Skip to main content
Log in

Memory-memory (M2) Authentication

  • Patient Facing Systems
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

The article introduces a new type of an authentication technique denoted as memory-memory (M2). A core component of M2 is its ability to collect and populate a voice profile database and use it to perform the verification process. The method relies on a database that includes voice profiles in the form of audio recordings of individuals; the profiles are interconnected based on known relationships between people such that relationships can be used to determine which voice profiles to select to test a person’s knowledge of the identity of the people in the recordings (e.g., their names, their relation to each other). Combining widely known concepts (e.g., humans are superior to computers in processing voices and computers are superior to humans in handling data) expects to significantly enhance existing authentication methods (e.g., passwords, biometrics-based).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Newman GR and McNally MM. Identity theft literature review. NCJRS Doc. No. 210459. Award Number: 2005-TO-008. July 2005. A research report submitted to the U.S. Department of Justice.

  2. Kartoun U, Lu F, Park Y, Ng K. Identity verification system using voice recognition by an individual (USPTO Application 16/397,563; Filed: 29 Apr 2019; Allowed: 24 Sept 2021; Issued: 22 Feb 2022).

  3. LeCun Y, Bengio Y., Hinton G. Deep learning. Nature 521, 436–44 (2015). https://doi.org/10.1038/nature14539

    Article  CAS  PubMed  Google Scholar 

  4. Latinus M and Belin P. Human voice perception. Curr Biol 2011;21(4):R143-5. https://doi.org/10.1016/j.cub.2010.12.033.

    Article  CAS  PubMed  Google Scholar 

  5. Sundararajan K, Woodard DL. 2018. Deep Learning for Biometrics: A Survey. ACM Comput. Surv. 51, 3, Article 65 (May 2018), 34 pages. https://doi.org/10.1145/3190618.

  6. User authentication using images interpreted by the individual. IPCOM000267639D. The IP.com Journal. 2021.

  7. Teoli D, Sanvictores T, An J. SWOT Analysis. [Updated 2021 Sep 8]. In: StatPearls [Internet]. Treasure Island (FL): StatPearls Publishing; 2022 Jan-. Available from: https://www.ncbi.nlm.nih.gov/books/NBK537302/

  8. Wing JM. 2006. Computational thinking. Commun. ACM 49, 3 (March 2006), 33–35. https://doi.org/10.1145/1118178.1118215

  9. Hodgson T, Coiera E. Risks and benefits of speech recognition for clinical documentation: a systematic review. J Am Med Inform Assoc. 2016;23(e1):e169-e179. https://doi.org/10.1093/jamia/ocv152

    Article  PubMed  Google Scholar 

Download references

Funding

The project was funded by IBM.

Author information

Authors and Affiliations

Authors

Contributions

Uri Kartoun is the sole author of the manuscript.

Corresponding author

Correspondence to Uri Kartoun.

Ethics declarations

Conflict of Interest

Uri Kartoun is an employee of IBM.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Topical Collection on Patient Facing Systems

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kartoun, U. Memory-memory (M2) Authentication. J Med Syst 46, 33 (2022). https://doi.org/10.1007/s10916-022-01820-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-022-01820-4

Keywords

Navigation