Apple Documentation: Touch ID And Security Area Details
< p > Apple Corp released the updated < a href= "//www.sjfzxm.com/news/index_c.asp > security document < /a > on the" iPhone in Business "website today, introducing the details of the" safe area (Touch) "in Touch ID and A7 processor.
< /p >
Since P was released in 2013, Touch ID has been challenged by privacy protection from users and government officials.
Apple Corp has announced some details of the design of the "safe area", and said that this module only stores fingerprint data instead of fingerprint images.
< /p >
< p > according to the new security document, the "security area" is a coprocessor in the A7 processor, which ensures the authentication and signature of the Apple Corp through the security startup process.
Even if a processor core is attacked, all the "safe areas" can function independently.
< /p >
< p > and each < < a href= > //www.sjfzxm.com/news/index_c.asp > > security zone > /a > contains unique identifiers which can not be accessed from other parts of the system, and Apple Corp also has no such information.
This will prevent the Apple Corp or other third parties from acquiring the data stored therein.
< /p >
< p > document shows: "each" safe area "is allocated UID (independent identifier) in manufacturing process, and can not be accessed from other parts of < a href=" //www.sjfzxm.com/news/index_c.asp "> system < /a >, and Apple Corp does not know this information.
When the device starts, according to UID, a temporary key will be created and used to encrypt the part of the "safe area" in the device storage space.
In addition, data stored in the system from the "security zone" is encrypted using this key.
< /p >
< p > fingerprint data collected by Touch ID will be stored in the "safe area".
This data will be used for information matching to support shopping and other activities.
Although the A7 processor obtains data from the Touch ID sensor, it is not possible to read these data, because these data are encrypted and authenticated using Touch ID and built in session keys in the "security zone".
< /p >
< p > in addition to the function and security of the "security area", this document also introduces the details of Touch ID.
Most of the details have been announced before, but the new document highlights the security of fingerprint acquisition, and points out that only the "safe area" can get fingerprint data, and these data will not be sent to Apple Corp or stored in iCloud cloud storage service.
< /p >
< p > the final document introduces how Touch ID and security zone cooperate to realize iPhone 5S's cell phone unlocking.
If the user is interested in it, it is a good reading material.
The release of Apple Corp's document is part of the redesign of iPhone in Business's IT channel, which now has a more refreshing design.
< /p >
- Related reading
Acronis Access Helps Enterprises To Share Document Contents Easily And Efficiently.
|- Finance and economics topics | ICE: Investors Lost Their Bags For Ann &Nbsp; US Cotton Futures Fell Sharply.
- business etiquette | What Is Business Etiquette In Thailand?
- Learning Area | 2011家居流行趋势解码
- Finance and economics topics | Reinhard: The Key Supporting Positions Are &Nbsp; 141.50&Nbsp; -&Nbsp; 139.50&Nbsp; Cents.
- Finance and economics topics | USDA US Exports And Exports Of Upland Cotton As At January 20Th
- Learning Area | Cowboy: True Performance
- Finance and economics topics | USDA Cotton Mills In The United States Are On Sale From Spot To Price.
- international master | Famous Designers Like To Teach By Means Of Materials.
- Finance and economics topics | Commodity Futures Trading Commission Report: ICE&Nbsp; Cotton Futures
- Learning Area | Fashion Dialogue: Let Creative Design Fly With Wings
- Expanding The Floating Range Of RMB And Winning The Initiative Of Monetary Policy
- Kodak Enhanced Scanner Helps Users Manage "Document Storm"
- Acronis Access Helps Enterprises To Share Document Contents Easily And Efficiently.
- Apple Technology Support Document Ios Security Is Very Important.
- OA Joint Document Management System Helps Enterprises
- Foreign Exchange Trading Varieties Are Expected To Expand Or More Foreign Trade Enterprises Hedging "Hedge"
- Edoc2 Helps Document Management In Real Estate Projects
- The Popularity Of Computer Processing Documents Makes Document Conversion Simple.
- RMB Two-Way Volatility Approaching Compression Hot Money Arbitrage Space
- Central Bank Basically Quit Normal Foreign Exchange Intervention