SlideShare a Scribd company logo
Touch ID in iphone 5
Prepared by:
Virendra Singh
Thakur
(131060753022)
Outlines
• Introduction
• History
• Hardware
• Security and privacy
Introduction
• Touch ID is a fingerprint recognition feature,
designed and released by Apple Inc., and
currently only available on the seventh
generation of iPhone, the iPhone 5S.
• Apple says Touch ID is heavily integrated
into iOS 7 on supported devices, allowing users
to unlock their phone, as well as make
purchases in the various Apple digital media
stores (iTunes Store, the App Store, or
iBookstore.
History
• Only a few other smartphone makers have built
fingerprint scanning into their phones, as with
the Motorola Mobility Atrix 4G in 2011, although
none of them were implemented into the
operating system like Touch ID.
• The iPhone 5S is the first phone on a major US
carrier since then to feature the technology.
History (Contd..)
• In 2012 Apple acquired AuthenTec, a company
focused on fingerprint reading and identification
management software, for $356 million. Since
then, people have expected a fingerprint reading
feature.
Hardware
• Touch ID is built into the home button, which is
now built of laser-cut sapphire crystal so as not
to scratch (which would prevent Touch ID from
working).It features a stainless steel detection
ring to detect the user's finger without pressing
it.
Hardware (Contd..)
• The sensor will use capacitive touch to detect
the user's fingerprint. The sensor has a
thickness of 170 µm, with 500 pixels per inch
resolution. The user's finger can be oriented in
any direction and it will still be read.
Hardware Design
Security and privacy
• Fingerprint data is stored on the secure enclave
of the Apple A7 processor that is inside the
device itself, and is not stored on Apple servers,
nor on iCloud, and will not be available to third
parties.
• If the user's phone has been rebooted, or has
not been unlocked for 48 hours, only the user's
passcode, not a fingerprint, can be used to
unlock the phone.
Using Touch ID instead of your
passcode
• You can use Touch ID to unlock your phone
without having to enter your passcode every
time. There are two ways you can unlock with
Touch ID:
• Press the Home button once to wake iPhone 5s
and keep your finger lightly on the Home button.
• Press the Sleep/Wake button once to wake
iPhone 5s, and then touch your finger lightly on
the Home button.
Using Touch ID instead of your
passcode
• If Touch ID doesn't recognize your finger, you'll
be asked to try again. After three attempts, you'll
be given the option of entering your passcode.
After two more tries, you will need to enter your
passcode.
References:
• Geltz, B.R. ; Berlier, J.A. ; McCollum, J.M.
• IEEE SoutheastCon 2010 (SoutheastCon),
Proceedings of the
• Digital Object
Identifier: 10.1109/SECON.2010.5453933
• Publication Year: 2010
Thank You..

More Related Content

What's hot

the impact of iPhone on Korean mobile communication business.
the impact of iPhone on Korean mobile communication business.the impact of iPhone on Korean mobile communication business.
the impact of iPhone on Korean mobile communication business.
Jiwoong Kim
 
How to Unlock iPhone 4s
How to Unlock iPhone 4sHow to Unlock iPhone 4s
How to Unlock iPhone 4s
How to Unlock iPhone 4S
 
iPhone OS in Indonesia
iPhone OS in IndonesiaiPhone OS in Indonesia
iPhone OS in Indonesia
hanusz
 
Software patents
Software patents Software patents
Software patents
Anshika Bhardwaj
 
How To Rid Back Acne ? With These 3 Tricks
How To Rid Back Acne ? With These 3 TricksHow To Rid Back Acne ? With These 3 Tricks
How To Rid Back Acne ? With These 3 Tricks
bobieandroidblog
 
Iphone
IphoneIphone
Thought Based Working - concept
Thought Based Working  - conceptThought Based Working  - concept
Thought Based Working - concept
Tushar Arora
 
Android 4.3 jellybean
Android 4.3 jellybeanAndroid 4.3 jellybean
Android 4.3 jellybean
Prince Kumar
 
Blue eye
Blue eyeBlue eye

What's hot (9)

the impact of iPhone on Korean mobile communication business.
the impact of iPhone on Korean mobile communication business.the impact of iPhone on Korean mobile communication business.
the impact of iPhone on Korean mobile communication business.
 
