Browse Prior Art Database

Systems and Methods for Dynamic Audio Authentication across different devices and applications

IP.com Disclosure Number: IPCOM000238499D
Publication Date: 2014-Aug-29
Document File: 5 page(s) / 92K

Publishing Venue

The IP.com Prior Art Database

Abstract

Nowadays, each of us owns many kinds of devices or PCs with various authentication mechanism behind them in order to protect our private data. There are plenty of passwords or authentication gestures people have to maintain. It costs a lot of time and energy to reinvent the wheels. Take out your personal device (e.g. smart phone, tablets) from your pocket, unlock it, immediately, all associated computers/applications/smart devices are logged in with your personal credential and authorized by a trusted device user, without bothering to type user name and password repeatedly any more.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 5

Systems and Methods for Dynamic Audio Authentication across different devices and applications

This invention named systems and methods for dynamic audio authentication across different devices and applications can improve and simplify the authentication process among different devices and applications. Now people have more and more different devices and applications which have complex authentication method to protect the data security. There are too many complex passwords or authentication methods to remember in order to guard the data safety when people want to use some devices and applications now and again . It costs a lot of effort and time to do such various complex authentications. With dynamic audio authentication, user can log in different devices and application with easy actions and leave the authentication to a trusted device user. Also the dynamic audio impulse increases the security level, which is one-off use and always changed. User can not use the same audio impulse for twice so even there is someone who recorded the audio this time, he/she can not reuse it to unlock user's devices or applications since the audio impulse is expired at a very short time interval.

Take out your personal device (e.g. smart phone, tablets) from your pocket, unlock it, immediately, all associated computers/applications/smart devices are logged in with your personal credential and authorized by a trusted device user, without bothering to type user name and password repeatedly any more. We separate our system from the pack as follows:

Your personal hardware(device/pc) here is acting as a key to unlock your operating system, other internet resources and devices. The discrepancy is your key is changing all the time and meanwhile authorized by a trusted device user, which could 100 percent guarantee your personal credential's safety. After complex algorithm in the back end, system will calculate a dynamic password code which would further generate a corresponding audio according to dynamic mapping rule. Once audio is generated, it could be effective only once and then discarded.

System will adopt high frequency noise to transfer credential information which is beyond human's identifiable acoustic spectrum and couldn't be recognized by a normal human being.

The respondent could identify that high frequency noise with a common microphone, in oth...