Touchstone Words


Wearable Items To Boost The Security Of Voice-Based Log-in | Touchstone Words

Popular Articles

Sexual activity and body health
Do You Know If You Are Sexually Active
Biofuel, Biodiesel, Environment, Fuel, Fossil Fuel, Energy, biohydrogen, biomethanol, biohyrdrogen d
Pros and Cons of Biofuel Energy
Porn actors who go to Hollywood
From Porn performances to Hollywood
social and economical state of a country
Pros and cons of capitalism vs socialism
Perceptions and mind thinking
What are perceptions and how to manage them
Taylor Swift nightmare songs
Top Ten Worst Taylor Swift Songs Shared by her Fans
How to get right attitude woman
Why in dating and relationship, attitude matters
Blow job tips
Pros and Cons of Blow Jobs
Public sex
Best Places for Public Hookup
LGBT, lesbian, gay, homosexual, sexuality, relationship, love, acceptance, crisis, gender, identity
What we know about LGBT and the gender identity crisis

Wearable Items to Boost the Security of Voice-Based Log-in

By Katie Lee on 2018-07-17

A security-token necklace, ear buds or eyeglasses developed by researchers could eliminate vulnerabilities in voice authentication -- the practice of logging in to a device or service with your voice alone.


Talking to electronics has become a popular -- even essential -- way to command them. In this era of the internet of things, voice assistants connect people to their mobile devices, homes and vehicles. Through spoken interactions, we place calls, send text messages, check email, get travel directions, control appliances, and even access bank accounts. Barclays bank, for example, recently began using a technology that uses voice to verify the identity of call-in center customers.


But sound is what researchers call an "open channel" that can be easily spoofed by mediocre impersonators and sophisticated hackers alike.


"Increasingly, voice is being used as a security feature but it actually has huge holes in it," said Kang Shin, the Kevin and Nancy O'Connor Professor of Computer Science and professor of electrical engineering and computer science at U-M. "If a system is using only your voice signature, it can be very dangerous. We believe you have to have a second channel to authenticate the owner of the voice."


The solution that Shin and colleagues developed is called VAuth (pronounced vee-auth), and it's a wearable device that can take the form of a necklace, ear buds or a small attachment to eyeglasses. VAuth continuously registers speech-induced vibrations on the user's body and pairs them with the sound of that person's voice to create a unique and secure signature.


The process of speaking creates vibrations that can be detected on the skin of a person's face, throat or chest. The system works by leveraging the instantaneous consistency between signals from the accelerometer in the wearable security token and the microphone in the electronic device. You can only use voice authentication with your device when you're wearing the security token.


The team has built a prototype using an off-the-shelf accelerometer, which measures motion, and a Bluetooth transmitter, which sends the vibration signal to the microphone in the user's device. They've also developed matching algorithms and software for Google Now.


"VAuth is the first serious attempt to secure this service, ensuring that your voice assistant will only listen to your commands instead of others," Shin said. "It delivers physical security, which is difficult to compromise even by sophisticated attackers. Only with this guarantee can the voice assistant be trusted as personal and secure, especially in scenarios such as banking and home safety."


That's a drastic departure from existing voice biometric mechanisms, which require training from each individual who will use them, said Kassem Fawaz, who worked on the project as a graduate student at U-M and is now an assistant professor at the University of Wisconsin.
"In addition, VAuth overcomes a key problem of voice biometrics," he said. "A voice biometric, similar to a fingerprint, is not easy to keep protected. From a few recordings of the user's voice, an attacker can impersonate the user by generating a matching 'voice print.'


"The users can do little to regain their security as they cannot simply change their voice. On the other hand, when losing VAuth for any reason, the user can simply unpair it to prevent an attacker from using their device."


The team tested VAuth with 18 users and 30 voice commands. It achieved a 97-percent detection accuracy and less than 0.1 percent false positive rate, regardless of its position on the body and the user's language, accent or even mobility. The researchers say it also successfully thwarts various practical attacks, such as replay attacks, mangled voice attacks or impersonation attacks.


The researchers also surveyed 952 people to gauge their willingness to wear a security token.
"Seventy percent of them said they are willing to give VAuth a serious try in one of the three configurations we developed -- and half of them said they are willing to pay $25 more for the technology," said Huan Feng, who worked on the project as a graduate student and currently works for Facebook.


A study on VAuth, titled "Continuous Authentication for Voice Assistants," will be presented Oct. 19 at the International Conference on Mobile Computing and Networking, MobiCom 2017, in Snowbird, Utah. The work was supported by the National Science Foundation. The researchers have applied for patent protection, and they are seeking commercialization partners to help bring the technology to market.


Article Comments

By Same Author

How neural network works
How Computer Engineers are Changing Neural Networks
Learn about non-verbal communications
How to Communicate Without Speaking
Computers and human diseases
How Computers Can Fight Diseases
Latest progress in computer speed
New Software Speeds Big-Data Analysis Through Algebra
Modern dating and matchmaking using computer science
An Algorithm to Find Your Perfect Match
Learn about Human-sized Holograms
What Are Human-sized Holograms
How to trust internet with your secrets
Are You Ready To Trust the Internet With Your Secrets
Learn about metabolic pathways
Modeling Metabolic Pathways
What are negative social talks about software
Social Bias Used against Software
Live of kids and technology
Technology is Not Completely Dominating Lives of Children

Affiliated Companies

Disclaimers And Things

Copyright © WEG2G, All Rights Reserved
Designed & Developed by DC Web Makers