The 6th day (2000)
Adam's blood analysis just before reading memory through the eyes,
but this is not for identification.
Adam pays the taxi using his fingerprint.
|
|
Adam Gibson's identity checked at the police station:
"thumbprint checked against records...match confirmed".
|
|
Adam shots Talia's hand...
|
|
... who is not so happy to loose her fingers.
|
|
Adam tries to steal Talia's car...
|
|
... and is rejected, remaining 10 seconds before the alarm...
|
|
... so Adam takes the cut finger from Talia...
|
|
... and uses it...
|
|
... searching...
|
|
... and starting Talia's car.
|
|
"Double X Charter" building fingerprint access control...
|
|
...accessing.
|
|
To enter the WEIR building, Adam is using Talia's cut finger...
|
|
... access granted! (so no aliveness detection, as usual)
|
|
Then, Adam wants to access an elevator, using again Talia's cut finger, but the
finger falls...
|
|
... on the floor...
|
|
... Adam finally enters the lift, even if the security guard is suspicious :)
|
|
Talia also wants to access the WEIR building...
|
|
... but is rejected...
BTW, it is impossible to get a perfect clone using only genetic
material, and fingerprints will be different from one clone to another...
Then security deactivates her credentials.
|
|
... login rejected...
|
|
...because she is already in the building!
|
|
... so the security deactivates her credentials to lock Adam (and Talia as well, by the way...).
|
|
So, when Adam try again to use the cut finger...
|
|
... it does not work.
|
|
So, back to the good old methods.
- May I help you?
- Oh yes, put your finger here.
|
|
A second time. Practical key!
|
|
And a third time, but the guard is less cooperative :)
|
|
Done.
|
|
Along Came a Spider (2000)
Fingerprint eraser machine: deposition of a kind of varnish on the skin.
|
|
Antitrust (2000)
Dust for fingerprints on the computer keyboard.
|
|
Followed by a manual match, using transparencies.
"Don't need a computer!" ;-)
|
|
Charlie’s Angels (2000)
Eye reader of the security system protecting the computer of RedStar. Seems to be an iris system (very often confused with retinal scan).
|
|
Stealing the iris image of the authorized person without cooperation.... Then a contact lens is made using the image.
|
|
Contact lens used to fool the eye reader.
Note it's only a colored lens... that's not a copy!
|
|
Latent fingerprints are stolen on a beer bottle.
Girls are lucky to get such a good print!
|
|
Automated latent print reader.
Note that the full hand is acquired: very lucky!
|
|
Fake fingerprint maker: nice tool ;-)
|
|
Fake fingerprints fool the "gelatin" reader.
|
|
Knox has designed a voice-identification software which,
combined with the GPS of RedStar, enables to localize Charlie.
|
|
Dracula 2000 (2000)
The burglars break the security system that protects the crypt.
After the password level, there is a palmprint security system...
|
|
...spoofed with a latex fake.
|
|
The voice recognition system is faked with a tape player.
|
|
A fake electronic iris.
|
|
Note that the pupil dilates!
|
|
The electronic iris fakes the eye sensor.
|
|
Hollow Man (2000) / L'homme sans ombre
Fingerprint recognition to access the lab.
|
|
|
|
Elevator to the lab with voice+speech recognition:
Dr Caine deleted the access rights of his collegues to lock them in the lab.
|
|
Mission Impossible 2 (2000)
Retinal scan to read the mission using the glasses.
|
|
Facial recognition to identify John McCloy
|
|
Vocal identification faked using a record.
|
|
Mission to Mars (2000)
In a spaceship, millions of km from Earth, with only four people,
the computer still needs a voice-print authentication system.
Note: pressure is quickly dropping,
which should slightly change the voice...
|
|
X-Men (2000)
Prof. X eye scan ...
|
|
... to access Cerebro.
|
|
Later faked by Mystic...
|
|
... who is able to impersonate anyone!
|
|
Frequency (2000)
In 1969, Frank gets some fingerprints of the killer on his wallet,
and hide it in a secret place of his house. Then in 1999, John
can retrieve it and use modern technology to match the fingerprint...
|
|
... and identify a cop, Jack Shepard, as the killer.
|
|
The Art of war (2000) L'art de la guerre
Neil Shaw face recognition: image capture...
|
|
picture analysis...
|
|
sorting...
|
|
found!
|
|
La Tour Montparnasse Infernale (2000)
Safe with 5-finger recognition...
|
|
...so the bad guys cut the hand...
|
|
... to open the safe.
|
|
But the next step is iris recognition.
|
|
Gen-Y Cops (2000) Te jing xin ren lei 2
Biometric access control: DNA they said... and not working the first time.
|
|
Later, real access, this is eye recognition. Verifying...
|
|
the camera
|
|
system view
|
|
Gone in 60 seconds (2000) 60 secondes chrono
Gluing a thin fake fingerprint on a finger.
|
|