Autonomous system of access to the premises using a fingerprint. Economical option. Fingerprint access Fingerprint login

Smartphones with fingerprint scanners are still quite rare on the market, however, this method of data protection is available to any device - as long as it has a camera. Finger Print App Unlock can actually do what it did before Android users The developers were just playing - it takes a photo of a fingerprint and installs biometric protection to launch any application.

How to use Finger Print App Unlock:

1. Install the application from Google Play, run it and allow it access to system functions smartphone.

2. Click on the cell labeled Finger Roll, scroll through the tutorial slides, select the finger to be fingerprinted, and let the app take a few pictures. Keep your finger about 10 centimeters from the camera exactly where indicated on the screen and do not move it



3. Now you can start protecting applications. Click on the Lock Apps cell and select applications that will only be entered after scanning your finger.

4. Try running any of the protected applications. If, before it opens, a camera is launched that requires you to scan your finger, protection has been installed.

Finger Print App Unlock also allows you to protect access to any applications and games in more traditional ways - by entering a PIN code or graphic key. The application settings through which you can reset your fingerprints are also password protected.

Of course, it is unlikely that Finger Print App Unlock can compete in terms of protection with full-fledged fingerprint scanners (which are also). Surely the application can be deceived by simply slipping a photo of the desired finger under the camera, but the “attacker” will have to guess which one. It is hardly advisable to use this application for everyday smartphone protection, although in some cases it may still be useful - for example, to block access to some valuable application that you very rarely launch.

FinTech - financial services provided through modern technologies. These include online banking, mobile payments and transfers, electronic wallets, contactless payments, investment management, financial accounting, etc.

What does the coming day have in store for us?

There are many directions in FinTech and there is room to expand. However, most solutions in the field are united by common trends. Such as the transition to performing financial transactions without the client’s personal presence, increasing the share of transactions by mobile devices, contactless payments, automation of financial services, virtual banking, use of “artificial intelligence”.

Trends in FinTech are close to global trends in software development, but adjusted for the conservatism of the financial industry.

Let's start from the beginning

Logging into the application is the user's first impression of the product and service. This module is often underestimated. What can we, as designers, do to make the first experience comfortable and functional?

Speed ​​matters

The frequency of logging into financial applications is high (several times a day). Security reasons require that the user log in again each time. Therefore, the process should be as simple and fast as possible. Good, modern technologies there is something to contrast with the traditional tedious authorization using a password and login. Here are the main login methods you can use to improve your user experience, in order of increasing speed and convenience:

Standard login using login and password

The most common and slowest method of logging into the application. Each time the user logs in, the user must enter a login and password. In addition to requiring user effort and time, this method also increases the likelihood of input errors. But even in such a situation, you can make life easier for the user. The “cunning need for invention” option is to save the user login. The next time you launch the application, the login will be automatically entered into the required field. Yes, you will have to enter a password, but even this will cut the login time in half.

One-time passwords and SMS parsing

A more humane method of logging into the application. Instead of entering a long and complex password, the user is authorized by entering a short digital password received via SMS. Yes, you will have to enter your login, but four numbers instead of a password are much faster and easier. This method becomes even better if you take (parse) the password from incoming message automatically and insert into the input field.

Fingerprint scanning

The fastest and convenient way login to the application. Thanks to Fingerprint technologies for Android and TouchID for Apple, login time is reduced from one minute to several seconds.

Not all devices are equipped with a fingerprint scanner, but their number on the market is constantly growing. Thus, according to reports from manufacturers of fingerprint sensors, market penetration of devices equipped with this technology was 20% in 2015, 40% in 2016 and is expected to exceed 50% in 2017.

In terms of platforms, the trend looks even more impressive. Share iPhone models with a fingerprint scanner on the market in 2016 - more than 80%. So, you can dare.

Designing a fingerprint login

Let's look at the design and implementation of logging into an application using a fingerprint scanner.

Fingerprints are stored in operating system device (whether iOS or Android), and not in the application itself. The application accesses system functionality to check whether the fingerprint matches what the user has added to the system settings.

It is necessary to think through all the scenarios that may arise when using a fingerprint.

Let's go through them. 0 or 1?

First of all, you need to check whether the user's device is equipped with a fingerprint scanner. If the answer is no, you should hide all buttons, icons and controls that are associated with the mentioned functionality. Essentially, there are two interface options:

As you can see in the picture on the right, if there is a scanner, a button with a “fingerprint” icon appears in the interface. The button is not active yet, because to create a special cryptographic key, the user must enter his username and password when logging in for the first time. However, the button was not hidden, but was used to call up instructions when pressed. And the instructions may be different, depending on whether the user has added fingerprints to the system or not.

Actually, the entrance itself is by fingerprint

So, the user logged into the application for the first time using a login and password. What will happen the next time you log into the application? To minimize the necessary actions, you can activate fingerprint scanning immediately upon opening the application. To log in, the user just needs to click on the application icon and, while it opens, place their finger on the scanner.

We leave the option to refuse quick login and enter in the traditional way or in another account. That's all the magic: fast, simple, convenient.

Not by one entrance

We sorted out logging into the application. But how can you make the application login screen useful for the user even before authorization?

Please review the application carefully. Surely it contains regularly used services or information that can be shown to the user on the login screen. The ability to find the nearest ATM on a map, check exchange rates, or read important news without authorization makes the application useful even for an unauthorized user. And activity in the application itself is growing.

Instead of an epilogue

There are many more ways to improve a user's first experience that are not covered in this article. But I hope I have been able to provide food for thought on this topic and provide some direction for research.

For several years now I have not used regular keys for locks in my daily life.
All these key rings are successfully replaced by one RFID card, but technology does not stand still and in my opinion it’s time to abandon the access card.
For testing, I bought several models of access controllers with a fingerprint scanner.
I’ll tell you more about one of them now.

The first step is to scan the users' fingerprints.
The general menu looks like this

Fingerprint scanning menu

You can scan all 10 fingers for each user, and in the same menu you can set a name and access rights.
In addition, the device has a built-in RFID card reader, and the access method can be combined


According to the manufacturer, 800 users are supported.

The scanning process is simple, each finger needs to be applied with slight force 3 times. If all three fingerprints are successfully verified, the finger is recorded in the database, and a confirmation message appears.
The reading process is very fast, less than a second.
What worried me most was the quality of reading; as it turned out, there were no problems with that. The device confidently recognizes fingerprints; it has been experimentally established that for every 50 correct readings there are 1-2 failures.

A typical connection diagram for controlling an electromagnetic lock looks like this

There are two options for connecting or combining devices over a network

The device keeps extensive log files, which can be accessed both over the network and via a USB port.

I used this device for a slightly different purpose; with its help I control the arming/disarming of the house.
Unfortunately, in my version the lion's share of the device's capabilities is not used.
If this review is read by a person for whom the words UDP, PHP and script are not empty words, then I ask you to respond. I need advice on writing a small script for the package and recording its contents in the database.

Now is the time to look under the lid.

Everything is assembled well, the soldering is of high quality.
A speaker is visible on the left; the device notifies you with a voice about the scanning result, unfortunately in English.
There is a technological marking on the processor, but according to the manufacturer it is

RFID Reader Frame

In general, the device is well thought out and of high quality. All declared functions work as in offline mode as well as online.
The device remains cold during prolonged operation. You can activate the power saving mode, in which after a specified period of time the screen becomes monochrome and the fingerprint scanner goes into standby mode.
They deserve special praise detailed instructions, which in itself is rare for devices from China.

I'm planning to buy +73 Add to favorites I liked the review +51 +122 Reviews