Voice Technology, Passwords And How To Protect Your Phone
It's a lot easier to talk to a smartphone than to try to type instructions on its keyboard. This is particularly true when a person is trying to log in to a device or a system: Few people would choose to type a long, complex secure password if the alternative were to just say a few words and be authenticated with their voice. But voices can be recorded, simulated or even imitated, making voice authentication vulnerable to attack. The most common methods for securing voice-based authentication involve only ensuring that analysis of a spoken passphrase is not tampered with; they securely store the passphrase and the authorized user's voiceprint in an encrypted database. But securing a voice authentication system has to start with the sound itself.
Jul-21-2017, 13:40:13 GMT
- Country:
- North America > United States > New York (0.05)
- Industry:
- Information Technology > Security & Privacy (1.00)
- Technology: