Iris Detection System

The Iris Recognition System is a component of our Access Control System.

The Iris Recognition System’s accuracy levels are second to none as no two people share the same iris pattern, such that even the right iris differs from the left one. This unique and spectacular feature makes the Iris Recognition System one of the most favored security systems around the globe.

With ATT’s Access Control Systems encompassing Iris Recognition, this elevates our level of security excellence through the iris’s inability to be compromised or stolen. Furthermore, the ergonomics and convenience users derive from the Iris Recognition boosts efficiency and productivity, and is ideal for highly secure facilities carrying high traffic flows.

The Iris Recognition technology can be integrated with other security systems such as fingerprint and pin access or used independently.

Why choose an iris detection system?

  • The iris, just like fingerprints, is unique in every individual.
  • This technology can be integrated with other security systems or used independently.
  • It remains unchanged from the moment it is fully formed, usually when a child is ten months old. Age does not interfere with the pattern of the iris.
  • The iris cannot be compromised or stolen. This feature makes it one of the most secure security systems.
  • It is easy to use, and the system easily detects the iris at a distance of between 3” and 10”. The iris detection system does not make direct contact with the iris or person making it one of the most convenient security systems. Once you look at the camera, it automatically seeks verification from the database.
  • Use of eye contacts does not affect the reading of the iris detection system.
  • It safeguards against identity theft.
  • It is one of the fastest biometric security systems. It is ideal for highly secure facilities which employ many people.
  • Almost everyone can use this system. This is because most people have at least one eye. The iris detection system has successfully been used on people who have lost their sight. This is because the focus is on the pattern of the iris, and not sight.

How the iris detection system works

For you to be able to use the iris detection system, you need to be enrolled and have your iris captured and stored in the database. A video camera is used to obtain the image. Fortunately, this process does not require bright light or up-close imaging. You will be comfortable during this process. The device used has a proximity sensor which allows it to focus on the iris even at a distance of 10”. The autofocus camera then takes a video of the iris.

The images are then captured from the video and then transferred to a frame. The iris pattern is then analyzed. These patterns are found between the pupil and the white of the eye (sclera). The patterns are then converted to a 512-byte template and stored in the database. Communication is then sent to the Identification Control Units. Your template is then stored in portals responsible for access privilege. In offices where access to different levels is restricted, the access privilege portals are very specific. There is no margin of error. The artificial intelligence used ensures only those captured in the database have access.

How the iris detection system compares to other biometric systems

  • Its accuracy levels are second to none. Even the right iris is different from the left one. This unique feature makes it one of the most favored security systems.
  • Other biometric systems have a high degree of failure. This has led to the use of human intervention should the need arise. For example, while attempting to work faster and because of the extensive database, the fingerprint detection system usually gives several possible matches. It seeks similarities and relies on human intervention to pick the most accurate finding. This has a more significant margin of error compared to the iris detection system. The iris detection system does not have this intervention. If the system is suspicious during the validation process, nothing can be done to alter the findings. It is estimated to have a false accept rate of 1 in 1.2million. This is the lowest rate in all the biometric detection technologies.
  • The iris is one of the parts of the body which deteriorates fastest after death. This is why it is often used to estimate time of death. It is therefore impossible for the system to be breached using the iris of a dead person to gain access to a restricted area.
  • Compared to its closest competitor, the iris detection system works 20 times faster. This means for every 20 people the iris detection system authenticates, the second-best biometric technology will have only authenticated one person.


With contractors, visitors and suppliers entering the building throughout the day, employee safety is compromised as any stranger could enter and bring harm to the building and its occupants.

This highly customized Visitor Management System consists of an appointment system, turnstiles and a dedicated lift management system.

To ensure building security, visitors are first required to make an appointment in which the control system will note the day, time and floor in which the meeting will be held. When visitors arrive, their identity card is exchanged for a pre-programmed entry card. After tapping through the turnstiles, the card is scanned and floor level keyed in.

If the floor level keyed in matches with the programmed card, a specific lift number will be displayed. The visitor will enter the designated lift, which will only stop at the exact floor level programmed. Visitors will be barred entry if floor levels are not the same.

This integrated process is designed towards automation, whereby an accurate and verifiable count of patrons can be done, enabling easy management of human traffic flow. Controlling the different designated levels will allow building security to monitor and be alerted on visitors trying to access off limit areas. Fast action will be taken against intruders.

lift-management-system

Key Features of the Visitor Management System

  • Appointment System – Friendly, easy to use system for both the company and the building administrators
  • Registration Kiosk – A physical kiosk will be set up for visitors to check-in, and a communication set will be available for the administrators to notify the company if any issue arises
  • Turnstiles – The turnstiles will only work when a visitor or staff card is tapped
  • Lift Management System – All lifts will require tapping from an access card for it to access the office levels
  • Card Access – Visitor cards can be easily programmable by the administrators for only specific level access



A customized system designed for tight security. Designated visitors are assigned specific lifts and floor levels for entry with time zone control. Unauthorized users are thus barred from going to restricted floors, reducing risk of intruders and unnecessary loitering. Other features include turnstiles and access card readers.



Access Control System designed to work with Access Systems product such as Fingerprint Access, Face Recognition Access, Iris Recognition Access, Biometric Access, Card Access, Pin Access, and other devices that provide sophisticated security solution. Our State-of-the-art access control software that integrates the most advanced security technologies with innovative networking capabilities to bring you full-featured security solutions serving any size facility.

  • Web-based Access Control
  • Provides all the benefits of a locally managed system without the responsibility, hassle, and cost of maintaining equipment.
  • Versatile, reliable and expandable control panels and hardware for your access security system.

ATT Group’s Access Control Systems are highly open to customisation as it encompasses a plethora of configurations such as Fingerprint Access, Face Recognition Access, Iris Recognition Access, Biometric Access, Card Access, and Pin Access. Our Access Control Systems ensures sophisticated security solutions that are versatile, reliable and expandable.