Last Updated: December 22, 2016

Replaced the Phoenix SW-30FPN with the Phoenix Neso SS0202F.

With the advent of new technology, we will no longer need a key, or even to remember a combination of digits in order to open a safe.

Fingerprint safes need only the owner to be present, with their own unique fingerprints in order to allow authorised access. This amazing technology means an end to any worries about losing your key, or having a safe place to store it, or the worries of having to remember a combination in order to open the lock.

Why Biometric Fingerprint Safes Are So Popular

Biometric safes no longer need both a pin code and a fingerprint in order to offer a high level of security. A fingerprint alone is enough to determine safe entry. While intruders may locate your safe, they will be unable to force it open or to find your keys, meaning your property and valuables are extra secure. While biometric can sometimes include scans of the retina and iris, fingerprint identification is still the most widely used means of biometric identification. The safes open and lock simply with a swipe of your finger. No need to carry a swipe card, to know a password, or to remember a pin number. All you need is to be the person you say you are. Biometrics has now been used since the 1970s, and when properly used provide safe, secure and accurate results.

Varieties of Biometric Methods

Biometrics are automated methods of recognising an individual, based on either their fingerprints, handwriting, iris and retinal scans of their eyes or even using voice recognition.  These unique physical attributes of a person can be used to effortlessly identify them. Less expensive than they were when first introduced, and more readily available on the market, biometrics are now a popular solution both for door entry systems and for products like safes.

How Does Biometrics Actually Work?

Biometric fingerprint safes contain a reader that creates a digital image of your individual fingerprint based on the unique features of a fingertip. Each fingerprint has a different pattern of ridges and valleys, and the three main patterns are known as arches, loops and whorls.  This template is created using a mathematical algorithm and then this information is stored by the unit.  The characteristics in the fingerprint, like where the ridges stop and start or join together are converted into the mathematical representation. The algorithm cannot be reconverted to an image, so it is virtually impossible for anyone to steal your fingerprints.

When a fingerprint is scanned on the device, it can compare this new fingerprint with the stored one, and give authorised access only if the two are successfully matched. For the system to be effective, the recognition system must be able to create a high-quality template, and ideally two fingerprints should be captured so that in the event that one finger is subject to any change, like a cut or any grazing, the other one can still be used for reliable recognition.

Photo credit: Some rights reserved by williac