APPLE’S NEW DEVICE (IPHONE) WILL HAVE FINGERPRINTS AND IMAGES OF THIEVES

Apple, apple biometrics, iphone to store thief fingerprints, apple patent, iPhone biometrics, iPhone fingerprint scanner, iPhone security, iPhone unauthorised use, stolen iPhone, technology, technology newsApple’s new patent is called “Biometric capture for unauthorised user identification” and was filed on August 25 by Apple
Apple has recently applied for a US patent to that will allow it to collect biometric information in case of unauthorised use. The patent is called “Biometric capture for unauthorised user identification” and was filed on August 25 by Apple. This patent will allow iPhones to document the fingerprints of a thief/unauthorised user, and take pictures/videos using the cameras as evidence.
The patent was first spotted by Apple Insider, and it says that if the feature is triggered through unauthorised use, the iPhone will obtain and store biometric information of the user. The information can be one or more fingerprints, images, audio, or even a video of the current user. The phone can then send the information to help capture the unauthorised user.
Currently, a user’s iPhone is protected against unauthorised use by going into a cool down period if the phone has had five failed attempts to unlock. A user can also set the phone to completely wipe the data in case of 10 failed unlock attempts. In case a phone is lost, it can be tracked using the ‘Find iPhone’ app and can also be remotely wiped clean.
Here is the abstract of Apple’s patent:
“A computing device may determine to capture biometric information in response to the occurrence of one or more trigger conditions. The trigger condition may be receipt of one or more instructions from one or more other computing devices, detection of potential unauthorized use by the computing device, normal operation of the computing device, and so on. The computing device may obtain biometric information and may store such biometric information. Such biometric information may be one or more fingerprints, one or more images of a current user of the computing device, video of the current user, audio of the environment of the computing device, forensic interface use information, and so on. The computing device may then provide the stored biometric information for identification of one or more unauthorized users.”

Comments