A fingerprint
scanner is a type of electronic security system that uses fingerprints for
biometric authentication to grant user access to information or to approve
transactions.
It used to be
that fingerprint scanners were mostly seen in movies and TV shows, or read
about in science fiction novels. But such times of imagination surpassing human
engineering ability has been long gone – fingerprint scanners have been in use
for decades!
Not only are
fingerprint scanners becoming more commonplace in the latest mobile devices,
but they’re gradually making headway into everyday life. Here’s what you should
know about fingerprint scanners and how they work.
What Are Fingerprint Scanners (a.k.a. Finger
Scanners)?
Human
fingerprints are practically unique, which is why they’re successful at
identifying individuals. It’s not just law enforcement agencies that collect
and maintain databases of fingerprints. Many types of occupations that require
professional licensing or certification (e.g. financial advisors, stock
brokers, real estate agents, teachers, doctors/nurses, security, contractors,
etc.) mandate fingerprinting as a condition of employment. It's also typical to
provide fingerprints when having documents notarized.
Advancements in
technology have been able to incorporate fingerprint scanners (can also be
referred to as ‘readers’ or ‘sensors’) as another (optional) security feature
for mobile devices.
Fingerprint
scanners are one of the latest in an ever-growing list – pin codes, pattern
codes, passwords, face recognition, location detection, iris scanning, voice
recognition, trusted Bluetooth/NFC connection – of ways to lock and unlock smartphones.
Why use a fingerprint scanner? Many enjoy it for the security, convenience, and
futuristic feel.
Fingerprint
scanners work by capturing the pattern of ridges and valleys on a finger. The
information is then processed by the device’s pattern analysis/matching
software, which compares it to the list of registered fingerprints on file. A
successful match means that an identity has been verified, thereby granting
access. The method of capturing fingerprint data depends on the type of scanner
being used:
Optical Sensor: These types of scanners basically make a photocopy of the finger.
Many illuminate the finger in order to deliver crisp contrast of lines as the
light-sensitive scanner (usually an image sensor or light-sensitive microchip)
records the information to produce a digital image. Many PC-connected
fingerprint scanners use optical sensors.
Capacitive Sensor: Instead of light, capacitive scanners use electricity (think of the
way touchscreens work) to determine fingerprint patterns. As a finger rests on
the touch-capacitive surface, the device measures the charge; ridges exhibit a
change in capacitance, while valleys produce practically no change at all. The
sensor uses all this data to accurately map out prints. Most all smartphones
with fingerprint scanners use capacitive sensors.
Ultrasonic Sensor: Similar to how bats and dolphins use echolocation to find and
identify objects, ultrasonic scanners work via sound waves. The hardware is
designed to send out ultrasonic pulses and measure how much bounces back.
Ridges and valleys reflect sound differently, which is how ultrasonic scanners
are able to create a detailed 3D map of fingerprint patterns. Ultrasonic
sensors are currently being prototyped (e.g. by Qualcomm Technologies, Inc.)
and tested for use in mobile devices
Fingerprint Analysis
You might be
staring at your fingertips right now, wondering just how scanners can so
quickly determine a match or not.
Decades of work
have led to the classification of fingerprint minutiae – the elements that make
our fingerprints unique. Although there are over a hundred different
characteristics that come into play, fingerprint analysis basically boils down
to plotting the points of where ridges end abruptly and fork into two branches
(and the direction).
Combine that
information with the orientation of general fingerprint patterns – arches,
loops, and whorls – and you have a pretty reliable way of identifying
individuals. Fingerprint scanners incorporate all of these data points into
templates, which are used whenever biometric authentication is required. More
data collected helps to ensure greater accuracy (and speed) when comparing
different sets of prints.
Fingerprint Scanners in Everyday Life
The Motorola
Atrix was the first smartphone to incorporate a fingerprint scanner, way back
in 2011. Since then, many more smartphones have incorporated this technological
feature. Examples include (but are not limited to) the: Apple iPhone 5S, Apple
iPad models, Apple iPhone 7, Samsung Galaxy S5, Huawei Honor 6X, Huawei Honor 8
PRO, OnePlus 3T, OnePlus 5, and Google Pixel. It’s likely that more mobile
devices will support fingerprint scanners as time goes on, especially since you
can already find fingerprint scanners in many everyday objects.
