top of page

Biometric Fingerprint Identification

Biometrics consist of automated methods of recognizing a person based on unique physical characteristic. Each type of biometric
system, while different in application, contains at least one similarity: the biometric ID must be based upon a distinguishable human
attribute such as a person’s fingerprint, iris, voice pattern or even facial pattern.

Today Biometric fingerprint readers are by far the most popular

form of biometric access security used, with a variety of access

control systems on the market intended for general and mass

market usage. Long gone are the huge bulky Biometric fingerprint

scanners; now a Biometric fingerprint reader can be small enough

to be incorporated into a laptop for security.

A fingerprint is made of a series of ridges and grooves. Once a Biometric fingerprint is captured the system locates the minutia points. These minutia points occur where the lines of the ridges begin, end, branch off and merge with other ridge lines. These points are then mapped and a line is drawn between each point.

This creates a map of how each point relates to the other points. The map is then stored as a data stream called a minutia template in a database for future comparison with other presented fingerprints. It is important to note that during the entire process no fingerprint images are stored on the system and a fingerprint image cannot be recreated from the minutia template.

Within the database, a fingerprint is usually matched to a reference number, or a PIN number which is then matched to a person’s name or account. In instances of security the Biometric match is generally used to allow or disallow access, but today this can also be used for something as simple as a time clock or payroll access – Time and Attendance.

We recommend the following Biometric finger and palm identification systems 

  • Suprema Biometric Systems 

  • Sagem Identification Systems 

bottom of page