Is Your Home Security System Smart or Dumb?

using biometrics to secure your home

Home security has rapidly evolved beyond padlocks and deadbolts. Learn more about new technologies now available to better secure your place of residence.

Remember the times, when you used to buy those giant locks with massive keys to secure your houses? Or do you know how that was replaced by one central door key, which was too big to be kept inside your pocket? It’s true that time flies, but the other side is also true that it flies with a lot of changes. Today, security systems have become less complex and more technology based.

With huge technological advancements in recent years, life has become simpler and less of a painstaking journey. One of the best advancements is the ease in security systems provided by the invention of biometrics. This has become bliss for many businessmen and professionals cautious about their belongings. Continue reading →

Fingerprint vs Vascular biometrics – What are the differences?

Fingerprint vs Vascular biometrics – Are they different?

fingerprint vs vascular biometrics

Fingerprint vs Vascular Biometrics – How are they different?

In biometrics, fingerprint technology is by far the most popular and widely used modality. However, due to the evolving nature of the technology, many other biometric modalities have emerged such as vascular biometrics.  Even though they both share parts of the hand for identification purposes, these biometric modalities are quite different in how they work and their effectiveness in different environments. Continue reading →

Biometrics: How does it Reduce the Risk of Security Breaches?

The following is a guest post by Robert Kramers.

In one way or another, biometrics has been around for a long time. Film fans may remember it from the 1993 film Demolition Man. This film is often cited as “predicting” the use of biometrics in security, but the truth is that this idea has been floating around since the discovery of fingerprints.

So, what is bio-security?

Bio-security uses biometrics as a way of identification and access control. It involves the use of body parts as an identification process, and works in a similar way we know fingerprint scanning works. An eye scanner, for instance, can detect all of the minute differences in the human eye, which are much more visible than people think, as evidenced by the photo below.

iris recognition biometric identification management

When it comes to biometric security, everything from your face to your DNA can be used to identify you. This technology is not just the stuff of science fiction anymore and biometric security and is currently used on consumer tablets and smartphones as well as access to sensitive information and hardware within high level corporations.

Biometrics has the potential to be used everywhere, from top-end businesses keeping entire buildings secure to artists, writers and photographers looking to secure the safety and protection of their intellectual property. Biosecurity is far more advanced than any other form of security, and contains fewer holes and breaches that leave more traditional systems vulnerable.

Fast Access to Personal Information

The main advantage of biometric technology over traditional security systems is that it detects things that are unique to the individual quickly and accurately.

This means that a place of business can ensure that only the employees gain access and attempted crime can be pinpointed faster.

Biometrics and a number of advancing technologies, including wireless power through resonant induction, have the ability to work cohesively. Items like this biometric sensor, which is printed directly on to human flesh (aka the biostamp) means, that a number of personally identifiable features has the ability to be obtained from the likes of a patient, in just seconds. Wireless power would provide the ability for the biostamp to communicate with internal devices like LVADs. This has the potential to help with medical information security, monitoring and identification.

Accuracy of Identification

Despite the misconception provided by popular sci-fi action movies, in real life modern biometric scanners detect capillary flow behind the eye or the finger, which means that they can only be used by a living, breathing person.

Biometrics can also be used to stop security holes that other systems can not detect.

For example, at Disney World, where a 5-day ticket can cost up to US$350, biometric fingerprint scanners are used to ensure that only the person who purchased a ticket can enter the park, which stops people from lending, sharing or even selling their ticket to others.


fingerprint biometrics for identification, finger scanner

Biometrics in use at Disney World (photo courtesy of Wikipedia)

Absence of Anonymity

Every time an eye scanner, fingerprint scanner or any other form of biometric is used to allow access for one person, that person’s details can be stored in a database. Not only is their physiological data stored which can be used to find their name, address and more but also information on when and where they logged in.

By scanning for fingerprints, irises and other unique parts of an individual’s physiology, it ensures that it knows exactly who is trying to gain access at any given time.

This information can be used across the board, from employers who simply want to make sure their employees are logging in and doing their work when they should, to those investigating crimes on the premises.

Unauthorized Duplication

We live in an age where everything from luxury handbags to prescription medication can be copied to the finest details, and this also applies to keys and key cards, the very things that keep us secure using current security standards. The beauty of biometrics is the near impossibility of duplication.

As each individual is unique, and due to the complex nature of the biometric systems, moulds and other inanimate things cease to work.

Loss and Theft

Finally, whereas keys and codes can be lost, biometrics can not.

Simply put, you can’t lose you.

Not only does this mean that you will always have access, but it also guarantees that you are not leaving open access to your property on the subway or in the back of a taxi. Where your access is, you are also – which adds another layer of complexity and security to accessed gained.

In conclusion, the idea of biometrics and security have an increasing number reasons to be adopted particularly for reasons related to security. Additionally, it is very possible that some forms of biometric security like vein pattern recognition and eye scanning will have the ability to provide hygiene benefits due to non-contact biometric interpretation.

This was written by Robert Kramers. The technology enthused freelance blogger at

Hedging Risk in Biometric Identification Management Deployments

The use of hybrid biometric hardware devices helps to hedge the risk of a deployment

The use of hybrid biometric modalities – fingerprint and finger vein for example – helps to hedge the risk of biometric identification management deployments.

As biometric identification management deployments continue to evolve around the world, the scope and complexity of administering these projects continues to grow as program administrators begin to expand the technology’s reach to more and more segments of society. A technology once used exclusively by government entities mostly in a military capacity has expanded to include virtually all classes and cultures thanks in large part to advances in system inefficiencies, lower costs, and wider acceptance and understanding of the benefits by the public.

The intricacies and conditions of biometric identification deployments from initial set up to enrollment to identification/verification and the ever present push to achieve near 100% identification accuracy has been a key motivator for biometric identification management vendors who design and build the software and hardware that power deployments. There is little doubt that biometric systems have become more user-friendly, customizable, ergonomical, and efficient, however end users don’t assess the effectiveness or develop opinions on the use of biometrics based on these factors. They are much more in tune with the basic tenet of just about any piece of technology they come in contact with — does it work and do I trust it? Faith and trust in a biometric identification system is largely defined by the ability of the technology to accomplish what it promises and that is to accurately identify individuals, no matter what the conditions.

End users expectations are that biometric identification management systems will be able to identify them regardless of the condition of their own physiological attributes or the environment where the system is used. After all, the effectiveness and security of a biometric system hinges on its ability to enroll as many eligible end users as possible, and accurately identify them on subsequent use of the system. Unfortunately, limitations in the ability of certain biometric hardware modalities to effectively capture individual biometrics due to problems like skin integrity, or climate as well as the use of unimodal (biometric systems that comprise one hardware modality) systems for larger scale deployments raise the risk that the technology will not perform as expected.

Factors that effect risk in biometric identification management deployments are defined by multiple categories including:

  • Spoofing and Mimicry Attacks
  • Server Side – Fake Template Risks
  • Communication Links Risk
  • Cross-System Risk
  • Component Alteration Risk
  • Emrollment, Administration, and System Use Risks
  • Noise and Power Loss Risks
  • Power and Timing Analysis Risks
  • Residual Characteristic Risk
  • Similar Template — Similar Characteristics Risk
  • Brute Force Attack Risk

While not all of these potential risks can be mitigated by strategic use of biometric hardware, technological advances for the selection of a proper biometric device to capture, store, and identify/authenticate end users have helped system administrators to help hedge some risk such as Spoofing and Mimicry Attacks, and Enrollment, Administration, and System Use Risks. Particularly effective and rising quickly in the battle to hedge risk is the use of modern, sophisticated, hybrid, fused biometric hardware devices that simultaneously captures two biometric attributes or identifiers and that can perform both one-to-many (1:N) and one-to-one (1:1) matching in a single environment. Plus, due to increases in spoofing and forgery, more end users are choosing hybrid biometric devices in a multimodal (biometric deployments that combine two or more unique biometric atttributes) capacity that also include “liveness detection” which simultaneously looks at and beneath the skin surface, provides protection from published and unpublished finger copying methods, and is highly adaptable for future spoof threats.