When it comes to
PC security, there are plenty of fingerprint-scanning options, some of which
can be found already integrated into certain laptop models. Most of the readers
you can purchase separately connect with a USB cable and are compatible with
both desktop and laptop system (typically Windows OS, but also macOS).
Some readers are
closer in shape and size to that of USB flash drives – in fact, some USB flash
drives have a built-in fingerprint scanner to grant access to the data stored
inside!
You can find
biometric door locks that use fingerprint scanners in addition to
touchscreen/keypads for manual entry. Biometric car starter kits, installed in
vehicles as an aftermarket accessory, use fingerprint scanners to add another
layer of security. There’s fingerprint-scanning padlocks and safes, too. And if
you ever plan a trip to Universal Studios, you can rent a free storage locker
that uses fingerprints instead of physical keys or cards. Other theme parks,
such as Walt Disney World, scan fingerprints upon entry in order to combat
ticket fraud.
More Popular Than Ever (Despite Concerns)
The application
of biometrics in everyday life is expected to grow as manufacturers devise new
(and more affordable) ways to incorporate the technology. If you own an iPhone
or iPad, you may have already been having helpful conversations with Siri. The
Amazon Echo speaker also employs voice recognition software, offering a host of
useful skills through Alexa. Other speakers, such as the Ultimate Ears Boom 2
and Megaboom, have integrated Alexa voice recognition through firmware updates.
All of these examples use biometrics in the form of voice recognition.
It should come
as little surprise to find more products designed to interact with our prints,
voices, eyes, faces, and body with each passing year. Modern fitness trackers
can already monitor heartbeat, blood pressure, sleep patterns, and movement in
general.
It will only be
a matter of time until fitness tracker hardware is precise enough to identify
individuals through biometrics.
The subject of
using fingerprints for biometric authentication is hotly debated, with people
arguing the dire risks and significant benefits in equal measure. So before you
start using the latest smartphone with a fingerprint scanner, you might want to
weigh some options.
Pros of Using Fingerprint Scanners:
Allows fast and easy one-finger access to unlock devices
Excellent way to identify unique individuals
Extremely difficult to fake/duplicate (versus identification/access
cards, etc.)
Practically impossible to guess/hack (versus pin codes, passwords,
etc.)
You can’t forget your fingerprint (as you might with passwords,
codes, patterns, access cards, etc.)
Cons of Using Fingerprint Scanners:
Not completely foolproof (individuals with the right resources,
time, and dedication can trick scanners with forgeries and/or master prints)
Can’t get new prints (you can change/replace cards, codes, and
passwords, but there’s not much you can do if someone steals your fingerprint
data)
Encryption is still questionable (the safety of your fingerprint
data hinges on the software/hardware manufacturer)
Finger injuries can impede successful scanning and deny access to
authorized users (even slight imperfections can create difficulties)
Germs (know how many people touched that public scanner before you
did? Better sanitize it first)
The utilization
of fingerprint scanners in consumer-level electronics is still quite new, so we
can expect standards and protocols to be established over time. As the
technology matures, manufacturers will be able to fine-tune and improve the
quality of encryption and data security in order to prevent possible identity
theft or misuse with stolen fingerprints.
Despite the
concerns associated with fingerprints scanners, many find it preferable to
entering in codes or patterns. The ease of use actually results in making more
mobile devices secure overall, since people would rather swipe a finger to
unlock a smartphone than remember and tap out a code. As for the fear of
criminals cutting off fingers of everyday individuals in order to gain access,
it’s more Hollywood and (irrational) media hype than reality. Greater worries
tend to revolve around being accidentally locked out of your own device.
Locked Out Using a Fingerprint Scanner
Even though
fingerprint scanners tend to be quite accurate, there can be a number of
reasons why one won’t authorize your print. You've likely tried to get back
into your phone while doing dishes and found that wet fingers typically can't
be read by the sensors. Sometimes it's a weird glitch. Most manufacturers have
anticipated this happening from time to time, which is why devices can still be
unlocked by passwords, pin codes, or pattern codes. These are typically
established when a device is first being set up. So if a finger won’t scan,
simply use one of the other unlocking methods.
If you happen to
forget a device code in a fit of anxiety, you can remotely reset (Android) lock
screen passwords and pins. As long as you have access to your main account
(e.g. Google for Android devices, Microsoft for desktop/PC systems, Apple ID
for iOS devices), there is a way to log in and reset the password and/or
fingerprint scanner. Having multiple means of access as well as two-factor
authentication can improve your personal security as well as save you in such
forgetful situations.