Contact us today.Phone: +1 888 776-9234Email: sales@plurilock.com

What is False Rejection Rate (FRR)?

False Rejection Rate, or FRR, measures how often a biometric authentication system incorrectly rejects a legitimate user.

It's the flip side of false acceptance—instead of letting the wrong person in, the system keeps the right person out. Every biometric system makes these mistakes occasionally because biological traits vary slightly each time they're measured. Your fingerprint might be drier today than yesterday, or you might position your face differently in front of the camera.

A high FRR means users constantly struggle to authenticate, which creates real problems beyond mere inconvenience. When people can't get into systems reliably, they complain to IT, delay important work, or find ways to circumvent security measures entirely. Some organizations respond by loosening authentication requirements, which trades one problem for another.

The challenge is finding the right balance—strict enough to keep threats out, but forgiving enough that legitimate users can actually work. An authentication system with a 5% FRR might sound acceptable until you realize that means one failed login attempt out of every twenty, potentially several times per day for each user.

Origin

The concept of false rejection emerged from signal detection theory, a framework developed during World War II to distinguish radar signals from background noise. Early researchers recognized that any detection system faces a fundamental tradeoff: make it more sensitive and you catch more real signals but also more false alarms; make it stricter and you reduce false alarms but miss legitimate signals.

When biometric authentication entered commercial use in the 1990s—starting with fingerprint readers for physical access control—engineers borrowed this framework directly. They needed metrics to characterize system performance, and FRR became the standard measure for quantifying how often legitimate users got rejected. The first biometric systems had terrible FRRs by modern standards, sometimes above 10%, because the technology was crude and environmental factors weren't well understood.

As biometric authentication expanded into computing—particularly after fingerprint readers appeared on laptops and smartphones in the 2000s—reducing FRR became a commercial imperative. Nobody would buy a phone that rejected their fingerprint half the time. Manufacturers invested heavily in better sensors, machine learning algorithms, and multi-attempt protocols to drive FRR down while maintaining security.

Why It Matters

FRR directly affects whether biometric authentication succeeds or fails in practice. A system that frequently rejects legitimate users creates friction that undermines security in unexpected ways. Help desk calls spike as frustrated employees seek password resets or alternative authentication methods. Some users develop workarounds—leaving devices unlocked, sharing credentials, or pressuring administrators to lower security settings. The organization loses the security benefits it paid for while still bearing the cost and complexity of biometric systems.

Modern environments compound these challenges because authentication happens constantly. Remote workers authenticate to VPNs, then to internal applications, then to customer systems. Mobile employees authenticate in varied lighting conditions, while moving, sometimes wearing gloves or with wet hands. Each authentication represents another chance for false rejection.

Organizations deploying behavioral biometrics face particularly complex FRR considerations because these systems continuously verify identity rather than checking once at login. Set the sensitivity too high and users face constant interruptions; set it too low and you miss genuine threats. The right FRR threshold depends on context—what's acceptable for unlocking a phone differs from what's acceptable for authorizing a financial transaction.

The Plurilock Advantage

Plurilock's identity and access management services help organizations deploy biometric and modern authentication that balances security with usability. Our team evaluates your specific environment—user population, use cases, risk tolerance—to design authentication flows that minimize false rejections without creating security gaps.

We test systems under real-world conditions before deployment and tune sensitivity thresholds based on actual usage patterns rather than vendor defaults.

When biometric authentication isn't the right fit, we implement alternatives that provide strong security with better user experience. Learn more about our identity and access management services.

.

Downloadable References

PDF
Sample, shareable addition for employee handbook or company policy library to provide governance for employee AI use.
PDF
Generative AI is exploding, but workplace governance is lagging. Use this whitepaper to help implement guardrails.
PDF
Cheat sheet for basics to stay secure, their ideal deployment order, and steps to take in case of a breach.

Enterprise IT and Cyber Services

Zero trust, data protection, IAM, PKI, penetration testing and offensive security, emergency support, and incident management services.

Schedule a Consultation:
Talk to Plurilock About Your Needs

loading...

Thank you.

A plurilock representative will contact you within one business day.

Contact Plurilock

+1 (888) 776-9234 (Plurilock Toll Free)
+1 (310) 530-8260 (USA)
+1 (613) 526-4945 (Canada)

sales@plurilock.com

Your information is secure and will only be used to communicate about Plurilock and Plurilock services. We do not sell, rent, or share contact information with third parties. See our Privacy Policy for complete details.

More About Plurilockâ„¢ Services

Subscribe to the newsletter for Plurilock and cybersecurity news, articles, and updates.

You're on the list! Keep an eye out for news from Plurilock.