Courtesy of BRAND X PICTURES (MARS)
Of all the personal data that cybercriminals can steal, your biometric information is the most unsettling. Purloined passwords, credit cards and even can be changed to guard against identify theft and fraud. Fingerprints, however, cannot. At least, not permanently. Perhaps the only silver lining to the U.S. Office of Personnel Management’s that criminals had stolen 5.6 million fingerprint files, up from the 1.1 million files originally reported missing, is that it would be extremely difficult to use such biometric data to commit fraud or theft.
The fingerprint theft was more likely meant as a psychological blow to the government and its employees, says , senior director of technology at security firm RSA. Given the highly personal nature of a biometric data, which in other settings can include such characteristics as DNA or patterns in one’s iris, retina or palm veins, “by the time you could convince users that it’s not that bad, your reputation is already damaged.”
Commercial fingerprint-based security systems used by businesses and government agencies create digital maps of the ridges and valleys that make each person’s fingertips unique. Most systems generate these maps by scanning high-resolution images of a person’s hand and using software algorithms to encode this map data into a file that can be used to identify that person. [A simple diagram of the fingerprint scanning and encoding process can be found .] A properly configured system will delete the images after use and encrypt the files containing these encoded fingerprint maps, Alikhani says.
Consumer tech versions of fingerprint readers—such as Apple’s iPhone Touch ID—are a bit different. Rather than taking digital images, they measure a fingertip’s , to capture a fingerprint image. Hackers have already proven they can and break into an iPhone. But they’ve done this by painstakingly copying physical fingerprints and applying them to the sensor. The iPhone’s digital fingerprint records are encrypted and stored exclusively on the phone itself. Apple says it does not keep copies of those files on the network. That means a thief would need to already have access to an iPhone in order to steal the fingerprint file.
“There has been to take encrypted, templated biometric information and reverse engineer it,” Alikhani says. But the and requires knowledge of the technology used to create the biometric profile. Even if someone were able to do all of this, that person would still need to create a physical copy of the fingerprint—perhaps 3-D printed and glued to a latex glove—to fool the actual fingerprint scanner guarding entry to a particular facility or computer. This might work, but only in the unlikely scenario there are no other security measures in place.
No comments:
Post a Comment