Fingerprint boot
Fingerprint mobile payment
......
For many mobile phone users, these features have become a part of daily life.
However, recent reports from a company in Suzhou reveal a serious security flaw in smartphone fingerprint recognition systems. It turns out that with just a piece of transparent tape and a conductive pen, someone can bypass the fingerprint lock in seconds. This means unauthorized access to your phone, even for payments.
So, how does fingerprint unlocking work? Let’s take a closer look.
Step 1: Use a conductive pen to draw some patterns on a piece of transparent tape.
Step 2: Align the pattern with the fingerprint sensor on your phone and stick the tape onto it.
Step 3: Press the fingerprint button with your thumb to unlock the phone. Repeat this process three times while the screen is locked.
Step 4: Then, press your index finger on the same area. Surprisingly, the phone unlocks — not just with your thumb, but with any finger, or even an orange peel!
This vulnerability is extremely dangerous. According to experts, the real issue isn't the tape itself, but the pattern drawn with the conductive pen. Once the phone's software learns this pattern as part of your fingerprint, it can be used to unlock the device without your actual fingerprint.
This method works across all major smartphone brands, leaving your personal data and sensitive information at risk. If your phone uses fingerprint payment, it also exposes you to financial fraud. Others could easily use this technique to make payments through WeChat or Alipay.
So why is this possible? The problem lies in how fingerprint recognition works. When you first set up your fingerprint, the system stores a digital representation of it. It then compares new scans against this stored data. However, the system doesn’t require a perfect match — just a 20% similarity.
This low threshold makes it easier for users, but also opens the door to security risks. If a malicious actor attaches a patterned tape to your phone, the system may mistakenly recognize it as your fingerprint.
Experts believe the low recognition ratio was likely implemented to improve user convenience. But it also raises questions about the security measures taken by software providers.
To protect yourself, always keep your phone within sight. Avoid letting strangers handle it, and be cautious of any strange films or patterns on your fingerprint sensor. If you notice anything unusual, remove it immediately and re-enroll your fingerprint.
Stay alert — your phone’s security might be more vulnerable than you think.
Tower Type Line Interactive UPS
Line Interactive UPS
Shenzhen Unitronic Power System Co., Ltd , https://www.unitronicpower.com