Take a look at your fingerprint; does it whorl, loop or arch? Your fingerprint is unique, not even identical twins have the same fingerprints, which is why they've been used as a crime-solving tool for decades. More recently, technology has been using your fingerprint to prove your identity to access your workplace and smartphone, but with a massive data breach identified last week, what happens when your fingerprint is stolen?
Science-fiction films are filled with plots where high-security areas are accessed using a fingerprint scanner, sometimes through clever copying means and sometimes by removing the finger from the victim!
This is the fascinating world of biometrics - systems designed to identify people either through unique physical characteristics, such as facial features, fingerprints and iris patterns, or by the way they behave, such as how they walk, sign their signature or type on a keyboard.
Over the past decade, smartphones have become incredibly smart. Not only do they house a camera, a map and more computer processing power than we sent to the moon, but many also house at least one of these sci-fi-worthy biometric scanners.
Rather than type in a four or six-digit number to access your phone, fingerprint access is quick and simple. It works by either using an optical in-screen scanner, which illuminates the finger for a sensor to grab a fingerprint image, or an ultrasonic sound wave scanner, which creates a 3D map of your finger. For some smartphones, fingerprint scanning is already out of date and facial recognition technology is the new unlocking and authorisation mechanism. Whichever one it is, after the hardware has created an image of your fingerprint, software is then used to upload and store the information. This is used to give you secure access to the content of your phone at a later date by comparing the old image with the current scan.