{"title":"SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response","authors":"Haruhiko Fujii, Y. Tsuruoka","doi":"10.1109/ICITST.2013.6750207","DOIUrl":null,"url":null,"abstract":"Two-step authentication, which uses SMS or voice calls, is becoming more practical for user authentication or for preventing phishing attack. However, conventional methods have vulnerabilities to man-in-the-middle or social-engineering attack or cellphone theft. As a general problem, it is difficult to prevent a legitimate user's denial. Therefore, we propose a secure user authentication method that uses a onetime phone number sent by SMS and oath and voiceprint authentication through voice calls. This method solves the above-mentioned problem and is easy to use since it can be used with any cellphone.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"551 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2013.6750207","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
Two-step authentication, which uses SMS or voice calls, is becoming more practical for user authentication or for preventing phishing attack. However, conventional methods have vulnerabilities to man-in-the-middle or social-engineering attack or cellphone theft. As a general problem, it is difficult to prevent a legitimate user's denial. Therefore, we propose a secure user authentication method that uses a onetime phone number sent by SMS and oath and voiceprint authentication through voice calls. This method solves the above-mentioned problem and is easy to use since it can be used with any cellphone.