New Recognition Technology: Utilizing Eye Movement Tracks

Whether it is the use of fingerprints or irises, past identification methods often use vital signs, while the Israeli ID-U biometrics company's new technology uses eye movement trajectories.

In many action movies, we have seen scenes of fraudulent authentication systems. Those male and female protagonists only need to use simple fingerprints or contact lenses with an iris pattern to intrude into a tightly guarded vault. The mood of the audience is extremely exciting and the designers of these security systems are frustrated.

In fact, the security of fingerprint or iris recognition systems is much higher than in movies, but they are often expensive and complex and are not suitable for people's daily use. Recently, an Israeli company demonstrated a low-cost, high-security authentication system that may be a good helper for our personal security.

The new technology developed by the company called "ID-U Biometrics" requires only monitors and cameras, and home-level products are sufficient. It uses an innovative approach to verify identity: by comparing people's eye movement patterns when watching a moving picture, it is determined whether the person was previously entered. At present, the safety and accuracy of this biometric method are good.

In general, biometrics can be divided into two broad categories. One is biometric-based recognition such as fingerprints, retinas, irises, face recognition, and subcutaneous veins; the other is recognition based on speech, handwriting, and other behavioral features.

The former relies on a unique appearance structure. After the individual's unique biometrics are processed and manipulated by the image, feature codes of different lengths are extracted and stored in the database, and the same operations are performed during verification. Compare the new signature obtained with the data in the database. In essence, this authentication method is not much different from password authentication.

The pattern of behavioral characteristics is not the same. Voice certification does not focus on specific words, but focuses more on the way these words are spoken; when people sign on a touchpad, the authentication system does not only contrast the signature of the signature, but also emphasizes the strength and direction of writing strokes. These methods contain more behavioral features than graphics and voiceprints themselves, and these behavioral features, once formed, will hardly change. This is much more difficult than just imitating a signature, and it is not easy to be impersonated.

However, these traditional behavioral feature recognition methods still have inadequacies. Early voice recognition was easily deceived by pre-recorded tapes, so people developed a system that needed to read random words, but it would increase the probability of misjudgment; and the characteristics of people's signatures are difficult to maintain long-term stability, often requiring A lot of training can get a high recognition rate.

In these areas, ID-U's biometric identification company's eye tracking and identification technology has considerable advantages.

In fact, the way we exercise our eyes is very different from our own feelings. In the process of watching, our eyes will quickly jump from one place to another instead of moving smoothly as we imagine. The reason why we don't feel dizzy in this process is because the brain's activities automatically process the multiple images acquired by the eye into a continuous and smooth vision, obscuring the actual movement of the eyeball. This kind of eyeball movement, like the sound, the handwriting, the gait, or the rhythm and strength of the keyboard, once formed, has a unique and unique imprint.

At the security seminar and technology exhibition held in Tampa, California in September this year, the inventor of the system, co-founder and CEO of ID-U biometrics, and Dr. Daphna Palti-Wasserman made a keynote speech. She said: "The eye movement pattern depends on the combination of many factors. It itself contains a lot of information. These movement patterns are not controlled by the user's own, it is difficult to imitate."

Only need to install an additional small software, home computers and cameras can be a powerful guarantee for personal information security. This set of software will display a moving picture on the screen, and the camera will take a face photo at a rate of 30 frames per second. Then it will track the pupil's trajectory through computer image processing, and it will be known to The pupil movement pattern is compared to verify the identity of the user.

The heart of this authentication system is eye tracking, a technology that has a long history and has developed rapidly over the past 20 years. From the second half of the 19th century, people tried to track the movement of the eyeball. The used method even covered the metal foil that connected the lever directly on the human eyeball. Today, eye tracking systems have been widely used in many fields such as lie detectors and user experience analysis. The tools used have long since been replaced by cameras and analysis software that are not easily noticeable. There has been a direct use of the eye to control the mouse product, and the patient lying in bed can already play complex computer games through the eyes.

It is in this context that this type of authentication can be successful. Dr. Palti-Wasserman focuses on image processing and pattern recognition. She founded ID-U in 2004 and has received funding from the Israeli government since 2006. Now, the company is developing an eye-tracking identity system on the iPhone, hoping to enter the broader personal information security market—a new market that may exceed $9 billion over the next five years.

However, whether this technology can be commercially successful requires time to test it.

In September 2009, researchers at Maryland State University in the United States found that monitoring computer user typing patterns will help doctors discover Alzheimer's at an early stage. This means that conditions such as illness or injury may cause people to Changes in behavior patterns.

So maybe this recognition technology can not completely replace those password verification methods that have been with us for a long time, but it can be at least a powerful aid - after all, the balance between cost and security is the technology biggest advantage.

LED Panel Light

LEDER technology's indoor LED Panel Light is designed for the LED replacement market. The Flat Panel Light is easy to install, delivers even illumination and has a clean, modern appearance.

LED Panel Light`s flat semi-flush mounting fixture provides a low-profile design, while the molded frame works modern without losing traditional LED.The LED panel Light is the perfect choice for a quality LED panel at an affordable price. The smooth, even lens projects a crisp and clean aesthetic. This panel Light offers 4000 lumens and 3500-kelvin CCT for warm color temperature.

Features:

• Uniform illumination

• Easy to assemble

• Great power saving

• Suitable for operation at -20°C ~45°C

• A low profile design

• Color temperature is available on warm white and cold white

• Body color can be customized as your requirement

• Type of protection: IP20 / IP65 (Some models)

• Warranty: 2 years

This LED Panel Light is the perfect choice for budget-conscious school, commercial office, or small retail footprint projects. The Panel Light can also be used in living rooms, bookstores and shopping malls.

We have rich production experience in lighting.Except LED Panel Light , we also offered other product in Indoor Lighting .Such as : LED Downlight , Track Light , Linear Light ,Wall Light , LED Strip Light , LED Tube Light , Cabinet Light , LED Bulb , LED Ceiling Light as so on .



Flat LED Light,LED Wall Panels,Solar Panel Lights,LED Flat Panel Light

JIANGMEN LEDERLIGHT LIGHTING Co.,LTD , https://www.ledsteplight.com