HOME

TheInfoList



OR:

Touch ID is an
electronic fingerprint recognition Fingerprint scanners are security systems of biometrics. They are used in police stations, security industries, smartphones, and other mobile devices. Function Everyone has patterns of friction ridges on their fingers, and it is this pattern t ...
feature designed and released by Apple Inc. that allows users to unlock devices, make purchases in the various Apple digital media stores (
iTunes Store The iTunes Store is a digital media store operated by Apple Inc. It opened on April 28, 2003, as a result of Steve Jobs' push to open a digital marketplace for music. As of April 2020, iTunes offered 60 million songs, 2.2 million apps, 25,00 ...
,
App Store An App Store (or app marketplace) is a type of digital distribution platform for computer software called applications, often in a mobile context. Apps provide a specific set of functions which, by definition, do not include the running of the c ...
, and
Apple Books Store Apple Books (formerly known as iBooks between January 2010 and September 2018) is an e-book reading and store application by Apple Inc. for its iOS and macOS operating systems and devices. It was announced, under the name iBooks, in conjunctio ...
), and authenticate
Apple Pay Apple Pay is a mobile payment service by Apple Inc. that allows users to make payments in person, in iOS apps, and on the web. It is supported on these Apple devices: iPhone, Apple Watch, iPad, and Mac. It digitizes and can replace a cred ...
online or in apps. It can also be used to lock and unlock password-protected
notes Note, notes, or NOTE may refer to: Music and entertainment * Musical note, a pitched sound (or a symbol for a sound) in music * ''Notes'' (album), a 1987 album by Paul Bley and Paul Motian * ''Notes'', a common (yet unofficial) shortened versio ...
on iPhone and iPad. Touch ID was first introduced in iPhones with 2013's
iPhone 5S The iPhone 5S (stylized and marketed as iPhone 5s) is a smartphone that was designed and marketed by Apple Inc. It is the seventh generation of the iPhone, succeeding the iPhone 5, and unveiled in September 2013, alongside the iPhone 5C. ...
, In 2015, Apple introduced a faster second-generation Touch ID in the iPhone 6S; a year later in 2016, it made its laptop debut in the MacBook Pro integrated on the right side of the Touch Bar. Touch ID has been used on all
iPad The iPad is a brand of iOS and iPadOS-based tablet computers that are developed by Apple Inc., Apple Inc. The iPad was conceived before the related iPhone but the iPhone was developed and released first. Speculation about the development, ...
s since the
iPad Air 2 The iPad Air 2 is the second-generation iPad Air tablet computer designed, developed, and marketed by Apple Inc. It was announced on October 16, 2014, alongside the iPad Mini 3, both of which were released on October 22, 2014. The iPad Air 2 ...
was introduced in 2014. In MacBooks, each user account can have up to three fingerprints, and a total of five fingerprints across the system. Fingerprint information is stored locally in a secure enclave on the Apple A7 and later chips, not in the
cloud In meteorology, a cloud is an aerosol consisting of a visible mass of miniature liquid droplets, frozen crystals, or other particles suspended in the atmosphere of a planetary body or similar space. Water or various other chemicals may ...
, a design choice intended to secure fingerprint information from users or malicious attackers. Apple retained Touch ID on
iPhone 8 The iPhone 8 and iPhone 8 Plus are smartphones designed, developed, and marketed by Apple Inc. They along with the iPhone X make up the 11th generation of the iPhone. The iPhone 8 was released on September 22, 2017, succeeding the iPhone 7 an ...
, 2nd generation iPhone SE, 3rd generation iPhone SE, and the base model iPads, while all other iPhones since the
iPhone X The iPhone X (Roman numeral "X" pronounced "ten", also known as iPhone 10) is a smartphone designed, developed and marketed by Apple Inc. It is part of the 11th generation of the iPhone. Available for pre-order from October 27, 2017, it was re ...
in 2017, and the higher-end
iPad Pro The iPad Pro is a premium model of Apple's iPad tablet computer. It runs iPadOS, a tablet-optimized version of the iOS operating system. The original iPad Pro was introduced in September 2015, and ran iOS 9. The second-generation iPad P ...
have adopted Face ID recognition. The 4th and 5th-generation iPad Air and the 6th-generation iPad Mini incorporates a Touch ID sensor on the top button. In 2020, 2021 and 2022, Apple unveiled a new line of iMacs, Mac Studios with Studio Display, and Mac minis that can be configured with Touch ID on the Magic Keyboard.


