• Breaking News

    Saturday, May 13, 2017

    Iris Scanning Technology

    Iris Scanning Technology

    I have a friend who is very good at hacking. So one day I thought I would do a little bit of PATC. But, the problem happened when P.C. went on to do something. Do not go on anything. The barber is failing. 

    Although I did not see the password or zip code nation!


    So, when he came, he said to him, "What is the story?"


    She said, "Mama, all the game of Iris scanning! My eyes will not be on P.C. until it matches Iris. "

    Then he was sitting in front of P.C.


    So what is the scope of this iris scan? How does it work and how safe is it? Let's learn more about this

    What Is Scandalous Iris?


    Before knowing about Iris scanning technology, you need to know what is the iris?

    In terms of body language, Iris is the most visible part of the eyes of all other vertebrates, including the people. Our eye structure is roughly a complex process. The name of the white part of our eyes is Scherré, and the name of the part of our eyes is the color of each of the colors, it is named Iris.

    Iris is made by Stringa, a dyed fibroblastic tissue. It is a layer located at the bottom of the carnarea and on the lens. The small hole in the center of it is known as a telescope or pupil [pupil].


    Iris Storma and Iris pigmented epithelium are two layers of iron / gray / brown color in the eyes. Men's eye is usually melanin pigment in iris. The melanin perts are basically dark brown, a kind of grainy substance. The difference in the color of our eyes depends on the amount of this melanin pigment. The density of Iris Melanin's density is as deep as its color and the more intense.


    Some people have different types of people's handbags, eye-eyed people, and so on. From the birth of each person to the death, Iris' pattern is different. Caro is not compatible with Carris.


    That's why technology has developed one of the most important security technologies by utilizing this great thing. This is basically, Iris scanning technology.


    However, it is important to note that during the time of growing up for children, eye iris may be seen to be changed. However, after 2/3 years of age, it does not change. Life remains unchanged.



    How does it work?



    I have already said that our eye-iris pattern does not match with anyone, so do not match anyone. Iris scanning recognizes your eye pattern. In which it resembles your eye Iryis and can identify you as positive. Iris Scanner uses fine infrared illumination video camera technology. Iris Scanner has an infrared camera and a normal video camera camera. These two cameras can take many high-resolution photos of eye-iris. It works in two satiety stages. The first is to find the iris pattern attached to it, and then verify it and then it displays the result.


    The first person to stand in front of the camera, his eyes are digitally taken in both light and invisible infrared images. (A kind of night vision system is used, which is a slightly wavelength wider than a kind of light red light.) Can not stand out clearly in ordinary light, using unique features of the eye to help the infrared to appear mysteriously by using the night vision system. After taking photos, the scanner collects some important information from the iris. These two digital photographs are analyzed by a computer. Which will remove unreliable detail parts, and will recognize around 240 locations around Iris. After acquiring and collecting identities, the information is changed to an encrypted code. The scanner will give positive results if all these features or points match the person's iris.


    Iris scanner basically stores these codes. And the time the person scans for access, the scanner will screw up all his information and make those codes in a code. Then it will look at the previously stored or saved code. If available, then provide access, otherwise it will show a fail or no match. This process takes a few minutes to complete.



    How safe is this technology?



    Iris scanning is a very complex form of technology. This technology is not implemented for biometric purposes. Finger print technology is used here. Even if the scanning of Iris is more advanced and safe than fingerprint technology. Because finger print is available where only 40+ pieces of access are available, Irriss scanning provides access to more than 250 contacts there. It can be estimated ten times more accurately than fingerprints.


    Iris scan's biggest advantage is its accuracy and reliability. It is not as easy to hack other technologies, such as passwords, finger prints, etc. It is not as easy to hack this technology.

    For example, we often see the movie in Thurla,


    There is a sinking filling diamond. There are special types of strong passwords in that synchronizer or locker. It is known only to the owner of the locker, that is, special people. However, anyone else can track that password by hacking or using a hidden camera.


    Again, the fingerprint has been used in the locker. In that case, the fingerprint of the person using the fingerprint is made of plastic or by making a fake finger and the person is unknowingly his hand is easily taken.


    But, at Iris scanning, it's not easy to do this. Because, as mentioned earlier, this technology identifies many tractors. Then give access. Scanner's High-Regulation Camera will look at your eyes. You will also see whether your eyes are alive or not! Moreover, it is not necessary to touch it. Work begins in front of the scanner.


    Only you can see it properly and you will be able to access it. So it is too complicated to have a sitar or a bypass here too.


    So this process is said to be more secure than others.



    Approach:



    This complicated process is still under investigation. And it is not quite used in the long run. Although some of these phones were connected to the phone, but it was relatively unimaginable.


    However, the use of this technology is increasing in developed countries. And soon it will start to get more popularity.


    Who does not want to keep his wealth safe with more security?
     

    No comments:

    Post a Comment