logo
Send Message
Wuhan Homsh Technology Co.,Ltd.
About Us
Your Professional & Reliable Partner.
Wuhan Homsh Technologies Co., Ltd is one of the few iris recognition intelligent semiconductor chip suppliers in the world. It is a national hi-tech company, which has completely innovated intellectual property rights of its key iris recognition algorithms.Homsh Technologies is committed to the research, development, application and industrialization of the core technology and related products of iris biometrics technology.Homsh Technologies specializes in advanced AI iris recognition, FPGA, and ...
Learn More

0

Year Established

0

Million+
Employees
China Wuhan Homsh Technology Co.,Ltd. Vision
Vision refers to having a clear idea or plan for the future.
China Wuhan Homsh Technology Co.,Ltd. Precision
Precision means being accurate and exact in one's actions.
China Wuhan Homsh Technology Co.,Ltd. Execution
Execution is the act of carrying out a plan or task effectively.
China Wuhan Homsh Technology Co.,Ltd. Trust
Trust is the belief in the reliability and integrity of someone or something.

quality Iris Recognition Module & Iris Scanner Module manufacturer

Find Products That Better Meet Your Requirements.
Cases & News
The Latest Hot Spots.
Criminal Investigation Iris Capture Project for a Municipal Public Security Bureau in Guangdong Province
Project Overview       A total of 33 sets of iris collection systems will be built in the sub-bureau and its subordinate police stations, equipped with telescope-type iris collection devices. Iris collection and recognition will be carried out for persons in the jurisdiction such as suspects involved in cases, persons subject to administrative penalties, and summoned persons. An iris database for key attention personnel will be established, and accurate identity verification will be conducted for criminals and offenders. The system collects and stores personnel's iris information in the database, and binds their ID card information with their iris feature information on a one-to-one basis, realizing the principle of "one ID card corresponds to one iris, and one iris corresponds to one ID card". At the same time, the local iris database and the national iris database are used to conduct iris identity verification for key personnel. Demand Analysis      The front-end collection devices use a telescope-type iris collection client and the Hongshi Collection Platform. Brief System Description      The iris identity recognition system centers on database storage technology. All front-end collection and recognition clients of the system are controlled by the back-end servers for data download and upload through communication methods. The back-end consists of an independent server cluster, whose main functions are to manage the communication of each collection and recognition terminal, and be responsible for uploaded data and access rights. In the early stage, the system collects personnel's iris information; in the middle stage, it conducts centralized storage and processing of identity information data; in the later stage, it performs identity information comparison, data statistics presentation and analysis. Finally, it achieves the goal of verifying the legitimacy of personnel's identity information. Most of the collection terminal devices of this project are integrated with the standard multi-modal biometric information collection platform for personnel. Topology Diagram System Composition      The system is mainly composed of an ID card reader, an iris collector, and an iris collection management client. System Process Project System Features 1.Excellent Performance and Comprehensive Functions of the Collection System     The equipment complies with the Technical Requirements for Iris Collection Devices Used in Criminal Investigation Services (for the construction of a 10-million-level iris database of the criminal investigation dedicated subsystem); it enables high-speed and high-quality iris image collection with a collection time of < 2 seconds; it supports automatic trigger for collection; it has a built-in LED fill light and supports automatic and manual control of internal light intensity to realize iris image collection under multi-level light intensity; it is equipped with liveness detection to prevent prosthetic attacks in the form of iris photos, iris videos, etc.2.One-Stop Identity Information Collection Solution     Based on independent intellectual property technology and a strong R&D and service team, Hongshi Technology provides a one-stop overall solution, including terminal collection device deployment, software development and data management.3.Easy-to-Operate and Intelligent Application Platform     The front-end collection platform can automatically mobilize collection devices in sequence, and perform functions such as automatic verification of collected data and automatic transmission, ensuring the integrity of collected data and realizing intelligent operations.4.Secure Transmission and Management of Data     It conducts effective and convenient management of a large amount of data collected by the front-end, as well as a large number of devices and stations, and provides multi-dimensional query and statistical analysis to serve business applications directly.5.Openness and Scalability of the Platform     The platform reserves standard unified interfaces and supports the access of multiple application systems. User Feedback      Since the successful implementation of this project, the system has been operating well and has been highly praised by senior public security leaders. By using unique iris feature collection and recognition devices, this project realizes high-security, high-precision and fully automatic collection of biometric features including iris information, enabling real-time, rapid and accurate grasp of the real identities of suspects. In addition, through real-time computer display and data statistics, it achieves effective management and tracking of suspects. At the same time, a customized suspect information management software has been developed, which realizes seamless integration with the already-built professional criminal investigation information application system, achieving information interconnection, sharing and reuse.
