|
Few people find themselves unable to use the technology. In a few instances even blind persons have used iris recognition successfully, as the technology is iris pattern-dependent, not sight dependent. |
2. Iris Patterns - Stable Over a Lifetime
Structural formation in the human iris is fixed in early childhood and remains constant over a lifetime. So once a individual is enrolled, re-enrollment requirements are infrequent. |
3. Scalable for 'Big-Data' Applications
Iris recognition is the only biometric authentication technology designed to work in the '1-n' or exhaustive search mode, making it ideal for handling applications requiring management of large user groups, such as the VAXSYS System database. |
4. Unmatched Iris Search Spped
In 'one to many' search mode, iris scans are unmatched by other authentication technologies. In a recent study, Iris ID’s IrisAccess platform searched records nearly 20 times faster than the next biometric technology: up to 10 million+ matches per second. |
5. Versatile One-to-N, Wiegand & Token Environments
While initially designed to work in 'one-to-many' search mode, iris recognition works well in 'one-to-one' matching, or verification mode. This makes the technology ideal for use in multi-factor authentication environments where PINs, or tokens are used. |
6. Safety and Security Protocols
Using 512-byte encryption, Iris ID iris scans cannot be re-engineered or reconstituted to produce any sort of visual image. As such, Iris recognition provides a high level defense against identity theft, with an imaging process that involves no lasers or bright lights. Iris scans are essentially non-contact. |
7. Easy to Learn & Use
Using Iris Scan Technology is intuitive, requiring minimal cooperation from subjects. Proximity sensors activate the equipment, which incorporates mirror-assisted alignment functionality. Audio auto-positioning prompts, automated image capture, and visual and audio authentication decision-cueing completes the process. |