Skip to main content

Overview

VaultWares biometric authentication devices provide passwordless security using fingerprint scanning and facial recognition technology. These devices integrate seamlessly with your existing infrastructure to add an additional layer of security through biometric verification.

Product lineup

VaultScan Fingerprint

Type: USB fingerprint scanner
Resolution: 500 DPI
Certification: FBI PIV-071006

VaultScan Pro

Type: Multi-finger scanner
Resolution: 1000 DPI
Certification: FBI PIV-071006, FIPS 201

VaultFace Recognition

Type: 3D facial recognition camera
Technology: Infrared + RGB
Certification: ISO/IEC 30107-3

VaultAccess Terminal

Type: All-in-one access control terminal
Features: Fingerprint + face + card reader
Display: 7” touchscreen

Key features

Biometric capabilities

  • High accuracy: False acceptance rate (FAR) < 0.001%
  • Fast authentication: < 1 second verification time
  • Liveness detection: Anti-spoofing technology prevents fake fingerprints/photos
  • Multi-modal: Combine fingerprint and facial recognition for enhanced security
  • Large capacity: Store up to 10,000 biometric templates per device

Security features

  • Template encryption: Biometric data encrypted with AES-256
  • Secure storage: Templates stored in tamper-resistant memory
  • No raw data storage: Only mathematical templates stored, not actual images
  • Privacy compliant: GDPR and BIPA compliant biometric data handling
  • Audit logging: Complete authentication attempt logs

Integration capabilities

  • LDAP/Active Directory: Sync with existing user directories
  • SAML/OAuth: Integrate with SSO providers
  • REST API: Programmatic enrollment and authentication
  • SDK support: Windows, macOS, Linux, iOS, Android
  • Physical access control: Integrate with door locks and turnstiles

Technical specifications

SpecificationDetails
Sensor typeOptical fingerprint sensor
Resolution500 DPI
Image size256 x 360 pixels
Scan area15mm x 20mm
InterfaceUSB 2.0
FAR< 0.001%
FRR< 0.1%
Verification time< 0.5 seconds
Template size512 bytes
Operating temp0°C to 45°C
Dimensions65mm x 45mm x 25mm
CertificationFBI PIV-071006
Warranty3 years

Setup and usage

Initial setup

1

Connect the device

Plug the biometric device into an available USB port or connect via network (for terminal models).
2

Install software

# Download and install VaultWares Biometric Suite
wget https://downloads.vaultwares.com/biometric-suite-latest.deb
sudo dpkg -i biometric-suite-latest.deb
3

Configure device

# Initialize device
vw-biometric init --device /dev/vaultscan0

# Set security level
vw-biometric config --security-level high --liveness-check enabled
4

Enroll users

Launch the enrollment wizard or use the CLI to register biometric templates.

User enrollment

# Enroll fingerprint
vw-biometric enroll \
  --user john.doe \
  --type fingerprint \
  --finger right-index \
  --samples 3

# Enroll face
vw-biometric enroll \
  --user john.doe \
  --type face \
  --samples 5 \
  --require-liveness

Authentication

# Verify fingerprint
vw-biometric verify \
  --type fingerprint \
  --timeout 10s

# Output:
# User: john.doe
# Match score: 98.7%
# Status: AUTHENTICATED

Integration examples

Windows Hello integration

# Register VaultWares as Windows Hello provider
Register-VaultWaresHelloProvider -DeviceType Fingerprint

# Configure policy
Set-VaultWaresHelloPolicy `
  -RequireBiometric $true `
  -AllowPIN $false `
  -RequireTPM $true

Linux PAM integration

# Configure PAM for biometric authentication
sudo nano /etc/pam.d/common-auth

# Add before other auth methods:
auth    sufficient    pam_vaultwares.so
auth    required      pam_unix.so try_first_pass

Active Directory integration

# Sync users from Active Directory
vw-biometric ad-sync \
  --server dc1.example.com \
  --domain example.com \
  --base-dn "OU=Users,DC=example,DC=com" \
  --sync-interval 1h

