"High security solution group"

IRIENCE

Experience the segmented and specialized iris recognition technology of IRIENCE along with our iris recognition algorithm and software developers. IRIENCE, truly the best iris algorithm company in Korea, who complies with international standards and maintains a strict operation offers a world class level iris recognition technology to our users.

홈 Iris authentication/Algorithm Application field

Access control

Limitation of Logical Security Systems

· Problems by using logical security (ID/PWD, OTP, RFID, security card, etc.)
· Security problems of stealing other’s ID/PWD and an implied use.
· Risk of hacking attempt by using a predictable PWD (1 minute to decrypt an 8-digit text)
· Inconvenience by possessing media including OTP, RFID, security card and risk of loss
· Requires a complex PWD or a periodic PWD change

Objective of The Proposed System

· Implement physical security by iris authentication(authentication without media, Bio-PWD)
· Prepare for hacking by distributed management of iris information, construct iris information to be non-reusable
· Build up a safe and reliable security access control system when accessing the DB and system

Logical Security Technology Physical Security Technology
Password OTP Fingerprint recognition Iris recognition
Recognition data
Media Combination of letters, numbers, and symbols Random number Finger curve Pattern of iris
Possibility of theft High Low Possibility impossibility
Technical level Low General purpose technology General purpose technology High
Maintenance costs Low High Low Low
Security Can be stolen and used implicitly
10-digit text decryption time 1 hour
Risk of loss
Replace every 2 years
Risk of gastric alteration
High Misperception
physical Security
the highest level of perception
Comparison Limits of Logical Security
Periodic replacement required
Requires several combinations such as symbols
High maintenance costs
Always carry product
Disable in case of emergency
Contact biometric authentication
1:N method limit present
non-Media authentication
Most Confident Authentication

Advanced Case Study On The Application of Iris Recognition

  • United States Army

    Unmanned weapons system (Drones, unmanned combat vehicles, etc.)
    Use iris for operator authentication

  • NATO

    Smart Helmet for Battlefield Information
    User authentication(BAE system)

  • Woori Bank

    Woori Bank DB Access Control
    Establishment of Bio(Iris) Recognition System

DB Access Control Iris Recognition Distributed Management System( Apply to 00 Bank)- Registration Structure