US922 USER GUIDE | 2016
4
Prior to operating the US922, it is essential to understand how ngerprint recognition
technology works.
Adding and verifying ngerprints are the core functions of the US922. Once you ac-
quire a thorough understanding of ngerprint recognition technology, you will nd
your experience with the US922 to be very productive and rewarding
How Fingerprint Recognition Technology Works
All ngerprints contain a number of unique physical characteristics called minutiae.
Minutia includes certain visible aspects of ngerprints such as ridges, ridge endings,
and bifurcation (forking) of ridges. Most of the minutiae are found in the core points
of ngerprints, which are found near the center of the ngerprint on the eshy pad
of the nger.
Figure below shows the positions of core points within ngerprints. The core points
are represented by the green dots in the gure below
Fingerprint Recognition Technology
Island Dot Bifurcation Ending Ridges
A core point is dened as the topmost point on the innermost upward recurring
ridge line.
A user is considered “enrolled” in the US922 after his/her ngerprint(s) or password
has been successfully registered in the US922.
When the user places his/her nger(s) on the US922 ngerprint sensor during the
enrollment process, the US922 takes a picture of that user’s nger’s key minutiae
points. Then the US922 uses its proprietary mathematical algorithm and converts
that picture into a unique mathematical template which is comparable to a 60-digit
password. This unique template is then encrypted and stored in the US922 database
IMPORTANT NOTE
Privacy issues should never be a concern when using the US922 because NO REAL
IMAGE OF A USER’S FINGERPRINT IS STORED. ONLY the minutiae-based tem-
plates are stored.
Each time a user’s ngerprint is scanned, the US922 searches its database for a
matching ngerprint. If the US922 nds the user’s ngerprint, then his/her “atten-
dance/door access” is recorded in the US922 “audit log” and will be noted in subse-
quent reports.