Apple's latest product launch could breathe new life into a technology that failed to take hold the first time: fingerprint scanners.

Placing a finger on a computer or smartphone has long been proposed as a way to avoid the need for passwords to authenticate users of computers and other devices. People familiar with the matter said last week that Apple will include a fingerprint scanner on the more expensive of two iPhones it is expected to unveil Tuesday at an event at its Cupertino, Calif., headquarters.

authenticate:鉴定,认证    

Because of Apple's influence, other companies are likely to follow. At least one new smartphone running Google Inc.'s Android operating system to be released this year will include a similar fingerprint sensor, though it is unclear if that phone will be sold in the U.S, a person familiar with the matter said. A Google spokesman declined to comment.

Behind the activity is a growing recognition that passwords are a porous defense for consumers' information-- particularly on mobile devices likely to be lost or stolen. At the same time, recent technology advances have made fingerprint scanners more accurate and reliable, addressing issues that previously impeded their adoption.

Some laptop computer manufacturers began building such scanners into their machines more than a decade ago. But despite the 007-like cool factor, the technology proved too temperamental for most consumers.

temperamental:喜怒无常的,性情的

'It was not reliable to use on a daily basis,' said Kevin Mahaffey, chief technology officer of Lookout Inc., a mobile cybersecurity company, who tried to be an early adopter of the technology a decade ago when he bought a fingerprint scanner for his desktop computer.

cybersecurity:网络安全    

Motorola Mobility LLC, a unit of Google, included a fingerprint sensor in its Atrix 4G phone in 2011. The company stopped using the sensors because, among other reasons, costumers complained about scanner errors and many didn't use the feature, a person familiar with the matter said.

But concerns about consumers' reliance on passwords--often composed of just six to 10 letters or numbers--continue to grow. Fraudsters and hackers have found a variety of ways to steal or crack codes that may be shared among multiple Web accounts.

fraudster:行骗者,诈骗者    

Meanwhile, some major companies have signaled that fingerprint-based safeguards may finally be ready. In one sign, big players that include Google, LG Electronics Inc., eBay Inc.'s PayPal unit and Lenovo Group Ltd. have joined a nonprofit called the Fast IDentity Online Alliance, which pushes for broader use of biometrics, among other alternatives to passwords.

biometric:生物统计学    

'It seems a natural fit,' said Kevin Kempskie, a spokesman for RSA, the security unit of EMC Corp. Once smartphones are protected with fingerprints, 'you could do all kinds of things,' he said.

In theory, scanning a user's finger could be a very fast way to unlock a phone or authorize a payment--and unlike a password, impossible for an unauthorized person to crack by guessing or trying different combinations.

authorize:批准,认可    

A scanner on a smartphone could also be used to safeguard corporate networks, acting much like security tokens made by RSA and others that generate sequences of numbers to be used with passwords, Mr. Kempskie said. A corporate customer could enter his password and then be required to scan his thumb on his iPhone, using an RSA app, for example, to verify his identity, he said.

They could also be used for physical security. August, a San Francisco startup, plans to ship a deadbolt lock add-on--the device fits on an existing lock--later this year that allows users to unlock their front doors with their smartphones. The company will likely allow customers to use their fingerprint as an additional form of verification, said Jason Johnson, its chief executive.

deadbolt:门栓,固定栓    

It remains unclear whether Apple will let outside developers employ the fingerprint scanner in apps, if at all. An Apple spokeswoman didn't return a request for comment.

Apple purchased fingerprint-reader specialist AuthenTec in 2012, and the U.S. government recently approved Apple's patent for its own fingerprint reader technology. The company, like other makers of fingerprint scanners, uses radio frequencies to map a finger's surface.

Older scanners required users to swipe their finger across a device and employed software to create a composite image of the fingerprint. Greasy or incorrectly placed fingers would lead to false negatives, as the scanners could only capture one image at a time.

swipe:猛击,偷窃,刷卡    composite:合成的,复合的    greasy:油腻的,谄媚的        

Newer models scan the surface of a finger or thumb while it is at rest, allowing it to capture one to five images after one touch. This gives backup images in case the first is poor quality, said Sebastien Taveau, CTO at Validity Sensors Inc., another fingerprint-sensor company that doesn't work with Apple.

Fingerprints aren't foolproof. They can sometimes be tricked if an attacker uses scans or molds of a user's fingerprints, as the TV show 'MythBusters' recently demonstrated to unlock a laptop. (Mr. Taveau said the finger must be attached to a living hand on most modern systems.)

foolproof:十分简单,十分安全    

Smartphones can also be hacked in ways that could bypass a fingerprint scanner.

'There's potential danger of a false sense of security,' said Bret Hartman, CTO of Cisco Systems Inc.'s computer-security business. Still, the longtime security guru and a former executive at RSA said 'it's definitely an important step in the right direction.'

