https://newsletter.en.creamermedia.com
Business|Components|SECURITY|Sensor|Service|Storage|System|Technology
Business|Components|SECURITY|Sensor|Service|Storage|System|Technology
business|components|security|sensor|service|storage|system|technology

Digital tech gives an old crime fighting ally new muscle

13th September 2024

     

Font size: - +

This article has been supplied as a media statement and is not written by Creamer Media. It may be available only for a limited time on this website.

Combating fraud and theft at every level of business is never-ending, but a powerful ally has emerged, and it’s one that’s – literally – at our fingertips.

Claude Langley, Regional Sales Manager, Extended Access Technologies, HID, a worldwide player in identity security says: “Fingerprints have been used by law-enforcement agencies for more than a century but are now being combined with digital technology and recognition techniques in a variety of applications.”

Fingerprints were first used studied at the University of Bologna in 1686, and first used in law-enforcement in 1892, when police in Argentina used a bloody fingerprint on a doorframe to identify a criminal. That year many police departments around the world started keeping fingerprint records. 

This is especially important, he notes, when the threat of fraud such as identity theft is greater than ever. He points to statistics from the Southern African Fraud Prevention Service (SAFPS) which found that impersonation fraud increased by 356% from April 2022 to April 2023.

Langley says: “Several factors make fingerprints one of the most widely used methods for biometric authentication: speed, ease of use, high level of accuracy and cost-effectiveness. It’s why a survey published in Payments Journal found that 70% of global consumers have used fingerprint biometrics.

He explains: “Firstly, they’re universal, meaning almost everyone has them. Secondly, each person’s fingerprint is unique and distinguishable, making it an excellent identifier.

Fingerprints offer several advantages over other methods of access control. Unlike some access-control cards they can’t be copied, lost, stolen or lots.

“Fingerprints are reasonably stable and permanent, remaining consistent over time. They’re also easily collectible, as they can be acquired, measured and processed with ease.” 

Fingerprints are also defendable, meaning they can be protected from abuse, misuse, theft, imitation and substitution. When combined with recognition techniques, fingerprints offering accuracy, speed, scalability and ease of use across various applications.”

A fingerprint biometric system consists of several components which work together to make an effective solution.

The process begins with the fingerprint sensor, specifically designed for the capture and preliminary processing of fingerprint data. A biometric algorithm is then used to extract data from the fingerprint, which includes details like ridge endings, ridge bifurcations, ridge islands, minutiae orientation, and various measurements.

A presentation attack detection (PAD) technique can also be implemented during the fingerprint capture to verify the authenticity of the fingerprint, confirming that that it originates from a living person.

If the predetermined criteria are satisfied, the digital fingerprint dataset is then securely stored as a record known as a template within a cryptographically protected storage enclave.

When a matching operation is required, the presented fingerprint undergoes a re-evaluation for liveness, and the corresponding template is retrieved from the secure storage for the matching process to take place.

Edited by Creamer Media Reporter

Comments

Research Reports

Showroom

Weir Minerals Africa and Middle East
Weir Minerals Africa and Middle East

Weir Minerals Europe, Middle East and Africa is a global supplier of excellent minerals solutions, including pumps, valves, hydrocyclones,...

VISIT SHOWROOM 
Rio-Carb
Rio-Carb

Our Easy Access Chute concept was developed to reduce the risks related to liner maintenance. Currently, replacing wear liners require that...

VISIT SHOWROOM 

Latest Multimedia

sponsored by

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION







sq:0.199 0.283s - 193pq - 2rq
Subscribe Now