History

In 2012, Apple acquired AuthenTec, a company focused on fingerprint reading and identification management software, for $356 million. The acquisition led commentators to expect a fingerprint reading feature. Following leaks and speculation in early September, the iPhone 5S was unveiled on September 10, 2013, and was the first phone on a major US carrier to feature the technology. Apple's
Vice President A vice president, also director in British English, is an officer in government or business who is below the president (chief executive officer) in rank. It can also refer to executive vice presidents, signifying that the vice president is on ...
of Marketing,
Phil Schiller Philip W. Schiller (born June 8, 1960) is an Apple Fellow at Apple Inc. He is a prominent figure in Apple's keynotes and has been a member of the company's executive team since Steve Jobs returned to Apple in 1997. In 2020 he became the first ...
, announced the feature at Apple's iPhone media event and spent several minutes (the major portion of the conference) discussing the feature. Wells Fargo analyst Maynard Um predicted on September 4, 2013, that a fingerprint sensor in the
iPhone 5S The iPhone 5S (stylized and marketed as iPhone 5s) is a smartphone that was designed and marketed by Apple Inc. It is the seventh generation of the iPhone, succeeding the iPhone 5, and unveiled in September 2013, alongside the iPhone 5C. ...
would help
mobile commerce The term mobile commerce was originally coined in 1997 by Kevin Duffey at the launch of the Global Mobile Commerce Forum, to mean "the delivery of electronic commerce capabilities directly into the consumer’s hand, anywhere, via wireless tech ...
and boost adoption in the corporate environment. "As consumers increasingly rely on mobile devices to transact and store personal data, a reliable device-side authentication solution may become a necessity," Um said. With the unveiling of the iPhone 6 and 6 Plus at a keynote event on September 9, 2014, Touch ID was expanded from being used to unlock the device and authenticating App Store purchases to also authenticating Apple Pay. The iPhone 6S incorporates a second-generation Touch ID sensor that is up to twice as fast as the first-generation sensor found in the 5S, 6, and SE (1st generation) phones. As of August 2022, the iPhone 6S, 6S Plus, 7, 7 Plus, 8, 8 Plus, SE (2nd generation), SE (3rd generation), 2016 and later MacBook Pro, 2018 and later
MacBook Air The MacBook Air is a line of ultrabook computers developed and manufactured by Apple Inc. It consists of a full-size keyboard, a machined aluminum case, and, in the more modern versions, a thin light structure. The Air was originally position ...
,
iPad Pro (2nd generation) The second generation of iPad Pro is a line of iPad tablet computers designed, developed and marketed by Apple Inc. The iPads, with a 12.9 inch or a 10.5 inch screen, were both announced on June 5, 2017. Both models are compatible wit ...
and later,
iPad Air (3rd generation) The iPad Air (3rd generation) (colloquially referred to as iPad Air 3) is a tablet computer developed, and marketed by Apple Inc. It was announced and released on March 18, 2019, alongside the 5th-generation iPad Mini. Its case design is i ...
and later, and iPad mini (5th generation) or later are the Apple devices which use the second generation sensor. The new Touch ID unlocks almost instantly and posed an issue as it unlocks too fast to read notifications on the lock screen. This is remedied with the
iOS 10 iOS 10 is the tenth major release of the iOS mobile operating system developed by Apple Inc., being the successor to iOS 9. It was announced at the company's Worldwide Developers Conference on June 13, 2016, and was released on September ...
update in which a user must press the home button to have the home screen appear. This, however, can be changed in iOS settings so that users can go directly to the home screen after resting their finger on the sensor, similar to previous versions of iOS. Solely placing a finger on the sensor will only unlock the iPhone unless said setting is enabled, and no notifications are currently being displayed on the lock screen.


Generations


Hardware

Touch ID is built into the home (top) button, which is built of
laser A laser is a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation. The word "laser" is an acronym for "light amplification by stimulated emission of radiation". The ...
-cut
sapphire crystal Sapphire is a precious gemstone, a variety of the mineral corundum, consisting of aluminium oxide () with trace amounts of elements such as iron, titanium, chromium, vanadium, or magnesium. The name sapphire is derived via the Latin "sapphi ...
, and does not scratch easily (scratching would prevent Touch ID from working). It features a stainless steel detection ring to detect the user's finger without pressing it. There is no longer a rounded square icon in the home button, nor is it concave. The sensor uses capacitive touch to detect the user's fingerprint. The sensor has a thickness of 170 
µm The micrometre ( international spelling as used by the International Bureau of Weights and Measures; SI symbol: μm) or micrometer ( American spelling), also commonly known as a micron, is a unit of length in the International System of Uni ...
, with 500 pixels per inch resolution. The user's finger can be oriented in any direction and it will still be read. Apple says it can read sub-epidermal skin layers, and it will be easy to set up and will improve with every use. The sensor passes a small current through one's finger to create a "fingerprint map" of the user's dermis. Up to 5 fingerprint maps can be stored in the Secure Enclave.


Security and privacy

Touch ID can be bypassed using passcodes set up by the user. Fingerprint data is stored on the secure enclave inside the Apple A7, A8, A8X, A9, A9X, A10, A10X, A11, A12, A13, A14 and
A15 A15 or A-15 may refer to: * A15 phases, a crystallographic structure type of certain intermetallic compounds * A15 road, in several countries * Antonov A-15, a Soviet glider * British NVC community A15 (Elodea canadensis community), a British Isles ...
processors of an iOS device, or the T1, T2 and M1 in the case of Macs, and not on Apple servers, nor on iCloud. From the Efficient Texture Comparison patent covering Apple's Touch ID technology:
In order to overcome potential security drawbacks, Apple's invention includes a process of collapsing the full maps into a sort of
checksum A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data ...
, hash function, or
histogram A histogram is an approximate representation of the frequency distribution, distribution of numerical data. The term was first introduced by Karl Pearson. To construct a histogram, the first step is to "Data binning, bin" (or "Data binning, buck ...
. For example, each encrypted ridge map template can have some lower resolution pattern computed and associated with the ridge map. One exemplary pattern could be a histogram of, e.g., the most common angles (e.g., a 2 dimensional (2D) array of common angles). The exemplary pattern could include in each slot an average value over a respective vector of the map. The exemplary pattern could include in each slot a sum of the values over a respective vector of the map. The exemplary pattern could include the smallest or largest value within a respective vector of the map or could be a difference between a largest and a smallest value within the respective vector of the map. Numerous other exemplary embodiments are also possible, and any other exemplary pattern calculation can be used, where the exemplary pattern includes enough associated information to narrow the candidate list, while omitting enough associated information that the unsecured pattern cannot or cannot easily be reverse engineered into a matching texture.
If the user's phone has been rebooted, has not been unlocked for 48 hours, has its SIM card removed or has Emergency SOS activated, only the passcode a user has created, not their fingerprint, can be used to unlock the device or during other specific use cases. In September 2013, the German
Chaos Computer Club The Chaos Computer Club (CCC) is Europe's largest association of hackers with 7,700 registered members. Founded in 1981, the association is incorporated as an '' eingetragener Verein'' in Germany, with local chapters (called ''Erfa-Kreise'') i ...
announced that it had bypassed Apple's Touch ID security. A spokesman for the group stated: "We hope that this finally puts to rest the illusions people have about fingerprint biometrics. It is plain pity to use something that you can't change and that you leave everywhere every day as a security token." Similar results have been achieved by using
PVA Glue Polyvinyl acetate (PVA, PVAc, poly(ethenyl ethanoate)), commonly known as wood glue, PVA glue, white glue, carpenter's glue, school glue, or Elmer's glue in the US, is a widely available adhesive used for porous materials like wood, paper, and ...
to take a cast of the finger. Others have also used Chaos Computer Club's method but concluded that it is not an easy process in either time or effort, given that the user has to use a high resolution photocopy of a complete fingerprint, special chemicals, and expensive equipment and because the spoofing process takes some time to achieve.


