Eye Recognition

Also know as Iris Recognition, is a method of identifying people based on unique patterns within the ring-shaped region surrounding the pupil of the eye. 

IRIS Recognition Technology On Mobile Phone

While biometric authentication has attracted users and manufacturers, iris recognition is an authentication technology using the iris pattern in the eye. This iris pattern is complex and random, which makes it difficult to find a recognizable rule. Thus, it provides authentication with high accuracy. It is used as one of the security systems such as PIN numbers, graphics and Fingerprint ID. Compared to conventional locks, this tech provides easier access for accurate authentication. 

Availability in mobile phone

OKI, Japanese leader in telecommunication announced the availability of Iris recognition middleware that can be implemented on existing mobile phones for better security protection. OKI has been providing its iris recognition technology-based equipment to government agencies, financial institutions and other enterprises in Japan and overseas. While these devices require a dedicated infrared camera, the new iris recognition technology can use a standard camera that is embedded in a mobile terminal, because of the original algorithm OKI has developed. 

The middleware is said to be compatible with current mobile phones that are running on either Symbian or Windows Mobile OS. On the hardware requirement, it only requires a 1Megapixies camera to capture the Iris patterns and compare it with correct user’s Iris for authentication. It is believed that the errors happen no more than one in 100,000 trials (equivalent to 99.99% accuracy). And based on its uniqueness of Iris patterns for each individual, it is the most accurate form of security application in the mobile market as of now. 

Significance

As mobile terminals become more sophisticated, new services such as payments and enterprise information management are becoming commonly used. Users and equipment manufacturers have been drawing attention to the incorporation of personal authentication in such equipment to prevent misuse when the terminals are lost or stolen.