Despite their clear superiority over other more traditional forms of identification, unimodal biometric systems are not without accuracy limitations when deployed in certain environments, depending on a number of factors, including:

  • Noisy sensor data: “Noise,” or factors affecting the quality of the image produce by the biometric device, can be present in the acquired biometric data mainly due to defects or environmental conditions.
  • Non-universality: If every individual in the target population is able to present the biometric trait for recognition, the trait is said to be universal; however, not all biometric traits are truly universal (e.g. – people with hand related disabilities, manual workers with low skin integrity caused by cuts and bruises on their fingertips, and people with very oily or dry fingers). The National Institute of Standards & Technology reported that 2% of the world’s population can’t enroll in biometric fingerprint systems[i] because of skin integrity issues.
  • Lack of individuality: Features extracted from biometric characteristics of different individuals can be very similar (e.g. – a small proportion of the population can have nearly identical facial appearances due to genetic factors).
  • Intra-class variations: The biometric data acquired from a user during verification will not be identical to the data used for generating the user’s template during initial enrollment.
  • Spoofing: Although it is extremely difficult to steal someone’s biometric traits, it is possible with some biometric devices for an impostor to circumvent a biometric system using spoofed traits (behavioral traits like voice and signature are more susceptible to these types of attacks than those based on physiological traits).

Advances in biometric identification management hardware and software solutions over the past few years have presented opportunities for end users to hedge risk and raise the integrity of a matching system by not relying on a single physiological characteristic, which can be significant in very sensitive or high-security environments. Therefore, the ability of a unimodal biometric system to accurately and consistently identify 100% of a population is limited. In addition, because of the rapid growth of large-scale deployments, a unimodal system can be considered undesirable unless combined with a second biometric modality.

While there are many more ways to hedge additional risk in biometric identification management deployments, the use of hybrid hardware that combines two modalities is certainly a step in the right direction.

What other ways can you hedge risk in biometric identification management deployments?

Introducing M2-FuseID™ – a New Hybrid Fingerprint and Finger Vein Biometric Scanner with Sophisticated Liveness Detection

M2-FuseID is a new hybrid biometric hardware device that combines fingerprint and finger vein technology in a single reader for large deployment environments covering millions of end users.

The new versatile. ergonomic M2-FuseID™ hybrid fingerprint and finger vein reader is ideal for dual factor environments.

If you missed the news, M2SYS Technology recently introduced a new, hybrid biometric scanner called M2-FuseID™ that simultaneously captures both fingerprint and finger vein images with the single touch of a finger. Why is this new biometric hardware considered to be a revolutionary advancement in biometric hardware?




Here are a few reasons:

  • Incorporates state-of-the-art technology combining two separate sensors into a single unit
  • The only biometric fused device that can perform both one-to-one (1:1) and one-to-many (1:N) matching for both fingerprint and finger vein templates in a PC-based environment
  • Designed to read 100% of end users eliminating the limitations of relying on fingerprint recognition alone
  • Sophisticated “liveness” detection (see below for a more detailed explanation)

The dynamics of biometric identificaiton projects around the world necessitate ongoing innovation on hardware design that delivers greater accuracy and speed, especially for deployments that cover large databases consisting of millions of end users. When paired with our Hybrid Biometric matching systems the M2-FuseID™ fused fingerprint and finger vein reader is the only device that allows customers to perform one-to-many matching of millions of fingerprint and finger vein templates in seconds.

Plus, we equipped the versatile, ergonomic M2-FuseID™ hybrid fingerprint and finger vein reader with sophisticated “liveness detection” to prevent spoofing, a concern by end users who want to prevent the use of fake and spoofed fingerprints trying to trick the system. Our M2-FuseID™ device simultaneously looks at and beneath the skin surface to protect against spoofing plus the device provides protection from published and unpublished finger copying methods rendering it adaptable against future spoof threats through consistent experiments and analysis of research in liveness detection.

Ideal for deployments covering large databases, here are some sample deployment environments that the M2-FuseID™ hybrid fingerprint and finger vein reader is best suited to:

  • Civil ID
  • Patient identification in healthcare
  • Banking
  • Visitor Management
  • Border Control
  • Voter Registration
  • ePassorts

To learn more about how the new M2-FuseID™ hybrid fingerprint and finger vein reader can help achieve 100% read rates in a dual factor environment, please contact us at:

1-770-393-0986 x1

Why Apple’s use of Fingerprint Biometrics is Boon to Industry, not the Modality

fingerprint biometrics are just one of many modalities set for strong future growth

Apple’s use of fingerprint biometrics for security is a boon to the entire industry

Unless you are living under a rock, you have no doubt heard about Apple’s recent addition of fingerprint biometrics as an added security feature to their new generation of iPhones. it’s exciting to see a company like Apple dive into the foray of using biometrics for security, largely because it further propels biometric technology into the mainstream, raises the awareness of the technology, and opens new doors for it’s applicability and use in many different markets.

