Biometric Access Control

Implement better security around your business based off who they are, not what they hold. 

Using a person’s individual features can ensure a better level of accuracy with your security. 

Smiling One2Call Director

Biometric Access Control

Biometrics is a method of establishing a person’s identity based on their physical attributes. This can be anything, but in access control it usually means either faces or fingerprints.

Biometrics offers greatly improved security over methods such as passwords, fobs, or QR codes. This is because access is granted based on who someone is, rather than what they have or know.

Biometric systems can also be much cheaper to administer as the costly task of replacing fobs or cards is completely removed.

Speak to our consultants about deploying biometrics in your business.

By clicking "submit", you agree to One2Call’s Terms of Use as detailed in their Privacy Policy (www.one2call.net/privacy). You consent to receive emails, phone calls and/or SMS messages from One2Call in relation to your enquiry or order, and for marketing purposes upon opt in. Message frequency depends on your activity. You may opt-out by texting "STOP" to any SMS sent from One2Call or by clicking “Unsubscribe” on any marketing email sent by One2Call. Message and data rates may apply for any SMS sent.
Facial Recognition Cameras

Facial Recognition Cameras

There is a wide range of facial recognition cameras that can be integrated into your solution.

The simplest solution is a dedicated facial recognition camera. This can be mounted at eye level for ease of use or can just as easily be mounted higher in a standard CCTV position. Most facial recognition cameras will also act as standard CCTV cameras.

A neat solution is a modular intercom with facial recognition unit. A guest can ring the bell for access and have their face scanned at the same time. Known users are simply scanned and then allowed access. Being modular, fingerprint and proximity scanners can also be included. These can be used either as alternates or as backup, but only once a face scan has failed.

Fingerprint Scanners

Fingerprint scanners use a range of methods to ensure accuracy.

Infra-red and white light sensors are used to ensure a live and natural finger is being assessed. Built-in algorithms scan to ensure authenticity. Ultra high-resolution cameras can scan fingerprint ridge depth as well as shape.

Indoor and outdoor scanners are available, with weather and vandal resistant features.

Fingerprint Scanners
Fingerprint Scanners

Fingerprint Scanners

Fingerprint scanners use a range of methods to ensure accuracy.

Infra-red and white light sensors are used to ensure a live and natural finger is being assessed. Built-in algorithms scan to ensure authenticity. Ultra high-resolution cameras can scan fingerprint ridge depth as well as shape.

Indoor and outdoor scanners are available, with weather and vandal resistant features.

Biometric Software

Biometric Software

Some access control systems have native biometric software. Others integrate with third parties to deliver this part of the solution.

When users are added they will be asked to provide a finger or face scan to act as their template within the system. A single sample is usually enough but in some cases several templates can be stored for greater matching accuracy.

During use, once a face or finger has been scanned it is sent to the biometric software for assessments. Match score assessment is usually done by an AI algorithm, but tolerances can also be set manually using the match score.

How biometric matching works
  • Image scanned and key points identified
  • Compared to stored templates
  • Matched with identical points
  • Number of match points creates a match score
  • Match score used as basis to confirm or deny identity (or request rescan)

Our Customers

Contact Us

By clicking "submit", you agree to One2Call’s Terms of Use as detailed in their Privacy Policy (www.one2call.net/privacy). You consent to receive emails, phone calls and/or SMS messages from One2Call in relation to your enquiry or order, and for marketing purposes upon opt in. Message frequency depends on your activity. You may opt-out by texting "STOP" to any SMS sent from One2Call or by clicking “Unsubscribe” on any marketing email sent by One2Call. Message and data rates may apply for any SMS sent.

Testimonials

Emily Laycock, CFS Formations

Very friendly and helpful over the telephone. Engineers worked fast to fix our issues.

James, Proove Restaurant

Very helpful, did exactly what I needed.

Annette, Blastcom

Ryan was very helpful and sorted out the problem for me.