FaceKey Security Access Control Blog


A H Starkweather (2)
Annette H. Starkweather (10)
Annette Starkweather (13)
Annette Starweather (1)
ahstarkweather (1)



July 2014
June 2014
May 2014
April 2014
February 2014
December 2013
October 2013
February 2013
December 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
November 2011
October 2011
August 2011
June 2011
May 2011
April 2011


Alarm Systems (27)
Biometeric Time Clocks (30)
Biometric Access Control (40)
Biometric Authentication (14)
Biometric Time Clocks (12)
Building Security Systems (31)
Business Security Alarms (21)
Face Recognition Access Control (32)
Face Recognition Systems (31)
Face Recognition Time Clocks (31)
Facekey Security Access Control (39)
Facial Recognition (12)
Fingerprint Access Control (38)
Fingerprint Time Clocks (31)
Green (15)
Key Card Access (27)
Mustering Drill (31)
Security Systems (30)
Smart Card Access (24)
Time and Attendance (29)
Time and Attendance Systems (5)
Tme and Attendance iSystems (3)

FaceKey Security Access Control Blog

Biometrics: Knowing "WHO" Matters

Biometric technologies increase security, reduce risk and make us safer because knowing “who” matters if you are really serious about safety and security. 

Commonly thought to be new technology, biometrics was used as early as 30,000 years ago, when authors of paintings on cave walls left their signature handprints to identify themselves.  In 1891  fingerprints of criminals in Argentina were collected and are thought to be t he earliest cataloging of fingerprints.   The common thread from 30,000 years ago to today is that it matters who I am. With today’s large and growing population, our relationships and transactions are no longer limited to the people in our village as in ancient times.  And as terrific as our brain is, we cannot always remember names and faces. 

The objective of an access control system is to manage where authorized people are granted access.   Using your typical access control card access system, entry is granted if the card or credential as presented has the right number.   Any person can be holding the card as the system does not care.    Card manufacturers’ solution to this issue of inability to authenticate the identity of the user has been to produce new cards with more options that are more expensive but do not and cannot authenticate the identity of the holder of the card.        

Management is still dependent upon the honesty and integrity of the person that holds the card.  More bells and whistles for this credential are not a cure. Is the future of the security systems integrator going to be as a vendor that sells and installs sub quality systems, i.e. card reader systems, that will not and cannot authenticate the “who” of the card holder.  
For more information about how biometrics can save you money, and increase safety and security, click here.

Posted by Annette H. Starkweather on 3rd February, 2014 | Comments | Trackbacks

Bookmark and Share


There are no trackbacks for this post


There are no comments for this post