Face Recognition
Iris Recognition
Fingerprint and Palmprint Recognition
Finger Vein Recognition
Voice Recognition
Ear Acoustic Authentication
This bio-metric authentication technology has become a familiar part of our lives. Our face recognition system authenticates with high accuracy using three key technologies: “Finding data within the face,” “Perceiving facial features,” and “Matching the same person.” In addition, the system is robust against poor recognition environments. Many face recognition technologies depend on clear face images for their processing. However, our solution achieves high accuracy even when images are poor and grainy. It is being used for a wide range of applications, from crime prevention to room entry/exit management and making purchase payments.
The iris is the colored, donut-shaped portion of the eye behind the cornea and surrounds the pupil. A person’s iris pattern is unique and does not change throughout his or her life. Also, covered by the cornea, the iris is well protected from damage, making the body part suitable for biometric authentication. It is an authentication method well-suited for users whose bodies are covered by heavy clothing like protective wear and other situations where hands-free authentication is desired. Because iris information is captured by an infrared camera, it can be used even in dark places. Going forward, this authentication technology is expected to be used in scenarios where even greater security than at present is needed, such as for national identification and immigration control
Our fingerprint and palmprint recognition technologies have the longest history among our biometric technologies. With the characteristics of lifelong invariance and uniqueness, the system is used as a rigorous personal identification technology, contributing to safety and security.
This technology identifies users by detecting veins on fingertips and analyzing the image features of the veins. As the technology uses vein information inside the user’s finger, theft or falsification of information is difficult. Thw finger vein recognition technology combines finger veins and fingerprints information to authenticate both biometrics simultaneously for PC logins and other applications. Besides achieving more secure identification of the user, the technology also contributes to security measures for government agencies and private enterprises because it is difficult to falsify.
This technology extracts characteristics inherent in speakers from their voices to identify them.
Every person’s vocal organs such as his or her mouth, throat, and nose are like musical instruments. Because of differences in their shapes and movements among individuals, unique characteristics arise.
* This technology is still under development
A person can be identified by recognizing the echo of a sound sent through his or her ear canal from an external source. Because only one second of authentication sound is sent and received, the authentication process is near-instantaneous. “Continuous authentication” without the user’s conscious awareness is thus possible. By using a device on the user to send various sensing data or sound data to the user’s ear, the technology ensures that the user is the true user. For example, the impersonation of a bodyguard around a VIP can be prevented by using this technology. If a terrorist acquires the security device being used, he or she can be detected by the device’s ear acoustic authentication function.