How biometric access cards work
With biometric access cards, the cardholder’s fingerprints are registered directly on the card. This way, each card is linked to a specific person. When the user enters the workplace, the card’s biometrics must match the person using the card.
The card is also encoded with RFID technology (Radio-Frequency Identification), corresponding to the system in which the card is to be used.
The user’s fingerprint together with the card’s RFID encoding allows the reader to accept the card.
The user authenticates at the door by holding the finger on the fingerprint sensor on the card before the card is held in front of the card reader.
There is a very wide range of different card technologies on the market, and biometric cards are part of that range.
The Kenyan company dayari technologies has developed biometric access cards based on integrated fingerprint sensors which are well suited for organizations that want to increase security without changing their existing access control systems or their security infrastructure.
Compatible with RFID readers
The biometric cards work with RFID readers by combining fingerprints with RFID technology. This will make the cards more secure on entry.
The biometric entry cards are first encoded with RFID technology, and upon delivery each user registers their fingerprints on the card.
This combination provides two-factor authentication; and you can also add a pin code with the card to get three-factor authentication, which is suitable for types of entry that requires high security.
Being able to use existing RFID readers instead of installing new biometric readers makes the solution cost effective.
Unauthorized access will not be possible
With dayari technologies RFID cards, the organization does not need to upgrade or replace its readers or backend systems.
The card will only allow communication with a reader after it has been activated with a fingerprint scan, which means that unauthorized card usage will not happen, and thus also reduces fraud related to lost or stolen cards. The cards are also strong, and resistant to cracking and breaking.
RFID Event & Venue Management
Layered access control and ultra-secure identification and validation Stark EM RFID biometrics
Stark EM includes RFID biometric options for events and venues requiring additional security and layered access control.
We can add iris capture and matching, facial or voice recognition and fingerprint ID to your Gen 2UHF RFID credentials, digitizing these files for enterprise-wide usage
- Iris images contain 100 more reference points than fingerprints
- Stark EM RFID biometrics available on Smart phone with camera functionality
- Data automatically saved with easy to use interface
These heightened security measures are ideal for meeting insurance requirements for high-value assets or protecting the security of athletes, artists or public figures.
We can integrate RFID biometrics with your Stark EM platform for customized security requirements.
RFID biometrics are part of our complete set of RFID event and venue management tools:
- Access control
- Business intelligence and customer analytics
- Digital wallets and stored value
- Brand activation and social media integration
- Inventory and staff management
- Merchandising
Fingerprint ID for fast on-site validation
Stark EM includes an available fingerprint identification option, using advanced fingerprint matching technology for instant ID and verification.
We can give you a choice of fingerprint scanners, so you’re not tied to a specific hardware vendor.
Stark EM RFID biometrics delivers fast validation to authorized staff within your network. Iris capture and matching beats fingerprinting
Stark EM offers iris capture and matching, using infrared iris scanners for hi-res images of the iris.
Iris images can hold up to 100 more reference points than fingerprints, with scanners securely integrated with your database.
The image capture is fast and easy, with the data matched to your Stark EM credentials and ready for scanning by your RFID hardware.
Stark EM RFID biometrics can be equipped to scan irises for tighter perimeter control.
Facial recognition for fast, secure validation
If you prefer to use facial recognition, we can integrate a camera system and digital photo manager option. Your system identifies key facial characteristics and matches individuals against your database.
Stark EM RFID biometrics works with Smart phones to cut down on capital costs.
RFID biometrics are part of our complete set of RFID event and venue management tools:
- Access control
- Business intelligence and customer analytics
- Digital wallets and stored value
- Brand activation and social media integration
- Inventory and staff management
- Merchandising