How to Unlock iPhone 4s
How to Unlock iPhone 4sHow to Unlock iPhone 4s
How to Unlock iPhone 4s
 
iPhone OS in Indonesia
iPhone OS in IndonesiaiPhone OS in Indonesia
iPhone OS in Indonesia
 
Software patents
Software patents Software patents
Software patents
 
How To Rid Back Acne ? With These 3 Tricks
How To Rid Back Acne ? With These 3 TricksHow To Rid Back Acne ? With These 3 Tricks
How To Rid Back Acne ? With These 3 Tricks
 
Iphone
IphoneIphone
Iphone
 
Thought Based Working - concept
Thought Based Working  - conceptThought Based Working  - concept
Thought Based Working - concept
 
Android 4.3 jellybean
Android 4.3 jellybeanAndroid 4.3 jellybean
Android 4.3 jellybean
 
Blue eye
Blue eyeBlue eye
Blue eye
 

Viewers also liked

Google Case Study: Becoming Unphishable
Google Case Study: Becoming UnphishableGoogle Case Study: Becoming Unphishable
Google Case Study: Becoming Unphishable
FIDO Alliance
 
Leveraging Fingerprint Verification on Mobile Devices
Leveraging Fingerprint Verification on Mobile DevicesLeveraging Fingerprint Verification on Mobile Devices
Leveraging Fingerprint Verification on Mobile Devices
Nok Nok Labs, Inc
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial
FIDO Alliance
 
[스페이스클라우드] 간편결제 서비스 도입, 네이버페이로 파티룸 예약해요!
[스페이스클라우드] 간편결제 서비스 도입, 네이버페이로 파티룸 예약해요![스페이스클라우드] 간편결제 서비스 도입, 네이버페이로 파티룸 예약해요!
[스페이스클라우드] 간편결제 서비스 도입, 네이버페이로 파티룸 예약해요!
SPACECLOUD
 
FIDO 생체인증 기술 개발 사례
FIDO 생체인증 기술 개발 사례FIDO 생체인증 기술 개발 사례
FIDO 생체인증 기술 개발 사례
Lee Ji Eun
 
FIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & TutorialFIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & Tutorial
FIDO Alliance
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2F
FIDO Alliance
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellIntroduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
FIDO Alliance
 
FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교
FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교
FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교
Lee Ji Eun
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
FIDO Alliance
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for Authentication
FIDO Alliance
 
Syrup pay 인증 모듈 개발 사례
Syrup pay 인증 모듈 개발 사례Syrup pay 인증 모듈 개발 사례
Syrup pay 인증 모듈 개발 사례
HyungTae Lim
 
Fido and Touch ID
Fido and Touch IDFido and Touch ID
Fido and Touch ID
Steve Sidner
 
NTT Docomo Deployment Case Study: Your Security, More Simple
NTT Docomo Deployment Case Study: Your Security, More SimpleNTT Docomo Deployment Case Study: Your Security, More Simple
NTT Docomo Deployment Case Study: Your Security, More Simple
FIDO Alliance
 

Viewers also liked (14)

Google Case Study: Becoming Unphishable
Google Case Study: Becoming UnphishableGoogle Case Study: Becoming Unphishable
Google Case Study: Becoming Unphishable
 
Leveraging Fingerprint Verification on Mobile Devices
Leveraging Fingerprint Verification on Mobile DevicesLeveraging Fingerprint Verification on Mobile Devices
Leveraging Fingerprint Verification on Mobile Devices
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial
 
[스페이스클라우드] 간편결제 서비스 도입, 네이버페이로 파티룸 예약해요!
[스페이스클라우드] 간편결제 서비스 도입, 네이버페이로 파티룸 예약해요![스페이스클라우드] 간편결제 서비스 도입, 네이버페이로 파티룸 예약해요!
[스페이스클라우드] 간편결제 서비스 도입, 네이버페이로 파티룸 예약해요!
 
