{"id":1225,"date":"2014-10-15T06:57:23","date_gmt":"2014-10-15T06:57:23","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=1225"},"modified":"2016-08-20T15:02:23","modified_gmt":"2016-08-20T15:02:23","slug":"the-keys-may-be-on-your-fingertips-but-that-doesnt-mean-biometric-locks-cant-be-picked","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/the-keys-may-be-on-your-fingertips-but-that-doesnt-mean-biometric-locks-cant-be-picked\/","title":{"rendered":"The keys may be on your fingertips, but that doesn&#8217;t mean biometric locks can&#8217;t be picked"},"content":{"rendered":"<p>By <a href=\"http:\/\/theconversation.com\/profiles\/andrew-smith-121006\">Andrew Smith<\/a><em>, The Open University<\/em><\/p>\n<p>How can we ensure that someone is who they say they are? How can be sure that the person in our system, both digitally speaking or physically in front of us, is who whom they claim to be?<\/p>\n<p>You may think that a good password is the answer, but with so many ways to break into a computer system these methods are clearly not always effective \u2013 as can be seen from the unfortunate hacked celebrities whose <a href=\"https:\/\/theconversation.com\/three-ways-your-personal-photos-are-vulnerable-to-hackers-31134\">naked pictures were strewn across the internet<\/a> recently, or the <a href=\"https:\/\/theconversation.com\/explainer-is-your-iphone-at-risk-after-the-oleg-pliss-hack-27288\">Oleg Pliss<\/a> ransomware that locks iPhones until the extortioner is paid. Even a combination of a good username and password may not be enough.<\/p>\n<h2>An organic alternative to passwords<\/h2>\n<p>What about biometrics? This technology uses human physical attributes as locks and keys, such as fingerprints, iris scans or, as is now suggested, the <a href=\"http:\/\/news.sky.com\/story\/1330620\/barclays-finger-vein-scanner-game-changing\">veins in the human fingertip<\/a>, making them highly individual ways to identify one user from another.<\/p>\n<p>Using biometrics is not especially new. For example, while the likes of <a href=\"http:\/\/www.theverge.com\/2013\/5\/2\/4270352\/theyre-already-watching-the-scary-new-technology-of-iris-scanners\">iris scanners<\/a> may be familiar from sci-fi films, they\u2019re also (or were <a href=\"http:\/\/www.theregister.co.uk\/2012\/02\/17\/iris_scanners_scrapped_at_two_airports\/\">until recently<\/a>) found in real life airports too. Often mistakenly called retinal scanners, they are based on scanning the unique pattern of the iris, the coloured part of the eye.<\/p>\n<p>But the technology needed to complete an effective and trusted scan is expensive and can be <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-18997580\">tricked<\/a> by technologically capable hackers. These are great for entry control systems on the buildings of large organisations, or for the occasional secret bunker seen in films. But they are extremely costly \u2013 prohibitively so if a bank was to insist that every customer had one at home \u2013 and false readings become a problem as the number of people using it scales.<\/p>\n<p>On the other hand, fingerprint technology has become cheaper and more available \u2013 fingerprint scanners are now sufficiently small and accurate that they started appearing in <a href=\"http:\/\/www.technewsworld.com\/story\/37017.html\">laptops<\/a> 10 years ago, and are even in small <a href=\"http:\/\/support.apple.com\/kb\/HT5883\">devices like the iPhone 5S<\/a>. This is one way that banks could allow smartphone and laptop users to access their financial services, with users presenting a finger rather than a passcode.<\/p>\n<p>In fact it\u2019s easy to obtain a range of low-cost scanners for all sorts of authentication uses. But that doesn\u2019t mean the users will like doing so \u2013 there are ethical issues to consider, as some UK schools discovered in 2012 when their use of fingerprint scanners to <a href=\"http:\/\/www.telegraph.co.uk\/education\/educationnews\/9764739\/Schools-banned-from-fingerprinting-pupils.html\">monitor pupil attendance<\/a> led to an outcry and a government ban without explicit consent from parents.