Impact

In a 2013 ''
New York New York most commonly refers to: * New York City, the most populous city in the United States, located in the state of New York * New York (state), a state in the northeastern United States New York may also refer to: Film and television * '' ...
'' magazine opinion piece, technology columnist
Kevin Roose Kevin Roose is the author of three books and a technology columnist for ''The New York Times''. He wrote a book about Liberty University, an evangelical Christian university known for strict rules imposed on students. He was named on ''Forbes'' " ...
argued that consumers are generally not interested in fingerprint recognition, preferring to use passcodes instead. Traditionally, he wrote, only businesspeople used biometric recognition, although they believe Touch ID may help bring fingerprint recognition to the masses. Roose stated the feature will also allow application developers to experiment, should Apple open up access to Touch ID later on (which they have done), but that those wary of surveillance agencies such as the US
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
may still choose not to use Touch ID. Roose also noted that fingerprint technology still has some issues, such as the potential to be hacked, or of the device's not recognizing the fingerprint (for example, when the finger has been injured). Adrian Kingsley-Hughes, writing for
ZDNet ZDNET is a business technology news website owned and operated by Red Ventures. The brand was founded on April 1, 1991, as a general interest technology portal from Ziff Davis and evolved into an enterprise IT-focused online publication. H ...
, said Touch ID could be useful in
bring your own device Bring your own device (BYOD )—also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own personal computer (BYOPC)—refers to being allowed to use one's personally owned device, rather than being required to u ...
situations. He said the biometric protection adds another layer of security, removing the ability of people to look over others' shoulders and read their passcode/password. He added that Touch ID would prevent children from racking up thousands of dollars in unwanted purchases when using iPhones owned by adults. He observed that Touch ID was Apple's response to the large number of iPhone crimes, and that the new feature would deter would-be iPhone thieves. Moreover, he notes that the feature is one of the few that distinguish the iPhone 5S from the 5C. Roose also stated the feature is intended to deter theft. However, Brent Kennedy, a vulnerability analyst at the
United States Computer Emergency Readiness Team The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA). Specifically, US-CERT is a branch of the Office of C ...
, expressed concern that Touch ID could be hacked and suggested that people not rely on it right away. ''Forbes'' noted a history of fingerprints being spoofed in the past, and cautioned that the fingerprints on a stolen iPhone might be used to gain unauthorized access. However, the article did say that biometrics technology had improved since tests on spoofing fingerprint readers had been conducted. Kingsley-Hughes suggested the Touch ID as a form of
two-factor authentication Multi-factor authentication (MFA; encompassing two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting ...
, combining something one ''knows'' (the password) with "something you are" (the fingerprint). ''Forbes'' said that, if two-factor authentication is available, it will be an overall improvement for security. ''Forbes'' columnist Andy Greenberg said the fact that fingerprint data was stored on the local device and not in a centralized database was a win for security.


See also

* Face ID


References


External links

* – official site * – official site * – official site {{iOS Authentication methods Fingerprints IOS