**This is part 3 of a three-part series on passwords
As we discussed in the first segment of this series-The Password Puzzle-password theft is a growing concern, not just for industry experts, but individuals who make online purchases and perform various banking functions.
The convenience in performing so many tasks online in an ever-increasing mobile world is a force gaining momentum with every passing day. We’ve witnessed the emergance of the PC, Laptop, and more recently, widespread mobile device usage. The path towards even greater convenience shows no signs of letting up. Google’s next generation computer goggles bring mobility to an entirely new level. Password security can no longer be seen as a luxury or something to put off until tomorrow. It should be an immediate necessity.
Yet, in February 2012, Javelin Research found that 62 percent of smart phone users do not employ a password on their device. Help Net Security
Industry experts have discussed the viability of voice biometrics as an authentication mechanism for many years. Biometrics are the identification of humans by their physical traits. The most common biometric considered has been finger prints. The process dates back thousands of years when caveman would sign their drawings with fingerprints as a way to authenticate their creation. Today it is the most widely used method in forensic evidence. History of Fingerprints
Two frequent criticisms aimed at finger printing are the need to own and operate expensive machinery and the risk of duplication. As a result, a second biometric-the human voice has garnered closer attention.
Opus Senior Analyst Researcher Dan Miller said that, “Voice biometrics strikes the right balance between strong authentication and usability.” (Voice Biometric in 2012) The biggest concern with voice biometric is the same one facing fingerprinting-that of duplication. Thankfully, Cookeyah Password Bank has devised a compelling strategy to mitigate the threat of a voice being copied.
Cookeyah requires users to read a random sentence during each log in attempt. This virtually eliminates the possibility of a voice being copied and then used to successfully log on to a system. The complexity of a breach is compounded when a large number of random phrases are integrated into a system.
Each human voice is unique and consists of over 2000 biometric parameters. Hardware records the highly specific nuances of each voice to establish a unique and proprietary log in as authentication. This is done during registration.
From then on, each time a user attempts to access the system, they are prompted to read a random phrase-fun fact. The system requires that every word be read in the exact order as they appear on the screen. If the sentence is read properly and the voice parameters match the attempted user’s pre-recorded voice (the one during registration) they will then be logged in.
The alarming rate of password thefts has pushed voice biometric authentication from the planning and “good idea” stage to one of practical value for both individuals and organizations. The human voice as a password is not limited to password banks.
Cookeyah’s sister company Trusttle offers organizations a safe way to send emails and attachments through the same voice biometric authentication process. Trusttle
…authenticate with your own voice