# Map AD users to biometric templates
vw-biometric ad-map \
  --attribute sAMAccountName \
  --auto-enroll false

Web application integration

// JavaScript Web API
const vaultBio = new VaultWaresBiometric({
  apiKey: 'your-api-key',
  endpoint: 'https://biometric.example.com'
});

// Request authentication
async function authenticateUser() {
  try {
    const result = await vaultBio.authenticate({
      type: 'fingerprint',
      timeout: 15000
    });
    
    if (result.success) {
      // User authenticated
      console.log('Welcome, ' + result.userId);
      // Proceed with login
    }
  } catch (error) {
    console.error('Authentication failed:', error);
  }
}

Physical access control

# Configure door controller
vw-biometric access-control \
  --device terminal-01 \
  --relay 1 \
  --unlock-duration 5s \
  --require-biometric fingerprint \
  --require-card true

# Set access schedule
vw-biometric schedule \
  --device terminal-01 \
  --user john.doe \
  --days mon-fri \
  --hours 08:00-18:00

Multi-factor authentication

Combine biometric with other factors

# Configure MFA policy
vw-biometric mfa-policy \
  --require-biometric fingerprint \
  --require-pin true \
  --require-card true \
  --any-two-of-three

# User must provide 2 of 3 factors:
# 1. Fingerprint
# 2. PIN code
# 3. RFID card

Adaptive authentication

{
  "adaptive_policy": {
    "low_risk": {
      "factors": ["fingerprint"],
      "conditions": ["known_device", "known_location"]
    },
    "medium_risk": {
      "factors": ["fingerprint", "pin"],
      "conditions": ["new_device", "known_location"]
    },
    "high_risk": {
      "factors": ["fingerprint", "face", "pin"],
      "conditions": ["new_device", "unknown_location"]
    }
  }
}

Privacy and compliance

GDPR compliance

VaultWares stores only mathematical templates, not raw biometric images. Templates cannot be reverse-engineered to recreate the original biometric data.
Users can request deletion of their biometric data at any time.
vw-biometric delete-user --user john.doe --purge-all-data
Export user biometric templates in encrypted format.
vw-biometric export --user john.doe --output user-data.enc

BIPA compliance (Illinois)

  • Written consent: Obtain written release before collecting biometric data
  • Retention policy: Automatically delete templates after specified period
  • No selling: Templates are never shared or sold to third parties
  • Security: AES-256 encryption for all stored templates
# Configure BIPA-compliant retention
vw-biometric retention-policy \
  --max-age 3years \
  --auto-delete true \
  --require-written-consent

Monitoring and reporting

Authentication logs

# View authentication attempts
vw-biometric logs \
  --start-date "2024-01-01" \
  --end-date "2024-01-31" \
  --status all \
  --format csv > auth-report.csv

# Real-time monitoring
vw-biometric monitor --live

Performance metrics

# Device health check
vw-biometric health-check

# Output:
# Device: VaultScan Pro (/dev/vaultscan0)
# Status: Online
# Sensor health: Good
# Template count: 1,247
# Avg verification time: 0.28s
# Success rate (24h): 99.2%
# Failed attempts (24h): 12

Troubleshooting

  • Clean the sensor with a soft, dry cloth
  • Ensure finger is dry and clean
  • Try different finger pressure
  • Re-enroll the fingerprint with more samples
  • Check sensor health: vw-biometric health-check
  • Ensure adequate lighting (not too bright or dark)
  • Remove glasses or accessories if causing issues
  • Position face within 0.3-1.5m range
  • Look directly at camera
  • Re-enroll with different lighting conditions
  • Lower security threshold: vw-biometric config --threshold medium
  • Enroll more samples per user
  • Check for sensor wear or damage
  • Update firmware: vw-biometric update-firmware
  • Check USB connection
  • Verify drivers installed: vw-biometric-driver --version
  • Check device permissions: ls -l /dev/vaultscan*
  • Restart biometric service: sudo systemctl restart vaultwares-biometric

Next steps