Smart Eye Technology’s Continuous Authentication Protects Your Screen From Unwanted ViewersLEARN MORE
Smart Eye Technology Is Technology For Your Eyes Only
Let’s face it. We’re living in a work-anywhere, always-on, connected world. It’s convenient and productive to be able to hop on your laptop or smartphone and conduct your business on a commuter train, in a coffee shop, or on a plane to your next big meeting. But if you or your employees are viewing highly-sensitive documents in those busy environments, do you have confidence they’re safe from potential screen snoopers? That’s why we’ve introduced Smart Eye Technology, which secures your screen from unauthorized viewers and provides robust, real-time document security.
- Work on your sensitive documents anywhere knowing they’re safe from screen snooping
- Biometric screen protection features block unauthorized users from looking at your screen
- Continuous facial and iris identification system ensures that only the authorized user is viewing your screen, moment by moment
Smart Eye Technology’s Continuous Authentication Secures Your Documents Using Multi-Level Biometric Security
Facial recognition is the method of identifying a person using their face. With facial recognition, specific and distinct features are selected from a person’s face and these details—like the shape of the chin or the distance between the eyes—are converted into a mathematical representation. That representation is then referenced so that the device can recognize the face.
Fingerprint scanners are the new norm for smartphones. Every person’s fingerprint consists of two main physical contours. The raised parts are called ridges, and the areas between the ridges are called valleys. When a finger is placed on the scanner, the light sensor generates an image of the fingerprint that is then used to identify the user.
Smart Eye Technology uses Behavioral Print recognition as a secure way to access documents. A user is required to print a series of letters in the alphabet. The system then analyzes how a user holds the cell phone, how much finger pressure is used to print the letters, and how the user physically moves their hand to write the letters before access is granted or not.
Voice recognition uses voice samples to identify a speaker. It works by taking a voice sample of a person’s voice and digitizing it to create a unique template or voice print. Every word that is spoken is broken up into distinct segments that comprise certain tones. These tones are then digitized and are used to capture a speaker’s unique voice. Biometric technology utilizes the wave form of the voice to digitally recreate the actual shape of the person’s vocal tract. Everyone has a unique vocal tract so everyone will have a unique voice imprint.
Iris recognition measures the unique patterns in a person’s iris, the colored circle in someone’s eye. A biometric iris recognition scanner works by illuminating the iris using invisible infrared light to pick up unique patterns that aren’t visible to the naked human eye. Iris scanners detect and exclude eyelids, eyelashes, and reflections that can block parts of the iris. Then the pattern of the eye’s colors and lines are analyzed to create a pattern that encodes the information within the iris.