PRO+ Premium Content/Modern Mobility

Thank you for joining!
Access your Pro+ Content below.
February 2016 issue, Volume 2, Issue 2

What's next for mobile biometrics

It's either an awe-inspiring technological opportunity, or your worst nightmare: A computer with the ability to read people's thoughts. With growing interest in mobile biometrics -- where a device can use an individual's physical or physiological attributes to authenticate that person's identity -- that's where the market is headed. Biometrics may scan a person's fingerprint, face, retina, ear and even DNA, using a sensor or camera. Either a complete image of the scan or a code-based representation of the image is stored in a database or locally on the device. When a user attempts to gain access to a biometrics-protected device or application, it rescans their physical attribute(s), and underlying software analyzes and compares it to the stored image data. If the software verifies the user's identity, it then grants the appropriate level of access. This technology is becoming a more prevalent way to control access to mobile devices, thanks primarily to the popularity of Apple's Touch ID fingerprint sensor on the iPhone and iPad....

Features in this issue

News in this issue

Columns in this issue

  • IT shouldn't count out mobile Web apps

    by  Steve Damadeo

    Web apps are great for mass amounts of users, or employees that don't have a lot of storage space on their personal devices. But you won't get native application capabilities for the most part.

  • What EMM vendors need to do next

    by  Eric Klein

    Going forward, EMM vendors need to work more closely with partners and manufacturers to improve their offerings. Support for more devices will also be on the docket in the coming years.

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

-ADS BY GOOGLE

Close