A Professional Manufacturer of Smart Interactive Screens For More Than 10 Years
What is Touch ID?
More than a year ago, Touch ID appeared on Apple's iPhone 5S for the first time. it was called a gimmick by many people and is regarded as a gimmick for the future.
Some argue that Apple's new attempt to biometric security helps justify a modest upgrade of the new 5 over the new iPhone 5, making it easy to understand why.
Already found in many businesses.
Laptops from Lenovo, Toshiba and other companies, fingerprint readers used in the business world before, but were widely ignored by consumers.
However, with the introduction of contactless Apple Pay systems and the growing trend for consumers to store sensitive information on mobile devices, biometric ID as a viable authentication method is slowly being taken seriously.
The well-known celebrity iCloud hack has also made many people look for better options than normal user names and passwords.
According to Phil Dunkelberger, CEO of Nok Labs, a mobile security company, the problem with usernames and passwords is that they are shared secrets: "You know your password, but so is the service you are using.
This means that these databases are a very attractive target for hackers who are trying to break millions of accounts.
"Worse practice also means that many people use the same password in the service-spreading the vulnerability to other websites.
How to install IOS 8.
1 Metal: how does Apple squeeze performance from the new iPad and iphone iPad Mini 3 specs and features, apple's "accident" reveals that the new iPad Air and Mini will never leave your phone with the username and password through these implementation-meaning for the sake of "hacking" biometrics, criminals need access to your device and the ability to cheat sensors.
"How does it work?
Fingerprint readers are a fast authentication system that provides secure, convenient security because they depend on the extremely hard-to-crack things you carry with you.
Faster and safer than 4-bit passwords ,(
5 times in the case of iDevices)
As a new proof of identity, the fingerprint sensor is getting the right appeal.
Apple's Touch ID crams sits in a space that is usually reserved for plastic Home buttons, providing fast biometrics with a range of integrated technologies.
The Touch ID is made up of steel electrical capacity rings, sapphire lenses, image sensors, and secure enclave, and relies on a series of components that work harmoniously to provide a simple and easy certification process.
Not just to show, the silver ring around each Touch ID is actually a capacitive sensor.
The silver ring is designed to detect when the finger is present, it sparks the rest of the Touch ID assembly and saves valuable battery life by making sure it doesn't always open.
Unlike Samsung's similar system, Touch ID is more like a traditional tablet scanner that requires you to slide on the sensor.
The fingerprint image is protected by a layer of durable sapphire glass and is directly focused on the Touch ID sensor.
Only 170 microns thinner than human hair, slightly thicker, the sensor scans the image at 500ppi-higher than the 326ppi resolution of the iPhone 6 screen.
After a detailed scan, a high-definition image is taken and temporarily stored for analysis in a secure enclave.
Measuring the features of the fingerprint, such as the angle of the flow of the subdermal Ridge, this process determines the basic aspects that make the fingerprint unique and produce a unique key.
Enough information to recognize your finger accurately again, and the data stored by Touch ID is far from enough to rebuild your original fingerprint.
Once your unique fingerprint data has been collected, only the scanned mathematical representation retains, stores, and encrypts without leaving your identity on your device --
Never used anywhere else.
When you use Touch ID for the first time, you need to scan it several times so that the sensor can create a complete image for your fingerprint.
You will also be instructed to scan the side and top of your fingerprint, as your thumb or finger will not always be in the center of death during normal use.
How did it recognize me?
Unlock the phone each time, repeat the scan process, and analyze the fingerprint again.
If the generated data key matches the data key already stored on your iDevice, the phone will be unlocked.
When the purchase is completed using systems such as Apple Pay, a successful fingerprint match will cause the device to automatically populate the stored keychain information when needed. What’s next?
Although the fingerprint reader can be used in conjunction with other biometric security measures, it seems that the biometric technology still exists.
"People are very focused on fingerprint sensors today, and that's understandable given Apple and Samsung's investment in adding fingerprint sensors to smartphones and tablets," Dunkelberger said . ", "But there are many other sensors and factors that can be used-biometric technologies such as face, voice, Iris, eye veins, and contextual information such as the location of the user.
The combination of these factors is a better way to identify users than the status quo.
However, as Dunkelberger said, this may not be the end of the password: "You can combine pin and biometrics well, or combine multiple biometrics (
Face and fingerprint)
Make cheating more difficult.
"So, in the future, there may not be a single security measure, but a combination of several security measures-equivalent to two biological features --
Step authentication.
In the future, biometrics can be applied to all aspects of life. "Client-
"Users have control over their templates and biometric on the side where the client makes a match has entered the mobile device, and the first application seems to be payment," said Dunkelberger . ".
"There is nothing to stop them from being used for access to health care services, workplace facilities and other places where we may use smart cards or passwords today.
"What can we do now?
"It's important to have a unique, powerful password for every online app you use," Dunkelberger said . ".
"Since the human brain can only handle so many things-you need a way to manage them.
It may make sense to use a password safe (such as LastPass, Keepass, or similar)-These passwords represent the calculated risk, but are practical ways to manage a large number of unique passwords.