OMVAPT

The Future of Authentication in iPhones & Macs

Let’s look at the future of authentication in phones and systems. Of course, the technology itself inspires one another for innovation to be implemented in the vast array of emerging Internet of Things (IoT) sooner or later.

Access controls are security features that control how users and systems communicate and interact with other systems and resources.

Three general factors can be used for authentication

  1. something a person knows
  2. something a person has
  3. something a person is

A. Authentication by knowledgeB. Authentication by ownershipC. Authentication by characteristic
Authenticating a person’s identity based on his knowledge is referred as ‘Password’ or ‘Passphrase’ or ‘PIN’ (Personal Identification Number).
Authenticating a person’s identity based on something he owns like RSA Secur-ID, token

Authenticating a person’s identity based on a unique physical attribute is referred to as biometrics.

Ex: Apple’s Touch ID (fingerprint) for iPhones, Facial Recognition in Lenovo laptops/systems
These are the excerpts from Wikipedia.

VeriFace is a face-recognition software package that is a registered trademark of Lenovo and was the first Face Verification Technology on public computer.
Apple’s Touch ID is a fingerprint recognition feature, designed and released by Apple Inc., and currently available on the iPhone 5S, the iPhone 6 and iPhone 6 Plus, the iPad Air 2, and the iPad Mini 3. Apple says Touch ID is heavily integrated into iOS devices, allowing users to unlock their device, as well as make purchases in the various Apple digital media stores (iTunes Store, the App Store, iBookstore), and to authenticate Apple Pay online or in apps.
Apple’s Touch ID is nothing but ‘Authentication by Characteristic’.
Authenticating systems in the enterprise only using Passwords is a single factor authentication and if we use two characteristics of authentication then it becomes 2FA or Two-Factor Authentication. RSA Secur-ID or tokens.
However, 3FA or Three Factor Authentication is also feasible but is rarely used. In the future multi-factor authentication is being enforced where security is of utmost importance such as banks, financial institutions or intellectual property so on & so forth.
Once the 3FA is being enforced then first users have to type the password then it recognises our face using its own facial recognition algorithm and if it matches then we can use the Apple’s iPhone – Touch ID for finger print authentication. The same technology could be seen in the systems and the wide array of Internet of Things (IoT).

Krishna Gupta

Share
Published by
Krishna Gupta

Recent Posts

We are featured on the European Site

We are featured on the Website Plante. Click Here to read   Thank you.

4 months ago

Featured on the Italian press release

Featured on the Italian press release Thank you for featuring us.  

4 months ago

The CEO in the Firing Line: Why Cybersecurity Needs Boardroom Leadership

The CEO in the Firing Line: Why Cybersecurity Needs Boardroom Leadership The landscape of corporate…

6 months ago

OMVAPT Private Limited – is recognised by Startup Karnataka

Startup Karnataka - The Government of Karnataka recognises OMVAPT Private Limited as a Cyber Security…

1 year ago