{"title":"SV-2FA:具有短信和声纹挑战响应的双因素用户身份验证","authors":"Haruhiko Fujii, Y. Tsuruoka","doi":"10.1109/ICITST.2013.6750207","DOIUrl":null,"url":null,"abstract":"Two-step authentication, which uses SMS or voice calls, is becoming more practical for user authentication or for preventing phishing attack. However, conventional methods have vulnerabilities to man-in-the-middle or social-engineering attack or cellphone theft. As a general problem, it is difficult to prevent a legitimate user's denial. Therefore, we propose a secure user authentication method that uses a onetime phone number sent by SMS and oath and voiceprint authentication through voice calls. This method solves the above-mentioned problem and is easy to use since it can be used with any cellphone.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"551 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response\",\"authors\":\"Haruhiko Fujii, Y. Tsuruoka\",\"doi\":\"10.1109/ICITST.2013.6750207\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Two-step authentication, which uses SMS or voice calls, is becoming more practical for user authentication or for preventing phishing attack. However, conventional methods have vulnerabilities to man-in-the-middle or social-engineering attack or cellphone theft. As a general problem, it is difficult to prevent a legitimate user's denial. Therefore, we propose a secure user authentication method that uses a onetime phone number sent by SMS and oath and voiceprint authentication through voice calls. This method solves the above-mentioned problem and is easy to use since it can be used with any cellphone.\",\"PeriodicalId\":246884,\"journal\":{\"name\":\"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)\",\"volume\":\"551 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITST.2013.6750207\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2013.6750207","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response
Two-step authentication, which uses SMS or voice calls, is becoming more practical for user authentication or for preventing phishing attack. However, conventional methods have vulnerabilities to man-in-the-middle or social-engineering attack or cellphone theft. As a general problem, it is difficult to prevent a legitimate user's denial. Therefore, we propose a secure user authentication method that uses a onetime phone number sent by SMS and oath and voiceprint authentication through voice calls. This method solves the above-mentioned problem and is easy to use since it can be used with any cellphone.