High Security Made Simple

EyeLock uses video based technology to look at more than 240 unique characteristics in each iris. In real time, EyeLock’s proprietary algorithm converts the characteristics to a code that is unique only to you.
The code is encrypted—this is your unique template. Each time the user looks at an EyeLock product, an EyeLock algorithm matches the newly created template to the existing template in just seconds.
The EyeLock platform has been developed to adhere to a specific chain of provenance in order to authenticate. EyeLock’s algorithm first establishes liveness, then initiates the
process of authentication.

Latest News

DataChambers - Case Study

 EyeLock Introduces Iris Authentication Reference Designs for Global Deployment Across IoT Devices

EyeLock Introduces Iris Authentication Reference Designs for Global Deployment Across IoT Devices

 Novetta Testing Finds Low FMR, FRR for EyeLock Tech

Novetta Testing Finds Low FMR, FRR for EyeLock Tech

 Novetta Certifies EyeLock Iris Authentication Performance

Novetta Certifies EyeLock Iris Authentication Performance

 EyeLock LLC is newest AMAG certified program partner

EyeLock LLC is newest AMAG certified program partner

 EyeLock Comments on False New York Post Article

EyeLock Comments on False New York Post Article