SOUND SECURITY

Audio Smart Cards

Unbreakable

Identita's audio smart card uses state-of-the-art dynamic audio recognition technology. Each time a users presses the card button or identifies themselves on biometric models, this powered smart card generates a unique acoustic tone to enable authentication with a microphone-equipped computing device or through a telephone. Depending on the application, the software automatically records and compresses the digital audio signal containing the binary sequence and relays the signal to the authentication server. The authentication server demodulates the signal to extract and check the user's PIN/passphrase, then grants appropriate access to the application. Audio smart cards are extensible to three-factor authentication with the addition of built-in biometric sensors. 

How an Audio Powered Card works 
The audio signal is captured locally on the user device (PC microphone, PDA, cell phone, etc). A previously loaded plug-in automatically records the signal and sends a compressed version of it to the authentication server. Depending on the application, either the client application or the authentication server demodulates the signal to get the binary sequence and relays it with the user's pin/passphrase to the authentication server. Once the signature and password are verified by the authentication server, access to the application is granted.

How an Acoustic Powered Card works

Affordability and Ease-of-use 
Most companies still do not have some manner of two-factor authentication, even for remote users. This reflects the high capital costs associated with purchasing, installing and maintaining the average security key fob or smart card infrastructure. Identita's audio smart card breaks this barrier, adapting to any environment without requiring a specific reader. Acoustic authentication devices require only the microphone of a computing device or telephone. Identita's solutions are not only secure, they are also the most cost-effective identity authentication platforms available. These solutions can be deployed rapidly across current infrastructure and integrated seamlessly with existing security frameworks and protocols. Audio Authentication Devices