Showing posts with label touch id. Show all posts
Showing posts with label touch id. Show all posts

Wednesday, 11 September 2013

Apple announces 'Touch ID' for iPhone 5S



The emergence of a fingerprint reader allows the new Apple Smartphone to improve its security. This is the main and almost the only real innovation of the iPhone 5s by adding a fingerprint reader, which is quietly inserted into the new Home button on the device. “Touch ID” which will unlock your Smartphone by simply waving your thumb to the button without pressing. The user can also validate his purchases on the App Store and iTunes but not elsewhere, since this iPhone does not support NFC. It is also an additional protection against theft or false manipulations. But it is the business that is referred to this component. We know employees use more and more of their personal devices for work tasks, connect to their corporate network, this is the BYOD (bring your own device) trend. The iPhone is obviously well placed in this field, but IT managers who need to manage this new type of fleets sometimes regret the lack of security of the terminal, especially when faced with competing solutions.

With Touch ID, Apple clearly meets this requirement of securing BYOD with a powerful biometric solution that could bury those pesky passwords. Powerful because Apple says the A7 chip in the terminal, a 64- bit processor, is especially dedicated to the management and the strength of the encryption. The iPhone can also now boast of offering two-factor authentication. The most riding on the security companies can indeed impose fingerprint reading AND a password to unlock the device. So the apple climbs its upscale terminal to a new level of security and intends to strengthen its presence in business when BlackBerry is sinking. As for Android, it does not really favor with CIOs.

 It is also necessary that its technology is really developed. Biometrics is a technology and Touch -sensitive ID must demonstrate its reliability in a professional sense. According to the first taken in hand, the Touch ID configuration takes only 30 seconds. The function will also demonstrate its robustness against attacks. Because these technologies are fragile; it will be recalled that the facial recognition of Android 4.0 was diverted in two shots ladle. Again, with the help of the chip, Apple promises a maximum shielding. The issue of databases generated by Touch ID also raises questions. Where and how these data will be stored? Apple ensures that they will not be stored in the cloud.