Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric data are separate and distinct from personal information. Biometric templates cannot be reverse-engineered to recreate personal information and they cannot be stolen and used to access personal information.
Using a unique, physical attribute of your body, such as your fingerprint or iris, to effortlessly identify and verify that you are who you claim to be, is the best and easiest solution in the market today. That is the simple truth and power of Biometrics Technology today. Although biometric technology has been around for many years, modern advances in this emerging technology, coupled with big reductions in cost, now make biometrics readily available and affordable to consumers, small business owner, larger corporations and public sector agencies alike.
A fingerprint scanner system has two basic jobs -- it needs to get an image of your finger, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images.
Only specific characteristics, which are unique to every fingerprint, are filtered and saved as an encrypted biometric key or mathematical representation. No image of a fingerprint is ever saved, only a series of numbers (a binary code), which is used for verification. The algorithm cannot be reconverted to an image, so no one can duplicate your fingerprints.
It is important to note that EasyClocking’s biometric time clocks do not actually collect and store fingerprints. Instead, it saves a mathematical representation of the employee’s biometric data. When the biometric time clock scans a hand or finger during a supervised enrollment process, only an encrypted mathematical representation of the fingerprint is stored. As a result, it’s virtually impossible to duplicate the original image from that mathematical representation. Additionally, if employees question cleanliness, this concern should not be dismissed. Instead, you should assure employees that the time clock’s finger zone is not a hot zone for germs. In fact, it will be touched far less frequently than restroom door handles, water cooler spigots, or chairs in the break room.
Only specific characteristics, which are unique to every fingerprint, are filtered and saved as an encrypted biometric key or mathematical representation. No image of a fingerprint is ever saved, only a series of numbers (a binary code), which is used for verification. The algorithm cannot be reconverted to an image, so no one can duplicate your fingerprints.
There are several ways an electronic time clock system can verify that somebody is who they say they are. Most systems are looking for one or more of the following:
To get past a "what you have" system, you need some sort of "token," such as an identity card with a magnetic strip. A "what you know" system requires you to enter a password or PIN number. A "who you are" system is actually looking for physical evidence that you are who you say you are -- a specific fingerprint pattern.
"Who you are" systems like EasyClocking Fingerprint Time Clocks have a number of advantages over other systems. To name few: