Memory-memory (M2) Authentication

AbstractThe article introduces a new type of an authentication technique denoted as memory-memory (M2). A core component of M2 is its ability to collect and populate a voice profile database and use it to perform the verification process. The method relies on a database that includes voice profiles in the form of audio recordings of individuals; the profiles are interconnected based on known relationships between people such that relationships can be used to determine which voice profiles to select to test a person ’s knowledge of the identity of the people in the recordings (e.g., their names, their relation to each other). Combining widely known concepts (e.g., humans are superior to computers in processing voices and computers are superior to humans in handling data) expects to significantly enhance exist ing authentication methods (e.g., passwords, biometrics-based).
Source: Journal of Medical Systems - Category: Information Technology Source Type: research