Touch ID

Touch ID is a fingerprint reader on newer iPhone and iPad devices that enables users to quickly sign in to their device as well as authorize transactions without needing to enter a passcode.

Apple’s Touch ID “fingerprint identity sensor,” as the company calls it, uses capacitive touch technology to detect a user’s fingerprint, and then uses the authorization to efficiently unlock the user’s smartphone, tablet or notebook; purchase apps or other digital content within iTunes and other Apple digital media stores; authenticate Apple Pay purchases or in-app purchases and more.

How Touch ID Data Is Stored and Support for Touch ID

The Touch ID fingerprint data is stored within a “secure enclave” on the device’s primary microprocessor chip rather than on a remote server or in Apple’s iCloud, helping to alleviate some security concerns about protecting the fingerprint data from cyber criminals.

Apple Touch ID

Touch ID first debuted in 2013 on the iPhone 5S, and is now supported on iPhone 5S and later smartphones as well as iPad Pro, iPad Air 2 and iPad mini 3 and later tablets and MacBook Pro notebooks. The iPhone 6S introduced a second-generation Touch ID sensor that recognizes fingerprints up to twice as fast as the first-generation Touch ID sensor utilized in earlier iPhones.

For the upcoming iPhone 8, Apple is rumored to be developing a new Touch ID sensor that is built into the device’s OLED screen. The new Touch ID sensor will rely on ultrasound to read a user’s fingerprint rather than the capacitive touch technology utilized in previous TouchID sensors.

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...