discomfort or concern for the user. This may be a subjective
issue, but it is important to fully explain any concerns users may have. If people are
afraid to use the device, they most likely will not use it properly and that may result in
them not being granted access. Second, the biometric must be easy to use. People like
things that are simple and intuitive. How many times have you been frustrated at a card
reader that gives no indication of which way to swipe the card? Third, the biometric must
work correctly. If a biometric is working properly, it does two things. It keeps bad guys
out and lets good guys in. Yet, no device is perfect and biometrics are no exception. The
two errors a biometric can make are letting the bad guy in and keeping GOOD guys out.
The probability of one of these errors happening is characterized by the False Accept and
False Reject error rates.
False Accept Rates
The probability of allowing an unauthorized user pass for someone else is known as the
False Accept Rate. This error rate must be low enough to present a real deterrent for a
given application. False Accept Rates claimed in today’s biometric access systems range
from .0001% to 0.1%. It is important to keep in mind that the only way a false accept can
occur is if someone tries. Therefore, the False Accept Rate should be multiplied only by
the number of unauthorized attempts in order to determine the number of possible
occurrences. To give some perspective to these numbers, the biometric used on the front
entry area of 60 percent of U.S. nuclear power plants has a False Accept Rate of 0.1%.
False Reject Rates
False Accept Rates are certainly important in security applications. But, the False Reject
Rate, which affects the good guys, is just as critical. The False Reject Rate or Insult Rate
is the probability that the biometric does not recognize an authorized user and therefore
denies them access. One can see the importance of a low False Reject Rate if you
consider that an access control point that does not allow bad or good guys in, is
commonly known as a wall. The False Reject Rates quoted for currently available
systems vary from .00066% to 1.0%. A low False Reject Rate is so important because
this type of error can occur with almost every use of the device. How many times will
authorized people attempt to gain access in a given day? To illustrate this point, an
example may be helpful. A company with 100 employees has a biometric device on the
front door. On average, the front door is used by each employee four times per day. This
would yield 400 transactions per day by the good guys. A False Reject Rate of 1.0%
would predict that each day, four good guys (one percent of 400) would be denied access.
Over the course of a five day week, that’s 20 problems for the good guys. Reducing the
False Reject Rate to 0.1% would result in only two problems for that same one week
period. What is considered an acceptable level of false accepts and false rejects depends
on the application. Understanding the impact to your application of these error rates can
mean the difference between success and failure.
A low False Reject Rate will also have a significant impact on user acceptance. If
someone is authorized to enter and the biometric recognizes them, then the system
works. People like things that work. If the biometric mistakenly doesn’t allow them
access, frustration will set in quickly and the biometric may never be accepted.
Equal Error Rates
In a biometric device, the False Accept and False Reject Rate can be affected by
increasing or decreasing the sensitivity of the device. The two rates are inversely
proportional and can be likened to a car alarm. When your car alarm is very sensitive, the
probability of the bad guys stealing your car ( a false accept) is very low. Yet the chances
of you accidentally setting off the alarm (a false reject) are higher. Reduce the sensitivity
and the number of false alarms will go down, but then you increase the chances of
someone being able to steal it. How much each error rate is affected by altering the
sensitivity is a characteristic of each manufacturer’s device. A device may offer an
extremely low False Accept Rate at a given sensitivity, but the corresponding False
Reject Rate may be totally unacceptable. The balance of the two error rates for a given
application is critical to the success of a biometric installation. Error curves such as the
ones below give a graphical representation of the biometric device’s personality, so to
speak. The point at which the false accept and the false reject curves intersect is called
the Equal Error Rate. This is the point where the two error rates equal one another. The
corresponding sensitivity setting for the Equal Error Rate is found on the lower axis. The
Equal Error Rate can be a good indication of the biometric’s all around performance. The
smaller the Equal Error Rate, the better.
