Princeton iDENTITY faqS
-
How does PI offer the most FLEXIBLE identity assurance solutions available?
Our solutions cover the widest range of capabilities in the market and are fully configurable to address your complete set of applications requirements. Our devices offer six (!) identification modalities in one small edge-mounted hardware package, and can operate indoors or out. You can configure your system's numerous authentication mode options by device, group, or user, and even chose among on-prem or cloud-based options for data storage and server operation. Even our sales model has various pathways to fit any organizational preferences.
-
Why are PI edge devices the most ACCURATE in the market?
Our solutions take advantage of the wonderous human iris - the most unique and stable biometric identifier - and are built on PI's foundational and proprietary Iris-on-the-Move(TM) technology. This combination drastically speeds up identity assurance while mitigating sources of error, and further enables precision results when leveraged as part of a multi-factor authentication. And yeah, our same readers do MFA, too!
-
What makes PI's solutions more CONVENIENT than our competitors'?
With nothing to carry, lose, or touch, our readers can quickly verify your identity even with glasses, goggles, hats, masks, headscarves, helmets, face paint, mouthguards, and other face-obstructing accessories - offering users fast and effortless authentication at a glance. PI solutions are also easy to install with bolt-on hardware, single-wire PoE+ connectivity, and dozens of turnkey API integrations. They are simple to set up and administer with seamless enrollment workflow options and our highly-learnable and usable web-based administrator portal. And for sure, your IT group will love that our single ecosystem can address requirements across the widest variety of applications.
-
Why are iris recognition solutions more SCALABLE than facial recognition systems?
Because the iris is so much more unique, and you have two of them! The largest global population-level biometric databases, like UIDA India and WorldCoin, rely on the iris for that reason alone. You can keep adding users and never worry about false match rates. The iris also remains stable as people age, gain or lose weight, and make other changes to their appearance. Once someone is in the system, they never require re-enrollment. As a result, it is much easier to manage and maintain applications that serve a vast and fluctuating user base. And it helps that you don't have to deal with per-user credential issuance because YOU are the credential!
-
Where do biometrics-based security products achieve a LOWER TOTAL COST of OWNERSHIP than supposedly less-expensive card readers and pin pads?
With biometric solutions like ours, there are no recurring costs for consumables or per-user credentialling charges... because you ARE the credential! PI's systems in particular focus on reducing the administrative overhead required for maintenance and administration. Also, your employees will never lose or otherwise require credential replacement, and will encounter heightened accountability as they cannot share credentials as they may with cards, phones, or passwords. In short, the savings from biometric identity solutions accrue throughout the identity management lifecycle, and arise from the enhanced employee productivity and organizational efficiencies they provide.
-
What is the differences between facial & iris recognition?
Both iris recognition and facial recognition are biometric identity modalities in which an image of the user's feature is acquired, converted to a mathematical representation, and then compared to a database for potential match. The structural details of the human iris are genetics-independent, completely formed by age three, and remain constant for the rest of your life! In fact, your iris is by far more unique and stable as a human biometric identifier that your face, and even your DNA! Unlike your face, the human iris is also self cleaning and hard to spoof. And the iris contains much more information / structural detail than your face. For these reasons, iris recognition is able to provide a far greater identity assurance and can be scalled to a much larger user base. Facial detection is easier to accomplish at a distance because the human face is so much larger than the human iris, but at intentional distances - 0.5 to 1m - both can be easily performed with conventional optics and technology. Iris recognition is a far superior choice when the N-N application involves a user base greater than 1,500 people, in situations where users may have parts of their face obscured with masks, hats, helmets, scarves, goggles, etc., and when security requirements call for the increased precision beyond that of facial recognition.
-
Does iris recognition involve 'scanning' like in the movies?
Nope. Our devices simply take a picture of your eye illuminated by an IR LED. The image capture takes a fraction of a second, and most likely you won't be aware it's happening.
-
What is "Iris on the Move™", how does it work, and what value does it add?
PI's foundational Iris on the Move(TM) technology utilizes short pulses of near-IR illumination and video-rate image acquisition, instead of relying on just one high-res snapshot like our competitors. In this way, our systems are able to minimize the detrimental effects of both conscious (walking) and unconscious (twitc, jutter, blink, etc) subject motion on image acquisition and algorithmic matching. The result is a higher accuracy identity asurance, and a faster user-device transaction that is more tolerant of subject behavior.
-
What use-cases are ideally suited to iris-based identity authentication?
Our everyday solutions apply equally well to Physical and/or Digital Access Control, Point of Sale, and Time and Attendance commercial applications. And we also have a dedicated product line to address the very specific needs of Border Operations and large-scale transportation environments.
-
What industries are currently using PI products?
Our solutions are synnergistic with many different markets, including Higher Education & Athletics, Enterprise & Finance, Healthcare & Research, Industry & Manufacturing, Data Centers & Critical Infrastructure, and Transportation & Government. Our current customer base includes universities, banks, healthcare providers, industrial manufacturers, research facilities, utilities, transportation hubs, and government agencies ─ to name a few.
