{"id":7464,"date":"2015-03-04T11:50:11","date_gmt":"2015-03-04T10:50:11","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=7464"},"modified":"2019-12-31T10:40:49","modified_gmt":"2019-12-31T09:40:49","slug":"touch-id-marque-t-il-la-securite-de-son-empreinte","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/","title":{"rendered":"Touch ID marque-t-il la s\u00e9curit\u00e9 de son empreinte ?"},"content":{"rendered":"<p><em>La biom\u00e9trie prend une place de plus en plus grande dans notre quotidien. D\u00e9sormais, les smartphones peuvent se d\u00e9verrouiller gr\u00e2ce \u00e0 des lecteurs d\u2019empreintes digitales miniatures qui s\u2019int\u00e8grent parfaitement \u00e0 la physionomie globale des terminaux. De nouveaux usages, dont les paiements s\u00e9curis\u00e9s par empreinte digitale, font \u00e9galement leurs apparitions. Touch ID, le capteur d\u2019empreinte digitale d\u2019Apple, a ouvert la voie de cette d\u00e9mocratisation\u00a0: selon la firme \u00e0 la pomme, \u00ab\u00a0trop peu de personnes mettent en place un code de s\u00e9curit\u00e9 pour d\u00e9verrouiller leurs appareils \u00bb. La question suivante se pose donc\u00a0: Touch ID est-il r\u00e9ellement performant et s\u00e9curis\u00e9\u00a0?<\/em><\/p>\n<h2>Touch ID, un lecteur d\u2019empreintes simple et plus s\u00fbr<\/h2>\n<p>Selon Apple, Touch ID est plus s\u00e9curis\u00e9 qu\u2019un code \u00e0 quatre chiffres\u00a0: la probabilit\u00e9 que le capteur confonde deux empreintes digitales est de 1 sur 50\u00a0000 et elle augmente \u00e0 <em>\u00ab\u00a01 sur 10\u00a0000 lorsqu\u2019un utilisateur non autoris\u00e9 devine un code d\u2019acc\u00e8s \u00e0 4\u00a0chiffres\u00a0\u00bb<\/em>. Il faut n\u00e9anmoins pr\u00e9ciser que ces deux chiffres ne sont pas r\u00e9ellement de m\u00eame nature car le premier repr\u00e9sente une probabilit\u00e9 de fausse d\u00e9tection tandis que le second correspond \u00e0 la probabilit\u00e9 de trouver le bon code de d\u00e9verrouillage, et donc de pouvoir se r\u00e9-authentifier par la suite.<\/p>\n<p>Utiliser Touch ID est \u00e9galement relativement simple. Lorsque le doigt est appos\u00e9 sur le bouton d\u2019activation de l\u2019\u00e9cran d\u2019accueil, une photographie haute r\u00e9solution de l\u2019empreinte digitale est prise, puis compar\u00e9e \u00e0 un gabarit r\u00e9f\u00e9rence g\u00e9n\u00e9r\u00e9 au moment de l\u2019enregistrement de l\u2019utilisateur. Concernant la confidentialit\u00e9 de ces donn\u00e9es, la documentation technique pr\u00e9cise que lors du processus d\u2019enregistrement, c\u2019est la mod\u00e9lisation math\u00e9matique de l\u2019empreinte digitale qui est h\u00e9berg\u00e9e dans l\u2019enclave s\u00e9curis\u00e9e du processeur, au plus proche du capteur, et non les empreintes digitales des utilisateurs.<\/p>\n<h2>Un capteur biom\u00e9trique aux usages multiples<\/h2>\n<p>Avec le lancement de l\u2019iPhone 6 et d\u2019iOS 8, les usages \u00e9voluent. Jusqu\u2019\u00e0 pr\u00e9sent, le capteur permettait uniquement de s\u2019authentifier et de payer ses achats sur l\u2019Apple store, l\u2019iTunes Store et l\u2019iBooks Store. D\u00e9sormais, l\u2019arriv\u00e9e d\u2019Apple Pay permet de r\u00e9aliser tous types d\u2019achats en validant ses paiements via Touch ID, notamment gr\u00e2ce \u00e0 l\u2019int\u00e9gration d\u2019une puce NFC\u00a0(pour le moment, Apple Pay n\u2019est disponible qu\u2019aux \u00c9tats-Unis). Il devient \u00e9galement possible de s\u00e9curiser l\u2019acc\u00e8s \u00e0 des applications tierces.<\/p>\n<p>Les nouvelles fonctionnalit\u00e9s que pourraient offrir ces capteurs biom\u00e9triques sont nombreuses, telles que d\u00e9verrouiller une voiture ou effectuer un virement bancaire. La question de la s\u00e9curit\u00e9 devient donc cruciale.