foryouririsonly brochure - identity management with iris recognition

6

Upload: iritech-inc

Post on 08-May-2015

101 views

Category:

Technology


0 download

DESCRIPTION

ForYourIrisOnly (FYIO) solution is an integration of a multi-functional security platform. It provides a "shortcut" to manage your data and accounts on PCs, smartphones and tablets. By iris capturing and matching method, do away with complex password chains and devote extra time to other tasks. FYIO utilizes a high-quality iris technology to speed up workload. It eases up your memory by one single installation of FYIO which in turn transforms into a safeguard against theft, vandalism or password confusion. More information: www.iritech.com Contact us: [email protected]

TRANSCRIPT

Page 1: Foryouririsonly Brochure - Identity Management with Iris Recognition
Page 2: Foryouririsonly Brochure - Identity Management with Iris Recognition

“Iris recognition as a tool

protecting sensitive data & personal access”

Superior Iris Identification www.iritech.com | [email protected]

The aim of FYIO is to manage all the complicated

passwords with iris verification. No one can log on

your computer by simply keying in the cracked or

stolen password but only by giving the correct iris

image, which is only yours.

Most of us secure our digital lives with passwords —

hopefully different, strong passwords for each service

we use. But the inherent weaknesses of passwords are

becoming more apparent.

How secure is your password?

The moment you open up Facebook, Twitter, Dropbox,

or thousands of connections out in the virtual world; all

of them require one common thing: Log on with your

account information to grant access. And for every

account, you must remember the proper username

and password to log in respectively. The mantra of

choosing long, complex passwords that cannot be

easily guessed or retrieved has been a common

method for security.

The overwhelming world of Social

Media Networks

Let your Eye handle the job!

Imagine yourself surrounded by several gadgets such

as smartphone, tablet, laptop, and so on; a multitude

of passwords will be required before you get a single

touch on those goodies. Many of us, in fear of

forgetfulness and confusion, create the same

password for every gadget. Others even neglectfully

set a random key to gain immediate access. It leads

to security and data breach nowadays.

Crackers are getting smarter. With the recent and past

breaches in different websites that have so many

passwords to analyze that they now extensively harm

your personal security and privacy intrusion.

Faced with daily net-surfing, online shopping, and

social networking, you can now be free from

remembering multiple accounts. FYIO poises its two

factor authentication that impressively protects these

accounts from theft, loss, and forgetfulness.

Isn’t security a problem that biometrics can solve?

Biometric technologies allow access based on unique

and immutable characteristics about ourselves —

ideally something that can’t be stolen or faked.

Page 3: Foryouririsonly Brochure - Identity Management with Iris Recognition

ForYourIrisOnly (FYIO) is a fast, easy-to-use, and secure biometric security

application capable of replacing complex passwords with advanced iris

biometrics for your technological needs such as computer log-on, single sign-on

to websites, file and folder encryption, and application launch control on

Windows computers and Android smart devices.

FYIO utilizes a high performance iris scanner, IriShieldTM, to register user irises

with Windows or other website accounts, and to verify identification for the

access of devices, website logons, and other applications. FYIO eases up

password memorization by using user irises. FYIO can prevent identity theft,

cyber-attack, frail passwords, and highly confidential data leaks.

• Reducing password

fatigue from multiple

usernames and

accounts

• Security on all levels of

entry/exit/access to

either devices, data,

applications and online

activities

• Authenticated identity is

used in a portable

fashion that reduces

phishing and speeds up

working process

Superior Iris Identification www.iritech.com | [email protected]

“Iris recognition as a tool

protecting sensitive data & personal access”

Page 4: Foryouririsonly Brochure - Identity Management with Iris Recognition

What is Identity Theft?

Identity theft is the appropriation of an individual's personal

information - including such identifiers as social security numbers,

driving license numbers, financial cards and account information. This

information can be used to fraudulently obtain such things as loans,

credit, employment, healthcare services, rentals and mortgages.

But why should a business care?

