Gary Numan / Exile Jean-François Mainguet fingerprint
Biometrics: Movies
Accueil
Nouveautés
soft Pocket PC
La Biométrie
introduction
séquence d'identification
types de biométrie
critères de choix
sécurité & biométrie
Bibliographie
cinéma & biométrie
Mythes
fingerprint / Empreinte digitale
FingerChip / Empreinte digitale
Auto-biographie
Previous Next

2000

The 6th day (2000)

Adam's blood analysis just before reading memory through the eyes, but this is not for identification.

  • Adam pays the taxi using his fingerprint.
  • Adam Gibson's identity checked at the police station: "thumbprint checked against records...match confirmed".
  • Adam steals Talia's car using her cut finger, lost after a gun shot.
  • "Double X Charter" building fingerprint access control.
  • Adam enters the WEIR building using Talia's cut finger.
  • Talia is rejected because it's her second access.
    Then security deactivates her credentials.
  • And now the cut finger is of no use.
  • So, back to the good old methods: Adam forces a guard to open doors with his fingerprint, twice.
  • And a third time to access the computer (the guard is unconscious).
  • Along Came a Spider (2000)

  • Fingerprint eraser machine: deposition of a kind of varnish on the skin.
  • Antitrust (2000)

  • Dust for fingerprints on the computer keyboard.
  • Followed by a manual match, using transparencies.
    "Don't need a computer!" ;-)
  • Charlie’s Angels (2000)

  • Eye reader of the security system protecting the computer of RedStar. Seems to be an iris system (very often confused with retinal scan).
  • Stealing the iris image of the authorized person without cooperation.... Then a contact lens is made using the image.
  • Contact lens used to fool the eye reader. Note it's only a colored lens... that's not a copy!
  • Latent fingerprints are stolen on a beer bottle. Girls are lucky to get such a good print!
  • Automated latent print reader. Note that the full hand is acquired: very lucky!
  • Fake fingerprint maker: nice tool ;-)
  • Fake fingerprints fool the "gelatin" reader.
  • Knox has designed a voice-identification software which, combined with the GPS of RedStar, enables to localize Charlie.
  • Dracula 2000 (2000)

  • The burglars break the security system that protects the crypt. After the password level, there is a palmprint security system...
  • ...spoofed with a latex fake.
  • The voice recognition system is faked with a tape player.
  • A fake electronic iris.
  • Note that the pupil dilates!
  • The electronic iris fakes the eye sensor.
  • Hollow Man (2000) / L'homme sans ombre

  • Fingerprint recognition to access the lab.
  • Elevator to the lab with voice+speech recognition: Dr Caine deleted the access rights of his collegues to lock them in the lab.
  • Mission Impossible 2 (2000)

  • Retinal scan to read the mission using the glasses.
  • Facial recognition to identify John McCloy
  • Vocal identification faked using a record.
  • Mission to Mars (2000)

  • In a spaceship, millions of km from Earth, with only four people, the computer still needs a voice-print authentication system. Moreover, when authenticating, pressure is quickly dropping, which should slightly change the voice...
  • X-Men (2000)

  • Prof. X eye scan ...
  • ... to access Cerebro.
  • Later faked by Mystic...
  • ... who is able to impersonate anyone!
  • Frequency (2000)

  • In 1969, Frank manages to grab some fingerprints of killer, and sticks the fingerprint evidence in a bag. Then in 1999, John can retrieve it and use modern technology to find out who the killer is.

  • Previous Next

    Copyright © 2004 Jean-François Mainguet
    Fair Use Notice


    Biometrics visitors