Method and system for verifying a party of a business transaction

作者: Jörg Tacke , Michael Kramer

DOI:

关键词: Business transactionsDatabase transactionService providerComputer securityTelephone numberPhraseAuthenticationComputer science

摘要: Authentication method has the following steps: input of a telephone number by participant, transmission to an authentication service provider who transmits phrase participant using number, calls back and repeats which is then compared with speech data stored in memory. If agreement spoken within threshold transaction initiated. To prevent fraud will not know be repeated before he calls. An independent claim made for system protecting e-commerce type transactions.

参考文章(4)
Alan L. Higgins, Speaker verifier using nearest-neighbor distance measure Journal of the Acoustical Society of America. ,vol. 97, pp. 2629- 2629 ,(1992) , 10.1121/1.411889