• Skip to primary navigation
  • Skip to main content
SRI logo
  • About
    • Press room
    • Our history
  • Expertise
    • Advanced imaging systems
    • Artificial intelligence
    • Biomedical R&D services
    • Biomedical sciences
    • Computer vision
    • Cyber & formal methods
    • Education and learning
    • Innovation strategy and policy
    • National security
    • Ocean & space
    • Quantum
    • Robotics, sensors & devices
    • Speech & natural language
    • Video test & measurement
  • Ventures
  • NSIC
  • Careers
  • Contact
  • 日本支社
Search
Close
Blog archive April 1, 2013

Biometrics at the Perimeter: Keep Threats Out and Business Moving

From high school basketball games to sophisticated military operations, a strong perimeter is the first line of defense.  The challenge for commercial security is strengthening the perimeter without affecting business.

Access control is a high priority for secure infrastructures such as nuclear power plants, corporate offices, universities, and financial buildings. The faster security can accurately screen possible threats, the more likely incidents can be avoided. Although many companies offer cutting-edge products for protecting interior building areas, most exterior access control systems are not nearly as advanced.

Today, vehicle access points are typically managed by use of RFID cards, pass codes, credit cards, and security guards. These tactics provide an initial layer of security, but determined individuals can get past these safeguards by stealing or forging access cards and IDs.

The security industry needs a vehicle access control system that will improve security without making the process cumbersome for clients and employees.

How Iris Biometrics Can Improve Vehicle Access Control

For accurate identity management, biometric systems are the most secure option. They identify people based on human characteristics and traits—credentials that are always with a person and hard to steal or forge.

Fingerprint and facial recognition systems provide a higher level of security than access cards and badges, but they are typically slower and can be difficult to use from within a vehicle. They also require users to remove gloves, headwear, and eyewear. Iris recognition is not only more secure than these options, but it works from a distance.

SRI’s IOM PassThru™ drive-up biometric system brings the accuracy and convenience of iris recognition to the perimeter—identifying potential threats before they enter. Built on proven Iris on the Move® technology, the automated system is quick and easy to use, expediting the entry control process. The system performs in all environments under day and night lighting conditions and integrates with existing access control systems. This breakthrough product extends identity authentication to the farthest access points.

Schedule meeting »

More information »

Share this
Career call to action image

Work with us

Search jobs

How can we help?

Once you hit send…

We’ll match your inquiry to the person who can best help you.

Expect a response within 48 hours.

Our work

Case studies

Publications

Timeline of innovation

Areas of expertise

Institute

Leadership

Press room

Media inquiries

Compliance

Careers

Job listings

Contact

SRI Ventures

Our locations

Headquarters

333 Ravenswood Ave
Menlo Park, CA 94025 USA

+1 (650) 859-2000

Subscribe to our newsletter


日本支社
SRI International
  • Contact us
  • Privacy Policy
  • Cookies
  • DMCA
  • Copyright © 2023 SRI International
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}