Last month, Officials from MSU police’s cyber crime and digital forensics unit approached the biometric research department after realizing that research on how printed fingerprints can trigger mobile devices was being conducted on the same campus.
"I Googled ‘spoof fingerprint’ or something like that and came across [the research] as one of the results," Detective Andrew Rathbun said. "I read the research and noticed it was based out of MSU, much to my surprise. I simply emailed those who did the study and set up a meeting."
Police had obtained the victim’s prints from a previous arrest, and gave them to the lab to make a 3D print to try to unlock the Samsung Galaxy S-6. The lab printed 2D and 3D replicas of all 10 of the victim’s prints, as they were unsure what finger he had used to lock phone. None of the original prints worked, so the team enhanced them digitally by filling in valleys and broken ridges. Researchers then printed 2D models of the prints using a special conductive ink that recreates the electrical circuit needed to trigger the phone’s sensor. They felt this was a better option than the more expensive 3D model.
The team was finally able to unlock the phone with the 2D prints after multiple attempts, aided by the fact the phone did not require a passcode. One MSU spokesperson said there were plans to use digitally enhanced 3D models but this proved unnecessary, as the 2D prints were successful. Full story...
Related posts:
"I Googled ‘spoof fingerprint’ or something like that and came across [the research] as one of the results," Detective Andrew Rathbun said. "I read the research and noticed it was based out of MSU, much to my surprise. I simply emailed those who did the study and set up a meeting."
Police had obtained the victim’s prints from a previous arrest, and gave them to the lab to make a 3D print to try to unlock the Samsung Galaxy S-6. The lab printed 2D and 3D replicas of all 10 of the victim’s prints, as they were unsure what finger he had used to lock phone. None of the original prints worked, so the team enhanced them digitally by filling in valleys and broken ridges. Researchers then printed 2D models of the prints using a special conductive ink that recreates the electrical circuit needed to trigger the phone’s sensor. They felt this was a better option than the more expensive 3D model.
The team was finally able to unlock the phone with the 2D prints after multiple attempts, aided by the fact the phone did not require a passcode. One MSU spokesperson said there were plans to use digitally enhanced 3D models but this proved unnecessary, as the 2D prints were successful. Full story...
Related posts:
- Yahoo aims to phase out passwords with new service...
- In a huge U-turn, the UK government now says it is NOT going to try and...
- Google eavesdropping tool installed on computers without permission...
- Canadian faces $20k fine, jail time for refusing to unlock phone during airport check...
- Why you should always password protect your smartphone...
No comments:
Post a Comment