Construction of an Iris Access Control System at a Detention Center in Tianjin
Project Overview      With the rapid development of information and network technologies today, high and new technologies have not only improved productivity but also transformed people’s ways of thinking, working, and living. The strategic guideline of "strengthening police forces through technology" is profoundly changing the traditional working methods of law enforcement. The construction of access control systems in detention facilities is an essential foundation for realizing modernized detention management and ensuring detention facility security. Detention facilities are the primary places for detaining suspects and prisoners, so the construction of their security systems is a top priority. To effectively prevent and stop incidents such as escapes and prison riots, detention facility access control systems play a crucial role. By implementing strict restrictions and linked control over various entry-exit checkpoints inside detention facilities—such as second-door checkpoints, cell doors, and corridor doors—these access control systems enable the management of daily operations, including prisoner confinement and release periods, attendance tracking for detainees and on-duty police officers, and internal facility management. They inject a new concept of scientific management into detention area supervision, build a high-tech operational platform for various work aspects, and lay the groundwork for the detention facility’s management to reach a high and advanced level in the new century. Demand Analysis      The second-door checkpoint and channel control system at the entrance and exit of the detention facility building are important components in the field of security technology and protection. Detention facilities need to build a high-security access control system with accurate identity verification to maintain order and implement standardized management of police officers and prisoners within the facility. The entire access control management system consists of three parts: the Information Collection and Registration Subsystem, the Second-Door Subsystem, and the Channel Access Control Subsystem. The Information Collection and Registration Subsystem is installed at the detention facility’s management center; the Second-Door Subsystem is distributed in the police officer and prisoner channels on the first floor of the detention facility building; and the Channel Access Control Subsystem is distributed at key checkpoints, corridor doors, and inter-floor channels on each floor.      Front-end devices shall be installed on channel doors. For areas using mechanical access control systems, door magnetic switches or alarm devices shall be installed, with functions such as location identification and automatic sound and light alarm display. For areas using electronic access control systems, functions such as personnel identification, location identification, automatic monitoring and recording, and system-controlled full opening, full closing, or partial opening/closing of door locks in emergency situations shall be available, with manual switches provided as backups. The system supports multi-door interlocking and anti-tailgating functions: when one of the two doors is open, the other door is prohibited from opening; the door to be opened can only be unlocked when the other door is closed. It supports the emergency double-opening function to facilitate personnel entry and exit in emergency situations (such as fires, gas leaks, etc.). It also supports the emergency double-closing function: if someone tailgates into the facility, both doors can be closed urgently, and they can only be opened after the normally closed state is canceled and confirmed. The system supports the duress card access function: in special circumstances, if a person uses a duress card or password to open the door, the door will open normally, but the central controller will issue a duress alarm with sound and light prompts. The access control system of the detention facility shall be equipped with two-way identity verification control. Detailed data of each entry and exit—including time, personnel, and door location—shall be recorded by the access control system, which also provides functions such as checking historical records and printing time reports. Brief System Description      The system mainly realizes multi-level control over personnel entering and exiting the detention area. According to the entry sequence of personnel entering the detention facility building through the police officer channel and prisoner channel (AB-door system) at the first-floor second-door checkpoint, iris access control management systems are installed at the first-floor entrance/exit and corridors to control personnel entry and exit, greatly improving the overall security and management efficiency of the detention area. Detention facility managers uniformly collect and register