A convenient, safe, and secure society with highly reliable iris authentication.
Traditional Dogman algorithms for iris recognition are weak against changes in illumination, and individuals with narrow eyes, particularly East Asians, have a high false rejection rate. Additionally, there are drawbacks such as being large and expensive. There have also been experimental reports indicating the possibility of "spoofing" using photographs. Critic's iris recognition has resolved these issues with a new algorithm and achieved high accuracy, miniaturization, and cost reduction through modularization. 【Solution Proposal】 - In biometric authentication, iris recognition is fundamentally the best choice due to its uniqueness, stability, and ease of accurate data acquisition. - Iris data (templates) will be encrypted with a cryptographic key determined at the user's discretion (organization or individual). - In the unlikely event of future leakage of iris data, it will be possible to change the cryptographic key and invalidate previous iris data. - Important data will be encrypted using iris recognition and stored on a hidden drive. → The cryptographic key will be created and stored by the user. - Combining with a one-time password method, the template will be disposable. For more details, please contact us or download the catalog.
Inquire About This Product
basic information
【Lineup】 ○ Iris recognition system: Ilias EF-45NC ○ Management software: CMID Manager V2 (abbreviation: CMV2) ○ Iris recognition device: IriShield ○ Same software: FYIO → Windows (7, 8.0, 8.1) Logon (no complex password required) → Document iris encryption software (AES), app lock → Single Sign-On (SSO) system ○ Technology provision (license agreements, SDK provision, etc.) (Smartphones, tablet PCs, laptops, automobiles, etc.) ○ Iris access control system → Simultaneous dual-eye authentication type (glasses, contacts, goggles OK) → Single-eye standalone type (budget version) ● For more details, please contact us or download the catalog.
Price information
Please contact us.
Delivery Time
※Please contact us.
Applications/Examples of results
For more details, please contact us or download the catalog.
catalog(1)
Download All CatalogsCompany information
Authentication using physical objects (My Number Card, various licenses, health insurance cards, various membership cards, ID cards, seals, etc.) and memory (passwords, PINs, etc.) has been the cause of many issues such as loss, forgetfulness, theft, forgery, hacking, and phishing. As a result, the practical application of biometric authentication (fingerprints, facial recognition, vein patterns, etc.) that utilizes the individual's physical characteristics has progressed. However, due to factors such as occupation, age, physical constitution, changes over time, and environment (temperature, lighting), there have been cases where individuals are "not authenticated despite being the rightful person" or "mistakenly authenticated as someone else," leading to insufficient reliability. Our company collaborates with leading companies worldwide to promote the adoption of "iris recognition," which boasts an ultimate high precision with a probability of being mistaken for someone else of "1 in 1 million (1 in 1 trillion with both eyes)." Furthermore, we aim to improve the usability and operability of "iris recognition" while reducing costs, contributing to the realization of a society free from the need for cards, various forms of identification, passwords, etc., as part of our corporate philosophy.