摘要:
Systems and methods for authenticating electronic transactions are provided, as well as methods for enrolling the person prior to authentication and systems for enrollment and authentication. The systems and methods employ multiple communication channels and security features,including features based on unique knowledge of the person being authenticated, a unique object that the person possesses, unique biometric or personal features and attributes of the person, and the ability of the person to respond in a fashion that a machine cannot imitate. In one embodiment, the user being authenticated receives a prompt and is expected to provide a corresponding voice response, e.g., by speaking into a microphone. Authentication is based in part on voice identification, which takes into account whether the voice corresponds to the user's registered voice, and in part on voice recognition, wherein the words spoken are extracted and compared to the expected response.
摘要:
Methods for software activation are provided that associate a software license key with one or more authorized individuals such that an authorized individual can readily transfer a license between different platforms. A biometric sample of the individual is stored in an enrollment step upon first activation of the software. Later, the same individual can provide a biometric sample that matches the stored biometric sample in order to activate the software on another platform, rendering the first instance inactive if no additional activations are available. More than one individual can be authorized under a license that allows for multiple activations.
摘要:
Methods for authentication over unsecure networks using one-time passwords methods are provided. The methods establish a connection over a first channel between an authentication system and a user's computing system, then the authentication system determines information based on the connection over the first channel, such as the IP address and other information that can be readily found once the IP address is known. The information derived from the connection is then provided to the user over a second channel, and the user is given an opportunity to review the information before deciding whether to continue the login. If the information returned to the user over the second channel is suspicious, this can indicate to the user that the connection over the first channel has been compromised.