Cybersecurity Reference > Glossary
What is False Rejection Rate (FRR)?
It's the flip side of false acceptance—instead of letting the wrong person in, the system keeps the right person out. Every biometric system makes these mistakes occasionally because biological traits vary slightly each time they're measured. Your fingerprint might be drier today than yesterday, or you might position your face differently in front of the camera.
A high FRR means users constantly struggle to authenticate, which creates real problems beyond mere inconvenience. When people can't get into systems reliably, they complain to IT, delay important work, or find ways to circumvent security measures entirely. Some organizations respond by loosening authentication requirements, which trades one problem for another.
The challenge is finding the right balance—strict enough to keep threats out, but forgiving enough that legitimate users can actually work. An authentication system with a 5% FRR might sound acceptable until you realize that means one failed login attempt out of every twenty, potentially several times per day for each user.
Origin
When biometric authentication entered commercial use in the 1990s—starting with fingerprint readers for physical access control—engineers borrowed this framework directly. They needed metrics to characterize system performance, and FRR became the standard measure for quantifying how often legitimate users got rejected. The first biometric systems had terrible FRRs by modern standards, sometimes above 10%, because the technology was crude and environmental factors weren't well understood.
As biometric authentication expanded into computing—particularly after fingerprint readers appeared on laptops and smartphones in the 2000s—reducing FRR became a commercial imperative. Nobody would buy a phone that rejected their fingerprint half the time. Manufacturers invested heavily in better sensors, machine learning algorithms, and multi-attempt protocols to drive FRR down while maintaining security.
Why It Matters
Modern environments compound these challenges because authentication happens constantly. Remote workers authenticate to VPNs, then to internal applications, then to customer systems. Mobile employees authenticate in varied lighting conditions, while moving, sometimes wearing gloves or with wet hands. Each authentication represents another chance for false rejection.
Organizations deploying behavioral biometrics face particularly complex FRR considerations because these systems continuously verify identity rather than checking once at login. Set the sensitivity too high and users face constant interruptions; set it too low and you miss genuine threats. The right FRR threshold depends on context—what's acceptable for unlocking a phone differs from what's acceptable for authorizing a financial transaction.
The Plurilock Advantage
We test systems under real-world conditions before deployment and tune sensitivity thresholds based on actual usage patterns rather than vendor defaults.
When biometric authentication isn't the right fit, we implement alternatives that provide strong security with better user experience. Learn more about our identity and access management services.
.