information (including iris data) of police officers and detained prisoners, and assign access permissions. Multiple access methods are available, including CPU card, ID card, iris recognition, and password. For visitors and temporary personnel, temporary iris permissions can be registered and automatically deleted upon expiration. Meanwhile, the system can realize daily personnel entry/exit management, staff attendance management, and statistical analysis. Topology Diagram System Composition      The detention facility’s iris access control system mainly consists of three parts: the Registration and Collection Subsystem, the AB-Door Access Control Subsystem, and the Channel Access Control Subsystem. System Process Project System Features       The iris access control management system adopts non-contact identification and supports multiple access activation methods. It grants different entry and exit permissions to users for multi-level control, and equipment selection during system construction shall be based on the customer’s actual needs. Meanwhile, it implements access control over different areas, specific doors, and channels within the project. The iris access control system supports remote management, enabling functions such as data modification and security key verification. The access control system controller is connected to alarm output and fire-fighting linkage expansion interfaces, with fire alarm and emergency door opening functions: when a fire-fighting switch signal is received, all doors under the jurisdiction of the access control system controller will open automatically. User Feedback      This system has realized the following functions: user information management, authorization management, equipment management, attendance management, real-time monitoring, dynamic tracking and monitoring, entry/exit record query, double-door interlocking, anti-passback management, and duress password input.
Iris Recognition Technology: A Key Component in Biometrics Driven by High Accuracy and Reliability
      With its high accuracy and reliability, iris recognition technology has become a crucial component in the field of biometrics. In today’s era of growing demand for digital identity security, iris recognition technology, boasting high accuracy and reliability, is emerging as a vital part of the biometrics sector. Each individual’s iris texture is unique, featuring a high degree of distinctiveness and stability.       This technology captures iris images via a near-infrared camera, followed by the use of advanced algorithms for feature extraction and matching. Its false acceptance rate (FAR) can be as low as 1 in 1 million, far surpassing other biometric methods and providing unprecedented security guarantees for various industries. 1. Technical Principles and Advantages       Iris recognition is a biometric technology based on the textural features of the human iris. The iris is a circular, colored membrane located between the black pupil and the white sclera of the eye, and it ranks among the most unique biological features of the human body.       The iris recognition process consists of four key links: iris image acquisition, image preprocessing, feature extraction, and feature matching. Image preprocessing includes steps such as the localization of the inner and outer boundaries of the iris, normalization, image enhancement, and image denoising.       Compared with other biometric technologies, iris recognition has three core advantages:       High distinctiveness: Each person’s iris texture is unique—even identical twins have different iris patterns;       Lifelong stability: Iris textures form in infancy and remain nearly unchanged throughout a person’s lifetime;       Live detection capability: Iris recognition only works on living organisms, making it difficult to forge or replicate. 2. Hardware Equipment and Technological Evolution       Modern iris recognition devices comprise multiple core components, ranging from iris scanners to all-in-one iris recognition machines, which can meet the needs of different scenarios.       The optical imaging chain determines the final performance of the system. Mainstream solutions adopt safe near-infrared light as the light source—this light is imperceptible to the human eye and can avoid glare from visible light, ensuring clear iris images are obtained under different ambient light conditions.       Next-generation iris recognition technology continues to make breakthroughs in recognition distance, speed, and adaptability. Industrial-grade iris recognition devices can operate normally under a wide temperature range, satisfying the requirements of special environments. Outdoor devices support a high protection level, enabling them to adapt to various harsh weather conditions. 3. Software Algorithms and Integration Support       Iris recognition algorithms are constantly evolving—from traditional iris localization methods to deep learning-based feature extraction technologies—with continuous improvements in recognition accuracy and efficiency.       Compared with the original algorithms, the improved feature extraction algorithms have achieved a significant increase in the correct recognition rate. By optimizing and selecting feature points with high contrast and quality as the final iris feature vectors, these algorithms can reduce the false matching rate and improve the operational efficiency of the algorithms.       