Browse Prior Art Database

A method of dynamic authentication based on the voice and track

IP.com Disclosure Number: IPCOM000239487D
Publication Date: 2014-Nov-12
Document File: 2 page(s) / 44K

Publishing Venue

The IP.com Prior Art Database

Abstract

This article presents a method of unlocking mobile device(especially wearable device) securely and easily. User can select password by slide or input characters etc., when un-locking, user can speak randomly regerated words on corresponding slide nodes or characters which is secure and convenient.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 76% of the total text.

Page 01 of 2

A method of dynamic authentication based on the voice and track

When holding a mobile device and proceeding authentication, a more secure and more operable method is needed.

Two methods are now usually utilized. One way is based on hand gestures, but it is easy to be peeped and revealed, and it is not prone to be operated if the gestures are toocomplicated. The other one is based on voice printrecognition, but it can be penetrated by recording the voice and playing back.

This method can generate the dynamic password library (for example nine-square grid, or sixteen-square grid), which the user reads in accordance with the hand gestures track in memory to complete the authentication.

This method combines hand gesture passwords and voice together, not only to avoid the simple voice to be easily eavesdropped, but also avoid the gesture passwords to by easily peeped. It has the complexity of hand gesture passwords, and does not need to occupy the finger operation. In the wearable equipment where it is inconvenient to use keyboard to input, this method provides easy operation and higher safety.

Phase1: set the password(see figure 1)

1. The user moves the fingers across the nine-square grid on the mobile screen to set a password track, like what existing hand gesture passwords do on mobile.

2. The positions and sequences comprising the track are saved in the mobile device

Figure 1

1


Page 02 of 2

Phase2: authentication(see figure 2)

1. The user requests to authenticate...