iOS based Biometric Local Authentication

September 11, 2018
Anisha

iOS-based-Biometric-Local-Authentication-Signity-Solutions

From the last couple of years, Security is playing a very crucial role in the mobile domain. Mobile platforms provide a feature to verify their identity by scanning a unique body part like a finger, palm, face or iris or by speaking.

With each major version release of iOS, Apple ships on an excellent range of recent technologies and frameworks. So in iOS 7 and iPhone 5S Apple introduced a biometric Local authentication technology. Using that users can unlock the device and make different purchases from the AppStore. In iOS 8, the developer can use the fingerprint sensor authentication mechanism for login or authenticate their applications.

Why we are discussing this?

On 12th Sep 2017, Apple introduced a brand new flagship phone the “iPhone X” with a strong new login system. Apple is ditching Touch ID in favor of an automatic face recognition system battery-powered by a brand new camera array and a specially changed A11 chip. Many applications are currently using TouchID only and after the release of iPhone X, all those applications are not supported. So let’s get a quick introduction of TouchID authentication and FaceID authentication.

Quick Introduction

  • TouchID:

For unlocking the Apple devices Apple Inc. release a unique feature of fingerprint recognition, using this user can make purchases within the Apple digital media stores (the iTunes Store, the App Store, and also the iBooks Store), and authorize Apple Pay online or in apps. Apple says fingerprint scanned information is stored locally in an exceedingly secure enclave on the Apple A7, A8 , A8X , A9 , A9X , A10 , A10X or A11 processors chips, not within the cloud, a design choice supposed to form it terribly tough for users to externally access the fingerprint data.

Touch ID is built into the home button, that is made of laser-cut sapphire crystal, and doesn’t scratch simply(scratching would block Touch ID from working). The stainless-steel detection ring detects the user’s finger while not pressing it. The feature doesn’t work while not contact with this ring. The user’s finger will be orientated in any direction and it’ll still be read. Apple says it will read sub-epidermal skin layers, and it’ll be simple to line up and can improve with each use. The sensing element passes a little current through one’s finger to make a “fingerprint map” of the user’s corium. Up to five fingerprint maps will be kept within the Secure territory.

  • FaceID:

As the next step in Local Authentication Apple Inc. Introduce and release FaceID a Facial recognition system for the iPhone X. it’s a kind of identity verification technology supposed to succeed Touch ID, a fingerprint-based system. FaceID includes 2 modules, first one projects a grid with 30,000 and more infrared dots onto a user’s face, and the second one reads the pattern to substantiate or deny access. This generates a 3D facial map stored in an exceedingly native, secured space of the device’s processor, inaccessible by Apple itself. Over the time the system can learn the changes in a user’s face, and can successfully acknowledge the user while carrying makeup, glasses, spectacles, scarves, hats or with changes in the beard. The system doesn’t work with eyes closed.

iOS-based-Biometric-Local-Authentication

 

Requirements:

Touch ID and Face ID are a part of the Local Authentication framework, So following are the things we need to check before implementation :

  1. Check device capability for supporting biometric authentication.
  2. If device support biometric then system start a check now with the access request and prompt the alert with a reason why we’re asking. For Touch ID the string is written in code and for Face ID the string is written into our Info.plist file(NSFaceIDUsageDescription Key).
  3. Once the authentication is done it means this is the device’s owner so we can unlock the app, otherwise we show a failure message.

Let’s Start: The TouchID/FaceID is a feature based on a new framework called Local Authentication, that provides facilities for requesting authentication from users with fixed security policies.

  • Local Authentication Framework

The Local Authentication framework has only one class that is LAContext.

  • LAContext : An LAContext object represents an authentication context and supply a programmatic interface for evaluating authentication policies and access controls, managing credentials, and invalidating authentication contexts.

First, create an authentication context, and Check the biometric sensor availability and setup the biometric authentication. Then we need to provide the policy to evaluate.

  • LAPolicy :
  1. OwnerAuthenticationWithBiometrics: It puts restriction to use only biometric authentication to authenticate the device owner.
  2. deviceOwnerAuthentication: It will allow the application to authenticate the device owner using biometric or the device password.
  • LABiometryType :
  1. FaceID: It puts restriction to use only FaceID to authenticate the device owner.
  2. TouchID: It puts restriction to use only TouchID to authenticate the device owner.
  • Checking Biometric availability:

LAContext provide a method for checking the biometric availability. So the canEvaluatePolicy(_:error:) method return false if it fails because, if biometric authentication is not available or not enrolled, policy evaluation fails.

  1. LAError.biometryNotAvailable: Authentication could not start because the device does not support biometric authentication.
  2. LAError.biometryNotEnrolled: Authentication could not start because the user has not enrolled in biometric authentication.
  3. LAError.biometryLockout: Authentication could not continue because the user has been locked out of biometric authentication, due to failing authentication too many times.
  • Evaluating Authentication Policies:

LAContext provide method for evaluating the specified policy. So the evaluatePolicy(_:localizedReason:reply:) method return  true if policy evaluation succeeded, otherwise false.

evaluatedPolicyDomainState: Returns t he current state of the evaluated policy domain.

  • Evaluating Access Controls:

LAContext provide method for evaluating the access control for a given operation. So the evaluateAccessControl(_:operation:localizedReason:reply:) method return  true if policy evaluation succeeded, otherwise false.

  • Managing Credentials:

LAContext provide method to set an application-provided credential to be used when evaluating

authentication. So the setCredential(_:type:)  method return true if the credential was set, otherwise false.Setting the parameter to nil removes any existing credential of the specified type. isCredentialSet(_:)  method return a Boolean value indicating whether the specified credential type is set.

  • Invalidating the Authentication Context:

LAContext provides a method invalidate() to Invalidates the authentication context. Calling this method stops any pending policy evaluations, causing them to fail with the LAError.Code.systemCancel error code.

  • LAError: Errors issued by the LocalAuthentication framework.

 

Latest posts by Anisha (see all)