Biometric Security Systems

By: Seenex  09-12-2011
Keywords: Access Control, Fingerprint, Biometric Security

Biometric security (identification) systems identify a human from a measurement of a physical characteristic or behavioral trait (for example, hand geometry, retinal scan, iris scan, fingerprint patterns, facial characteristics, DNA sequence characteristics, voice prints, and hand written signature) to determine or verify an identity. There is typically an enrollment process in which the biological information is taken and stored in a database for future identification or verification purposes. Because biometric security technology relies on biological information about a person, it is typically thought of as more reliable than other identification methods. There are several different types of biometric security technologies:
  • Facial Recognition technology identifies individuals by analyzing certain facial characteristics such as the distance between the eyes, the length of the nose, and the angle of the jaw. Facial recognition works for both verification and identification and is often used for surveillance purposes.
  • Fingerprint Recognition is the most widely used method of biometric authentication. Fingerprint recognition is based on features found in the impressions made by unique ridges and valleys on the surface of a human's fingertips.
  • Hand Geometry is based on the measurement and analysis of the shape of a person's hand. Unlike fingerprints, the human hand is not descriptive enough for identification. However, it can be used for verification by combining various individual features, such as width, height, and length of the fingers, or distance between joints.
  • Iris Recognition is the process of recognizing a person by analyzing the distinctly colored ring that surrounds the pupil of the eye. With more than 250 unique characteristics, the iris is believed to go unchanged throughout a person's lifespan. This technology is typically used for access control into a facility.
  • Voice Recognition technology is a biometric security technology used to uniquely identify individuals based on the different characteristics in their voice such as tone, pitch, cadence, etc. The system captures samples of the individual's speech and then converts them to an electronic format to create a biometric template.

©2006 Seenex Inc. All rights reserved. Biometric Security Systems.

Keywords: Access Control, Biometric Security, Fingerprint,

Other products and services from Seenex


Visitor Management Systems | VMS

Have you ever had a need to get an audit trail of who visited your facility, who invited them, how long they stayed, what floors or rooms they visited, and if in fact, they left the building after closing. The Seenex Visitor Management System provides and efficient, accurate, and automated solution to capture and track the visitor’s information in your facility.


Smart Card Access Control

A smart card is a plastic device, about the size of a credit card that has a built-in computer chip that is typically used to store personal information, hold digital cash or prove identity. Whether regarding personal or professional business, people leverage their identity to conduct transactions, access privileges, and obtain information.


Chemical and Explosive Detection Systems

Two types of detection devices are explosive detection systems, which are designed to detect large quantities of explosives based on physical dimensions and densities consistent with explosive materials; and explosive trace detectors, which are used to detect vapor or particles of explosives.


Security Turnstile Systems

With its own proprietary technologies and through partnerships with leading security companies, Seenex integrates the following types of technologies with its proven platform: For more information about Seenex's products and services, please contact or call 202-333-3577.


Security Surveillance Systems

These security surveillance systems monitor activity in or around a property within an internal network that does not receive an outside signal or feed. There is a need to integrate surveillance systems with secure portals to ensure proper recognition of potential intruders.