中文简体 | Member Center| Register| Add to Favorites| Feedback| Site Map Welcome to the official website of IdWorld!
IdWorld hotline:13718395695
百叶窗图片载入中
Your location:Home>>Common problem

Fingerprint identification: reverse the world "codes and keys"

Release date:2015-07-28 13:57:45

It is important to note that apple is not in the FIDO alliance.

 

This is similar to the relationship between the android and ios, FIDO alliance alliance for open source, as long as keep FIDO alliance standards, both mobile phone manufacturers, chip makers and technical services, Internet companies can access. Apple's current fingerprint identification is not open to a third party to use, so can only achieve these two functions.

 

Relative to the open source system, apple's ios in terms of overall system security or fingerprint authentication, are relatively safer, of course, the premise is you don't want to escape.

 

In this year's apple developers conference, however, apple has opened many third-party interface for developers, it is also considered by the android open source system such as stress. So in the near future, apple may also the interface of the fingerprint identification is open to third-party developers, it is worth looking forward to change.

 

In addition, a new conference held in September apple, apple, or will the fingerprint identification to expand to a new device on the mini, which will further promote the popularity of fingerprint authentication technology.

 

Fingerprint authentication is really safe?

 

Fingerprint identification so widely, so this way is really safe?

 

For this problem, we will divide the fingerprint collection and fingerprint authentication two parts to answer.

 

In fingerprint acquisition phase, use of fingerprint identification technology such as fingerprint puncher machine security is low, the user can through a simple copy refers to the way of cheating. But a new generation of fingerprint payment technology (such as samsung S5 fingerprint technology of mobile phone and a new fingerprint lock) has the identification function of bioelectricity, can identify to the dermis, so copy refers to the mode, can't by identifying or amputation.

 

In fingerprint authentication phase, lenovo Cui Zhongyong to netease science and technology is introduced, in this technology, lenovo converts the sensor to identify fingerprint to a bunch of keys, in the mobile local do fingerprints, only transfer alignment for results "YES OR NO". In this process, all the fingerprint data will be stored in the local device, not uploaded to the cloud, even if the attack, the server will not lead to safety accident. (note that this does not mean that all of the fingerprint identification will not upload your fingerprint information. Although apple before also denied, but foreign security experts also said earlier, set up large-scale cloud fingerprint is very dangerous.)

 

The fingerprint data can be in local being stolen? Lenovo, explained in alipay fingerprint payment project, user's fingerprint data entry into the mobile phone, stored in a TEE from the main operating system environment, we can interpret the TEE environment as a black box, the data cannot be read, the main operating system appears Trojan by circumstances, such as fingerprint data is safe.

 

Overall, the security of fingerprint payment or are much higher than digital password.

 

May now there is a small part of the user fingerprint cannot identify situations, such as born without fingerprints, or seriously injured finger, finger long soak in the water or chemicals, may also affect the fingerprint recognition rate. In this case, the user can switch from fingerprint password number password back.

The article keywords:
Privious:Not the last Next:Dark background infrared optical fingerp..
More>>
Hotspot information
网站ICP备案号:京ICP备12046952号-2
Copyright © 2014-2017 Beijing IDworld Science & Technology Development Co.,Ltd All rights reserved
TEL:+86-13718395695
Support:Website | zk71  | Manage