2002 ...
|
Bad Company (2002)
The CIA records Jake Hayes=Michael Turner's retina in the computer that will contain the bomb code.
|
 |
|
Jake's retina enrollment.
|
 |
|
Michael Turner's access his computer to check the bomb.
|
 |
|
Jake's retina verification. The sensor seems to be the computer screen...
|
 |
|
The terrorists who have stolen the bomb cannot access the computer. Note that the CIA said that sooner or later, they will be able to workaround the protection, which is a good remark from a security point of view (absolute security does not exist).
|
 |
|
So later, the terrorists catch Turner, and force him to open the eyes, with or without the cooperation (and also, they kidnapped his girlfriend).
|
 |
|
So they access the nuclear bomb.
|
 |
Die Another Day (2002) Meurt un autre jour
Bond and Jinx have to go through the door locked by a handprint reader.
|
 |
|
Jinx uses a laser to cut off Mr Kill’s arm...
|
 |
|
...so the reader is tricked.
|
 |
Minority report (2002)
Eye recognition of Howard when arrested by precrime.
|
 |
|
Eye-dentiscan: Precrime building access control.
|
 |
|
Precrime jail eye access control. Later, John Anderton's wife will also enter, using his eyeball.
|
 |
|
Eye recognition everywhere in the mall, John Anderton is immediatly identified as member since 2037...
|
 |
|
Eyedentiscan in the metro, John is localized by the police.
|
 |
|
After eyeball replacement, which seems not to be that difficult (!), John is checked by the spiders and falsely identified.
|
 |
|
John kept his original eyeballs in a bag (with difficulties ;-), so he can enter the temple with the precogs (hopefully, nobody removed John's access rights).
|
 |
|
John enters a shop, and now he's recognized as Yamamoto.
|
 |
The Bourne Identity (2002) La mémoire dans la peau
Palm-print identification to access safe in a Swiss bank: scanning...
|
 |
|
... access granted.
|
 |
Nightstalker (2002)
Fingerprint lifted from one of the stolen cars used by the Stalker.
|
|
Crazy as Hell (2002)
Dr. Adams has a fingerprint check run on the patient.
To his surprise, each finger comes back exactly matching its identical digit
on the hands of such famed butchers as John Dillinger, Jeffrey Dahmer...
|
|
X-Men 2 (2003)
Hand access control to Stryker office faked by Mystic.
|
 |
|
And Mystic fakes also Stricker's voice to access the computer.
|
 |
|
Stricker accesses Cerebro, faking the iris access control.
|
 |
|
Regular Cerebro iris access control by Prof. X.
|
 |
Paycheck (2004)
Face recognition used to find the closest candidate for imitation purpose.
|
|
The Bourne Supremacy (2004) La mort dans la peau
iPAQ h5000 series, fingerprint sensor (the FingerChip ;-).
A latent print is taken on adhesive tape, then put on the iPAQ screen where we can see
the Cogent logon with a fingerprint, and (magically), the latent print is read by the iPAQ, then
sent for further processing. Sure, this is particularly stupid...
|
|
I, Robot (2004)
Access control using the side of the palm (twice).
Voice identification to access mail files.
|
|
Qui Perd Gagne! (2004) Looser takes all
The latent fingerprints on the two win tickets of the lottery match.
|
|
Benjamin Gates (2004)
Benjamin Gates et le trésor des templiers
Benjamin Gates reveals the (grey) latent print of Abigail on a glass using superglue fumes,
copies on a latex gloves and spoofs the fingerprint access control (Bioscrypt ;-)
that protects the museum containing the Declaration of Independance.
FYI, superglue gives white latent prints, and the copy on the latex just cannot work
on the Authentec fingerprint sensor used in this system...
|
|
|