Você está na página 1de 4

Explore – Impact of Computing Innovations

Written Response Submission Template


Please see Assessment Overview and Performance Task Directions for Student for the task
directions and recommended word counts.

Computational Artifact

2a)

The computing innovation represented by my computational artifact is biometric


technology in current phones. To begin, biometrics is an increasingly used
technology used in order to identify and authenticate. Biometrics uses the
unique characteristics of people such as fingerprints; DNA; hand geometry; face,
retina, iris, and ear features (1). My computational artifact showcases multiple
examples and diagrams of phones with the integration of biometrics. With only a
touch of a finger, or a look to the screen, it can unlock to one’s digital lives. The
major companies I focused on in my computational artifact are in fact Apple and
Samsung.

2b)

At first I used a website called Wix (as a starting ground), a free website
creator/builder with no coding skills needed. I had previously used Wix with
many projects and knew how to work my way around building a website. The
site featured multiple tabs and a sources page, that an individual could access.
The main page featured a gallery of pictures and then displayed 4 diagrams
(incorporating gifs) of biometrics in Apple and Samsung phones. I then converted
all of the pictures, gifs, and other things into a Microsoft Powerpoint which was
then exported as a movie.

AP Computer Science Principles Effective Fall 2017 Page 1 of 4


Computing Innovation

2c)

Biometrics in phones can have both beneficial and harmful effects on the people
of this society. Our mobile devices hold an immense amount of our digital lives
(2). This technology is new, exciting, and has created a buzz in our society. First, a
benefit to this innovation is its security advantages over other methods.
Biometrics are never lost, stolen, nor forgotten like other passwords and security
tactics (3). To add, the physical characteristics used in biometrics cannot be
easily duplicated, allowing for a high level of security (4). The expansion of
biometrics will soon surpass the standard for protection as it has more security,
speed, efficiency and convenience (5). However, biometrics does pose some
harmful effects to our society. This is due to the technology not having a 100%
accuracy. In addition, some forms of biometrics can be very intrusive, affected by
many factors (dry skin, lighting, contacts, and/or illness), and can be very
expensive. Thereby stating that the environment and usage can affect
measurements. With these factors a false reject error or a false accept error can
occur in the systems. In each scenario, someone could access the digital life of
someone else or someone wouldn’t be able to access their own digital life (6).
Either of which could potentially cause many problems. On the other hand,
biometrics is an innovation meaning it is still in the process of innovating.
Optimistically, as time continues, society will see an improvement in the
technology itself and its disadvantages.

2d)

Biometrics uses people's physical and behavioral characteristics (7). Apple’s


Touch ID is a laser cut sapphire crystal and capacitive touch sensor, both used to
take the high-resolution image of one’s fingerprint. The image is then
continuously analyzed to provide accurate readings from any angle (8). The first
step is setting up Touch ID, being the owner's initial scan. But, one data storage
concern thought of is if our fingerprints our saved on Apple servers or backed up
to the iCloud. However, this is not the case as the fingerprint information is
encrypted and stored in the Secure Enclave inside the Apple A7, A8, A8X, A9,

AP Computer Science Principles Effective Fall 2017 Page 2 of 4


A9X, A10, A10X or A11 processors of an iOS device (9).Then as it continues to be
used the Touch ID sensor recognizes the owner with just the touch of a finger.
When Samsung’s fingerprint sensor first came out on the Galaxy S5 the process
was similar to Apple’s. One of the only differences was that Samsung's process
required an individual to swipe vertically across the home button to register and
scan the fingerprint. As Samsung continued to upgrade so did its unlocking
methods. The S8 featured a fingerprint scanner placed where one’s index finger
normally rests (10). Samsung has also added an iris scanning method, which uses
a diode to emit near-infrared light (illuminating the eyes), then a specially tuned
narrow-focus camera takes an image. That image is analyzed and set with
distinct data. All of these security options allow for a different user experience
on present-day phones.

AP Computer Science Principles Effective Fall 2017 Page 3 of 4


References

2e)

1.Saini, M., & Kapoor, A. K. (2016, May 25). Biometrics in Forensic Identification:
Applications and Challenges. Retrieved December 18, 2017, from
https://www.omicsonline.org/open-access/biometrics-in-forensic-identification-
applications-and-challenges-2472-1026-1000108.php?aid=76775
2.About Touch ID advanced security technology. (2017, September 11). Retrieved
December 18, 2017, from https://support.apple.com/en-us/HT204587
3.Thakkar, D. (2017, August 30). Importance of Biometric Fingerprinting Technology.
Retrieved December 18, 2017, from https://www.bayometric.com/importance-of-
biometric-fingerprinting-technology/
4.Rubens, P. (2012, August 17). Biometric Authentication: How It Works. Retrieved
December 18, 2017, from https://www.esecurityplanet.com/trends/biometric-
authentication-how-it-works.html
5.Woodward, J. D., Jr. (n.d.). Biometrics Offers Advantages and Controversy.
Retrieved December 18, 2017, from
https://www.rand.org/natsec_area/products/biometrics.html
6.Advantages and Disadvantages of Biometric Authentication | SESTEK Blog. (2016,
November 17). Retrieved December 18, 2017, from
http://www.sestek.com/2016/11/advantages-disadvantages-biometric-
authentication/
7. Rouse, M. (2017, December). What is biometrics? - Definition from WhatIs.com.
Retrieved December 18, 2017, from
http://searchsecurity.techtarget.com/definition/biometrics
8. Gilbert, B. (2016, July 14). IPhone 5s fingerprint sensor called Touch ID, recognizes
your thumb on the Home button: here's how it works and what it does (video).
Retrieved December 18, 2017, from
https://www.engadget.com/2013/09/10/iphone-5s-fingerprint-sensor/
9.Apple Announces iPhone 5s--The Most Forward-Thinking Smartphone in the
World. (2013, September 10). Retrieved December 18, 2017, from
https://web.archive.org/web/20130913010513/http://online.wsj.com:80/article/PR-
CO-20130910-909214.html
10.Seifert, D. (2017, April 21). Fingerprint, face scan, or password: what's the best
way to unlock your Galaxy S8? Retrieved December 18, 2017, from
https://www.theverge.com/2017/4/21/15360584/samsung-galaxy-s8-unlock-face-
iris-fingerprint-scanner-most-secure
11.Hildenbrand, J. (2017, September 13). Examining the differences between iPhone
X Face ID and Samsung iris scanning. Retrieved December 18, 2017, from
https://www.androidcentral.com/differences-between-samsung-and-apple-face-
unlocking

AP Computer Science Principles Effective Fall 2017 Page 4 of 4

Você também pode gostar