Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

11
Confident ial Optics and Digital System

Transcript of Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Page 1: Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Confidential

Optics and Digital System

Page 2: Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Confidential

R&D TeamWork

Optics , Camera Module

Application ,System Solutions

IRIS System

Algorithm

1

Page 3: Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Confidential

Protection Function on PC

1. Lon on 1. Lon on • Only the authorized person can turn on PC (Log on)

- No access except Iris Identification

4. Screen saver4. Screen saver

5. Internet on/off5. Internet on/off

2. File lock 2. File lock

3. Folder lock3. Folder lock

• Internet connection or disconnection by ‘Icon’ click

• Only the authorized person can go into ‘work station’

- No access except Iris Identification

• Only the authorized person can lock or unlock ‘File’

- No access except Iris Identification

- Locked file can not be copied, moved and deleted

• Only the authorized person can lock or unlock ‘Folder’

- No access except Iris Identification - Locked file can not be copied, moved and deleted

2

Page 4: Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Confidential

Iris Authentication Mouse

Characteristics

1. Users : 10 Persons (Max. number of persons could be registered in the one mouse)

2. Illumination : (Registration) 50 Lux, (Identification) 10 Lux ~ 10,000 Lux

3. Process Speed : (Registration) 8 ~15 sec., (Identification) 0.1~1.0 sec.

4. Method of Identification Process : Match-on Type. Iris Data exist only in the mouse

5. Algorithm : Embedded. Self-learning function the more use, the better perform

⇒ None Contact Iris Identification system durability & longevity

Common mouse + Iris identification Module ⇒ Reliability, Security and Commercialization

3

Page 5: Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Confidential

4

Biometrics comparison

Biometric Identification

OURS ; FAR = 1 ÷ 2 25 (Standard level, Algebraic value in Algorithm)

FRR =< 0.01% (Experience)

* FAR can be adjusted according to the requested security level.

↑ On base of theory

Page 6: Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Confidential

Using the individual characteristics (Biometrics)

Maximizing the convenience, safety and security

Iris Identification System built-in Mouse

5

Image Capture, Analysis, Encode, Register,

Storage, Comparison ⇒ Identification

【 Flow Chart 】

(IRIS) (MOUSE) (PC, Terminal)

① ②

Communication

Summary of Product

Page 7: Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Confidential

Customizable Application

6

Module

- Portable Devices

Access Control

* Network / PC Login Protection* Web Site Protection* Employee Recognition* Time Attendance / Leaving Systems* Gate (Door) Access Control* Voting Solutions* Handheld Devices* Home and Office Security Systems* Debit / Credit Card Payment * Missing Child / Senior Identification* Vehicle Anti-Theft / Starting System * Weapon Operation Control* The others – Various Solutions

# OEM Products / Solution Available

Recognizer- Banking ; Internet, ATM - Immigration Control

Mouse type

- PC, Terminal

Page 8: Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Confidential

Appendix-1

Technical Characteristics

“Match-On” Type to protect the personal Iris Data

Under the current data base system, the information data to differentiate a person fromthe others should be stored in data base of a PC as so called ‘Store-on Type’. For example,Fingerprint data should be stored in DB of the PC. The fingerprint data input from terminalshould be compared with the one in the DB. However, this system still has bunch of risks to lose the personal data by illegal access like hacking.

In order to protect the personal Iris Data safe, we introduced ‘Match-on’ technology in Iris Identification Mouse. All the processes to identify the iris are done only in the Mouse and the Iris Data should be stored and compared only in the mouse without being processed in the PC. The personal Iris Data could be created, compared and transacted only in the Mouse so that the Iris data would not fall out.

7

Page 9: Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Confidential

Appendix-2

Technology (Patents)

• Oriented for ‘Iris’ related works and holds many Patents and technologies on

the Iris recognition.

- Iris Identification System : Patent Register (KR, UK, DE, CN, US)

Pending (JP)

- Iris Health Analysis System : Patent Register (KR)

- Iris Cameras and Device : Patent Register (KR) 8 Items

- Iris Identification Mouse : Patent Register (2005.12)

PCT (on Apr.06)

8

Page 10: Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Confidential

Appendix-3

Network System (ex.)

Application Server Repository Existing Methods

Existing Methods

• ID / Password• Cookie• Official Certification • Card Key

But …

• Password Open• Copy• Missing Key

☞ Network system (Group ware) would be customized according to the requirements.

內部職員 統計 ,Reportin

g

私設公認機關

協力社代理店

公認認證機關

顧客外部使用者

Page 11: Confidential Iris Authenticati on System 2007. 8. Optics and Digital System.

Confidential

i Mouse samples

10