Apple's iPhone 5S Fingerprint Scanner And How It Works
Sep 11, 2013 17:27
Apple introduced the new iPhone 5S today with a biometric lock saying that it will revolutionize mobile security. That's right. No more "slide to unlock".
Fingerprint authentication is an electro optical and capacitance technology. For EO scanners, it works like a traditional scanner - using bright lights to illuminate the peaks and valleys of the print. A CCD device is used to capture a black and white image, where the whites are peaks and the darks are valleys. If enough intersections match, the identity is verified and access is granted. But this isn't the method being used in Apple's new system.
Apple is using a more sensitive capacitance method, which instead of bouncing light off the print to generate a binary representation, it relies on an array of minuscule capacitive cells, where each less than a finger ridge wide. They consist of two conductor plates separated by an insulating layer.
When you put your finger on the capaciative scanner, the ridges will cause some plates to come into contact which generates a current, while the cells under the ridges on your fingers remain separate. The system interprets that voltage generated to determine which one is under a ridge and which is under a valley.
They combine this data to generate an overall image of the print with a much higher degree of fidelity. Capacitance scanners require an actual fingerprint shape to work making it harder to fake.
What this means
This means you'll probably never have to smear your display with pass codes or swipes. More importantly, someone looking over your shoulder doesn't read your passcode. And it also eliminates a thief guessing your code by all the greasy fingerprints on your screen.
So this means, it's much easier to steal an older iPhone this time round. Apple says its stored security is on the hardware itself, rather than on Apple's servers. [Bioelectronix - How Stuff Works - Patently Apple - Wiki - Onin]
The HONOR Magic 7 Pro price in ksa makes it an appealing option for those looking for a high-end smartphone. This advanced device stands out with its sleek design and robust build quality. This blog delves into the details, examining what makes the HONOR Magic 7 Pro unique, from the materials used to its overall durability and user experience. If you’re considering purchasing a high-end smartphone that balances aesthetics and functionality, this review of the HONOR Magic 7 Pro’s design and build quality will provide you with all the information you need. Read more
Organizations continue to reside under substantial pressure to provide security and compliance with data in the current-day complex regulatory ambiance. Enter endpoint management — a strategic approach to managing and securing devices, that has become a key tool for achieving these objectives. Endpoint management solutions assist organizations with stringent compliance requirements by establishing a single interface for monitoring, controlling, and securing devices. Read more
Application security is the face of organizational success in today's digital transformation era. It has been brought about by rising cyberattacks against applications that are forcing businesses to choose strong security solutions. With application security software, one is capable of protecting sensitive data, regulating compliance, and maintaining trust with customers. In this blog, we will review how to evaluate and pick the best application security testing tools, with a spotlight on the capabilities of HCL AppScan. Read more