User authentication prior to accessing contents of a secured device or container can be achieved in many ways, including textual passwords, picture passwords, locks, keys, or other codes. Many devices also allow for biometric authentication via fingerprint scanners, iris scanners, facial recognition, or the like for increased security and simplified user experience. In concept, a biometric scanner would eliminate all but a single individual from obtaining access to the device or container. However, many biometric scanners can be fooled, tricked, or spoofed. For example, an unauthorized user can bypass some fingerprint scanners obtaining a latent fingerprint, manipulating a copy of the latent print, and presenting the copy to the fingerprint scanner, which can result in unauthorized access to the device or container. Indeed, improvement in scanning technology and manipulation software have increased the potential for forged fingerprint production. Fingerprint scanners, especially those in smart device displays, can be improved by illuminating a finger, or a purported finger, with multiple differing wavelengths of light as an integral component of fingerprint verification.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.