The iris recognition Software Development Kit (SDK) provides comprehensive development support, compatible with multiple programming languages and operating system platforms. The system supports 1:1 verification and 1:N search, enabling fast recognition even in databases with millions of entries. At the same time, the system offers a sound security protection mechanism, supporting advanced encryption algorithms and national cryptographic algorithms to ensure the security of biometric data. 4. Application Scenarios and Solutions       Iris recognition technology is widely applied across various industries. At airport border checkpoints and customs ports, iris recognition channels enable fast clearance; in financial institutions, iris recognition access control systems provide dual-authentication guarantees.       In the field of coal mine safety production, iris recognition technology provides effective technical support for access control management in key underground areas. By adopting a non-contact biometric authentication system, "person-specific control" management has been realized for critical locations such as underground substations and pump rooms. Leveraging the distinctiveness and stability of the iris, this system effectively solves the recognition problem caused by facial contamination of underground workers. Each authorized person can only enter the authorized area through iris verification within a specific time period, technically eliminating the risk of illegal entry by unauthorized personnel. Meanwhile, the system can also be connected to personnel positioning and alcohol detection systems, comprehensively improving the safety management level of underground operations and providing reliable support for the intelligent construction of coal mines.       In the field of public housing management, iris recognition technology has also been effectively applied. For example, Wuhan Homsh Technology Co., Ltd. once successfully implemented the "Iris Recognition Technology Integration Application Demonstration Project in Public Rental Housing Communities of Daxing District, Beijing", helping to solve common management problems in public rental housing such as subletting, illegal transfer, and fee arrears, and improving the level of technological management. 5. Security and Privacy Protection       As iris recognition technology is widely applied, security and privacy protection have become key considerations. Advanced iris security technologies can protect the security of iris information and prevent the leakage of biometric data.       Iris recognition systems adopt a variety of technical measures to ensure security. Live detection algorithms can effectively prevent spoofing methods such as photos and videos, ensuring the security and reliability of the recognition process. Generally, the system does not store the iris images themselves, but rather encrypted feature templates—even if data is leaked, the original iris information cannot be restored.       Multimodal biometric technology has become a development trend. By integrating multiple biometric authentications and dynamic anti-counterfeiting technologies, a full-link security protection system from the device end to the business system can be built, meeting the needs of high-security-level scenarios. 6. Future Development Trends and Challenges       Iris recognition technology is moving toward greater intelligence and integration. AI-based iris recognition algorithms continue to improve recognition accuracy and speed, while 5G technology opens up new possibilities for remote iris recognition. The application of edge computing technology makes iris recognition devices more intelligent, supporting localized processing and data protection.       Multimodal fusion has become an important trend. Solutions integrating multiple biometric recognition technologies—by combining biometric data collection, a trusted authentication platform, and business systems—have been implemented in some government service centers, helping to improve work efficiency.       Cost reduction and technological popularization are driving the continuous expansion of the application scope of iris recognition. Supply chain optimization has significantly reduced the cost of iris modules, supporting the wider promotion of the technology. Technological development also covers anti-interference algorithms for more complex environments, expanding the geographical scope of application. Important progress has also been made in standardization and compliance. With the formulation and improvement of relevant national standards, the standardized development of the industry has received strong support. Iris recognition algorithms have passed testing and certification by authoritative institutions, providing official endorsement for technological promotion.       In the future, with the in-depth integration of artificial intelligence, 5G, and edge computing technologies, iris recognition technology will embrace broader development prospects. As a leading domestic provider of iris biometric technology, Wuhan Homsh Technology Co., Ltd. has always been committed to the R&D and innovation of core iris recognition algorithms and owns complete independent intellectual property rights. The company will continue to promote the upgrading and implementation of multimodal biometric systems. By deeply integrating multi-dimensional feature recognition technologies such as iris and facial recognition, it will provide overall identity authentication solutions with higher security levels and better user experience for industries including finance, security, and intelligent transportation—truly empowering thousands of industries with cutting-edge biometric technology and jointly creating a safe and convenient intelligent future.

