Apple wants iPhone users to be able to display their smartphones instead of ordinary documents. The company has applied for other patents that can identify someone over the phone without using a traditional ID card or passport to support them.
Apple Insider The report stated that the case involved a patent on how officials request identification information from the iPhone. The entire document focuses on the issue of confirming that the person with a digital ID who owns a given smartphone is its true owner and therefore the actual person to whom the digital document is to be applied for.
In its application, the company not only describes the user authentication problem used to confirm its identity. The document also focuses on the issue of storing sensitive data, such as all the information usually contained in an ID card, passport, driving license or school ID. The application extensively describes the communication protocol, secure storage and ensure that the entire identity verification process is not compromised by manipulation.
As expected by Apple, the document contains the idea of using Face ID to authenticate users. Interestingly, this is not over yet, because the company also decided to submit examples using NFC and RFID technology.
In addition to standard confirmation of its identity, Apple also hopes that the technology can be used in many other everyday situations. The company provides an example that illustrates the possibility of confirming your age when buying products that can only be legally purchased by adults. For this reason, it is enough to confirm the person through Face ID on the iPhone, and the seller will only receive information about whether he can sell the goods. Therefore, the user’s sensitive data will be protected without having to show his entire ID card.
Apple’s ideas are not new, after all, we already have solutions such as the mObywatel application. However, it seems that properly designed technology can actually help better protect our data. For example, when proof of our age is required, it is not necessary to provide proof to random sellers. Therefore, I want to know how the company will actually design this solution and make it properly protected in the process to prevent possible data leakage.