Superior Iris Identification www.iritech.com | [email protected]

“Prevention of on-the-rise identity theft”

For a start, theft of credit card and account information is one of the

most common reasons for identity theft, but consumer liability is

generally capped in the case of such fraud - leaving financial

institutions to pick up the pieces.

1 The United States Department of Justice states that in 2010, 7% of all United States households had at least one member of the family at or over the age of 12 to have been a victim of some sort of identity theft.

2 According to Time Magazine, identity thieves have been applying for credit cards under the names of the deceased, opening up clean credit lines, new cell phone services, and in a staggering 1.6 million cases, using Social Security numbers belonging to those who are now deceased.

3

With a 13% increase in identity fraud between 2010 and 2011, a study conducted by Javelin Strategy & Research showed that consumers may be putting themselves at a higher risk for identity theft as a result of their increasingly intimate social media behaviors.

4

According to the findings from a study

conducted by the Federal Trade

Commission, 19,428 complaints regarding

medical identity theft have been reported to

the Consumer Sentinel Database since

January 1, 1992.

Companies need to be aware that identity theft is a pressing problem for

them - especially since the vast majority of fraud is carried out by

insiders. There have been numerous reports recently of employees

involved in theft of information, such as customer credit card numbers.

And companies are increasingly finding themselves being held

responsible.

Companies need to look long and hard at the internal and external

processes to make sure that they have the business processes and

infrastructure in place to prevent themselves falling victim. All data

gathered on individuals must be held securely - and disposed of

securely when no longer needed.

Page 5: Foryouririsonly Brochure - Identity Management with Iris Recognition

Whether it is a PC or laptop, a smartphone or tablet; the very essential concern is

its safety. The first function of FYIO is to prevent intrusive access from

unauthorized person with iris verification. No longer is it necessary to remember a

long, complex password, but simply verify user’s irises with an enrolled iris to be

granted access. Likewise, it supports domain logon which is specifically shared

among certain number of users. Each of these users will have to verify his/her irises

in order to be logged on.

“The secure functions that provide unparalleled iris

identity fusion”

The second functions of FYIO allows users to log into any application and web

site by verifying their irises. Iris biometric single sign-on will manage multiple

accounts and passwords in just a blink of an eye. This great function will

automatically capture logon information when a user visits a secured website.

Therefore, without being prompted to input account logon information again,

the same user will be able to gain access later by verifying their irises.

Superior Iris Identification www.iritech.com | [email protected]

This function designed to enhance the way encrypted data are

protected. It boost users’ data security with a fast and high

accurate iris authentication that allows you to easily encrypt a

single or bunch of files and folders within seconds. Furthermore,

to decrypt an encrypted file or folder, only the right user can make

it.

Locking application function restricts access to one or more

sensitive applications by using the user’s irises. To launch the

applications, users need to present their iris for verification. This

function is very convenient for mobile and tablet users who are

anxious about theft and loss.

Page 6: Foryouririsonly Brochure - Identity Management with Iris Recognition

Headquarters Office

Asia Pacific Regional Office

Technical Support

[email protected]

Sales & Marketing

[email protected]

General Inquiries

[email protected]

3951 Pender Drive, Suite 120A

Fairfax, VA 22030, USA

Phone: +1.703.877.2135

#701, CheongDong Bldg.,

1922 Nambusunhwan-ro,

Gwanak-gu, Seoul 151-832, Korea

Phone: +82.2.872.3812

Copyright ©2013 IriTech, Inc.

The information contained in this

document has been provided for

general information only and IriTech

reserves the right to change

product specifications without

liability. No liability for errors or

omissions is assumed whatsoever.

IriTech is a global leader in Iris Biometric

Technology. Our passionate team are

diversified Iris Recognition researchers and

engineers supporting different OEM

partners in various industries such as

Mobile, Banking, Health Care, Education,

Military and Government.

By focusing on quality and staying up-to-

date, IriTech features a high level of data

security and identity control with a

multifunctional iris scanner and iris

recognition software provided to end-

users worldwide.