But fingerprints have the advantage of requiring few steps, and nothing to memorize, compared with other alternatives.

'The industry has always struggled with balancing online security with ease of use--and one has always come at the expense of the other,' said Raj Mata, senior director of platform services at PayPal.

August's Mr. Johnson remains a bit skeptical.

skeptical:多疑的,怀疑的    sweaty:出汗的,吃力的    

'If I go jogging with my iPhone and I come back to my house and my thumb is all sweaty and I can't get in my apartment door, that would kind of suck,' he said.

每日英语:Apple's Latest iPhone Puts Focus Back on Fingerprint Security的更多相关文章

  1. 每日英语:China Underwhelmed After First Apple Event

    Apple's roll-out of its latest iPhones landed with a thud in China, the company's biggest foreign ma ...

  2. apple watch 与 iphone 之间的通信方式

    apple watch 与 iphone 之间的通信方式:通过watchkit WatchKit应用扩展都提供一个名为WKInterfaceController的子类来管理相应的界面. 启动watch ...

  3. 每日英语:4G in China: A bigger deal than the iPhone

    Forget the breathless coverage of China Mobile offering the iPhone for a moment. Yes, it's huge news ...

  4. 每日英语:Apple Unveils New iPads

    Apple Inc. 's answer to the increasingly cutthroat tablet-computer market: more product choices and ...

  5. 每日英语:Upgrade Your Life: How to speed up your PC (or Mac)

    Is your desktop or laptop computer starting to feel a little poky? Even after just a few months of u ...

  6. 每日英语:The Most Destructive, Unpredictable Force in Tech

    What's the most destructive force in the tech world, the thing that has nearly killed BlackBerry, pu ...

  7. 每日英语:How To Survive The Windows XPiration Date

    The default background for Microsoft's Windows XP operating system -- a perfect blue sky full of cot ...

  8. 每日英语:The Power of Parents Who Say 'No'

    I grew up in an affluent area. Most kids owned multiple Cabbage Patch dolls and Gear bags and pairs ...

  9. 每日英语:The Risks of Big Data for Companies

    Big data. It's the latest IT buzzword, and it isn't hard to see why. The ability to parse more infor ...

随机推荐

  1. Windows下安装配置SBT

    1:安装包下载界面 http://www.scala-sbt.org/download.html 下载后进行安装. 安装路径:D:\Java\sbt\conf 2:进行配置 (1)sbtconfig. ...

  2. 获取TrustedInstaller

    Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\*\shell\runas] @="获取TrustedInstaller权限& ...

  3. 13、java中8中基本类型

    一.基本类型介绍 关键字 数据类型 占用字节数 取值范围 默认值 byte 字节型 1个字节 -128~127 0 char 字符型 2个字节 Unicode0~Unicode215-1 \u0000 ...

  4. HTTP协议是如何通信的

    一.什么是HTTP协议 HTTP协议是HyperText Transfer Protocol的缩写,即超文本传输协议.是由w3c(万维网联盟)制定的一种应用层协议,用来定义浏览器与web服务器之间如何 ...

  5. C++开发WPF,Step by Step

    示例代码 使用C++来开发WPF,主要是如何在MFC(Win32)的窗口中Host WPF的Page.下面我就做个详细的介绍. 一.创建工程, 由于MFC的Wizard会生成很多用不到的代码,所以我准 ...

  6. Laravel中的信息验证 和 语言包

    首先,谈下语言包的问题 1.安装语言包,通过composer进行安装 composer require "overtrue/laravel-lang:dev-master" 2.成 ...

  7. Android网络开发之Socket通信

    HTTP通信中Client发送的每次请求都需要Server回送响应,在请求结束后,Client会主动释放连接.从建立连接到隔壁连接的过程成为一次连接.要保持Client程序的在线状态,需要不断地向Se ...

  8. [转]linux内核网络分层结构

    Preface   Linux内核对网络驱动程序使用统一的接口,并且对于网络设备采用面向对象的思想设计. Linux内核采用分层结构处理网络数据包.分层结构与网络协议的结构匹配,既能简化数据包处理流程 ...

  9. JavaScript 设计模式之单例模式

    一.单例模式概念解读 1.单例模式概念文字解读 单例就是保证一个类只有一个实例,实现的方法一般是先判断实例存在与否,如果存在直接返回,如果不存在就创建了再返回,这就确保了一个类只有一个实例对象.在Ja ...

  10. python学习笔记——multiprocessing 多进程组件 进程池Pool

    1 进程池Pool基本概述 在使用Python进行系统管理时,特别是同时操作多个文件目录或者远程控制多台主机,并行操作可以节约大量时间,如果操作的对象数目不大时,还可以直接适用Process类动态生成 ...