2025

09/12

The Future of Precise Identification: Exploring Iris Recognition Devices in Daily Life
      Scenes in sci-fi movies where confidential access is granted via eye scanning have now become real-life security solutions. Iris recognition technology is no longer confined to laboratory environments; instead, it serves as a mature security measure, widely applied in various fields around us. Understanding Iris Recognition Devices: Sophisticated Security Guardians      An iris recognition device is a precision system that integrates optics, electronics, and artificial intelligence (AI) technologies. While its appearance varies by application scenario, it internally contains core modules specifically designed to achieve accurate and secure identification. Core Technical Components:      The Optical Acquisition Module adopts dedicated near-infrared (NIR) cameras and infrared LED illumination units. Near-infrared cameras are specialized in capturing the detailed texture of the iris under specific spectral illumination—this light is safe and invisible to the human eye, enabling clear capture of the iris’s unique features. The infrared LED illumination units ensure stable image quality under all lighting conditions.      The Intelligent Processing Module is equipped with a high-performance processor and advanced algorithms. It can complete complex computing processes such as eye localization, image quality optimization, and feature extraction within milliseconds, ultimately generating a unique digital feature code.      The Interactive Feedback System provides users with intuitive operation guidance and recognition result feedback through multi-color LED indicators and audio prompts, ensuring a smooth and natural user experience.      Iris recognition devices come in diverse forms, including micro-modules integrable into mobile devices, embedded devices for access control systems, and specialized large-scale devices for high-security locations—all tailored to meet the needs of different scenarios. An Analysis of Professional Usage Processes Phase 1: Image Acquisition and Liveness Detection      The user needs to stand within the optimal recognition distance of 30–50 centimeters in front of the device. The system activates safe near-infrared illumination while running liveness detection algorithms to ensure the captured object is a real biological feature. The device automatically optimizes acquisition parameters to ensure iris images that meet identification requirements are obtained under varying environmental conditions. Phase 2: Eye Localization and Feature Extraction      Intelligent recognition algorithms accurately lock onto the eye area and automatically handle interference factors such as eyelash occlusion and lens glare. The system performs standardization and quality enhancement on the captured images, uses deep learning algorithms to extract feature information from the iris texture, and converts it into a digital feature template. Phase 3: Feature Matching and Identity Verification      The system rapidly compares the real-time generated feature template with pre-registered templates, calculating the matching degree via pattern recognition algorithms. The entire process uses encryption technology to ensure data security; verification results are returned in an extremely short time, and the system feeds back the recognition status to the user through visual or auditory means. Practical Application Scenarios Government Agencies and Immigration Checkpoints      Immigration authorities in multiple countries have adopted iris recognition technology to improve customs clearance efficiency. Major international airports are equipped with iris passage devices—registered passengers can quickly complete identity verification through dedicated channels, significantly reducing waiting times. Financial Institutions and Data Centers      Critical facilities such as bank vaults and data centers generally use iris access control systems. These devices are installed at key entry points and integrated with access control systems; staff must use both their employee ID cards and pass iris verification (a two-factor authentication process) to gain entry permission. Research and Medical Institutions      Iris recognition devices are used to manage access rights in areas such as research laboratories, pharmaceutical storage facilities, and medical archives. This ensures that only authorized personnel can access sensitive materials and information, effectively safeguarding research data and patient privacy. Outlook on Application Prospects      As technology continues to advance and costs gradually decrease, iris recognition devices are expanding into more application fields.      Smart home systems may integrate iris recognition functions to enable keyless entry and personalized environment settings—adjusting living conditions automatically based on the identified family member.      Educational institutions can apply iris recognition technology to manage dormitory access, library book loans, and exam identity verification, enhancing both management efficiency and security.      The automotive sector is expected to introduce iris recognition technology to implement personalized intelligent cockpit systems and enhance vehicle security systems, bringing drivers a safer, more convenient, and personalized travel experience.      From professional fields to daily life, iris recognition technology is redefining the way identity verification works. When we see these devices in operation, they are leveraging each individual’s unique biological features to provide safer and more convenient services. With technological progress and widespread application, we are moving toward an increasingly intelligent future.

2025

09/09

Homsh Technology Submits Its First AI-Based Iris Algorithm Patent
      In today’s era of rapidly advancing biometric technology, Homsh Technology has reached a significant milestone — we have successfully submitted the company’s first patent application for an AI-based iris algorithm. Titled "An Iris Segmentation Method Based on an Improved UNet Model", this patent marks a solid step forward for Hongshi Technology in the in-depth integration of artificial intelligence (AI) and biometrics.       Iris recognition is hailed as the crown jewel of biometric technology. Its uniqueness and stability make it highly favored in high-security scenarios. However, achieving accurate iris region segmentation in complex environments has long been a technical challenge for the industry. Practical challenges such as varying lighting conditions, eyelid occlusion, and motion blur have all tested the robustness of algorithms. After in-depth research, Homsh Technology’s R&D team innovatively combined deep learning technology with iris recognition to create this groundbreaking solution.       The core innovation of this patent lies in the in-depth transformation of the classic UNet network architecture. The R&D team ingeniously adopted MobileNetV3 as the backbone network for feature extraction and integrated the CBAM (Convolutional Block Attention Module) attention mechanism, enabling the algorithm to automatically focus on the key features of the iris. Meanwhile, by introducing the ASPP (Atrous Spatial Pyramid Pooling) multi-scale dilated convolution module, the algorithm can better capture the global contextual information of images, significantly improving the segmentation accuracy of iris boundaries.       More notably, this patent also innovatively integrates dual-band liveness detection technology. Through the coordinated collection of two near-infrared bands (810nm and 940nm), the system can leverage the difference in hemoglobin absorption across different bands to effectively distinguish between real human eyes and spoofing attacks such as photos and videos. This design not only enhances the accuracy of iris recognition but, more importantly, improves its security. Test data shows that the system’s false acceptance rate (FAR) and false rejection rate (FRR) have been significantly optimized, fully meeting the strict requirements of the ISO 19794-6 international standard.       In terms of technical implementation, the R&D team also fully considered the needs of practical applications. By adopting advanced optimization strategies such as mixed-precision training and cosine annealing learning rate scheduling, they not only accelerated the model training process but also significantly improved the algorithm’s generalization ability. The system supports ONNX format conversion and can be flexibly deployed on various hardware platforms, truly achieving a seamless transition from laboratory research to industrial application.       The submission of this patent not only demonstrates Homsh Technology’s technical strength in AI algorithm R&D but also highlights the company’s determination to pursue continuous innovation in the field of iris recognition. From traditional image processing methods to the full application of deep learning technology, and from a single recognition function to comprehensive security protection integrated with liveness detection, Homsh Technology is driving technological progress across the entire industry through concrete actions.       Looking ahead, Homsh Technology will continue to deepen its research in iris recognition technology. Taking this patent as a starting point, we will constantly explore new frontiers in the integration of AI and biometric technology. We believe that through sustained technological innovation and the accumulation of intellectual property rights, Homsh Technology will surely deliver safer and more convenient identity authentication experiences to users in broader application scenarios such as intelligent security, financial payment, and smart cities.       The submission of this patent is not only an important milestone in Homsh Technology’s development journey but also a new starting point for us to move toward our vision of "becoming a world-leading provider of iris recognition technology". We would like to thank every partner for their trust and support. Homsh Technology will continue to be driven by innovation, safeguard security with technology, and make identification smarter.

2025

09/05