Fingerprint recognition and mobile security

Fingerprint recognition technology for mobile devices is posed to become the preferred user authentication solution mobile device security. In this Technical Note from the Farpoint Group, you'll see why Fingerprint recognition is likely to become the methodology of choice for all aspects of mobile security across a broad range of applications and usage scenarios.

Fingerprint recognition technology for mobile devices is posed to become the preferred user authentication solution mobile device security. In this Technical Note from the Farpoint Group, you'll see why Fingerprint recognition is likely to become the methodology of choice for all aspects of mobile security across a broad range of applications and usage scenarios.

Fingerprint recognition can be implemented in essentially all mobile devices and has the right combination of security, cost and convenience for the end-user. It has the potential to be the single personal identifier that can work with every element of your IT security solution, from the mobile device to the PC, the network, servers, applications and whatever else might be required today, or tomorrow.

Read The broad reach of biometrics: Fingerprint recognition and mobile security to learn how fingerprint recognition can be the key to efficient mobile security.

This was last published in November 2008

Dig Deeper on Enterprise mobile security

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

There are a few cases where a fingerprint makes sense.  On a phone, isn't one of them, at least not to me.  It may seem convenient, but its too easy to coerce a finger print from a person, as opposed to a pass code.
Cancel
I remember a story a while back where a young child, around 6 or 7 years old and hacked his dads phone to play games. He racked up a lot of dollars in micro-transactions. How did he hack this fingerprint security ???
He got his dads phone, and when his dad was sleeping, scanned his finger to unlock the phone.

This sounds real secure....
Cancel

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close