Resources

Explore Our Resources

Explore case studies, blogs, and FAQs showcasing 3PD’s digital transformation solutions.

Resources

10 Signs Of Vulnerability


The digital world is replete with reminders of how vulnerable we can be in that security landscape.

Learn More

Case Studies



beyond
recognition


Handle exceptions with ease. See how foreign workers returning on different visas and names were able to be identified pre-immigration.

Download
Learn More

absolute protection


Identify patients whose lives depend on absolute assurance. See how we stop potentially fatal medications reaching the wrong hands.

Download
Learn More

life saving certainty


Know exactly who’s on site and what they’re qualified to do. See how IrisID was implemented after a non-credentialed crane operator.

Download
Learn More

Blogs

Cyber attacks risk our health

The Microsoft Digital Defence Report 2024 is out and its easy but sobering reading. A snippet summary of what’s been at play in our digital landscape highlights hostile governments leading the assault on our

Read More

Frequently Asked Questions

Expand the questions below to learn more about IrisID

What is Iris ID Biometric Access Control?

It is a leading identity authentication system utilising unique iris patterns for robust security in sensitive areas. It provides a high level of security and accuracy. The technology is 100% foolproof and never misses, ensuring absolute protection and certainty by eliminating human error in identity verification and circumvention in processes

How does the Iris ID system identify someone?

The system captures an image of the individual’s iris using a specialised camera It then converts this image into a secure, encrypted digital template. Identification is a quick match against the stored template, providing immediate, absolute, and error-free recognition

What makes Iris ID a top choice for security in challenging environments?

Iris patterns are unique with a probability of two irises having the same pattern being 1 in 1078, making them highly accurate and reliable. This offers 100% foolproof identity verification. Unlike other biometrics, iris recognition works reliably in challenging environments like those with dirt, dust, chemicals, or even when users are wearing masks or full PPE. This ensures only authorised people are onsite, reducing reliance on costly human supervision and providing absolute protection against fraudulent access.

How is personal privacy protected when using Iris ID?

Privacy is a key design consideration. The system stores encrypted digital templates (a 512-byte template), not the original iris images. These templates are transformed using an algorithm that makes it impossible to regenerate the images or re-engineer the irises. The encrypted data is not inherently connected to other personal identifying information, protecting the individual and preventing fraud or misuse. The data is essentially useless even if decrypted without the proprietary algorithm to reverse-engineer it (which is not possible). Encryption methods like AES256 are used for data security.

Do employees need to provide consent to use the Iris ID system?

Yes, obtaining informed and voluntary consent is essential. The system is designed as “opt-in only”; iris data cannot be captured without the knowledge and witting compliance of the individual. This aligns with privacy best practices and requirements like Fair Work. The system’s API documentation indicates capability to manage user consent status. Clear communication about purpose, data usage, and privacy measures is part of obtaining consent.

Can Iris ID systems integrate with our existing security or time systems?

Yes, integration is a core capability. Iris ID devices use standard interfaces and protocols such as Wiegand, Relay, RS232/RS485, and TCP/IP. Comprehensive APIs and SDKs are available for seamless integration. Specific integrations, like the documented one with Alcolizer breath testers, demonstrate the capability to simplify complex workflows for safety and compliance verification. Integration with existing access control systems is a common deployment method.

What types of hardware does Iris ID offer for workplaces like ours?

Iris ID offers various hardware options suitable for different workplace needs:

  •   iT100: A walk-up, multi-biometric (iris and face) authentication camera based on Android OS It is designed mainly for Time & Attendance and Physical Access Control markets. Features include a large 7″ touch display, automatic motorised camera tilt, and options for card readers. It supports multiple authentication modes.
  •   iCAM Series (e.g., iCAM7S): Access control products featuring dual iris capture, non-contact user interface, high speed, high throughput, 1:N identification and 1:1 verification. They can include internal card readers are Time & Attendance ready, and compliant with ISO standards.
  •   iBAR 600: Designed for integration with revolving doors and speed gates, combining iris authentication with physical barriers.

How does Iris ID help address common challenges in Mining and Healthcare?

In Mining, it directly addresses issues like “buddy punching” by providing indisputable identity verification, ensuring accurate time & attendance and payroll. Integrated solutions (like with Alcolizer) eliminate costly manual supervision at alcohol test points and prevent significant contractual issues and revenue leakage caused by circumvention of safety.

Quick Links


Socials

Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Youtube
Consent to display content from - Youtube
Vimeo
Consent to display content from - Vimeo
Google Maps
Consent to display content from - Google