Reading Irises from Cars?

Author: Brian Rhodes, Published on Apr 14, 2013

What happens when you want to use biometrics at vehicle gates? In the past, this has meant staffing entry points with guards, and bringing readers to drivers inside their vehicles. However, SRI/Sarnoff demonstrated a new reader named 'IOM PassThru' at ISC West 2013 which they claim completely automates the process of reading irises, regardless of what type of vehicle the driver is sitting inside. Aside from a cool premise, does the IOM solve a real problem for access gates? In this note we examine.

Show Floor Demo

***/******* *** * ******* ****** **** ****** ** ***** ***** at *** ****, ********** * ******'* **** *** **** ** proximity ** *** ********. ** *** ***** ***** ***** ** captured ** *** *******, *** *** *** *** ******** *******:

  • *** **** ***** **** *** ****** *** ******* *** ****** at ***** *** *****.
  • *** ****** ******* *** ****** *** ***** *** ****'* **** geometry / **** ********.
  • **** *** ****** ******** *** ********** ** ***********.

*** ******* ************ *** ***** *****, **** *** ************ ******** up ** *** ******* *** ****** **********:

Problem *********

*** ******* *** ********* ** *********** *** '******** ********' ** biometric **** ******** ** ******* *****, * *********** ********* *** most ********. *************, *** ******* **** *********:

  • ******* *** ****** ** **** ***** *******, ****, *** **** reenter ***** ******* ** ***** ** ***** ******* *** *****.
  • ***** ****** ****** **** ****** *** ***** ******** ******* ** seated *******, *** **** ********** ** * ****** *****.

*** '*** ********' ***** **** *** ****** ****** ****** *** steering *****, *********** ******** ** *** ************** ******* *** ****** the ********* **********. ****** ** *** ***** *****, *** *** is ******* *****-***** ***** ** ***** *** * ***** ** vehicles ** *** **, **** ***-****** ******, ** ****-****** **** trucks. *** ****'* ****** ******* ** ** **** ** *** proper ****** ***** ** **** ** *******:

Product *******

***** **** ***** ****** **** * **** ***** ** ******* traffic, ***** ******* ******* *******:

  • *** *******: ***** *** ******** '** *****', *** ****** ** ****** against ***** *** ** ******** ** ** ******** ** * range ** ******* **********, **** ******* ****/*** ** ***/**** ************. The ********* ** ****** *** ****** ********* ** ******* **********, and *** **** ******* **** **** ****** ** *** ********* glass ******* *** ***** ** **** *******.
  • ******* ****: ** ***** ** **** ****** ********, *** ******'* ****** must ** ****** ****. ** ****** **** ******* *** ***** driver, *** **** **** ***** *** ******** ** ******** * read. *** ******'* **** ******* *** ******* ** *** ******* driver *******, *** *** ****'* ****** ******* ***** ** ***** set ** ******* *** ******.
  • '********** *****': *** ** *** **** **** ******, ****** *** **** was *** ****** ** *** **** *****, ** **** *** can **** ****** ******* ********** *** **** *** ******* *** driver ** ****** ****** ** **** *** ***.
  • ******* *******: ******* *** ********* ********** ** *** *****-****, ** ** integrated **** ****** ******* ******* **** *** ***** ******* ******, and *** **** ** ********** ** *** ******* ******* ** trigger **** ******. **** ******* ***** *** *** ******** *** ability ** **** **** ****** *** ****** ******, ** *** type.

******* **** ********* ** *** *********, ** ***** *** ************ 'how *****' **** *** ****** **** ** ** ** *** driver *** ****** *********. ***** *** ****** ** ***** **** did *** **** *** ******** *****, ** ********* **** *** reader ****** ** ******* ******* **" *** **" *** *** best ******.

PassThru ****

**** ******* ** $**,*** *** *** *** ******** ******** ******. However, *** ***** ****** **** **** ***** ** ****** ********* like ****** *****, ****** ******* ** ***** ************ *******.

******* *** ****** *** ******** ** *** **** ***** ** an '********** *******' ******* ~$**,***. **** ******** ******* ****** *** users ** ****** ***** ****** **** *** ******** **** * remote ******** **** * ******** ******. ******* **** ********** ******, irises **** ** ******** ***** **** *** ******** ****** ******.

*** ******** ** ** ********** ******* ****** *** ***** **** of *** ********* ** ~$**,*** *** *** ******, *** **** not ******* ************ ** ****** ******* *********** *****.

***** **** ** **** ******** ** ******** ****** *******, ** potentially ******** **** ** ********* ** ******* ** ****** ***** costs *** ***** ***** ** ****** ******** ** **** **** a ****'* ****.

****

*** **** ***** ** *** *** ******** ** *** ******** of ********, ********* ************ ****** ** ****** **** *********, *********** increasing *** ********* ******** ** *************.

****

*******, ******* *** ********** **** ** *** ***** **** *****, a ****** ** ******** *** ********* ********* *****:

  • *********:******* *** ****** **** ** ****** ***** **** ** *** scanner, *******/****** ********** *** ****** ** ******. ******* ** ** simply ******** *** **** **** * ******, ** * **** substantial ******* ****** , *** **** ** ***** ** ** damaged ****** * ******* **********. ***** *** **** *** ** somewhat ********* ** *** **********, ******* **** **** ** ** ******* ** *** ****** use ** *** ******, *** ****** ** ********* **** ** a **** **** ** *** *********** ** **********.
  • ***********:******* ****** ** ********* ** * ***** ** ********* **********, the ************ ************ **** ********* ******** *** ******** *** ******'* accuracy. *** *******, ****** ******** ******* **** *** ******* *** cause ***********. ***** *** ************ ********* **** ** * ******* '10 ****** **** *** *****', ** ** * ******** ******** for *** ****** ******* ******, *** * ********* **** ******* in ********.