% Error Rate
5.00%
4.00%
3.00%
2.00%
1.00%
Decreasing
Sensitivity
False Reject
200
190
180
170
160
150
140
130
120
110
100
90
80
70
60
50
40
0.00%
Increasing
False Accept
Example of Error Rate Graphs
Validity of test data
In general, testing biometrics is a difficult task because of the extremely low error rates
involved. In order to attain any statistical confidence in the results, thousands of
transactions must be recorded. Some quoted error rates are the result of theoretical
calculations. Others are obtained by actual field testing of the devices. Field test data is
usually more desirable since it is a real world test of the device. In the case of False
Reject data, only field test results can be considered accurate. This is due to the fact that
biometric devices require human interaction and rely on human characteristics for
verification. If the device is difficult for a person to use, false rejects will tend to go up.
If the attribute used for verification varies for some reason, a false reject could also occur.
None of these conditions can be accurately quantified and included in a theoretical
calculation. On the other hand, False Accept Rates can be reasonably calculated for some
biometrics by performing cross comparisons of templates in large template databases.
Currently, most field test error rate data for biometric devices has been generated by end
users and the various biometric manufacturers. There have been several tests completed
by independent laboratories, namely Sandia National Labs of the U.S. Department of
Energy. The last test released from Sandia was performed in 1991. In any case, it is
important to remember that error rates are statistical in nature. They are derived from a
series of transactions that were created by a population of users. In general, the larger the
population and the greater the number of transactions studied, the greater the confidence
level in the accuracy of the results. If the error rate is reported at 1 in a 100,000 and only
100 transactions were included in the study, the confidence level in the result would be
very low. If the same error rate was reported and 1 million transactions were used, the
confidence level would be much higher. The magnitude of the reported results will have
an effect on the size of the sample needed for a reasonable confidence level. If the
reported error rate is one in ten, then a sample of 100 transactions may provide a
sufficient confidence level. Conversely, 100 transactions would be too small a sample if
the error rate was reported as 1 in 100,000.
Throughput
A logistical issue that should be considered carefully when using a biometric is the
throughput. Throughput is the total time that it takes for a person to use the device. It is
difficult for manufacturers to specify a throughput since it is application dependent. Most
manufacturers specify the verification time for the reader, but that is only part of the
equation. When a person uses a biometric reader, they typically enter an ID number on
an integral keypad. The reader prompts them to position their hand, finger or eye where
the device can scan physical details. The elapsed time from presentation to identity
verification is the "verification time." Most biometric readers verify ID in less than two
seconds. Those considering the use of biometrics for access control must look beyond the
verification time and consider the total time it takes a person to use the reader. This
includes the time it takes to enter the ID number, if required, and the time necessary to be
in position to be scanned. If ID numbers must be entered, they should be kept as short as
possible. If a long ID number must be used, some biometrics can obtain the number by
reading a card, which contains the ID number in the card code. One must weigh faster
throughput gained by using cards against the card administration costs. The total time
required for a person to use the reader will vary between biometric devices depending on
their ease of use and verification time. A card-based access system may appear faster.
However, as one hand geometry user points out, "The speed difference between a card
and the hand reader is about two seconds, but you make up for it (the difference) since
your hand is right in front of you, verses fumbling around looking for your card."
The Technologies Currently Available
A wide variety of human characteristics are used by biometric devices to confirm a
person’s identity. The industry is constantly finding new attributes and ways to measure
their uniqueness. Some of these systems are still in the development stage and are not
currently available in a form that can be readily used in access control systems. These
emerging technologies will be discussed later. Here, we will review the biometric
devices that are commercially available today. Unless noted, all of the information has
been provided by the individual manufacturer. A contact name and phone number for
each of the manufacturers is supplied at the end of this paper.
The Eye
Two companies currently produce systems utilizing different aspects of the eye for
identification, EyeDentify and Iriscan. The EyeDentify system looks at the vascular
pattern on the retina of the eye. Iriscan, as the name implies, relies on the iris (the colored
part of your eye) for identification. Both technologies do not require the entry of an ID
number when using the system.
EyeDentify
EyeDentify’s first product offering was released in 1982. The technology was further
refined and a second generation system came to market in 1989. Continued
advancements and cost reductions have resulted in the current product.
