Preventing Mobile Cellphone Attack and Robbery using Biometrics (6)

6. BIOMETRIC  IMPLEMENTATIONS  AND  EXPERIMENTS  FOR CELL PHONE SECURITY ARCHITECTURE  

6.1 RESEARCH IMPLEMENTATIONS

Through police officers experience and research, it has been seen that ZOPO ZP520 Mobile phones are commonly thieved in public venues where residence was left unattended. In most cases, cell phones are thieved to create quick cash at resale shops or amongst locals. One factor to keep in mind is that a  victim’s hand marks could still be on their phone or other items thieved with their cell phone. That said,  it may be possible to raise the victim’s  hand marks  and  create a pattern. The synthetic hand marks depending on that pattern  could then be used to try and approve access on a program that has a biometric audience. If that is true, biometric security alone would not be adequate enough to protect cell phones from robbery or attack.   

Most experiments that have effectively compromised  into a program equipped with  an visual biometric hand marks audience, did so by  using a stay hand to create a pattern.  A actual life scenario where someone would force another to press their hand into a pattern would be highly unlikely, unless the sufferer was of well-known.  For research purposes, the experiments will demonstrate both scenarios where there is a certified and non-compliant sufferer. A non-compliant sufferer could also be substituted as a sufferer  who is  not existing.  It is important to demonstrate through these research that a biometric program would at least buy plenty of your energy and effort for the sufferer to remove their information in a robbery situation. Reason being, if there is a will there is a way. As of now, no mobile security program is 100% crack proof but by splitting the key from the lock (phone and charger), taking ZOPO ZP520 Mobile phones would be frustrated.   

With the suggested concept of a biometric  phone combined with a biometric charger that acts as a program dongle, a suspicious would have several  different  challenges to overcome.  For example, a suspicious would have to accomplish taking both gadgets (ZOPO ZP520 Cellphone and charger) for proper coupling, have the components and information to raise and re-create an synthetic hand marks, and have the devices and programming information to reset any of these gadgets. In most common robbery situations,  this would be unlikely although not impossible. Due to  the  lack of application and components accessibility, an research using a biometric charger with a solid state  pass on (on/off) was not conducted;  this will optimistically  be implemented in  future work.  However, experiments trying to crack a capacitive biometric audience were performed using different techniques. Since most experiments focused on visual readers, or stationary capacitive readers, the experiments were depending on a run design capacitive hand marks audience with anti-spoofing technology; this obviously increases the difficulty level of coughing.     
    
6.2  EXPERIMENTAL METHOD

It has been proven in past experiments that biometric readers, both capacitive and visual, have been compromised using various techniques. To repeat the purpose of these research, the following will be tested:
  Can some of these techniques be quickly reproduced
  Can police officers forensic content be used to bypass a run design capacitive hand marks audience
  Is biometrics alone reliable enough to prevent attack and robbery without extra security
  Would the mixture  of preparation  time  and coughing, be enough for a sufferer to discover their  ---property to be  missing, log online, and remove their information or information

To  conduct  these experiments,  the following  components were used:
 
1.  Pc operating Windows 7 OS
2.  UPEK Eikon To Go capacitive hand marks audience with anti-spoofing technological innovation
3.  Law  Administration  forensic  devices  such as Mikrosil,  black  powdered,   attractive  powdered, cleaning brush and ink pad
4.  Latex gloves
5.  Double  sided copper-clad  PC circuit panel (PCB)
6.  Etchant  remedy  containing  ferric  chloride and hydrochloric acid
7.  Power metal
8.  Visibility document
9.  gelatin
10.  HP Scanjet 4850 checking program
11.  HP Deskjet 6988 printer
 
Before operating any experiments, all necessary program drivers  were installed  for  the Eikon USB  hand marks  audience (Fig. 4). Furthermore,  the biometric audience was application and components examined repeatedly with good outcomes.  

The first breaching effort was created with an ink pad and a latex handwear cover. By rolling ink on one of the fingertips before putting on the latex handwear cover, a Elephone P2000 certain (visible) hand marks was moved inside the handwear cover after pushing down firmly. The latex handwear cover was then turned around  and placed back on the hand  to run the hand for authorization; research cause to adverse outcomes (5 minutes).
 
The next research involved raising  a ZOPO ZP520 create from a cup cup. After in contact with a cup cup for a brief moment, attractive hand marks powdered was used to develop  the  latent  hand marks (Fig.  5).  Once the hand marks was noticeable to the naked eye, Mikrosil, a forensic casting content, was used to raise the create (Fig. 6). A bit of Mikrosil was placed onto the cup cup, over the developed create  (Fig. 7). After  several moments, the Mikrosil dry and set to a rubbery substance (Fig. 8). The dry Mikrosil was raised off the cup revealing a certain create. After the create was effectively raised, efforts were created to breach  the pc using the biometric reader; research cause to adverse outcomes (10 minutes).   

