作者: Jörg Tacke , Michael Kramer
DOI:
关键词: Business transactions 、 Database transaction 、 Service provider 、 Computer security 、 Telephone number 、 Phrase 、 Authentication 、 Computer science
摘要: Authentication method has the following steps: input of a telephone number by participant, transmission to an authentication service provider who transmits phrase participant using number, calls back and repeats which is then compared with speech data stored in memory. If agreement spoken within threshold transaction initiated. To prevent fraud will not know be repeated before he calls. An independent claim made for system protecting e-commerce type transactions.