Home Your Tech Mobility Controlling an iPhone by fingerprint recognition?
×

Warning

JUser: :_load: Unable to load user with ID: 3286
As if getting cut and paste, video recording and voice control wasn't enough to get iPhone fanboy hearts racing, now Apple hints at fingerprint scanning as an input methodology for controlling future versions of the Jesus Phone.

You might be forgiven for thinking that there are few surprises left when it comes to the iPhone, after all Apple has done enough with the 3GS and iPhone 3.0 OS for it to sell out in a matter of days over in the UK.

Apple is not quite in the same league as IBM when it comes to the patent business. It certainly isn't likely to file 4186 patent applications in a single year for example.

So what has Apple been doing at the US Patent Office that has got iPhone fanboys all in a tizzy then?

Well, Apple already has the patent for swipe gestures on touch screen keyboards so that's not it, and I doubt it will be something as stupid as trying to reinvent the wheel or, as in the case of Microsoft, patenting Page Up Page Down.

How about using the iPhone touch screen as a RFID reader? Well, yes, Apple has filed for just such a thing by looking at using a RFID antenna within the touch screen itself to function as a rudimentary reader.

But that's not got iPhone users in a flap, perhaps because most of us are not yet sold on the whole RFID invasion thing. So maybe it is haptics instead.

Apple has also filed an application for a method of haptic tactile feedback using the touch screen. Now that's quite neat, if you could 'feel' the click wheel vibrating as it turns on screen for example.

But, no, even that is not the great reveal: that's the patent application for 'Control of electronic device by using a person's fingerprints."

Yes, Apple is looking at methods of not only introducing fingerprint scanning via the touch screen but also controlling "an electronic device" by detecting and using a person's fingerprints for good measure.

The abstract for the July 2nd filing states that a device, such as an iPhone perhaps, could "store user input signatures, including fingerprint signatures. The user input signatures can, in turn, be associated with user-selectable commands. When a user provides user input (including fingerprints) to the electronic device that matches one of the stored user input signatures, the device can initiate the associated user-selectable command."

The application describes how you could use your index finger to control the play button of such a device, while your middle finger could be used to fast forward. And there I was thinking that iPhone and iPod controls were pretty simplistic as is, but soon they could get even easier with totally non-visual, fingerprint controlled commands.

CDAO SYDNEY TURNS 5 IN 2019

With 50+ Speakers, 300+ senior data and analytics executives, over 3 exciting days you will indulge in all things data and analytics before leaving with strategic takeaways that will catapult you ahead on your journey

· CDAO Sydney is designed to bring together senior executives in data and analytics from progressive organisations
· Improve operations and services
· Future proof your organisation in this rapidly changing technological landscape
· CDAO Sydney 2-4 April 2019
· Don’t miss out! Register Today!
· Want to find out more? Download the Agenda

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect