Undetectable Humanizer: Lifetime Subscription
Transform AI-Generated Text into Human-Like, High-Ranking Content & Bypass Even the Most Sophisticated AI Detectors
Get 95% Deal

Flash Memory with Iris identification

Martin Brinkmann
Aug 17, 2007
Updated • Aug 17, 2013
Hardware
|
0

It is really easy to access data on USB flash drives, sticks and other removable drives unless data is encrypted on the drive with software such as True Crypt. Software based encryption however requires that the software to decrypt the data is actually installed on the system or at least available to the user who wants to access it. If you do not have access to the software that you need to decrypt the data, you cannot really use it at all. It is also necessary to know and remember the password to decrypt the date, and if you lose the password or cannot remember it, then your data is lost forever unless you have been using a very weak password and try to brute force or guess it.

Rehoboth Tech introduced another method of protecting data on an USB sticks. They have created a device that is automatically encryption all data on the device using an Iris scanner. It ships with 20 slots, so that you can theoretically place data from 20 different people on the same stick, with all of them protected by their own unique encryption password.

The Iris scanner is implemented in the USB device which means that no additional software has to be installed to decrypt the data on the stick. There is obviously no password as well as this is handled by you using the Iris scanner instead.

Devices come with capacities of 1,2 and 4 Gigabytes and a hard drive version was announced as well. Rehoboth Tech state that their Irikon Flash Memory device has a False Reject Rate (FRR) of 0.1% and a False Acceptance Rate (FAR) of 0.000083%.

What is not really clear is how close you need to be to use the Iris Scanner. If you need to use it while the device is plugged in, it could become really uncomfortable if you need to be very close. On the other hand, it would probably be optimal if you could unlock the data while it is not connected to the computer.

Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

There are no comments on this post yet, be the first one to share your thoughts!

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.