FIDO 생체인증 기술 개발 사례
FIDO 생체인증 기술 개발 사례FIDO 생체인증 기술 개발 사례
FIDO 생체인증 기술 개발 사례
 
FIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & TutorialFIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & Tutorial
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2F
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellIntroduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
 
FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교
FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교
FIDO기반 생체인식 인증기술_SK플래닛@tech세미나판교
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
 
Introduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for AuthenticationIntroduction to FIDO: A New Model for Authentication
Introduction to FIDO: A New Model for Authentication
 
Syrup pay 인증 모듈 개발 사례
Syrup pay 인증 모듈 개발 사례Syrup pay 인증 모듈 개발 사례
Syrup pay 인증 모듈 개발 사례
 
Fido and Touch ID
Fido and Touch IDFido and Touch ID
Fido and Touch ID
 
NTT Docomo Deployment Case Study: Your Security, More Simple
NTT Docomo Deployment Case Study: Your Security, More SimpleNTT Docomo Deployment Case Study: Your Security, More Simple
NTT Docomo Deployment Case Study: Your Security, More Simple
 

Similar to Touch id in iphone 5s

Apple watch
Apple watchApple watch
Apple watch
John Kyle Mendoza
 
iPhone
iPhone iPhone
iPhone
Varun Luthra
 
I phone
I phoneI phone
I phone
Sheetal Rane
 
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
Yole Developpement
 
Apple Watch
Apple WatchApple Watch
Apple Watch
John Kyle Mendoza
 
Apple watch slide share
Apple watch slide shareApple watch slide share
Apple watch slide share
John Kyle Mendoza
 
Apple Watch
Apple WatchApple Watch
Apple Watch
John Kyle Mendoza
 
How to reset iphone
How to reset iphoneHow to reset iphone
How to reset iphone
Yusuf Ansyory Siregar
 
Spectacular features of i phone 6 with compatible ios 8
Spectacular features of i phone 6 with compatible ios 8Spectacular features of i phone 6 with compatible ios 8
Spectacular features of i phone 6 with compatible ios 8
Nimap Infotech
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – andRandyBett
 
Iphone 5S review
Iphone 5S reviewIphone 5S review
Iphone 5S review
Reliance Digital
 
Usage Method: iphone 7/ 7 Plus IOS passcode hack Tool
Usage Method: iphone 7/ 7 Plus IOS passcode hack ToolUsage Method: iphone 7/ 7 Plus IOS passcode hack Tool
Usage Method: iphone 7/ 7 Plus IOS passcode hack Tool
diyfix phone
 
Forgot iPhone Passcode without Restore -How to Reset It without Passcode
Forgot iPhone Passcode without Restore -How to Reset It without PasscodeForgot iPhone Passcode without Restore -How to Reset It without Passcode
Forgot iPhone Passcode without Restore -How to Reset It without Passcode
Elinall
 
IOS7
IOS7IOS7
MA GMM Design one second assignment ppt
MA GMM Design one second assignment pptMA GMM Design one second assignment ppt
MA GMM Design one second assignment ppt
JANEY1020
 
Apple iwatches
Apple iwatchesApple iwatches
iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?
Reality Net System Solutions
 
How to Unlock iPhone Passcode
How to Unlock iPhone PasscodeHow to Unlock iPhone Passcode
How to Unlock iPhone Passcode
EmmaSmith1993
 
How to track my i phone if its stolen
How to track my i phone if its stolenHow to track my i phone if its stolen
How to track my i phone if its stolen
tradeintechforcash
 

Similar to Touch id in iphone 5s (20)

Apple watch
Apple watchApple watch
Apple watch
 
iPhone
iPhone iPhone
iPhone
 
I phone
I phoneI phone
I phone
 
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
iPhone 5S Fingerprint Sensor teardown reverse costing report by published Yol...
 