<\/p>\n<h2>Weaknesses and workarounds<\/h2>\n<p>Despite our fingerprints all being unique, there is still the possibility to fool the systems used to protect secured buildings, large computer systems or financial institutions. There are well known ways to get around fingerprint biometric authentication, from <a href=\"http:\/\/www.theregister.co.uk\/2002\/05\/16\/gummi_bears_defeat_fingerprint_sensors\/\">creating false fingers (with prints) from gelatin<\/a>, using good quality <a href=\"http:\/\/9to5mac.com\/2013\/09\/22\/biometrics-hacking-team-uses-photographed-fingerprint-to-get-past-touch-id\/\">photographs or even a photocopy of fingerprints<\/a> to fool scanners, or most upsettingly simply <a href=\"http:\/\/news.bbc.co.uk\/1\/hi\/world\/asia-pacific\/4396831.stm\">removing a finger<\/a> from those with access rights. These and others are <a href=\"http:\/\/www.networkworld.com\/article\/2293129\/data-center\/120606-10-ways-to-beat-fingerprint-biometrics.html\">well known<\/a>, in real life and in the semi-fictional world of Hollywood.<\/p>\n<p>Barclays&#8217; recent decision to use a <a href=\"http:\/\/news.sky.com\/story\/1330620\/barclays-finger-vein-scanner-game-changing\">finger vein<\/a> scanner, which scans and pattern-matches the unique structure of the blood vessels in the finger. This has the benefit of only working when the finger is attached to the rest of the body and blood is flowing, which rules out the most grisly workarounds.<\/p>\n<p>Facial recognition has been available for a while, and as the majority of computers now come with webcams included this would seem a logical step. The challenge is that the software making the decisions is very sensitive to environmental conditions such as light and darkness. We don\u2019t all look our best for the camera all of the time, and the need for our real face to match the reference version the system is using means that, while a human would recognise the same person, a computer algorithm often can\u2019t. This is why the killjoys at the UK Home Office and elsewhere <a href=\"http:\/\/news.bbc.co.uk\/1\/hi\/uk_politics\/3541444.stm\">refuse to let us smile in passport photos<\/a> these days. But this same fact means that it\u2019s possible to log into laptops equipped with a face-recognition login by simply putting a picture of the owner in front of the webcam.<\/p>\n<h2>Right technology used the right way<\/h2>\n<p>Using biometrics for security and identification requires meeting two challenges: they must be cheap enough and sufficiently simple to be used by ordinary users. And the context of when and how they are used must also be entirely ethical, and secure. For example, systems that store too many personal details or copies of biometric data could be hacked or abused without appropriate controls in place.<\/p>\n<p>Biometrics could be the answer, but it\u2019s a case of combining two or more types of authentication for added security, such as coupling fingerprints with key codes or passwords to provide greater trust that who is logging in is only who we are expecting. There may always be new picks created to open whatever new locks we invent, but if biometrics can make it that much harder, so much the better.<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/counter.theconversation.edu.au\/content\/31588\/count.gif\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><\/p>\n<p><em>Andrew Smith does not work for, consult to, own shares in or receive funding from any company or organisation that would benefit from this article, and has no relevant affiliations.<\/em><\/p>\n<p>This article was originally published on <a href=\"http:\/\/theconversation.com\">The Conversation<\/a>.<br \/>\nRead the <a href=\"http:\/\/theconversation.com\/the-keys-may-be-on-your-fingertips-but-that-doesnt-mean-biometric-locks-cant-be-picked-31588\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Andrew Smith, The Open University How can we ensure that someone is who they say they are? How can be sure that the person in our system, both digitally speaking or physically in front of us, is who whom they claim to be? You may think that a good password is the answer, but [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":6769,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/1225"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=1225"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/1225\/revisions"}],"predecessor-version":[{"id":6770,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/1225\/revisions\/6770"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/6769"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=1225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=1225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=1225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}