UFC 4-021-02NF
27 September 2006
change 1, 23 October 2006
allow the use of the encoding format defined in the SEIWG-012 standard (described in
the previous section Magnetic Stripe Cards).
3-4.8
Keypads and PIN Codes. Coded devices use a series of assigned numbers
commonly referred to as a PIN. This series of numbers is entered into a keypad and is
matched to the numbers stored in the ACS. By itself, this technology does not offer a
high level of security since a PIN can be stolen by even casual observation. However,
coded devices can be effective when used in combination with another credential
reading technology. Coded devices include electronic keypads and microprocessor-
controlled keypads.
3-4.9
Biometric Readers.
Biometric readers verify personal biological metrics
(biometrics) of an individual. Biometric readers may be used in addition to credential
devices or with a PIN code.
3-4.9.1 Biometric devices have uses at access control points, but may not be mature
enough to use in throughput-critical applications such as vehicle entry gates. Designers
have to evaluate the tradeoff between added security and decreased throughput.
3-4.9.2 Biometric readers are the future trend of security systems. Current gains in
large-scale production of some types of biometric readers have brought biometrics
close in cost to conventional card readers. Although biometrics are not as fast as other
readers, these technologies are still evolving.
3-4.9.3 There are several types of biometric characteristics that can be used. The
most common are described in the following sections.
3-4.9.3.1 Fingerprint. Fingerprint technology scans the loops, whorls, and other
characteristics of a fingerprint and compares it with stored templates. When a match is
found, access is granted (depending on the authorized security level). Advantages of
fingerprint technology are that it is easily understood. Disadvantages are that the
systems can be disrupted if cuts or sores appear on fingers or if grease or other
medium contaminates the fingers and the scanning plates. Some systems create two
templates for two different fingers, in the event that one finger is altered by injury or
other means. Fingerprint technology is not convenient in environments where workers
wear gloves. Early fingerprint readers were compromised by picking up a valid
fingerprint from a reader with a manufactured "finger". To combat this shortcoming of
the technology, sensors were equipped with the ability to sense a pulse and
temperature. Fingerprint technology is the first choice biometric method per the
emerging FIPS201.
3-4.9.3.2 Facial Image. This technology measures the geometric properties of the
subject's face relative to an archived image. Specifically, the center's of the subject's
eyes must be located and placed at precise (within several pixels) locations. Facial
imaging is the backup technology for biometric authentication per FIPS 201.
3-4.9.3.3 Hand Geometry. This technology assesses the hand's geometry: height,
width, and distance between knuckle joints and finger length. Advantages of hand
39