What should be made clear is that Apple’s use of biometric technology isn’t a boon for the fingerprint biometrics industry – it’s a lift for the entire industry. That’s why we were a little bit surprised to see this article prognosticating about the future potential uses of fingerprint biometrics in common, everyday life. The article authors suggest that we could see fingerprint biometrics used in the following capacities in the near future:

1. Automobiles
2. Gun safety
3. Home entertainment systems
4. Access control for a home or office
5. ATM withdraws
6. Entry into nightclubs or bars

We agree with the idea that these are indeed places that could see the use of biometrics in the future, but what we don’t agree with is using fingerprints as a biometric modality in all these applications. Yes, fingerprint biometrics are in fact the most common modality in the industry but also have distinct limitations in their effectiveness due to problems with; skin integrity, climate, ethnicity, and hygiene. How long do you think a hotel for example would rely on fingerprints for room access when they discover that a certain percentage of their patronage is not able to use the technology due because of some of the problems listed above, or refusal to use the biometric device because of hygiene reasons?

What’s much more realistic is a combination of fingerprint biometrics with other modalities like palm vein, finger vein, iris, and voice for these deployment examples, not just fingerprint alone. Vascular biometric modalities like finger vein and palm vein present certain advantages over fingerprints like: no contact with a sensor, scanning beneath the surface of the skin to alleviate skin integrity problems, an increased difficulty to recreate someone’s biometric template because the sensor of the vascular scanner needs the hand and blood flow to register an image, etc. The use of biometrics for ATM authentication is already widespread in places like Europe and Asia, and the preferred modality is usually palm vein or finger vein because of the advantages that they present over fingerprint.

Understanding that fingerprint biometrics are an excellent modality but have limitations that are overcome by more modern biometric hardware is key to envisioning more widespread use of the technology in everyday applications.

Finger Vein Biometrics Identification for Membership Management Software

University of Vermont is using M2SYS finger vein biometrics for student membership management

Finger vein biometric technology for membership management

An article published today in the University of Vermont’s campus newspaper The Vermont Cynic reported that the campus recreation center has adopted M2SYS finger vein technology for student member identification. Tim Lewis, associate director for campus recreation made the decision to use finger vein biometrics for member identification after brainstorming ideas on how to eliminate students carrying ID cards. Happy to see our finger vein biometric identification system used at the University of Vermont through a partnership we have with Vermont Systems, a recreation and parks software provider based in Essex Junction, VT.

Modern day membership management software is  designed to help create efficiencies that antiquated methods simply can’t provide. In an effort to eliminate ID cards, prevent identity fraud, and create a more convenient user experience, many membership management facilities are evaluating vascular biometrics (finger vein and palm vein) for identification because of the distinct advantages it offers. Specifically, using biometrics for member identification has proven to be the most effective and affordable solution for safe and secure management of sensitive information. Installation of a biometric member identification system is fast and easy, providing a convenient experience for members who no longer have to remember their ID Cards and a comforting feeling to recreation center staff who can feel confident that no unauthorized members are gaining access to the facility.

Although fingerprint biometrics is traditionally seen as the most common modality, many membership management facilities have discovered that vascular biometrics (finger vein and palm vein) are more effective in their environments for identifying members who may have skin integrity issues that would limit the effectiveness of fingerprint readers. The University of Vermont decided that finger vein biometrics, which uses near infrared light to map the vein pattern beneath a finger for identification was a preferred biometric modality for their end users. After a brief 2 – 3 minute enrollment period, on subsequent visits students can be identified in about 2 seconds.

Could finger vein or palm vein biometrics help your membership management facility to create efficiencies, save time and resources, and create a more convenient user experience? Please contact us for a price quote or membership management software provider reference.

University of Maine Deploys @M2SYS Palm Vein Scanners for Student Check-In at Dining Halls

Palm vein scanners and multi-biometric software to eliminate students sharing meal plans

The University of Maine

Today we announced that the University of Maine has deployed the M2SYS palm vein scanner with our Hybrid Bio Snap-OnPlatform and Hybrid Bio-Hyperpliance Multi-Biometric Identification Matching Server software for student check-in at their on-campus dining halls. The goal for the deployment is to use the palm vein scanner to more effectively track dining hall traffic and eliminate shared cards where students share their meal plans at a price of $4,100 per academic year.

