A convenient, safe, and secure society with highly reliable iris authentication.
Traditional Dogman algorithms for iris recognition are weak against changes in illumination, and individuals with narrow eyes, particularly East Asians, have a high false rejection rate. Additionally, there are drawbacks such as being large and expensive. There have also been experimental reports indicating the possibility of "spoofing" using photographs. Critic's iris recognition system addresses these issues with a new algorithm, achieving high accuracy, miniaturization, and cost reduction through modularization. 【Solution Proposal】 - In biometric authentication, iris recognition is fundamentally the best choice due to its uniqueness, stability, and ease of accurate data acquisition. - Iris data (templates) are encrypted with a cryptographic key determined by the user (organization or individual). - In the unlikely event of future leakage of iris data, it allows for the cryptographic key to be changed, rendering previous iris data invalid. - Important data is encrypted using iris recognition and stored on a hidden drive. → The cryptographic key is created and stored by the user. - Combining with a one-time password system, the template is made disposable. For more details, please contact us or download the catalog.
Inquire About This Product
basic information
【Product Lineup】 ○ Iris Authentication System: Ilias EF-45NC ○ Management Software: CMID Manager V2 (Abbreviation: CMV2) ○ Iris Authentication Device: IriShield ○ Same Software: FYIO → Windows (7, 8.0, 8.1) Logon (No complex password required) → Document Iris Encryption Software (AES), App Lock → Single Sign-On (SSO) System ○ Technology Provision (License Agreement, SDK Provision, etc.) (Smartphones, Tablet PCs, Laptops, Automobiles, etc.) ○ Iris Access Control System → Simultaneous Dual-Eye Authentication Type (Glasses, Contacts, Goggles OK) → Single-Eye Standalone Type (Economical Version) ● For more details, please contact us or download the catalog.
Price information
Please contact us.
Delivery Time
※Please contact us.
Applications/Examples of results
For more details, please contact us or download the catalog.
catalog(1)
Download All CatalogsCompany information
Authentication using physical items (My Number card, various licenses, health insurance cards, various membership cards, ID cards, seals, etc.) and memory (passwords, PINs, etc.) has caused many issues such as loss, forgetfulness, theft, forgery, hacking, and phishing. As a result, the practical application of biometric authentication (fingerprints, facial recognition, vein patterns, etc.) that utilizes an individual's physical characteristics has progressed. However, due to factors such as occupation, age, physical constitution, changes over time, and environment (temperature, lighting), there have been cases where individuals are not authenticated despite being the rightful person, or are mistakenly authenticated as someone else, leading to insufficient reliability. Our company collaborates with leading companies worldwide to promote "iris recognition," which boasts an ultimate high precision with a probability of being mistaken for someone else of "1 in 1 million (1 in 1 trillion with both eyes)." Furthermore, we aim to improve the usability and operability of "iris recognition" while reducing costs, contributing to the realization of a society where 'cards, various forms of identification, and passwords are unnecessary' as our corporate philosophy.