Biometric technology

Biometric technology is used to recognition patterns of human body parts. Biometric devices use a person's unique physiology to determine identity such as, fingerprints, retinal scan, palm, facial recognition, DNA, etc.

Fingerprint technology is used by Granding
Granding fingerprint devices are embedded with stable and fast algorithm which can read a fingerprint template and identify the unique patterns of a fingerprint. The duration of verification process will be very short (less than 1 second).

Legal to read and store people's fingerprint
The Granding fingerprint reader can scan a fingerprint image and store the fingerprint template. This kind of template is generated by our special algorithm which cannot be reverted to original fingerprint image. So this may not transgress law for some country.

The right way to put your finger on the device reader
Normally, the Granding fingerprint reader can read the fingerprint freely, even half of the fingerprint. But by putting the finger firmly and flatly on the center of the scanner it will be able to read it much better.

There are some hints for successful enrollments

How to select the finger 1. Use fingerprints of good quality, without wear or injury;
2. Priority left or right forefinger;
3. If the user's finger is small, you should select the thumb;
4. The bigger the touch area, the better identify effect
How to place the finger 1. Place your finger firmly and touch over 2/3 of the sensor surface;
2. Do not touch the finger too fast; do not move the finger on the sensor surface
Fingerprint is too dry or dirty 1. Rub the dry finger and palm;
2. Blow from the mouth over the finger
Others Very few people's fingerprint quality is too poor to verify, the fingerprint is in gear.
1. Use ID number + fingerprint identify;
2. Reduce the threshold; 3
. Use password verification;

Algorithm
It is a sequence of instructions that tells a system how to solve a problem. For example, it is used by biometric systems to tell whether a sample and a template are a match. Cryptographic algorithms are used to encrypt sensitive data files, to encrypt and decrypt messages, and to digitally sign documents.

API
Application Program Interface. It is a computer code which is a set of instructions or services used to standardize an application. Any system compatible with the API can then be added or interchanged by the application developer.

Authentication
The process of establishing the validity of the user attempting to gain access to a system. Primary authentication methods are: Access passwords (something the user knows), access tokens (something the user owns) and biometrics geography (a workstation, for example).

Biometric (noun)
One of various technologies that utilize behavioral or physiological characteristics to determine or verify identity. "Finger-scan is a commonly used biometric." The plural form is also acceptable: "Retina-scan and iris-scan are eye-based biometrics."
Biometrics (noun)
The field relating to biometric identification. EG: "What is the future of biometrics?"

Biometric (adjective)
Of or pertaining to technologies that utilize behavioral or physiological characteristics to determine or verify identity. EG: "Do you plan to use biometric identification or older types of identification?" Biometric system is the integrated biometric hardware and software used to conduct biometric identification or verification.

Contact/Contactless
In regard to chip cards: whether the card is read by direct contact with a reader or has a transmitter/receiver system which allows it to be read using radio frequency technology (up to a certain distance).

Crossover Error Rate (CER)
A comparison metric for different biometric devices and technologies; the error rate at which FAR equals FRR. The lower the CER, the more accurate and reliable the biometric device.

Enrollment
The initial process of collecting biometric data from a user and storing it in a template for later comparison.

Feature Extraction
The automated process of locating and encoding distinctive characteristics from a biometric sample in order to generate a template.

False Acceptance Rate (FAR)
The percentage of imposters incorrectly matched to a valid user's biometric.

False Rejection Rate (FRR)
The percentage of incorrectly rejected valid users.

Identification
The process by which the biometric system identifies a person by performing a one-to-many (1:n) search against the entire enrolled population.

Identification
(1:N, one-to-many, recognition) – The process of determining a person's identity by performing matches against multiple biometric templates. Identification systems are designed to determine identity based solely on biometric information. There are two types of identification systems: positive identification and negative identification. Positive identification systems are designed to find a match for a user's biometric information in a database of biometric information.

Matching
The comparison of biometric templates to determine their degree of similarity or correlation. A match attempt results in a score that, in most systems, is compared against a threshold. If the score exceeds the threshold, the result is a match; if the score falls below the threshold, the result is a non-match.

Single Error Rates
Error rates state the likelihood of an error (false match, false non-match, or failure to enroll) for a single comparison of two biometric templates or for a single enrollment attempt. This can be thought of as a "single" error rate.

Submission
The process whereby a user provides behavioral or physiological data in the form of biometric samples to a biometric system. A submission may require looking in the direction of a camera or placing a finger on a platen. Depending on the biometric system, a user may have to remove eyeglasses, remain still for a number of seconds, or recite a pass phrase in order to provide a biometric sample.

Template
A mathematical representation of biometric data. A template can vary in size from 9 bytes for hand geometry to several thousand bytes for facial recognition.

Threshold
A predefined number, often controlled by a biometric system administrator, which establishes the degree of correlation necessary for a comparison to be deemed a match.

Verification (1:1, matching, authentication)
The process of establishing the validity of a claimed identity by comparing a verification template to an enrollment template. Verification requires that an identity be claimed, after which the individual's enrollment template is located and compared with the verification template. Verification answers the question, "Am I who I claim to be?". Some verification systems perform very limited searches against multiple enrollee records. For example, a user with three enrolled finger-scan templates may be able to place any of the three fingers to verify, and the system performs 1:1 matches against the user's enrolled templates until a match is found. One-to-few. There is a middle ground between identification and verification referred to as one-to-few (1:few). This type of application involves identification of a user from a very small database of enrollees. While there is no exact number that differentiates a 1:N from a 1:few system, any system involving a search of more than 500 records is likely to be classified as 1:N. A typical use of a 1:few system would be access control to sensitive rooms at a 50-employee company, where users place their finger on a device and are located from a small database.

Main Products
    1. 3000T-C The 3000T-C fingerprint time attendance offers a composite algorithm system with high speed operating.
      It has an embedded ...
    1. T2 The T2 fingerprint time attendance has a built-in back up Li battery and can support 4 hours of continuous operation if there is a power failure.
    1. 5000A The 5000A fingerprint access control offers a composite algorithm system with high speed operating.
      It has an embedded ...
    1. SC403 The SC403 proximity card time attendance, access control system has a built-in access controller, supports 99 time zones, ...