Biometric Scanning and 3D Printing

Bioprinting technology was developed with the goal of helping thousands, if not millions, of people. A 3D bioprinted organ could replace a damaged one; a 3D bioprinted limb could offer increased normality and function to someone who has lost an appendage.

However, every technological advancement has its light and dark sides. While bioprinting has the potential to improve the lives of countless individuals, it is not without risk, particularly when it comes to the correct identification of authorized users. In this aspect, bioprinting technology can actually cause harm if not monitored correctly.

Bioprinting and Biometric Scanning

Biometric scanning is one of the most essential aspects of any security system. Some security systems rely solely on biometric information to identify authorized users. Common methods of biometric identification include:

  • Fingerprints
  • Voice identification
  • Facial recognition
  • Retinal scans

These identification methods are considered secure because they are unique for each person. However, a recent police case has cast doubt on the ability of a biometric security system to keep information secure. In this instance, police attempted to 3D print a murder victim’s finger in order to unlock his phone. The case is still under investigation, so there are no reports on the success or failure of this attempt.

Police have used other techniques to recreate fingerprints from images, but this is the first time they have used 3D printing in this manner. If the attempt is successful, it could mean other methods of biometric security are made vulnerable by 3D bioprinting.

What the Movies Have Taught Us

Like many others, I think I know a little bit about hacking biometric security systems. After all, what spy or action movie doesn’t have its share of heroes or villains gaining access to valuables secured behind a biometric lock? The characters in these films employ false contacts, recorded voices, and more to bypass biometric security measures.

Some of the specific ways these characters bypass security include:

  • Recreating fingerprints. Honestly, it isn’t that hard. You can recreate a fingerprint by using modeling clay and metallic particles (to conduct a charge) to make a mold.
  • Vocal recordings. Voice recognition technology allows for a margin of error when reading someone’s voice. After all, we always speak with slightly different tones, pitches, speeds, etc. Hackers can take advantage of these margins by using a recorded speech or, in some cases, by impersonating someone with authorized access.
  • Facial recordings. Even with recent advances in facial recognition systems, a high-definition recording of someone’s face, complete with blinking, can fool many biometric systems.
  • False retinas. It is possible to create a false retina to fool a biometric security system. A high-definition picture of a person’s retina can also trick some systems into improper authorization.

These are not just movie examples. All these methods for hacking a biometric security system have been tested and proven in the real world. I’m sure security companies have held back some tricks to catch people who attempt simple biometric hacking methods, but this still suggests that biometric security systems are more vulnerable than people think.

How to Ensure Security in a World of False Biometrics

Many organizations depend on biometrics, because people stubbornly refuse to use passwords that are hard to crack. “123456” and “password” are still two of the more common passwords in use today. To compensate, companies adopted biometrics as a security measure that helps prevent guessing for access.

It is clear that the advent of 3D bioprinting and the hacking methods listed above can render systems insecure; these methods make it easier to bypass multiple forms of biometric security. If the police can recreate a fingerprint to unlock a dead man’s phone, then criminals can create one to hack into a secure system. Companies that rely solely on biometric authentication for users are nearly as vulnerable as those enterprises that only have passwords for security. It’s just a matter of time.

I believe that to make a security system difficult to hack, it needs elements of both biometric and traditional authentication. As neither method is foolproof, companies cannot have a set-it-and-forget-it mindset about their security system if they want it to be invulnerable to penetration. A multistage authentication process, such as biometrics backed up with password authentication, needs to be part of an overall security system in order to be secure – or at least as secure as anything can be.

Featured Contributor
The opinions expressed in this article are the author’s own and do not necessarily reflect the views of Dassault Systèmes. Featured contributor authors are compensated for their content.

Daniel Newman

Principal Analyst of at Futurum Research
Daniel Newman is the Principal Analyst of Futurum Research and the CEO of Broadsuite Media Group. Living his life at the intersection of people and technology, Daniel works with the world’s largest technology brands exploring Digital Transformation and how it is influencing the enterprise. From Big Data to IoT to Cloud Computing, Newman makes the connections between business, people and tech that are required for companies to benefit most from their technology projects, which leads to his ideas regularly being cited by CNBC, CIO.Com, CIO Review and hundreds of other sites across the world. A 5x Best-Selling Author including his most recent “Building Dragons: Digital Transformation in the Experience Economy,” Daniel is also a Forbes, Entrepreneur and Huffington Post Contributor. MBA and Graduate Adjunct Professor, Daniel Newman is a Chicago Native and his speaking takes him around the world each year as he shares his vision of the role technology will play in our future.