CIO Today

CIO Today Network Sites:   Top Tech News  |   CIO Today   |   Mobile Tech Today   |   Data Storage Today
Daily Briefing for Technology's Top Decision-Makers
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Thursday, April 24th 
Next Generation Data Center Is Here!
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Trending Topics:   Security Heartbleed Big Data Cloud Computing Windows XP Data Centers OS X Mavericks
Home
Enterprise Software
Enterprise Hardware
Big Data
Network Security
Cloud Computing
CRM Systems
Data Storage
Operating Systems
Communications
CIO Issues
Mobile Tech
Chips & Processors
World Wide Web
Business Briefing
After Hours
Press Releases
 
Free Newsletters
Top CIO News
 
Mobile Tech Today
 

Apple/Mac

Is Fingerprint Scanning Coming to the iPhone?

Is Fingerprint Scanning Coming to the iPhone?
July 29, 2013 2:34PM

Bookmark and Share
Biometric identity recognition could provide a major differentiator for iPhones, as other smartphones have begun to match Apple feature for feature and, in some cases, are offering functionality that Apple does not. Remembering passwords remains an onerous task, so being able to log-on with natural identifiers could again give iPhones a boost in ease of use.

Your Next Generation Data Center Is Here! Vblock™ Systems: the world's most advanced converged infrastructure are built on the Cisco Unified Computing System with Intel® Xeon® processors. Vblock™ Systems deliver extraordinary time to market, ROI and TCO, and flexibility to meet your continually changing demands with 5X faster deployment, 96% less downtime, and 1/2 the cost. Click here to learn more.

Will the next iPhone include biometrics? Possibly, as a new beta version of Apple's iOS software, released Monday for developers, contains fingerprint scanning technology.

Beta 4 of iOS 7 includes code for biometric scanning, according to developers sites. The code, in a folder called BiometricKitUI, handles fingerprint recognition from a left or right thumb placed on an iPhone.

The code also includes a tutorial section containing a description of a photo of a person holding the iPhone with their right hand "while touching the Home button with their thumb." One obvious use for a fingerprint scanner would be as a replacement for the lock screen code now used.

Purchase of AuthenTec

Almost exactly a year ago, Apple spent $356 million to buy a company called AuthenTec, which provided fingerprint sensor and identity management technology for mobile devices, as well as for governments and networking companies. One of AuthenTec's customers before the acquisition, interestingly, was Apple's arch-competitor in the mobile space, Samsung. In regulatory filings related to the acquisition, Apple mentioned it was eager to complete the purchase in order to add fingerprint sensors to its devices.

Code found in a beta version of an operating system does not necessarily mean that the supported feature will appear anytime soon. Apple could be preparing its platform for fingerprint and other identity technologies at a future date. A new iPhone is expected to be released within a few months.

However, in addition to the AuthenTec acquisition and the buried iOS code, another piece of evidence is that Apple received a patent last fall for a biometric unlocking mechanism in its products. That patent described a hidden biometric scanner used in a two-step unlock screen feature, living under the screen of an Apple device and becoming visible through an action by the user, such as pushing a Home button. The scanner could be used for fingerprints, face recognition, or eye scanning, any of which could serve a second factor in two-factor authentication.

Transparent Computing

There had been rumors that Apple would utilize near-field communication as a way to authenticate users without passwords, although the technology giant has been discouraging that line of thinking.

Biometric identity recognition could provide a major differentiator for iPhones, as other smartphones have begun to match Apple feature for feature, and, in some cases, are offering functionality that Apple does not. Remembering passwords remains an onerous responsibility in this world of many log-ons, so being able to log-on simply with your natural identifiers could again give iPhones a boost in ease of use.

Of course, natural identity verification is also very appealing to every other device maker. Intel, for example, has been pushing the idea of "transparent computing," which would include biometrics as a way to facilitate natural computing and would employ scans of a user's entire palm via a scanner or camera. Intel has said that a palm print is more accurate than a fingerprint and is more difficult to lift from a user's device. Other device makers, such as Motorola, have also released products with fingerprint sensors, although such identifying technology has not yet caught on.

Tell Us What You Think
Comment:

Name:

Steve:

Posted: 2013-07-31 @ 9:18am PT
The Motorola Atrix had this technology at least 4 years ago...



 Apple/Mac
1. Samsung: $2.2B Too Much for Apple
2. Google, Rockstar Suit Stays in Calif.
3. Samsung Tech Experts Talk Patents
4. Phones Annoy Patent Trial Judge
5. Apple vs. Samsung: Latest News




 Most Popular Articles
1. BlackBerry Drops T-Mobile After Nasty Spat
2. Cisco, IBM Launch Internet of Things Consortium
3. Salesforce CRM Gets Industry Specific for Internet of Customers
4. Intel Bets on Cloudera for Big Data Analytics
5. SAP HANA Data Warehouse App Gets Faster Analytics

Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  Google Maps, Now with Time Travel
  Lessons from Verizon's Threat Report
  NYPD Twitter Campaign Backfires
  Net Gets Faster, But Easier to Attack
  OnePlus One Boasts Android Weapon

 Technology Marketplace
Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
Cloud Computing
Next Generation Data Center Is Here! Vblock™ Systems from VCE
 
Contact Centers
HP delivers the future of the contact center with HP Qfiniti 10.
 
Data Storage
Next Generation Data Center Is Here! Vblock™ Systems from VCE
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise Hardware
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Hardware
Protect your network with APC Smart-UPS battery backup
 
Network Security
Protect your network with APC Smart-UPS battery backup
 

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 
Navigation
CIO Today
Home/Top News | Enterprise Software | Enterprise Hardware | Big Data | Network Security | Cloud Computing | CRM Systems
Data Storage | Operating Systems | Communications | CIO Issues | Mobile Tech | Chips & Processors | World Wide Web
Business Briefing | After Hours | Press Releases
Also visit these Enterprise Technology Sites
Top Tech News | CIO Today | Mobile Tech Today | Data Storage Today

Services:
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About CIO Today Network | How To Contact Us | Article Reprints | Services for PR Pros (In partnership with NewsFactor) | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 CIO Today. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.