Confidential
Optics and Digital System
Confidential
R&D TeamWork
Optics , Camera Module
Application ,System Solutions
IRIS System
Algorithm
1
Confidential
Protection Function on PC
1. Lon on 1. Lon on • Only the authorized person can turn on PC (Log on)
- No access except Iris Identification
4. Screen saver4. Screen saver
5. Internet on/off5. Internet on/off
2. File lock 2. File lock
3. Folder lock3. Folder lock
• Internet connection or disconnection by ‘Icon’ click
• Only the authorized person can go into ‘work station’
- No access except Iris Identification
• Only the authorized person can lock or unlock ‘File’
- No access except Iris Identification
- Locked file can not be copied, moved and deleted
• Only the authorized person can lock or unlock ‘Folder’
- No access except Iris Identification - Locked file can not be copied, moved and deleted
2
Confidential
Iris Authentication Mouse
Characteristics
1. Users : 10 Persons (Max. number of persons could be registered in the one mouse)
2. Illumination : (Registration) 50 Lux, (Identification) 10 Lux ~ 10,000 Lux
3. Process Speed : (Registration) 8 ~15 sec., (Identification) 0.1~1.0 sec.
4. Method of Identification Process : Match-on Type. Iris Data exist only in the mouse
5. Algorithm : Embedded. Self-learning function the more use, the better perform
⇒ None Contact Iris Identification system durability & longevity
Common mouse + Iris identification Module ⇒ Reliability, Security and Commercialization
3
Confidential
4
Biometrics comparison
Biometric Identification
OURS ; FAR = 1 ÷ 2 25 (Standard level, Algebraic value in Algorithm)
FRR =< 0.01% (Experience)
* FAR can be adjusted according to the requested security level.
↑ On base of theory
Confidential
Using the individual characteristics (Biometrics)
Maximizing the convenience, safety and security
Iris Identification System built-in Mouse
5
Image Capture, Analysis, Encode, Register,
Storage, Comparison ⇒ Identification
【 Flow Chart 】
(IRIS) (MOUSE) (PC, Terminal)
① ②
Communication
Summary of Product
Confidential
Customizable Application
6
Module
- Portable Devices
Access Control
* Network / PC Login Protection* Web Site Protection* Employee Recognition* Time Attendance / Leaving Systems* Gate (Door) Access Control* Voting Solutions* Handheld Devices* Home and Office Security Systems* Debit / Credit Card Payment * Missing Child / Senior Identification* Vehicle Anti-Theft / Starting System * Weapon Operation Control* The others – Various Solutions
# OEM Products / Solution Available
Recognizer- Banking ; Internet, ATM - Immigration Control
Mouse type
- PC, Terminal
Confidential
Appendix-1
Technical Characteristics
“Match-On” Type to protect the personal Iris Data
Under the current data base system, the information data to differentiate a person fromthe others should be stored in data base of a PC as so called ‘Store-on Type’. For example,Fingerprint data should be stored in DB of the PC. The fingerprint data input from terminalshould be compared with the one in the DB. However, this system still has bunch of risks to lose the personal data by illegal access like hacking.
In order to protect the personal Iris Data safe, we introduced ‘Match-on’ technology in Iris Identification Mouse. All the processes to identify the iris are done only in the Mouse and the Iris Data should be stored and compared only in the mouse without being processed in the PC. The personal Iris Data could be created, compared and transacted only in the Mouse so that the Iris data would not fall out.
7
Confidential
Appendix-2
Technology (Patents)
• Oriented for ‘Iris’ related works and holds many Patents and technologies on
the Iris recognition.
- Iris Identification System : Patent Register (KR, UK, DE, CN, US)
Pending (JP)
- Iris Health Analysis System : Patent Register (KR)
- Iris Cameras and Device : Patent Register (KR) 8 Items
- Iris Identification Mouse : Patent Register (2005.12)
PCT (on Apr.06)
8
Confidential
Appendix-3
Network System (ex.)
Application Server Repository Existing Methods
Existing Methods
• ID / Password• Cookie• Official Certification • Card Key
But …
• Password Open• Copy• Missing Key
☞ Network system (Group ware) would be customized according to the requirements.
內部職員 統計 ,Reportin
g
私設公認機關
協力社代理店
公認認證機關
顧客外部使用者
Confidential
i Mouse samples
10
Top Related