Smartphone Fingerprint Security

picture courtesy of dmacc.edu
picture courtesy of dmacc.edu

Apple’s iPhone 5S includes fingerprint scanning technology called Touch ID to unlock the phone and make purchases in iTunes. Some are calling it the key to the future of your Smartphone – a more secure way to authenticate mobile transactions and protect your data from theft if your phone is lost or stolen. Others are concerned about the privacy of users, worried that fingerprints will be kept on record at Apple or made available to 3rd party software developers.

Smartphones let you bring your photos, email, and social media everywhere you go. Many use Smartphones for mobile banking, shopping and storing important but private information. In spite of the wealth of data stored on a Smartphone, Apple reports that half of all iPhone users don’t use the passcode lock feature on their phone. This leaves their information vulnerable should their phone be lost or stolen.

Many users report that it’s just too cumbersome to tap in a passcode every time they unlock their phone. The biggest benefit of using a fingerprint scan to unlock your phone is its simplicity. While critics insist that even fingerprint security is vulnerable to hacking, it’s certainly more of a deterrent to a common thief than having no lock on your phone at all.

Could a thief could lift your fingerprint from elsewhere on the phone and use it to unlock the device? Touch ID uses a capacitive sensor in the steel ring around the home button to ensure that only materials of certain conductivity will register. The sensor uses data from your finger’s sub-epidermal layer, not just the surface, making it much more difficult to replicate.

Could someone hack your phone and get access to your fingerprint data? According to Apple’s website, instead of just using a photo of your fingerprint, Touch ID “creates a mathematical representation of your fingerprint and compares this to your enrolled fingerprint data to identify a match and unlock your iPhone.” Touch ID doesn’t store any photos of your fingerprint and it isn’t possible for your fingerprint to be reverse-engineered from this mathematical equation.

Could a hacker get access to my fingerprint data where it’s stored on Apple’s servers? Fingerprint data is encrypted and is stored in a unique area of the phone’s memory chip, walled off from the rest of the operating system. According to Apple, “your fingerprint data is never accessed by iOS or other apps, never stored on Apple servers, and never backed up to iCloud or anywhere else.”

Could this fingerprint data be used to identify me using other fingerprint databases? Because it’s a mathematical equation, not your fingerprint itself, only Touch ID can use the data. Apple assures users that it can’t be used to match your fingerprint against other fingerprint databases.

Apple insists that the company has no immediate plans to allow 3rd party app developers access to Touch ID in order to incorporate fingerprint authentication in their programs. However, having the fingerprint scanner built into the phone offers some intriguing future-use security. Passwords or passcodes are relatively easy to hack, and many users allow their device to auto-login to avoid entering a password every time. If it proves reliable, fingerprints would be a much safer way to authenticate your identity for mobile banking, online purchases or any app that maintains your personal data.

The implications for using your Smartphone as a mobile wallet are also promising. No more easily stolen credit card numbers – use your Smartphone to pay for purchases both online and in-person while trusting that only you can access your money.

As a form of personal identification and transaction authentication, fingerprint scanning could be the future of mobile security. For now, it makes securing your iPhone from thieves easier than ever before.

About The Author: Andrea Eldridge is CEO and co-founder of Nerds On Call, an on-site computer and laptop repair service company for consumers and businesses. Andrea is the writer of two weekly columns; Computer Nerds On Call, a nationally syndicated column for Scripps-Howard News Service, and Nerd Chick Adventures in The Record Searchlight.

32 COMMENTS

  1. 275848 857384Pretty section of content. I just stumbled upon your weblog and in accession capital to assert that I get really enjoyed account your blog posts. Any way I is going to be subscribing to your augment and even I achievement you access consistently swiftly. 185247

  2. 985605 876070Hello! I could have sworn Ive been to this weblog before but right after browsing through some of the post I realized its new to me. Anyways, Im certainly happy I found it and Ill be book-marking and checking back frequently! 862079

  3. 752882 107666Greetings! Quick question thats completely off subject. Do you know how to make your site mobile friendly? My internet site looks weird when browsing from my apple iphone. Im trying to discover a template or plugin that may well be able to correct this problem. Should you have any suggestions, please share. With thanks! 922516

  4. 763400 821342I ought to test with you here. Which is not 1 thing I normally do! I enjoy studying a submit that will make men and women feel. Also, thanks for allowing me to comment! 62183

  5. 972621 428238Wow, incredible blog structure! How lengthy have you ever been blogging for? you produced running a weblog appear easy. The full appear of your internet site is wonderful, well the content! 661720

  6. Hi would you mind sharing which blog platform you’re using? I’m looking to start my own blog in the near future but I’m having a difficult time deciding between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your design and style seems different then most blogs and I’m looking for something completely unique. P.S Apologies for being off-topic but I had to ask!

  7. Excellent goods from you, man. I’ve understand your stuff previous to and you’re just extremely magnificent. I really like what you’ve acquired here, really like what you are stating and the way in which you say it. You make it entertaining and you still take care of to keep it sensible. I can’t wait to read far more from you. This is really a tremendous web site.

  8. An intriguing discussion is definitely worth comment. I think that you ought to publish more about this issue, it may not be a taboo matter but typically people don’t discuss such issues. To the next! All the best!!

  9. I’m not sure why but this blog is loading extremely slow for me. Is anyone else having this problem or is it a issue on my end? I’ll check back later on and see if the problem still exists.

  10. Thanks for the helpful posting. It is also my belief that mesothelioma cancer has an very long latency period of time, which means that the signs of the disease won’t emerge until finally 30 to 50 years after the preliminary exposure to asbestos fiber. Pleural mesothelioma, which can be the most common kind and impacts the area round the lungs, could cause shortness of breath, upper body pains, plus a persistent cough, which may cause coughing up maintain.

  11. Thanks for expressing your ideas on this blog. Additionally, a fable regarding the banking institutions intentions when talking about foreclosures is that the traditional bank will not have my repayments. There is a certain quantity of time that the bank can take payments from time to time. If you are far too deep inside hole, they should commonly call that you pay the payment 100 . However, i am not saying that they will not take any sort of repayments at all. Should you and the standard bank can manage to work something out, the actual foreclosure practice may end. However, in case you continue to skip payments under the new program, the foreclosed process can just pick up where it left off.

  12. What i do not realize is if truth be told how you are not actually a lot more neatly-liked than you may be now. You’re very intelligent. You understand therefore considerably in terms of this topic, made me individually imagine it from numerous various angles. Its like men and women don’t seem to be fascinated unless it’s one thing to accomplish with Lady gaga! Your individual stuffs nice. All the time deal with it up!

  13. What’s Happening i’m new to this, I stumbled upon this I’ve found It absolutely helpful and it has helped me out loads. I hope to contribute & assist different users like its helped me. Great job.

  14. One thing I would like to touch upon is that weightloss system fast is possible by the suitable diet and exercise. An individual’s size not just affects appearance, but also the actual quality of life. Self-esteem, depressive disorders, health risks, as well as physical skills are damaged in putting on weight. It is possible to make everything right and at the same time having a gain. In such a circumstance, a problem may be the root cause. While an excessive amount food and not enough body exercise are usually at fault, common medical ailments and traditionally used prescriptions can greatly add to size. Thanks for your post right here.

  15. Hello there! I could have sworn I’ve visited this blog before but after looking at many of the articles I realized it’s new to me. Nonetheless, I’m certainly pleased I came across it and I’ll be book-marking it and checking back regularly!

  16. I believe that avoiding ready-made foods is a first step to be able to lose weight. They will often taste beneficial, but prepared foods include very little nutritional value, making you eat more just to have enough power to get over the day. When you are constantly eating these foods, changing to whole grain products and other complex carbohydrates will help you to have more electricity while consuming less. Interesting blog post.

  17. Thanks for helping me to acquire new concepts about pcs. I also possess the belief that certain of the best ways to maintain your mobile computer in excellent condition is with a hard plastic-type material case, or even shell, that matches over the top of your computer. These types of protective gear are usually model unique since they are made to fit perfectly over the natural outer shell. You can buy these directly from the vendor, or via third party places if they are designed for your mobile computer, however don’t assume all laptop will have a spend on the market. Yet again, thanks for your guidelines.

  18. Thanx for a very informative site. Where else could I get that type of information written in such a perfect method? I have a venture that I’m just now running on, and I have been on the look out for such information.

LEAVE A REPLY

Please enter your comment!
Please enter your name here