How to log in using a fingerprint. Fingerprint access. How it works

💖 Do you like it? Share the link with your friends

Serious financial and credit institutions take a responsible approach to the problem of security of transactions on the Internet. The software of reliable banks must include protection blocks against unauthorized transactions. As one of the measures to help protect the client, specialists of the Security Service of the Russian Federation have developed the ability to log into Sberbank Online using the client’s fingerprint.

Page content

How it works

The client can choose an identification method when logging into the online banking application using a five-digit code or a fingerprint, which is highly unique for each person.

Important! Previously, it was believed that each capillary pattern was strictly unique; according to modern data, prints are repeated in approximately one person out of a hundred thousand.

When selecting fingerprint input, the process becomes simple: just place your finger on the screen.

The function does not work on all gadgets. Certain requirements must be met:

  • Android version no lower than 6.0;
  • Fingerprint function support;
  • for iPhone iOS versions from 9.3;
  • for devices Apple Watch Watch OS 2.0 and higher.

The fingerprint must be added to the phone's OS as a means of unlocking the screen.

How to activate the protective function

The first step to adding your fingerprint to " " is to log into your account using the five-digit security code generated during registration. Next you need to do the following:

  • go to the settings section;
  • activate the menu item “Login using Fingerprint”.

Now the service is turned on, when you try to log in, the PIN code dialing panel opens, in the lower left corner the program will place a fingerprint symbol. Then you can enter the application without using a digital combination.

Poll: are you satisfied with the quality of services provided by Sberbank in general?

YesNo

Possible problems and solutions

Sometimes users have problems logging into the capillary pattern program. In 90% of cases the situation can be corrected on your own.

Important! When logging into the application several times in a row using a security code, the function is deactivated, and the user notices that the fingerprint in Sberbank Online has disappeared. In this case, you should carry out the activation procedure again, as described above.

Other reasons causing capillary print identification to not work may be:

  1. Failure or conflict software. To fix the error, you first need to install everything Latest updates. If this doesn't help, try reinstalling your online banking application. You need to install the latest version.
  2. Dirty sensor. The method of elimination is to clean the sensor from dirt.
  3. Damaged or dirty capillary pattern on the finger. If after cleaning your finger from dirt the problem does not go away, you can try replacing the fingerprint in the phone settings.
  4. Damage to the hardware. In this case, the only solution is to visit a workshop for repairs.

The method of identifying a client by capillary pattern is reliable protection against unauthorized access to financial management. It should be remembered that the use of a fingerprint is possible under certain conditions, failure to comply with which makes it difficult to determine the client’s identity.

Smartphones with fingerprint scanners are still quite rare on the market, however, this method of data protection is available to any device - as long as it has a camera. Finger Print App Unlock can actually do what it did before Android users The developers were just playing - it takes a photo of a fingerprint and installs biometric protection to launch any application.

How to use Finger Print App Unlock:

1. Install the application from Google Play, launch it and allow it access to the system functions of the smartphone.

2. Click on the cell labeled Finger Roll, scroll through the tutorial slides, select the finger to be fingerprinted, and let the app take a few pictures. Keep your finger about 10 centimeters from the camera exactly where indicated on the screen and do not move it



3. Now you can start protecting applications. Click on the Lock Apps cell and select applications that will only be entered after scanning your finger.

4. Try running any of the protected applications. If, before it opens, a camera is launched that requires you to scan your finger, protection has been installed.

Finger Print App Unlock also allows you to protect access to any applications and games in more traditional ways - by entering a PIN code or graphic key. The application settings through which you can reset your fingerprints are also password protected.

Of course, it is unlikely that Finger Print App Unlock can compete in terms of protection with full-fledged fingerprint scanners (which are also). Surely the application can be fooled by simply slipping a photo under the camera desired finger, but the “attacker” has to guess which one it is. It is hardly advisable to use this application for everyday smartphone protection, although in some cases it may still be useful - for example, to block access to some valuable application that you very rarely launch.

FinTech - financial services provided through modern technologies. These include online banking, mobile payments and transfers, electronic wallets, contactless payments, investment management, financial accounting, etc.

What does the coming day have in store for us?

There are many directions in FinTech and there is room to expand. However, most solutions in the field are united by common trends. Such as the transition to performing financial transactions without the client’s personal presence, increasing the share of transactions by mobile devices, contactless payments, automation of financial services, virtual banking, use of “artificial intelligence”.

Trends in FinTech are close to global trends in software development, but adjusted for the conservatism of the financial industry.

Start over

Logging into the application is the user's first impression of the product and service. This module is often underestimated. What can we, as designers, do to make the first experience comfortable and functional?

Speed ​​matters

The frequency of logging into financial applications is high (several times a day). Security reasons require that the user log in again each time. Therefore, the process should be as simple and fast as possible. Fortunately, modern technologies have something to contrast with traditional tedious authorization using a password and login. Here are the main login methods you can use to improve your user experience, in order of increasing speed and convenience:

Standard login using login and password

The most common and slowest method of logging into the application. Each time the user logs in, the user must enter a login and password. In addition to requiring user effort and time, this method also increases the likelihood of input errors. But even in such a situation, you can make life easier for the user. The “cunning need for invention” option is to save the user login. The next time you launch the application, the login will be automatically entered into the required field. Yes, you will have to enter a password, but even this will cut the login time in half.

