Iris recognition for access control

May 2002 Access Control & Identity Management

LG Electronics recently launched an access control system based on iris recognition, the IsisAccess 3000.

Iris recognition technology identifies people by the unique patterns of the the iris of the eye is the most personally distinct feature of the human body. Its details remain stable and unchanged from one year of age through life. In the entire world population, no two irises are alike in their mathematical detail, even among identical twins.

How it works

The characteristics of the iris are acquired during a brief enrollment by simply looking into an ordinary digital camera. A 512-byte digital code is derived from these characteristics and stored for later comparison. Subsequentially, glancing into the camera positioned at an access point, matching patterns is found in realtime image against the enrolled IrisCode make identification within less than 1 s. Eyeglass, contact lenses or even sunglasses have no effect on the identification.

System configuration

The system consists of an Enrollment Optical Unit connected to a central PC/server, four remote optical units are accommodated on an identification control unit which in turn is interfaced to the server on TCP/IP network. A total of 128 remote optical units can be connected to one server.

Worldwide acceptance

Since the introduction of IrisAccess this year, the system has been installed in a number of airports such as Schipol, Heathrow, Dallas, Cheriotadale and the Pentagon.

Telbit Electronics, the distributor of IrisAccess in South Africa is targeting the system at security and access control companies, system integrators and installations of high security profiles such as airports, government, the army, hospitals, etc.

Telbit Electronics

011 608 1121





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security launches Augmented Reality Training in Australia
Gallagher Training & Education Access Control & Identity Management
Gallagher Security has announced the latest addition to its innovative suite of training solutions, Augmented Reality Training, demonstrating its continued commitment to innovation and improving access to security training opportunities.

Read more...
Fluss launches the next wave of IoT solutions
IoT & Automation Access Control & Identity Management News & Events
Fluss has announced its newest IoT product; Fluss+ continues to allow users to manage access from anywhere globally and brings with it all the advantages of Wi-Fi connectivity.

Read more...
The future of digital identity in South Africa
Editor's Choice Access Control & Identity Management
When it comes to accessing essential services, such as national medical care, grants and the ability to vote in elections to shape national policy, a valid identity document is critical.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...