-
Are PI solutions only suited for the highest-security settings?
No! Our solution's convenience, flexibility, and scalability ensure an outstanding fit to a range of situations. In particular, at most installations there exists a mix of higher security needs and lower security needs - and because our solutions are highly configurable, you can solve your entire requirements spectrum with a single identity assurance ecosystem.
-
Are Princeton Identity solutions sold through the world? Who are some of Princeton Identity's biggest customers?
Our solutions are available worldwide, although most of our sales partners currently focus on North America and the Middle East. PI customers include some of the largest and most successful entities in their fields, including Shell Oil, Dubai International Airport, ConEdison, University of Illinois, P&G, BNY Mellon, and EMAAR.
-
Does Iris recognition hurt your eyes? How close do I have to get to the device?
The process is fast, safe, and noninvasive. Our devices take a picture of your eyes as you stand about half a meter away. It's as simple as that, and nothing at all like in the movies.
-
Can I get recognized even if I am wearing a mask, sunglasses, helmet, veil, etc?
Indeed! Our reader can do its job as long as at least one eye is available, even if you are wearing sunglasses, ski goggles, splatter shield, etc.
-
How fast is IRIS recognition with Princeton Identity products?
Super fast! Iris recognition takes just a fraction of a second, thanks to our Iris on the Move™ technology.
-
Are PI products able to accommodate individuals who want to opt out of all biometrics capturing?
Absolutely! Those folks can interact with our devices using other forms of identification. And the simple web interface makes it easy to set up.
-
Which Princeton Identity product is recommended for Access Control in a typical building doorway setting?
Our EyeAllow indoor reader is compact, capable, and attractive - and ideally suited for all your inside door / gate access control needs.
-
What identification modalities are included in a single PI edge device?
What identification modalities are included in a single PI edge device?
-
Does Princeton Identity have a weather-proof product that works outdoors?
Yes. Our Access200w has an IP65 rating, making it fit for use outdoors in rainy, snowy, and windy conditions, day or night. It is ideally suited for all your outside door / gate access control needs.
-
What is an Identity Server and how is it used in your system's configuration? Do your devices still work if there is a network outage?
" PI's Identity Server (IDS) is the ""brain"" behind our solution, performing biometric matching and supporting your system's administrative management platform. You can host an on-prem IDS on your organization's existing dedicated hardware or on a virtual appliance. Alternatively, you can chose a cloud-based IDS solution. They each provide the same easy-to-use interface and an open, secure REST API. In both cases, your organiztion alone would own any and all user data including biometrics templates. "
-
What power and data connections are required?
PoE+. Single wire, that's it!
-
What API integrations does PI currently maintain with access control manufacturers?
Off-the-shelf integrations exist for Genetec, Software House, Lenel S2, Brivo, RS2, Gallagher, Honeywell Pro-Watch, Feenics, Galaxy, and ICT. Our open API can accommodate others, and we are building out more everyday.
-
Does your product supprot OSDP?
Yes. It also supports Wiegand.
-
How does PI safeguard system data and user biometric information? Does Princeton Identity have access to user data? Are face and iris templates reversible?
Biometric information caputured and used by PI solutions is always secure and private. First, the biometric signatures of enrolled users are not stored as images; they are converted into digital templates that cannot be reverse-engineered into user likeness. Additionally, the host organization stores and maintains all biometric data centrally on site or in the coud. Either way, Princeton Identity has no access to any user data, and the host organization's infosec policies and processes maintain database integrity. We also offer an option to store each individual's biometric information on their badge / access card, so that even the host organization has no access to any user biometric data.
-
Can different access levels be setup (admin, read only, etc.)?
Yes. You can also assign permissions by user groups and issue temporary credentials to visitors that are time bound or expire quickly.
-
What is seamless enrollment, how does it work, and what value does it add?
In Princeton Identity's seamless enrollment processes, an organization's existing employee database can be pre-loaded into a new identity server installation and used - via one of several optional workflows - to enroll individual biometrics with minimal organizational involvement and no manual entry. This allows even the largest user bases to begin using the system right away. Seamless enrollment allows HR teams to support workers or students at remote locations and eliminates the physical bottleneck of traditional badging offices. Users can be already enrolled when they arrive onsite for the first day of work or school.
-
How often does Princeton Identity release software updates? How are they distributed and installed?
Software releases usually occur quarterly. We're always adding new features to grow the value of existing systems and create functionality that benefits wider use-case scenarios.
-
Do Princeton Identity solutions log use data and if so, how is it stored, and can it be exported?
All system operational data is logged. It can be exported to a searchable text file to ease troubleshooting in the unlikely event of any system hiccups.
General Information
Products & Capabilities
Applications & Markets
Installations & Case Studies
Videos
Blog
Curious about something specific? Ask us ANYTHING!