University of Maine officials chose the comprehensive M2SYS Hybrid Bio-SnapOnsolution because of the fact that it instantly interfaced with their dining hall lunch line point-of-service (POS) software without any code level development on their part. In addition, due to the large size of their student enrollment database and their decision to deploy the palm vein scanner as their biometric hardware of choice, the University also chose to deploy Bio-Hyperpliancewhich is a scalable, hyper-threaded multi-biometric matching server designed to increase matching speeds and boost convenience for large scale deployments.

We are starting to see more and more Universities using the M2SYS palm vein scanner and other biometric identification (finger vein, fingerprint) on their campuses to help increase efficiency, reduce expenses and establish more accountability in areas like employee workforce management and student dining hall lunch line POS. As more Universities across the country catch on to the benefits of using biometrics for identification, we expect this growth to continue.

For a copy of the news release please click here.

Biometrics in Healthcare — One to Many Identification as a Way to Eliminate Patient Fraud

Checking in at the Dr’s Office

Healthcare professionals are catching on to the value of using biometrics for patient identification. As cases of medical identity theft increase and liability mounts, the industry has been turning to biometrics to ensure 100% patient identification accuracy, safeguard patient health, eliminate medical identity fraud, and cut costs. In addition, biometric patient identification systems instantly interface with any electronic health record or patient management software which means they can be up and running quickly without any database or code-level integration needed. Seamless interface capability helps smooth the transition from a more traditional means of identifying patients (name, DOB, social security number) to biometrics, a more modernized method that uses physiological characteristics of the human body to identify a patient.

Before you consider investing in a biometric patient identification system, it is important to understand the two fundamental differences in how back end biometric engins/systems/algorithms authenticate an individual:

a) 1:1 (one to one) verification – This method of authentication answers the question: Am I who I claim to be? and involves confirming or denying a person’s claimed identity. For example, when used in patient identification a patient would present a form of identification (driver’s license, social security card, insurance card, etc.) and after their record is pulled up they would then scan their biometric information to verify that they are the same person their identification states they are.

b) 1:N (one to many) identification – This method of authentication answers the question: Who am I? and the system must identify a person from a list of users in the template database. For example, when used in patient identification a patient would scan their biometric information first which immediately pulls up the patient record associated with their template before presenting any other form of identification.

Why is it important to understand the differences between biometric verification and biometric identification when it comes to eliminating medical identity fraud and duplicate records? Relying on 1:1 verification can create problems during patient registration. Since medical records are usually associated with a person’s date of birth or social security number, 1:1 verification creates the possibility of a person using a forged, fake or stolen ID to link their biometric identity to another patient’s record. Furthermore, since ID’s or insurance cards can be forged repeatedly then it’s possible that multiple medical records could exist for the same person all using the same biometric template. 1:1 verification would not catch this at registration.

The key to eliminating patient fraud is to catch a perpetrator at the time of registration before services are rendered. 1:N matching allows a healthcare facility to prevent medical identity theft by instantly performing a dedupe of their records before the record is created.

Understanding how biometric patient identification works and the functionality of the backend system is essential to working towards the ultimate goal of improving patient care. Eliminating patient identify fraud and lowering medical liability litigation costs  is key for the healthcare industry to maintain economic vitality to continue the fight of safeguarding our health.



Contactless Biometric Sensor Market Poised For Rapid Growth

M2SYS Palm Vein Reader with Fujitsu PalmSecure Contactless Sensor Technology

Recent reports have suggested that the contactless biometric sensor market is poised for rapid growth as more deployments of the technology take hold in vertical markets around the globe.  The report suggests that market growth for touchless sensing could reach $3656.8 million ($3.6 billion) by the end of 2015.  Touchless biometric sensors can be found in biometric hardware like Fujitsu’s PalmSecure Palm Vein biometric reader, Hitachi’s VeinID Finger Vein device and contactless fingerprint readers.  The report defined target applications for the technology as gaming, consumer electronics, automotives and transportation.

As biometric deployments begin to expand into markets and environments that are characterized by end users who may possess less than ideal skin conditions to use fingerprint technology, contactless biometric sensor technology is proving to be a viable solution.  We have previously stated that fingerprint technology is not a one-size-fits-all solution due to its reliance on skin integrity and difficulty to function properly in certain environments and with various ethnicities.  Contactless biometric sensors (which have also proven to be more accurate than sensors that require contact) alleviate these problems plus offer the added feature of being more hygienic, a problem that plagues biometric technology with sensors that require contact.

Expect to see more interest in vascular biometrics and iris recognition as companies, organizations and countries seek to deploy secure, accurate, hygienic biometric identification solutions in the future.