Irisys Introduction

Irisys Technologies

Irisys Vision

Irisys History

Our Iris recognition system can be applied onto a variety of products like OTP,
Door lock, Safety Box, ATM, CD, POS, Healthcare, etc.
Biometric Fuzzy Hash Algorithm

When our encryption technology (Biometric Fuzzy Hash algorithm) combined with an iris data code, it makes no compromise of high security level of the system, unlike other systems.

  • 1. Authentication without saving biometric information to any server or device
    2. Unique one way iris hashing cryptographic algorithm
General Verification Hash Function
  • PasswordDatabase
  • Match
  • Authentication Result
Biometric Information Code Template
Bio Hash Function
  • Iris Code
  • Iris Code
  • 1st step iris code
  • Iris Encryption
  • 2nd step Iris encryption code   
    Fuzzy Hash Encryption     
  • Double encryption
  • Database
  •  Match
  • Authentication

※ IRISYS governs a very strict R&D policy at securing the biometric hashing algorithms intellectual property within the Company. Our engineers try its best to lead our technology
    at the cutting edge while they keen to utilize this high level of the biometric recognition solutions for our clients that require to interface with their products.