Title :
With vaulted voice verification my voice is my key
Author :
Johnson, R.C. ; Boult, Terrance E.
Author_Institution :
Colorado Springs & Securics, Inc., Univ. of Colorado, Colorado Springs, CO, USA
Abstract :
Those who handle sensitive information from time to time need a device that can communicate securely. They also need the ability to verify the recipient of the information. For such secure communication to take place, they must securely exchange a key, often with someone they do not already know. Biometrics have been gaining widespread adoption in an effort to verify the end users identity. We extend this to key exchange. Vaulted Voice Verification, a recently introduced voice-based biometric protocol, has been shown to securely and remotely verify a user while also maintaining the privacy of the user. However Vaulted Voice Verification as originally proposed was not well suited for the exchange of larger keys. We present an index-based Vaulted Voice Verification which significantly reduces communication overhead and allows the transmission of keys that are suitable for biometrically authenticated secure communication.
Keywords :
biometrics (access control); data privacy; telecommunication security; authenticated secure communication; communication overhead; end users identity; index based vaulted voice verification; key exchange; remote user verification; sensitive information; user privacy; voice based biometric protocol; Biometrics (access control); Privacy; Protocols; Public key; Servers; Vaulted Voice Verification; biometrics; privacy; security; speaker verification;
Conference_Titel :
Technologies for Homeland Security (HST), 2013 IEEE International Conference on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4799-3963-3
DOI :
10.1109/THS.2013.6699047