Ideal *******

***** *** ************ ****** ******** ** *** '****** **** ****** controlled ******* *****', *** **** *** ************** ** *** ****** effectively ****** ** ** ****-******** *** ********** *************.

Comments (6)

What about the potential 'weekend at bernies' vulnerability of biometrics-only authentication?

If someone wants into the high-security area, and the only way in is with either my eyeballs or my fingers, then bad guys might take my eyeballs and/or fingers to gain access without any secondary requirement.

That might get messy. :(

It's my understanding that iris scanners can discriminate live eyeballs from dead ones. A live iris has an involuntary movement when the scanner beam strikes it that dead ones don't.

Do not worry for your eyeballs. They are nothing without you and you have to be alive.

Will we hold educational classes for the bad guys so that they don't fall prey to movies showing dead eyeball scanning? On the other hand, I don't want my finger cut off either.

It does not make sense at all. It will be much easier just to force you to use your traits and grant access to the facility or asset.

Person who is willing to cut a finger or cut out an eye will torture without any hesitations in order to get let's say a password or needed information. Thus it does not an exclusive problem of biometrics.

Konstantin, I and Marty were writing tongue-in-cheek as obviously what you say characterizes the situation very well.

And usually, the threat of torture is all it takes unless you are Jackie Chan, Chuck Norris or the like.

Generally employee training is to give such an attacker what they want, rather than try to fight them. A life is more valuable than other company assets.

I think some field trial reports and customer use data will tell the story for this product, which as Brian writes would be suitable for government and high-security applications.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Access Control

Higher Power PoE 802.3bt Ratified, Impact on Security Products Examined on Oct 12, 2018
Power over Ethernet has become one of the most popular features of many video, access, and other security products. See our PoE for IP Video...
Door Hinges Guide on Oct 10, 2018
Some of the trickiest access control problems are caused by bad door hinges. From doors not closing right, to locks not locking, worn or warped...
Security System Health Monitoring Usage Statistics 2018 on Oct 09, 2018
How well and quickly do integrators know if devices are offline or broken? New IPVM statistics show that typically no health monitoring is...
UTC Merges Lenel and S2, Creates LenelS2 on Oct 03, 2018
UTC has completed the acquisition of S2, launching literally Lenel's2 LenelS2 with UTC declaring that "LenelS2 unites two world-class teams with...
Anti-Tailgating Startup: Spyfloor on Oct 03, 2018
A Canadian startup, Spyfloor, is using a different approach to warn against tailgating, a common access control problem. By counting feet,...
VMS Mobile App Shootout - Avigilon, Dahua, Exacq, Genetec, Hikvision, Milestone on Oct 01, 2018
Mobile VMS apps are a critical interface for the modern surveillance user. But who does it best and worst? We tested 6 manufacturers - Avigilon,...
Favorite Power Supply Manufacturer 2018 on Sep 28, 2018
While power supplies are becoming less important as PoE matures, they remain vital to access control systems, where increased power for locks,...
AHJ / Authority Having Jurisdiction Tutorial on Sep 27, 2018
One of the most powerful yet often underappreciated characters in all of physical security is the Authority Having Jurisdiction (AHJ). Often,...
Access Control Lock Guide on Sep 26, 2018
In this guide, we examine locks; critical elements of any security system and fundamental parts of every access control system. Two fundamental...
Favorite Access Control Reader Manufacturer 2018 on Sep 25, 2018
Favorite reader votes are in, and it is not close. A global access giant ran away with the votes in a one-sided contest. But for many, the...

Most Recent Industry Reports

Knightscope Winning Investors, Struggling With Growth on Oct 16, 2018
While Knightscope's new financials show the company only winning 11 new customers in the past 12 months, the company continues to win new...
Integrator Laptop Guide on Oct 16, 2018
This 18-page guide provides guidance and statistics about integrator laptop use. 150 integrators explained to IPVM in detail about their laptops,...
Huawei Admits AI "Bubble" on Oct 16, 2018
A fascinating article from the Chinese government's Global Times: Huawei’s AI ambition to reshape industries. While the Global Times talks about...
ADI's Financials Revealed + W-Box Growth Priority on Oct 15, 2018
  ADI is one of the most powerful distributors in the security industry but how big are they? How much profit do they make? How much do they sell...
Amazon Touts Home Security Market Disruption on Oct 15, 2018
Amazon is coming for ADT and all of home security. Indeed, Amazon is advertising this as, in their own words, calling home security a: Inside...
Higher Power PoE 802.3bt Ratified, Impact on Security Products Examined on Oct 12, 2018
Power over Ethernet has become one of the most popular features of many video, access, and other security products. See our PoE for IP Video...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
Mysterious Patent Troll 'Secure Cam' Targets Industry, Sues Hanwha, Hikvison, JCI, Panasonic, More on Oct 11, 2018
A company named "Secure Cam," who is actively hiding their ownership, has acquired a slew of video patents and is systematically suing video...
Unfixed Critical Vulnerability In Millions of XiongMai Devices Disclosed on Oct 10, 2018
XiongMai, one of the biggest OEMs alongside Dahua and Hikvision, has suffered a critical vulnerability impacting millions of their devices. This...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact