Most of us are familiar with the application of fingerprint biometric data for access control purposes. But what actually happened that determine if your access is granted or denied? There are two ways for this access determinations: identification and verification.
This is when you present your finger to the fingerprint reader, the reader captures your fingerprint biometric data, compares it to the pre-established pool of data stored in the access control system, find out who you are, and finally determine if you are granted access or not.
This is when you have to first present a trusted media like a smart card that already had your fingerprint data stored, the reader then extracts the data from your smart card, prompt for your fingerprint, and then compares the two data to determine if you are the genuine holder of the smart card.
Fingerprint data can be stored in servers, access panels, biometric readers, or smart cards. There is no good or bad ways, but your security consultant need to consider the following factors in order to find the best technology fit: project scale (number of persons and readers), existing infrastructure, feasibility of card issuance, cross country access, network bandwidth and latency, and costs.
This article focuses on fingerprint biometric data, but the same principle applies to all other types of biometric data.