• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Physical Security

Iris Recognition Emerging as Preferred Biometrics Technology

Biometrics as a whole is growing popular because it is unlikely for such information to be falsified.

May 11, 2016 TechDecisions Staff Leave a Comment

With the growing focus on physical and logical security, identity protocols are of the utmost importance in helping to achieve the desired level of security of people, assets and data. This is because many aspects of general security depend on authorities and permissions held by an individual: opening a particular door, visitor permissions, issuing keys, accessing money or materials, etc. In each case, maintaining security depends on correctly identifying an individual and matching them with the proper authorities and permissions – the identity imperative.

Biometrics is one of the fastest-growing categories of identity protocols. One primary reason for this is that it is difficult if not impossible to falsify biometric information. In our daily lives, we almost always confirm the identity of the people we know using a version of biometrics – we recognize the face, the body size and shape, and the voice of our friends, family and coworkers.

It is only for people who we don’t know that we shift to other methods; for example, airport security screeners look at your driver’s license or passport. But even in that case, only photo versions of these documents are accepted, as the near-biometric information — your photograph — helps the screener link you to the document.

Among all the available biometrics, the one most rapidly gaining ground is iris recognition. It is as fast and simple as taking a selfie, and does not require any physical contact with a sensor. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. Some can even read through eyeglasses, in diverse weather conditions, outdoors or inside.

The integration of iris scanners into smart phones has also helped to drive acceptance of the technology. Moreover, it is hands-free, adding a strong measure of convenience to its usage. Subjects can approach an entry point with their arms loaded with books, bags, etc. and have no need to fumble for a card.

Because of its accuracy and ease of use, iris recognition technology is being implemented in a growing number of security systems, displacing card readers and keypads to provide a higher level of security. Some examples include transportation such as airport registered travel programs, financial services as replacements for PINs for more secure banking and education applications where iris recognition is used for book borrowing or online examinations in addition to integration with a school’s access control system. Iris recognition can also be used on moving subjects making it suitable for toll booth/bridges installations.

Iris recognition technology can also benefit business applications. For instance, warehouse access, as well as any secure areas or cages within, can be controlled by the same device that interfaces with the inventory management system. Picked items could be instantly recorded for a precise audit trail that limits theft. Usually this is done with a combination of cards or PINs, handheld devices, remotely managed systems and even paper pick lists. With the integration of security and business processes, you know exactly who is at the location and exactly what they’re doing while they are there.

Market research suggests that biometric technology implementations will grow steadily due to the rising need for higher levels of data and identity security. With most organizations now giving more attention to managing risk, cost-effective iris recognition systems are primed to be the next big thing in access control and identity verification.

Bio: Mark Clifton is president, products and solutions division, and vice president of SRI International.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Access Control, Corporate

Related Content:

  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • AtlasIED North Syracuse Central School Dist 2 North Syracuse Central School District Streamlines Communications with…
  • cyber-attack-skull Spike in Cyberattacks Exposes Vulnerabilities in University Security…
  • NSA Programming Languages The Cyberattacks and Insider Threats During The Development…

Free downloadable guide you may like:

  • 10 Reasons Why School Administrators Should Consider These Tech Tools for Emergency Preparedness

    Working in an educational facility is more complicated than ever before. There are so many more situations to be aware of, so much more to have to communicate to others. Communication is paramount for the safety of students and staff and to keep daily operations flowing smoothly. Where once a PA system was all that […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.