Rapid adoption of mobile platforms such as smartphones and tablet computers has increased the range of applications and data on mobile devices. The use of these devices to communicate sensitive or confidential data requires, among other things, strong front-end user authentication procedures and/or protocols to protect the sensitive or confidential data, the devices themselves, and the integrity of networks carrying such data. Traditional methods of front-end user authentication such as typed-in password or graph-match patterns on the screen can be stolen or obtained by coercion.
Biometric-based user authentication technology for mobile device access and continuous authentication uses the owner's intrinsic physical characteristics such as voice with spoken password. This technology authenticates the rightful user of the mobile device, a particular application, network, or database. It also collects biometric information when suspicious access attempts are detected.
It operates by comparing a power spectrum and/or an amplitude spectrum within a frequency range of an audio signal to a criterion, and determining that the audio signal is one of a live audio signal or a playback audio signal, based on the comparison.
For more information, visit here , or phone 781-271-4649.