[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kaur et al., 2020 - Google Patents

Intelligent voice bots for digital banking

Kaur et al., 2020

Document ID
11001485075912905129
Author
Kaur R
Sandhu R
Gera A
Kaur T
Gera P
Publication year
Publication venue
Smart Systems and IoT: Innovations in Computing: Proceeding of SSIC 2019

External Links

Snippet

Current digital payment solutions are passwords or PIN-based and are complex and time- consuming process with 5+ steps including downloading an app, thereby impacting bandwidth and cost. Moreover, these are susceptible to phishing/vishing/theft/hacking. Also …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Similar Documents

Publication Publication Date Title
Kaur et al. Intelligent voice bots for digital banking
US11748469B1 (en) Multifactor identity authentication via cumulative dynamic contextual identity
US20220400109A1 (en) Centralized gateway server for providing access to services
US11625467B2 (en) Authentication via a dynamic passphrase
US8831941B2 (en) System and method for tracking fraudulent electronic transactions using voiceprints of uncommon words
US20150088746A1 (en) Method and system for implementing financial transactions
US10665238B1 (en) Alert through voice assistant
US20060136219A1 (en) User authentication by combining speaker verification and reverse turing test
US11769152B2 (en) Verifying user identities during transactions using identification tokens that include user face data
Khitrov Talking passwords: voice biometrics for data access and security
US20220122060A1 (en) Voice Controlled Systems and Methods for Onboarding Users and Exchanging Data
JP2022087815A (en) System to achieve interoperability through use of interconnected voice verification systems and method and program
US20100161468A1 (en) Systems and methods for authenticating parties engaging in a financial transaction
US20220321350A1 (en) System for voice authentication through voice recognition and voiceprint recognition
EP4420120A1 (en) Shared assistant profiles verified via speaker identification
US11934892B2 (en) Global account identifier translation
Chetalam Enhancing Security of MPesa Transactions by Use of Voice Biometrics
US20220300596A1 (en) Authentication System
KR101703942B1 (en) Financial security system and method using speaker verification
AU2015200732B2 (en) Authentication using application authentication element
US20240129311A1 (en) Digital identity step-up
US12057128B1 (en) System and method for enhanced trust
CN107454057A (en) Information processing method and device
KR100639828B1 (en) On-line Banking service method
MK et al. Voice Biometric System-Authentication Over the Voice Command from Remote Place-A Case Study