Using Biometric Access Systems: Dos and Don'ts

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more.

For biometric access systems, the devil is in the details. Here are implementation strategies from users and analysts.

Considering a biometric access system? Experts offer practical advice in these dos and don'ts.

DO expect resistance. All biometrics systems require user enrollment and credentialing, which are expensive and resource-intensive processes, Most says. "There is well-founded resistance to the idea of large, centralized repositories of personal information," she says. Eventual solutions to this problem may include anonymous identification, encrypted transmission of templates, and identity-centric infrastructures with distributed storage models.

In some cases, resistance comes in the form of cultural norms, says Ant Allen, an analyst at Gartner. For instance, finger scanning is not widely accepted in Japan, he says, as people reject the idea of physical contact with the sensors. Since the country's banks use biometric identification extensively for ATMs, many have turned to vein structure biometrics, whose sensors do not require contact.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
Insider: How a good CSO confronts inevitable bad news
Join the discussion
Be the first to comment on this article. Our Commenting Policies