<img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2015\/03\/Presentation2.png\" alt=\"\" width=\"986\" height=\"683\" \/><\/p>\n<h2>Performances et limites de Touch ID<\/h2>\n<p>En d\u00e9pit des tests et des \u00e9tudes montrant que cette technologie est robuste et que les taux de <a href=\"http:\/\/fr.wikipedia.org\/wiki\/Faux_positif\" target=\"_blank\" rel=\"noopener noreferrer\">faux positif<\/a> et de <a href=\"http:\/\/fr.wikipedia.org\/wiki\/Faux_n%C3%A9gatif\" target=\"_blank\" rel=\"noopener noreferrer\">faux n\u00e9gatif<\/a>\u00a0restent bas, Touch ID poss\u00e8de quelques limites.<\/p>\n<p>L\u2019authentification peut \u00eatre avort\u00e9e si le lecteur biom\u00e9trique porte des traces de poussi\u00e8res, de graisse&#8230;Le capteur est \u00e9galement insensible \u00e0 la chaleur corporelle et ne fait donc pas la diff\u00e9rence entre la peau et les corps inertes. Enfin, comme pratiquement tous les lecteurs d\u2019empreintes digitales, il est possible de le pi\u00e9ger. De nombreux experts en s\u00e9curit\u00e9 ont post\u00e9 des vid\u00e9os montrant leurs tentatives r\u00e9ussies de piratages \u00e0 partir de fausses empreintes digitales. Le \u00ab\u00a0Chaos Computer Club\u00a0\u00bb a ainsi <a href=\"http:\/\/venturebeat.com\/2014\/12\/28\/chaos-computer-club-claims-it-can-reproduce-fingerprints-from-peoples-public-photos\/\" target=\"_blank\" rel=\"noopener noreferrer\">r\u00e9ussi \u00e0 tromper Touch ID<\/a> en photographiant en haute r\u00e9solution une empreinte digitale et en moulant cette derni\u00e8re.<\/p>\n<p>Nous avons, nous aussi, voulu tester la fiabilit\u00e9 de cette technologie avec de fausses empreintes digitales r\u00e9alis\u00e9es en g\u00e9latine alimentaire et en colle \u00e0 bois. Le processus est fastidieux et les r\u00e9sultats varient en fonction de la qualit\u00e9 des copies et de leur fid\u00e9lit\u00e9 par rapport \u00e0 l\u2019originale, mais nous sommes bien parvenus \u00e0 d\u00e9jouer le capteur biom\u00e9trique.<\/p>\n<p>Ainsi, une personne mal intentionn\u00e9e pourrait parvenir, moyennant de nombreux efforts, \u00e0 s\u2019authentifier sur les appareils utilisant la biom\u00e9trie par Touch ID. Cela implique cependant de pouvoir r\u00e9colter une empreinte digitale nette, claire et \u00e9paisse qui puisse \u00eatre facilement dupliqu\u00e9e, ce qui est au quotidien difficile \u00e0 trouver.<\/p>\n<h2>Des \u00e9volutions dans le futur\u00a0?<\/h2>\n<p>Simple d\u2019usage et efficace, la technologie Touch ID est une belle avanc\u00e9e pour la s\u00e9curit\u00e9 des terminaux mobiles. Malgr\u00e9 ses limites, les usages cit\u00e9s pr\u00e9c\u00e9demment (acc\u00e8s aux donn\u00e9es personnelles sur les terminaux, paiements mobiles\u2026) ne devraient th\u00e9oriquement pas souffrir de probl\u00e8mes majeurs de s\u00e9curit\u00e9 pour le grand public.<\/p>\n<p>Cependant, pour des populations sensibles ou dans des contextes \u00e0 risques, il faut avoir conscience des limites concr\u00e8tement d\u00e9montr\u00e9es. Il aurait \u00e9t\u00e9 souhaitable que la sortie de l\u2019iPhone 6 am\u00e9liore de fa\u00e7on notable la s\u00e9curit\u00e9 et les performances du capteur biom\u00e9trique. Malheureusement, \u00e0 part une plus grande sensibilit\u00e9 impliquant une diminution du taux de faux n\u00e9gatifs (la r\u00e9solution du capteur \u00e9tant plus grande), il n\u2019y a pas eu de modifications substantielles. Dans le futur, une approche combinant l\u2019empreinte et un code pourrait \u00eatre une \u00e9volution int\u00e9ressante et simple \u00e0 mettre en \u0153uvre.