Product:
List Price:
False Reject Rate:
False Accept Rate
Equal Error Rate:
Verification Time:
Standalone:
Network:
Card Reader Emulation:
Icam 2001
$2650
0.4%
0.001%
Not Supplied
1.5 to 4 seconds (varies depending on number of users)
Yes
Yes
Yes
Iriscan
In 1994, Iriscan brought their technology to the commercial market. The image of the iris
is captured with a standard video CCD, similar to those found in a video camera.
Product:
List Price:
False Reject Rate:
False Accept Rate
Equal Error Rate:
Verification Time:
Standalone:
Network:
Card Reader Emulation:
System 2000EAC
$5950
0. 00066%
0. 00078%
0. 00076%
2 seconds (10,000 users)
Yes
Yes
Yes
Fingerprint
Law enforcement agencies have used fingerprints for decades to identify individuals.
Efforts to automate the process were started in the late 1960s by the U.S. Federal Bureau
of Investigation (FBI). Currently, there are several manufacturers which have systems on
the market designed specifically for access control applications.
Identix/Bio Recognition Systems
Identix first introduced a fingerprint system for access control in 1988. In 1994, they
formed a relationship with Bio Recognition Systems (BRS). BRS integrates the Identix
fingerprint capture unit and the associated algorithms for template creation into their
access control terminal. Identix recently purchased BRS
Product:
List Price:
False Reject Rate:
False Accept Rate
Equal Error Rate:
Verification Time:
Standalone:
Network:
Card Reader Emulation:
TouchLockII
$2950
<1.0%
0.0001%
Not Supplied
0.5 seconds
Yes
Yes
Yes
Mytec
Mytec utilizes optical computing techniques to process the fingerprint image. This
methodology allows for large amounts of data to be processed very quickly. The unit is
just coming to market and error rate studies are in process.
Product:
List Price:
False Reject Rate:
False Accept Rate
Verification Time:
Standalone:
Network:
Card Reader Emulation:
Mytec Optical Fingerprint Comparator
TBD
Error rate studies in process
<0.1 seconds
Yes
Yes
Yes
Startek
This Taiwanese company first brought a system to market in 1993. The information
provided here is from reference sources. Startek did not respond to the request for
information on their system.
Product:
List Price:
False Reject Rate:
False Accept Rate
Equal Error Rate:
Verification Time:
Standalone:
Network:
Card Reader Emulation:
FIC-2000I
$5500 for a four door system
1.0%
0.0001%
Not supplied
<1 second
Yes
Yes
?
Hand
The size and shape of the hand and fingers is used by a hand geometry system to verify a
person’s identity. Hand geometry was the technology used for the very first commercially
available biometric device, the Identimat, which came to market in 1976. Today, two
companies offer hand geometry systems, Recognition Systems, Inc. and BioMet Partners.
BioMet Partners
The Digi-2 was introduced in 1994 and verifies an individual by looking at the size and
shape of two fingers. BioMet Partners provides an OEM module that consists of an
optical assembly and the associated template creation algorithms. The module is then
integrated by other companies into an access control reader configuration. The following
information was obtained through reference sources.
Product:
List Price:
False Reject Rate:
False Accept Rate
Equal Error Rate:
Verification Time:
Standalone:
Network:
Card Reader Emulation:
Digi-2
Not Supplied
0.1%
0.1%
0.1%
1 second
Yes
Yes
Yes
Recognition Systems, Inc.
After introducing their first system in 1986, Recognition Systems has refined and reduced
the cost of the technology. They currently offer their third generation product, the ID3D
HandKey, which was released in 1991. The system evaluates a three dimensional image
of the four fingers and part of the hand to verify a person. To date, the ID3D is the most
widely used biometric device for access control applications.
Product:
List Price:
False Reject Rate:
False Accept Rate
Equal Error Rate:
Verification Time:
Standalone:
Network:
Card Reader Emulation:
ID3D HandKey
$2150
0.1%
0.1%
0.1%
1 second
Yes
Yes
Yes
Voice
Voice verification utilizes characteristics of the voice, including bass and treble tones,
vibration in the larynx, and throat and nasal tones. Several companies have introduced
voice systems over the years, but only one, Voice Strategies, is actively marketing a
system.
Voice Strategies
First introduced in 1991, the Voice Strategies system uses technology developed by Texas
Instruments. Telephones located at the access points are linked to a central computer
where the verification process takes place.
