Presentation is loading. Please wait.

Presentation is loading. Please wait.

Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Similar presentations


Presentation on theme: "Confidential Iris Authenticati on System 2007. 8. Optics and Digital System."— Presentation transcript:

1 Confidential Iris Authenticati on System Optics and Digital System

2 Confidential R&D TeamWork Optics, Camera Module Application, System Solutions IRIS System Algorithm 1

3 Confidential Protection Function on PC 1. Lon on Only the authorized person can turn on PC (Log on) - No access except Iris Identification 4. Screen saver 5. Internet on/off 2. File lock 3. Folder lock Internet connection or disconnection by ‘Icon’ click Only the authorized person can go into ‘work station’ - No access except Iris Identification Only the authorized person can lock or unlock ‘File’ - No access except Iris Identification - Locked file can not be copied, moved and deleted Only the authorized person can lock or unlock ‘Folder’ - No access except Iris Identification - Locked file can not be copied, moved and deleted 2

4 Confidential Iris Authentication Mouse Characteristics 1. Users : 10 Persons (Max. number of persons could be registered in the one mouse) 2. Illumination : (Registration) 50 Lux, (Identification) 10 Lux ~ 10,000 Lux 3. Process Speed : (Registration) 8 ~15 sec., (Identification) 0.1~1.0 sec. 4. Method of Identification Process : Match-on Type. Iris Data exist only in the mouse 5. Algorithm : Embedded. Self-learning function  the more use, the better perform ⇒ None Contact Iris Identification system  durability & longevity Common mouse + Iris identification Module ⇒ Reliability, Security and Commercialization 3

5 Confidential 4 Biometrics comparison Iris Finger Printer FaceVoice Error Rate ~0.1 Speed0.2-1 sec.1 sec. 18 sec. ContactNoYesNo ForgeryImpossiblePossible TechnologyHighCommonUnstable Biometric Identification OURS ; FAR = 1 ÷ 2 25 (Standard level, Algebraic value in Algorithm) FRR =< 0.01% (Experience) * FAR can be adjusted according to the requested security level. ↑ On base of theory

6 Confidential Using the individual characteristics (Biometrics) Maximizing the convenience, safety and security Iris Identification System built-in Mouse 5 Image Capture, Analysis, Encode, Register, Storage, Comparison ⇒ Identification 【 Flow Chart 】 (IRIS) (MOUSE) (PC, Terminal) ① ② Communication Summary of Product

7 Confidential Customizable Application 6 Module - Portable Devices Access Control * Network / PC Login Protection * Web Site Protection * Employee Recognition * Time Attendance / Leaving Systems * Gate (Door) Access Control * Voting Solutions * Handheld Devices * Home and Office Security Systems * Debit / Credit Card Payment * Missing Child / Senior Identification * Vehicle Anti-Theft / Starting System * Weapon Operation Control * The others – Various Solutions # OEM Products / Solution Available Recognizer - Banking ; Internet, ATM - Immigration Control Mouse type - PC, Terminal

8 Confidential Appendix-1 Technical Characteristics “ Match-On” Type to protect the personal Iris Data Under the current data base system, the information data to differentiate a person from the others should be stored in data base of a PC as so called ‘Store-on Type’. For example, Fingerprint data should be stored in DB of the PC. The fingerprint data input from terminal should be compared with the one in the DB. However, this system still has bunch of risks to lose the personal data by illegal access like hacking. In order to protect the personal Iris Data safe, we introduced ‘Match-on’ technology in Iris Identification Mouse. All the processes to identify the iris are done only in the Mouse and the Iris Data should be stored and compared only in the mouse without being processed in the PC. The personal Iris Data could be created, compared and transacted only in the Mouse so that the Iris data would not fall out. 7

9 Confidential Appendix-2 Technology (Patents) Oriented for ‘Iris’ related works and holds many Patents and technologies on the Iris recognition. - Iris Identification System : Patent Register (KR, UK, DE, CN, US) Pending (JP) - Iris Health Analysis System : Patent Register (KR) - Iris Cameras and Device : Patent Register (KR) 8 Items - Iris Identification Mouse : Patent Register ( ) PCT (on Apr.06) 8

10 Confidential Appendix-3 Network System (ex.) Application ServerRepository Existing Methods ID / Password Cookie Official Certification Card Key But … Password Open Copy Missing Key ☞ Network system (Group ware) would be customized according to the requirements. 內部職員 統計,Reporting 私設公認機關 協力社 代理店 公認 認證機關 顧客 外部使用者

11 Confidential i Mouse samples 10


Download ppt "Confidential Iris Authenticati on System 2007. 8. Optics and Digital System."

Similar presentations


Ads by Google