One-time passwords and SMS parsing

A more humane method of logging into the application. Instead of entering a long and complex password, the user is authorized by entering a short digital password received via SMS. Yes, you will have to enter your login, but four numbers instead of a password are much faster and easier. This method becomes even better if you take (parse) the password from incoming message automatically and insert into the input field.

Fingerprint scanning

The fastest and convenient way login to the application. Thanks to Fingerprint technologies for Android and TouchID for Apple, login time is reduced from one minute to several seconds.

Not all devices are equipped with a fingerprint scanner, but their number on the market is constantly growing. Thus, according to reports from manufacturers of fingerprint sensors, market penetration of devices equipped with this technology was 20% in 2015, 40% in 2016 and is expected to exceed 50% in 2017.

In terms of platforms, the trend looks even more impressive. Share iPhone models with a fingerprint scanner on the market in 2016 - more than 80%. So, you can dare.

Designing a fingerprint login

Let's look at the design and implementation of logging into an application using a fingerprint scanner.

Fingerprints are stored in operating system device (whether iOS or Android), and not in the application itself. The application accesses system functionality to check whether the fingerprint matches what the user has added to the system settings.

It is necessary to think through all the scenarios that may arise when using a fingerprint.

Let's go through them. 0 or 1?

First of all, you need to check whether the user's device is equipped with a fingerprint scanner. If the answer is no, you should hide all buttons, icons and controls that are associated with the mentioned functionality. Essentially, there are two interface options:

As you can see in the picture on the right, if there is a scanner, a button with a “fingerprint” icon appears in the interface. The button is not active yet, because to create a special cryptographic key, the user must enter his username and password when logging in for the first time. However, the button was not hidden, but was used to call up instructions when pressed. And the instructions may be different, depending on whether the user has added fingerprints to the system or not.

Actually, the entrance itself is by fingerprint

So, the user logged into the application for the first time using a login and password. What will happen the next time you log into the application? To minimize the necessary actions, you can activate fingerprint scanning immediately upon opening the application. To log in, the user just needs to click on the application icon and, while it opens, place their finger on the scanner.

We leave the option to refuse quick login and log in the traditional way or with another account. That's all the magic: fast, simple, convenient.

Not by one entrance

We sorted out logging into the application. But how can you make the application login screen useful for the user even before authorization?

Please review the application carefully. Surely it contains regularly used services or information that can be shown to the user on the login screen. The ability to find the nearest ATM on a map, check exchange rates, or read important news without authorization makes the application useful even for an unauthorized user. And activity in the application itself is growing.

Instead of an epilogue

There are many more ways to improve a user's first experience that are not covered in this article. But I hope I have been able to provide food for thought on this topic and provide some direction for research.

For several years now I have not used regular keys for locks in my daily life.
All these key rings are successfully replaced by one RFID card, but technology does not stand still and in my opinion it’s time to abandon the access card.
For testing, I bought several models of access controllers with a fingerprint scanner.
I’ll tell you more about one of them now.

The first step is to scan the users' fingerprints.
The general menu looks like this

Fingerprint scanning menu

You can scan all 10 fingers for each user, and in the same menu you can set a name and access rights.
In addition, the device has a built-in RFID card reader, and the access method can be combined


According to the manufacturer, 800 users are supported.

The scanning process is simple, each finger needs to be applied with slight force 3 times. If all three fingerprints are successfully verified, the finger is recorded in the database, and a confirmation message appears.
The reading process is very fast, less than a second.
What worried me most was the quality of reading; as it turned out, there were no problems with that. The device confidently recognizes fingerprints; it has been experimentally established that for every 50 correct readings there are 1-2 failures.

A typical connection diagram for controlling an electromagnetic lock looks like this

There are two options for connecting or combining devices over a network

The device keeps extensive log files, which can be accessed both over the network and via a USB port.

I used this device for a slightly different purpose; with its help I control the arming/disarming of the house.
Unfortunately, in my version the lion's share of the device's capabilities is not used.
If this review is read by a person for whom the words UDP, PHP and script are not empty words, then please respond. I need advice on writing a small script for the package and recording its contents in the database.

Now is the time to look under the lid.

Everything is assembled well, the soldering is of high quality.
A speaker is visible on the left; the device notifies you with a voice about the scanning result, unfortunately in English.
There is a technological marking on the processor, but according to the manufacturer it is

RFID Reader Frame

IN general device thoughtful and high quality. All declared functions work both offline and online.
The device remains cold during prolonged operation. You can activate the power saving mode, in which after a specified period of time the screen becomes monochrome and the fingerprint scanner goes into standby mode.
They deserve special praise detailed instructions, which in itself is rare for devices from China.

I'm planning to buy +73 Add to favorites I liked the review +51 +122

tell friends