Acoustic Cards


Identita's acoustic smart card uses state-of-the-art dynamic acoustic recognition technology. Each time a users presses the card button or identifies themselves on biometric models, this powered smart card generates a unique acoustic tone to enable authentication with a microphone-equipped computing device or through a telephone. Depending on the application, the software automatically records and compresses the digital audio signal containing the binary sequence and relays the signal to the authentication server. The authentication server demodulates the signal to extract and check the user's PIN/passphrase, then grants appropriate access to the application. Acoustic cards are extensible to three-factor authentication with the addition of built-in biometric sensors. 

How an Acoustic Powered Card's works 
The audio signal is captured locally on the user device (PC microphone, PDA, cell phone, etc). A previously loaded a plug-in automatically records the signal and sends a compressed version of it to the authentication server. Depending on the application, either the client application or the authentication server demodulates the signal to get the binary sequence and relays it with the user's pin/passphrase to the authentication server. Once the signature and password are verified by the authentication server, access to the application is granted.

How an Acoustic Powered Card works

Affordability and Ease-of-use 
Most companies still do not have some manner of two-factor authentication, even for remote users. This reflects the high capital costs associated with purchasing, installing and maintaining the average security key fob or smart card infrastructure. Identita's EchoSystem acoustic authentication device breaks this barrier, adapting to any environment without requiring a specific reader. Acoustic authentication devices require only the microphone of a computing device or telephone. EchoSystem's solutions are not only secure, they are also the most cost-effective identity authentication systems available. These solutions can be deployed rapidly across current infrastructure and integrated seamlessly with existing security frameworks and protocols. Audio Authentication Devices