Apple Adds Biometrics, Snubs NFC Again

By: Brian Rhodes, Published on Sep 11, 2013

iPhones will soon have fingerprint readers. Few brands have Apple's immense market impact, and physical security increasingly takes its cues from smartphone design. Will the millions of Apple fanbois singlehandedly make fingerprints the hottest fashionable credential? Does this development spell doom for NFC's access control adoption? We take a look in this note.

[NOTE: For background, see our Fingerprint for Access Control tutorial.]

Fingerprint Scanner

Long speculated as a 'future feature', Apple has announced a fingerprint reader will be included in its iPhone 5S release. The reader will be included in the footprint occupied by the 'home button', and while retaining the same tactile features, adds a capacitive detection ring and fingerprint scanner. The conceptual design is shown below:

While final details are pending, Apple has released preliminary specs on the sensor:

Capactive Sensor: In contrast with an Optical Sensor, the semiconductor contact 'capacitive' type reader measures electrical resistance of fingerprints, and translates individual characteristics of the print into a user-unique range of measurements. While capacitive sensors are thin, low power, and inexpensive, they generally are not as reliable or accurate as the optical type.

Subdermal Scanning: Rather than reading the outermost layer of skin, Apple will tune the sensor to read prints in tissue beneath the surface. This not only avoids problems of small cuts or surface contamination, but it provides a measure of 'anti-spoofing' protection against lifted prints.

In the video below, Apple describes this feature they deem 'Touch ID' technology:

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

Implementation Details

Notable aspects pertaining to Apple's use of the sensor, aside from simple locking/unlocking of the device include:

  • Not Kept in Cloud: The fingerprint authentication template is stored on the device only. That information is not stored anywhere else (ie: iCloud), potentially risking theft and misuse.
  • Multiple Factors: Touch ID can be used in conjunction with passcodes, to add another layer of authentication to device/app security.

Apple describes that 'Touch ID' will be a user option to lock down app/iTunes purchases, or even access to specific apps on the device.

Cupertino Snubs NFC, Again

With the iPhone 5S, Apple once again sidesteps including NFC on the device, and instead opts to feature its own security interface method first. While Apple publically cites 'security concerns' as justification in omitting the technology, several sources and past patent filings suggest 'an alternative proximity technology' that is yet to be designed, but absolutely not NFC, may someday be implemented in iPhones.

The inclusion of NFC is especially relevant to the Access Control market, where many claim the technology to be 'the next big thing'. However, with upward of 40% of the US smartphone market (~15% globally [link no longer available]) choosing the iPhone, the credential tech appears no closer to the primetime than before.

Biometric Boom

Few companies wield as much design influence as Apple. Many industries and individual products take cues from the company, and if Apple declares 'fingerprint technology' a standard security element, which industries will follow? Will the iPhone 5S become the catalyst for the long-latent biometrics boom in electronic access control? We will keep sharp eyes open in the days ahead.

Comments (4) : Members only. Login. or Join.

Related Reports

2020 Access Control Book Released on Dec 19, 2019
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Designing Access Control Guide on Jan 30, 2019
Designing an access control solution requires decisions on 8 fundamental questions. This in-depth guide helps you understand the options and...
Startup GateKeeper Aims For Unified Physical / Logical Access Token on Apr 04, 2019
This startup's product claims to 'Kill the Password' you use to keep your computers safe. They have already released their Gatekeeper Halberd...
Proxy Access Control Tested on May 09, 2019
Silicon Valley Access Startup Proxy raised $13.6 Million in May 2019, focusing on mobile physical access control. Beyond the fund raising, Proxy...
HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Mobile Access Control Guide on Aug 28, 2019
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this...
Fingerprints for Access Control Guide on Sep 09, 2019
Users can lose badges, but they never misplace a finger, right? The most common biometric used in access are fingerprints, and it has become one...
Access Control Time & Attendance Guide on Sep 24, 2019
Access control systems can do more than lock doors. With little or no extra equipment, they can be used to track labor hours for employees...
Directory of Access Reader Manufacturers on Nov 27, 2019
Credential Readers are one of the most visible and noticeable parts of access systems, but installers often stick with only the brand they always...

Most Recent Industry Reports

Latest London Police Facial Recognition Suffers Serious Issues on Feb 24, 2020
On February 20, IPVM visited another live face rec deployment by London police, but this time the system was thwarted by technical problems and...
Masks Cause Major Facial Recognition Problems on Feb 24, 2020
Coronavirus is spurring an increase in the use of medical masks, which new IPVM test results show cause major problems for facial recognition...
Every VMS Will Become a VSaaS on Feb 21, 2020
VMS is ending. Soon every VMS will be a VSaaS. Competitive dynamics will be redrawn. What does this mean? VMS Historically...
Video Surveillance 101 Course - Last Chance on Feb 20, 2020
This is the last chance to join IPVM's first Video Surveillance 101 course, designed to help those new to the industry to quickly understand the...
Vulnerability Directory For Access Credentials on Feb 20, 2020
Knowing which access credentials are insecure can be difficult to see, especially because most look and feel the same. Even insecure 125 kHz...
AI/Smart Camera Tutorial on Feb 20, 2020
Cameras with video analytics, sometimes called 'Smart' camera or 'AI' cameras, etc. are one of the most promising growth areas of video...
China Manufacturer Suffers Coronavirus Scare on Feb 20, 2020
Uniview suffered a significant health scare last week after one of its employees reported a fever and initially tested positive for coronavirus....
Cheap Camera Problems at Night on Feb 19, 2020
Cheap cameras generally have problems at night, despite the common perception that integrated IR makes cameras mostly the same, according to new...
Milestone Launches Multiple Cloud Solutions on Feb 18, 2020
Milestone is going to the cloud, becoming one of the last prominent VMSes to do so. Milestone is clearly late but how competitive do these new...
Video Surveillance Architecture 101 on Feb 18, 2020
Video surveillance can be designed and deployed in a number of ways. This 101 examines the most common options and architectures used in...