Iris scanner replaces traditional passwords
With the ambition to end the era of password security, on January 6, the American electronics corporation Voxx Electronics launched an iris recognition device, allowing users to secure information on their phones or personal computers more effectively than using traditional passwords.
![]() |
Illustration photo. (Source: bangkokpost.com) |
Accordingly, the security device called Myris, manufactured by Voxx in conjunction with biometric technology company Eyelock, is compact in size and will scan the user's eyes and convert personal identification data into encrypted segments.
The device is then plugged into a computer, phone or any other device that requires security via a USB port and the user simply uses their eyes to unlock it. In other words, with Myris, with just a blink of an eye, the user can connect to their phone or personal computer, log in to online banking, email and social networks.
Speaking to the press, Voxx President Tom Malone expressed hope that this iris recognition technology could replace the traditional password setting method because this invention has high accuracy and security with an error rate of 1/2000 billion.
Malone also said that although many iris scanning devices have been used for security purposes in businesses and corporations, this is the first time the technology has been produced as a consumer product. Although no specific price was announced, the head of Voxx said that the Myris device will be sold through retail channels at an affordable price.
Iris recognition technology is a biometric method that relies on the complex and unique structure of the iris to identify a person, even if they are wearing glasses or contact lenses.
Experts also say that this iris recognition security method is often highly accurate and secure, while also providing convenience and speed for users. Currently, this technology is also being researched by electronics companies, including Samsung Group, for widespread application in practice and promises to become the leading method in future security technology./.
According to VNA