<\/p>\n<p>Enfin, si l\u2019on souhaitait renforcer la s\u00e9curit\u00e9 de mani\u00e8re significative, on aurait pu s\u2019orienter vers des technologies biom\u00e9triques \u00ab\u00a0sans traces\u00a0\u00bb (r\u00e9seau veineux, reconnaissance d\u2019iris\u2026etc). Mise \u00e0 part l\u2019usabilit\u00e9 de la plupart de ces technologies qui ne permet pas \u00e0 l\u2019heure actuelle de les int\u00e9grer sur un smartphone, la question essentielle est de savoir si le grand public est pr\u00eat \u00e0 les accepter et \u00e0 les utiliser. Affaire \u00e0 suivre\u2026<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La biom\u00e9trie prend une place de plus en plus grande dans notre quotidien. D\u00e9sormais, les smartphones peuvent se d\u00e9verrouiller gr\u00e2ce \u00e0 des lecteurs d\u2019empreintes digitales miniatures qui s\u2019int\u00e8grent parfaitement \u00e0 la physionomie globale des terminaux. De nouveaux usages, dont les&#8230;<\/p>\n","protected":false},"author":271,"featured_media":7578,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3224,37],"tags":[144,3305],"coauthors":[1651],"class_list":["post-7464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-identity","category-digital-innovation","tag-identite","tag-identity-access-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Touch ID marque-t-il la s\u00e9curit\u00e9 de son empreinte ? - RiskInsight<\/title>\n<meta name=\"description\" content=\"La biom\u00e9trie prend une place de plus en plus grande dans notre quotidien. La technologie de Apple, Touch ID, est-elle r\u00e9ellement performante et s\u00e9curis\u00e9e ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Touch ID marque-t-il la s\u00e9curit\u00e9 de son empreinte ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"La biom\u00e9trie prend une place de plus en plus grande dans notre quotidien. La technologie de Apple, Touch ID, est-elle r\u00e9ellement performante et s\u00e9curis\u00e9e ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-04T10:50:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:40:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/03\/Fotolia_40160548_Subscription_Monthly_XXL-centre-smartphone-bloomua-Fotolia.com_1-59x39.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"59\" \/>\n\t<meta property=\"og:image:height\" content=\"39\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mehdi Karray\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mehdi Karray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/\"},\"author\":{\"name\":\"Mehdi Karray\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/a28cb3f39e9a542ddbc7d643e70327f7\"},\"headline\":\"Touch ID marque-t-il la s\u00e9curit\u00e9 de son empreinte ?\",\"datePublished\":\"2015-03-04T10:50:11+00:00\",\"dateModified\":\"2019-12-31T09:40:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/\"},\"wordCount\":969,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/03\/Fotolia_40160548_Subscription_Monthly_XXL-centre-smartphone-bloomua-Fotolia.com_1.jpg\",\"keywords\":[\"identit\u00e9\",\"identity &amp; access management\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\",\"M\u00e9tiers - Digital &amp; innovation\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/\",\"name\":\"Touch ID marque-t-il la s\u00e9curit\u00e9 de son empreinte ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/03\/Fotolia_40160548_Subscription_Monthly_XXL-centre-smartphone-bloomua-Fotolia.com_1.jpg\",\"datePublished\":\"2015-03-04T10:50:11+00:00\",\"dateModified\":\"2019-12-31T09:40:49+00:00\",\"description\":\"La biom\u00e9trie prend une place de plus en plus grande dans notre quotidien. La technologie de Apple, Touch ID, est-elle r\u00e9ellement performante et s\u00e9curis\u00e9e ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/03\/Fotolia_40160548_Subscription_Monthly_XXL-centre-smartphone-bloomua-Fotolia.com_1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/03\/Fotolia_40160548_Subscription_Monthly_XXL-centre-smartphone-bloomua-Fotolia.com_1.jpg\",\"width\":4899,\"height\":3266},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Touch ID marque-t-il la s\u00e9curit\u00e9 de son empreinte ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/a28cb3f39e9a542ddbc7d643e70327f7\",\"name\":\"Mehdi