Core are Northern Ireland’s most experienced biometric identity management experts. We have been working in the field since the 1990s, developing biometric solutions ranging from biometric access control to biometric login to confidential systems.

Please click on the links below for further information about our Biometric products.

► Net Sec

What are biometrics?

Biometrics are automated methods of recognising a person based on a physiological or behavioral characteristic. Among the features measured are face, fingerprints, hand geometry, handwriting, iris, retina, vein, and voice. Utilising biometrics for personal authentication is considerably more accurate than conventional methods like passwords or PINs.

  • Biometrics link the event to a particular individual(a password or token may be used by someone other than the authorised user).
  • Biometrics are convenient (nothing to carry or remember).
  • Biometrics are the ultimate in accuracy and efficiency. There are no consumables making biometrics a cost-effective solution.
  • Unlike a password, PIN, or smart card, biometrics cannot be forgotten, misplaced, lost or stolen.
  • While traditionally used in high security applications, biometrics is now gaining acceptance in mainstream consumer applications worldwide.

How do biometrics work?

Biometrics work by using our unique characteristics to identify us. Consider fingerprint-based identification. All fingerprints are unique, and that makes them ideal for personal digital identification. Each and every one of our ten fingerprints is unique, different from one another and from those of every other person. Even identical twins have unique fingerprints.

It is accepted good practice to store a template of the fingerprint image, rather than the fingerprint image itself. This protects the individual’s privacy and reduces the ability to mis-use the person’s fingerprint. The key to unlock a person’s biometric template is the special algorithm that supports the biometric device. It acts as an encoder that translates the person’s individual characteristics into a template. A sample template is stored by the system for each individual. When the person presents themselves to be identified a new template is produced and compared to the sample. If the templates match within a defined tolerance the person is authenticated by the system.