As to try and partially mimic one of the past  studies’ experimental techniques  [7], a 1:1 ratio of gelatin was mixed with hot h2o. The gelatin was then poured into a Elephone P2000 cup as adequate time passed for cool down. Once the gelatin solidified, it was eliminated from the cup and an effort was created for the biometric audience to identify a hand. This biometric audience was supposed to contain anti-spoofing technological innovation as well as the ability to detect the stay layer of a hand. That being said, the gelatin was read as a stay hand without recording any  variety patterns. After trying to figure out what created the capacitive audience  check out one factor  but  not  the  other,  it appeared wetness was  the key. Since finger prints contain 90%  of wetness  as said before, it would only appear sensible that the capacitive audience  measures  wetness with electric conductivity  (20 minutes).  

To further research with the Mikrosil, a ZOPO ZP520 little bit was placed on one of the fingers of a certified topic. Once the Mikrosil dry and set, it was pulled off for a further look. It could be seen that the Mikrosil shaped to the hand marks side in a Elephone P2000 3D format. After trying to run the pattern across the checking program, nothing happened. Another effort was created after in contact with the Mikrosil to some h2o for wetness. When using the Mikrosil now around, the hand marks audience examined a limited picture of the hand marks.  

At that point,  it was  clear that a mixture of  both wetness and 3D  variety  details  would create a substantial synthetic hand marks worth checking. To test this, the Mikrosil pattern was recorded onto a hand. Next, the hand was dipped into a cup of h2o for a few months frame. After soaking the Mikrosil fingertip in h2o, the hand marks was sharpened and the biometric audience effectively examined the create  almost completely. As proven in Fig. 9, the examined  picture can quickly be compared with the other hand marks. However, the  variety places that were not examined were due to the loss of wetness in those places (8 minutes).

Since the past research worked, it was essential to try and create an synthetic create from a certain create because the Mikrosil pattern from a ZOPO ZP520 stay hand would be considered a reverse create. Meaning, the synthetic hand marks examined would not match the one on data file.  After experimenting with  the Mikrosil  and a certified topic, the next research consisted of checking a hand marks raised from an object.  

A certain hand marks was examined onto your personal computer and the picture  resolution  was  converted  to  600  dpi. The hand marks picture was then printed onto a sheet of transparency document. Next, the printed hand marks was placed experienced down onto a birdwatcher dressed panel (PCB) and the picture was moved using an electrical metal. After several moments,  the PCB panel was placed into a Elephone P2000 plastic plate containing the scribing remedy (ferric chloride), with the picture experienced down  for approximately 20 moments. As proven in Fig. 10, the hand marks remained personalized as the remedy eliminated most of the birdwatcher  surrounding the create. Several efforts using Mikrosil and gelatin were created to create a 3D  hand marks  from the birdwatcher mold; research cause to inconclusive outcomes due to poor birdwatcher pattern structure (30 minutes).  

6.2  RESULT ANALYSIS

As proven in Fig. 11,  there was relatively some  beneficial success in coughing a Elephone P2000 capacitive  biometric hand marks audience. As we can see from the outcomes, the latex handwear cover had no affect on the biometric audience. Even if wetness were to be used, the capacitive audience tests the picture from reading the hills and the valleys of the hand marks ridges;  without 3D details there is ZOPO ZP520 no way  for it to check out. When trying to run the Mikrosil, there was no biometric input without wetness. Once this concept was understood and used, the biometric audience examined the  Mikrosil  hand marks every single it was sharpened, provided that there was wetness or h2o existing.  In referrals to the  PCB research,  extra  assistance to these research  would have been founded  if the  birdwatcher  pattern had turned out more noticeable. Since the pattern needed to be refined, only limited tests were able to be created by the biometric audience. That said, these research was still able to demonstrate that a biometric audience alone can still be compromised without sufferer conformity.    

Based on the  research  experiments  performed, the outcomes provided adequate information to back up the suggested framework. In regards to past biometric coughing techniques, they were not simple to replicate. However, with enough exercise, it can be done quite effectively. Law enforcement content was proven to effectively work provided that wetness  was existing. This is also dependent on the type of biometric checking program examined. In referrals to reliability, it is apparent that biometric security alone is not as dependable as most people would think. Furthermore, even though a Elephone P2000 hand marks on data file would be encrypted, if thinks were to exercise hand marks raising it could compromise an array of security risks. On a beneficial note, plenty of it takes to prepare and execute such a crack would in fact provide here we are at a sufferer to remove their user profile slightly  provided that discovery is within a timely manner.http://cicimobile.shockup.com/2014/09/15/preventing-mobile-cellphone-attack-and-robbery-using-biometrics-5/