Product:
List Price:
False Reject Rate:
False Accept Rate
Equal Error Rate:
Verification Time:
Standalone:
Network:
Card Reader Emulation:
VACS (Voice Access Control System)
$21,000 for a 16 door system
Error rates were not supplied
1.5 seconds
No
Yes
No
The Future
Lower Costs
The one thing that can be said with certainty about the future of the biometrics industry is
that it is growing! Biometrics are finding their way into all kinds of applications beyond
access control. Time and attendance, border crossings, day care centers, welfare
disbursement and point of sale are just a few of the applications where biometrics are
currently utilized. The use of smart cards is growing and so is the amount of information
they can store. The more data stored, the greater potential for privacy and security issues.
Biometrics are an obvious solution to these issues. As the number of uses increases so do
the volumes at which the devices are produced. This will ultimately reduce the cost of
systems. In addition, the seemingly endless reduction in the cost of computing power will
also contribute to lower costs.
Increased Accuracy
Biometrics got their start in very high security applications. The primary design criteria
of those systems was to keep the bad guys out, with little attention paid to letting the good
guys in. For those applications, a low False Accept Rate was the most important
specification. As biometrics move into more commercial/public applications, the False
Reject Rate becomes more critical. Barclay’s Bank made this clear by suggesting that a
biometric suitable for credit card verification would have a False Reject Rate of one in
100,000 and a False Accept Rate of 5%. Certainly the False Accept Rates required by the
commercial access control market are more stringent, but the need for low False Reject
Rate is clear. Low False Reject Rates, delivered in systems that are intuitive to use, are a
necessity for widespread use of biometrics in this market. In recent years, biometric
manufacturers have put tremendous energy into this area of development and will
continue to do so. One additional necessity for increasing accuracy is the need for more
rigorous testing of biometric devices. As the error rates grow smaller, the size of the test
will need be larger.
New Technologies
The market for biometric devices is not the only part of the industry that is growing. The
number of technologies and manufacturers is also expanding. Some of the new
technologies look at new unique attributes while others improve on ways to look at
characteristics currently being used by today’s biometric systems.
One new attribute that has received a fair amount of attention is facial recognition.
People easily identify other people by looking at their face, but automating the task is by
no means simple. Most of the work in this area has been dedicated to capturing the image
of the face through a video camera or picture. One company has taken a different
approach and looks at the thermal pattern created by the blood vessel structure of a
person’s face. Another company relying on the circulatory system examines the pattern
of veins and arteries on the back side of your hand. Several companies are developing
systems that use the other side of a hand and identify individuals by their palm print.
There is also work being done on an electronic nose. A blood hound can tell two people
apart by their scent, why not a biometric!
Some new technologies are being applied to human attributes that are already being used
by commercial biometric system. For example, a new sensor is being developed for
fingerprint image capture that utilizes ultrasonics to acquire the picture. This approach
could minimize the impact of dirt and debris which can cause problems with traditional
optical methodologies. Holograms are being employed to store fingerprint images
allowing for compact storage media and fast “optical comparisons”.
While all of these technologies hold promise, their usefulness will be determined by their
ability to provide a solution at a price/performance ratio that fits the needs of the market.
Only time will tell.
Summary
As the use of biometrics grows, the need to understand the issues related to them becomes
more critical. User acceptance will always be central to successfully utilizing a biometric.
Unfortunately, there is no way that a biometric manufacturer can specify a device’s user
acceptance. Different classes of applications demand different biometric performance in
order to achieve high user acceptance. The key quantifiable performance factors of a
biometric are it’s various error rates. Therefore, understanding what these different error
rates mean and how they can impact acceptance is extremely important.
Certainly, the future is bright for the biometric industry and their place in access control
applications. The goal of access control is to control where people can and cannot go.
Only a biometric device truly provides this capability to the end user. This technology is
no longer science fiction. It has been used successfully for years by large and small
companies alike. There are biometric systems available today which can economically
meet the needs of almost any commercial access control application. And, as costs come
down, justifying the use of a biometric will become a reality for more and more people.
Download