Systems and methods for evaluating the strength of audio passwords
An audio and password technology, applied in the field of electronic devices, can solve problems such as insufficient security of electronic devices
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] Some configurations of the systems and methods disclosed herein provide password strength assessments and recommendations for voice-based biometric authentication. When using voice for authentication purposes, the user may want to set the password to be spoken. However, it may be difficult to know whether the password will be unique enough in terms of voice timbre that no one else can break the system when the same password happens to be spoken. It would be even better if the spoken password contained the user's own biometric difference from an arbitrary set password. If additional means are available, they can be used to enforce security as appropriate.
[0027] The systems and methods disclosed herein can provide a way to assess the strength of "uniqueness" so that a user can choose a sufficiently unique password. In some configurations, the systems and methods disclosed herein may suggest some candidates using utterances that preserve the user's enhanced uniqueness...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


