SOUND SECURITY

Acoustic Smart Cards

Unbreakable

Identita's acoustic smart card uses state-of-the-art dynamic acoustic recognition technology. Each time a users presses the card button or identifies themselves on biometric models, this powered smart card generates a unique acoustic tone to enable authentication with a microphone-equipped computing device or through a telephone. Depending on the application, the software automatically records and compresses the digital audio signal containing the binary sequence and relays the signal to the authentication server. The authentication server demodulates the signal to extract and check the user's PIN/passphrase, then grants appropriate access to the application.

How an Acoustic Card works 

Each time the user presses the button on the card, it generates a unique dynamic signature carried thru sound, allowing for authentication with any device equipped with a microphone or via a telephone or IVR interface. Depending on the application, the software registers and automatically compresses the digital audio signal that contains the dynamic sequence and transmits it to Identita’s ECHOsystem™ authentication server. The authentication sever decodes the digital hash & timestamp to extract and verify the PIN or passphrase, and then provides access to the application. For banking, retail, and customer service applications, it reduces the response time from an average of twelve minutes to forty-five seconds, allowing the user to purchase online or offline and send or receive money in a timely and secure way.


How an Acoustic Powered Card works

Affordability and Ease-of-use

Most companies still do not have some manner of two-factor authentication, even for remote users. This reflects the high capital costs associated with purchasing, installing and maintaining the average security key fob or smart card infrastructure. Identita's EchoSystem acoustic authentication device breaks this barrier, adapting to any environment without requiring a specific reader. Acoustic authentication devices require only the microphone of a computing device or telephone. EchoSystem's solutions are not only secure, they are also the most cost-effective identity authentication systems available. These solutions can be deployed rapidly across current infrastructure and integrated seamlessly with existing security frameworks and protocols.





Comodo SSL