Asking out of mere curiosity. Apple's new iMacs give you the ability to switch user by scanning your fingerprint.<p>I assume that there's some code that converts your fingerprint into some sort of unique identifier but I'm wondering how it does this? How is the fingerprint scan data stored?<p>All answers/suggestions welcome.
I don't think the new TouchID works any different than the versions before. According to Apple, the fingerprints are exclusively stored on the device, so, using a locally stored fingerprint for log in a local user should be fairly straight forward.<p>When I got my S10 and everyone talked about the new fingerprint sensor technology I got curious and researched myself, I found a Computerphile [1] video that does a great job at explaining how fingerprint recognition works.<p>[1] <a href="https://www.youtube.com/watch?v=xD88Qs_DZp4" rel="nofollow">https://www.youtube.com/watch?v=xD88Qs_DZp4</a>
In case you're more curious about fingerprint recognition itself the basic classical approach is roughly:<p>First you acquire a fingerprint image from the sensor. A fingerprint is composed of small ridges and valleys. Every ridge will make physical contact with the sensing device in some way, so that allows for the system to obtain a black and white image showing depth. From there the standard features that are detected is when the ridges either end or split into two ridges (think of them as corners in other image recognition tasks).<p>In order to obtain the location and direction of the feature points (referred to as minutia) the system algorithms usually segment the image into fingerprint/noise, performs some signal enhancements, changes it into a skeleton (i.e. each ridge is represented by a 1px thick line), and then gets the location+angle of minutia. Matching can have a number of additional features collected, but assuming the process is as described you can find a similarity score by finding the best rotational+translational fitting from two inputs and seeing how many pairs of minutia line up. From there it's just a matter of putting a threshold on the similarity score to decide if it's a match.
We don't know yet. Soonish, the Apple Security Guide[1] should be updated with the correct answer.<p>My best guess is that the keyboard itself is running it's own Secure Enclave and is running a modern incantation of BridgeOS and it uses a pairing model[2] to the host Mac.<p>1. <a href="https://support.apple.com/guide/security/welcome/web" rel="nofollow">https://support.apple.com/guide/security/welcome/web</a><p>2. <a href="https://support.apple.com/guide/security/pairing-model-security-secadb5b6434/1/web/1" rel="nofollow">https://support.apple.com/guide/security/pairing-model-secur...</a>