As we rely on computers for tasks like handling money and keeping secrets safe, it has become increasingly important to give our desktops, laptops and PDAs the means to know for sure who they are dealing with. The classic solution is . . .
As we rely on computers for tasks like handling money and keeping secrets safe, it has become increasingly important to give our desktops, laptops and PDAs the means to know for sure who they are dealing with. The classic solution is to lock up the data, and give the user a cryptographic key. The main challenge to improving this type of security is to make it more difficult to steal or reconstruct the keys, but at the same time make it easier for legitimate users to access computing resources.

Researchers from Lucent Technologies' Bell Labs are tapping the individuality of the human voice to generate unique cryptographic keys for computer users. Under the researchers' scheme, a user speaks a password, and the system listens for both the correct word and the correct voice.

The link for this article located at TRN News is no longer available.