Apple Watch
Apple WatchApple Watch
Apple Watch
 
Apple watch slide share
Apple watch slide shareApple watch slide share
Apple watch slide share
 
Apple Watch
Apple WatchApple Watch
Apple Watch
 
Apple watch slide share
Apple watch slide shareApple watch slide share
Apple watch slide share
 
How to reset iphone
How to reset iphoneHow to reset iphone
How to reset iphone
 
Spectacular features of i phone 6 with compatible ios 8
Spectacular features of i phone 6 with compatible ios 8Spectacular features of i phone 6 with compatible ios 8
Spectacular features of i phone 6 with compatible ios 8
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
Iphone 5S review
Iphone 5S reviewIphone 5S review
Iphone 5S review
 
Usage Method: iphone 7/ 7 Plus IOS passcode hack Tool
Usage Method: iphone 7/ 7 Plus IOS passcode hack ToolUsage Method: iphone 7/ 7 Plus IOS passcode hack Tool
Usage Method: iphone 7/ 7 Plus IOS passcode hack Tool
 
Forgot iPhone Passcode without Restore -How to Reset It without Passcode
Forgot iPhone Passcode without Restore -How to Reset It without PasscodeForgot iPhone Passcode without Restore -How to Reset It without Passcode
Forgot iPhone Passcode without Restore -How to Reset It without Passcode
 
IOS7
IOS7IOS7
IOS7
 
MA GMM Design one second assignment ppt
MA GMM Design one second assignment pptMA GMM Design one second assignment ppt
MA GMM Design one second assignment ppt
 
Apple iwatches
Apple iwatchesApple iwatches
Apple iwatches
 
iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?
 
How to Unlock iPhone Passcode
How to Unlock iPhone PasscodeHow to Unlock iPhone Passcode
How to Unlock iPhone Passcode
 
How to track my i phone if its stolen
How to track my i phone if its stolenHow to track my i phone if its stolen
How to track my i phone if its stolen
 

More from Virendra Thakur

Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
Virendra Thakur
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
Virendra Thakur
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
Virendra Thakur
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
Virendra Thakur
 

More from Virendra Thakur (6)

Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Touch id in iphone 5s

  • 1. Touch ID in iphone 5 Prepared by: Virendra Singh Thakur (131060753022)
  • 2. Outlines • Introduction • History • Hardware • Security and privacy
  • 3. Introduction • Touch ID is a fingerprint recognition feature, designed and released by Apple Inc., and currently only available on the seventh generation of iPhone, the iPhone 5S. • Apple says Touch ID is heavily integrated into iOS 7 on supported devices, allowing users to unlock their phone, as well as make purchases in the various Apple digital media stores (iTunes Store, the App Store, or iBookstore.
  • 4. History • Only a few other smartphone makers have built fingerprint scanning into their phones, as with the Motorola Mobility Atrix 4G in 2011, although none of them were implemented into the operating system like Touch ID. • The iPhone 5S is the first phone on a major US carrier since then to feature the technology.
  • 5. History (Contd..) • In 2012 Apple acquired AuthenTec, a company focused on fingerprint reading and identification management software, for $356 million. Since then, people have expected a fingerprint reading feature.
  • 6. Hardware • Touch ID is built into the home button, which is now built of laser-cut sapphire crystal so as not to scratch (which would prevent Touch ID from working).It features a stainless steel detection ring to detect the user's finger without pressing it.
  • 7. Hardware (Contd..) • The sensor will use capacitive touch to detect the user's fingerprint. The sensor has a thickness of 170 µm, with 500 pixels per inch resolution. The user's finger can be oriented in any direction and it will still be read.
  • 9. Security and privacy • Fingerprint data is stored on the secure enclave of the Apple A7 processor that is inside the device itself, and is not stored on Apple servers, nor on iCloud, and will not be available to third parties. • If the user's phone has been rebooted, or has not been unlocked for 48 hours, only the user's passcode, not a fingerprint, can be used to unlock the phone.
  • 10. Using Touch ID instead of your passcode • You can use Touch ID to unlock your phone without having to enter your passcode every time. There are two ways you can unlock with Touch ID: • Press the Home button once to wake iPhone 5s and keep your finger lightly on the Home button. • Press the Sleep/Wake button once to wake iPhone 5s, and then touch your finger lightly on the Home button.
  • 11. Using Touch ID instead of your passcode • If Touch ID doesn't recognize your finger, you'll be asked to try again. After three attempts, you'll be given the option of entering your passcode. After two more tries, you will need to enter your passcode.
  • 12. References: • Geltz, B.R. ; Berlier, J.A. ; McCollum, J.M. • IEEE SoutheastCon 2010 (SoutheastCon), Proceedings of the • Digital Object Identifier: 10.1109/SECON.2010.5453933 • Publication Year: 2010