Iris Recognition System Technology Standard

The iris is the circular organization between pupil and sclera, is the visible part of the human eye. As iris recognition biometric identification, and other biometrics and non-biometric identification, like having to identify the authenticity of the user identity features. In information systems, early user authentication is often used to password authentication Multi-language Attendance Management System based. With the development of information security attack and defense technology, password authentication security because of its low intensity, and the use of memory and other aspects of the problems, it has been unable to meet the development needs security technology, fingerprint, iris biometric technology favored. Iris recognition technology because of its efficient, accurate and difficult to forge and other characteristics attention. In order to regulate the iris recognition technology, promote the development of iris recognition technology has independent intellectual property rights, and provide effective and practical human biometric fingerprint attendance system identification capabilities for information systems security and social security, there is a need to develop safety standards for iris recognition system. Iris recognition system includes the following modules: iris image acquisition, iris image processing, user registration processing, user identification processing, data storage transport management (see Appendix A.1). These modules are used to achieve two basic functions: user registration and user identification. User registration, by the image acquisition module user iris image, the image processing module, user registration information is generated by the user registration processing module and stored in the database; when the user identification, user identification information is generated, and the identification information and registration. information for comparison, obtained recognition results. Wherein the user is a one-time registration process, a user registered only once. User registration information should have a consistent form, in order to enhance the safety management and saves fingerprint door access control machine resources. Appendix A.2 iris recognition processing process is described. Shots acquired iris image with the increased level of safety is increased in order to improve the reliability of iris recognition, reducing the likelihood of false rejection and false acceptance condition. Iris recognition system consists of software and hardware systems. Software system i.e. iris information processing system for realizing iris image processing, user registration, user identification, iris image storage management, storage management, and other functions iris; hardware system includes an iris image acquisition system and hardware support iris information processing software system operation surroundings. Above constitute a complete hardware and software system information processing system, iris recognition. The external interface iris recognition system is: input information is an iris image; output information is the recognition result. Iris recognition system capable of running the operation and intervention are system administrators, price of biometrics fingerprint scanner system security officers, and system auditors fingerprint time attendance machine suppliers and other privileged users. These privileged user must later confirm authorization to implement the operation may require.

Published
Categorized as Journal