ID cards

Face Forensics’ Access Control System Links Face Biometrics To ID Cards

It’s another example of the biometric access control and attendance tracking solutions emerging as such technology becomes more accessible to customers. For its part, in a statement announcing the new F2, Face Forensics says the system “is designed to be straightforward to integrate into existing access control systems and connects easily to images in existing industry-standard databases,” which should help to heighten its appeal to organizations in the market for improved security or attendance tracking.

How To Protect Your ID Card Access Control System From Getting Hacked

When a 125kHz proximity card is powered up by getting in “proximity” of a reader, it immediately begins to transmit a fixed binary code number. As a result, it’s also possible to use a device that will stealthily power up the card from a distance to read and record its internal data. An attacker can then easily use the card’s information to let unauthorized people in.