New Contract
Biometric security is far safer than passwords and passcodes. Facial recognition phones use clever AI to analyse parts of your face using your selfie camera, and translates your facial features into code that unlocks your phone.
Fingerprint phones let you use your unique fingerprint to lock and unlock your phone. Many smartphones have both fingerprint and facial recognition built-in, giving you two extremely secure ways to access your smartphone on the go. For more information, take a look at our FAQs
Fingerprint locks are generally safer than simply using a pattern, PIN or passcode to access your phone. When you use your fingerprint as a biometric ‘passcode’, that data is encrypted and stored directly on a separate part of the phone. Of course, adding a password after your fingerprint means an extra layer of security.
Yes, Using a fingerprint as a password is safer than conventional passwords. That’s because this data cannot be hacked, duplicated or snooped.
When you log in using a pattern, passcode or PIN, others can easily see what you’re drawing or typing. Fingerprint login can be used much more freely as this is unique to you.
Touch ID is Apple’s fingerprint security system. It’s easy to set up Apple iPhone Touch ID, and you can even add a fingerprint from both index fingers if you use your phone with both hands.
If you ever find that face recognition on your phone isn’t working, it’s worth checking that your device is up to date with the latest software. If you’re still struggling to use facial recognition to log in, reset your Face ID or face unlock settings and set it up again.
Face recognition unlocking is one of the best additions to mobile phone security. Face unlocking works in a number of different ways depending on the device you use. Apple iPhones use the TrueDepth IR camera to create a 3D map of your face, while Samsung phones use clever iris scanning technology to identify you.
Most facial recognition phones analyse the placement of your eyes, width of your nose and other facial features to identify the user.