Karray\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/mehdi-karray\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Touch ID marque-t-il la s\u00e9curit\u00e9 de son empreinte ? - RiskInsight","description":"La biom\u00e9trie prend une place de plus en plus grande dans notre quotidien. La technologie de Apple, Touch ID, est-elle r\u00e9ellement performante et s\u00e9curis\u00e9e ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/","og_locale":"en_US","og_type":"article","og_title":"Touch ID marque-t-il la s\u00e9curit\u00e9 de son empreinte ? - RiskInsight","og_description":"La biom\u00e9trie prend une place de plus en plus grande dans notre quotidien. La technologie de Apple, Touch ID, est-elle r\u00e9ellement performante et s\u00e9curis\u00e9e ?","og_url":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/","og_site_name":"RiskInsight","article_published_time":"2015-03-04T10:50:11+00:00","article_modified_time":"2019-12-31T09:40:49+00:00","og_image":[{"width":59,"height":39,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/03\/Fotolia_40160548_Subscription_Monthly_XXL-centre-smartphone-bloomua-Fotolia.com_1-59x39.jpg","type":"image\/jpeg"}],"author":"Mehdi Karray","twitter_misc":{"Written by":"Mehdi Karray","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/"},"author":{"name":"Mehdi Karray","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/a28cb3f39e9a542ddbc7d643e70327f7"},"headline":"Touch ID marque-t-il la s\u00e9curit\u00e9 de son empreinte ?","datePublished":"2015-03-04T10:50:11+00:00","dateModified":"2019-12-31T09:40:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/"},"wordCount":969,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/03\/Fotolia_40160548_Subscription_Monthly_XXL-centre-smartphone-bloomua-Fotolia.com_1.jpg","keywords":["identit\u00e9","identity &amp; access management"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Identity","M\u00e9tiers - Digital &amp; innovation"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/","url":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/","name":"Touch ID marque-t-il la s\u00e9curit\u00e9 de son empreinte ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/03\/Fotolia_40160548_Subscription_Monthly_XXL-centre-smartphone-bloomua-Fotolia.com_1.jpg","datePublished":"2015-03-04T10:50:11+00:00","dateModified":"2019-12-31T09:40:49+00:00","description":"La biom\u00e9trie prend une place de plus en plus grande dans notre quotidien. La technologie de Apple, Touch ID, est-elle r\u00e9ellement performante et s\u00e9curis\u00e9e ?","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/03\/Fotolia_40160548_Subscription_Monthly_XXL-centre-smartphone-bloomua-Fotolia.com_1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/03\/Fotolia_40160548_Subscription_Monthly_XXL-centre-smartphone-bloomua-Fotolia.com_1.jpg","width":4899,"height":3266},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/03\/touch-id-marque-t-il-la-securite-de-son-empreinte\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Touch ID marque-t-il la s\u00e9curit\u00e9 de son empreinte ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/a28cb3f39e9a542ddbc7d643e70327f7","name":"Mehdi Karray","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/mehdi-karray\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=7464"}],"version-history":[{"count":10,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7464\/revisions"}],"predecessor-version":[{"id":12416,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7464\/revisions\/12416"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/7578"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=7464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=7464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=7464"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=7464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}