Abstract
The article introduces a new type of an authentication technique denoted as memory-memory (M2). A core component of M2 is its ability to collect and populate a voice profile database and use it to perform the verification process. The method relies on a database that includes voice profiles in the form of audio recordings of individuals; the profiles are interconnected based on known relationships between people such that relationships can be used to determine which voice profiles to select to test a person’s knowledge of the identity of the people in the recordings (e.g., their names, their relation to each other). Combining widely known concepts (e.g., humans are superior to computers in processing voices and computers are superior to humans in handling data) expects to significantly enhance existing authentication methods (e.g., passwords, biometrics-based).
References
Newman GR and McNally MM. Identity theft literature review. NCJRS Doc. No. 210459. Award Number: 2005-TO-008. July 2005. A research report submitted to the U.S. Department of Justice.
Kartoun U, Lu F, Park Y, Ng K. Identity verification system using voice recognition by an individual (USPTO Application 16/397,563; Filed: 29 Apr 2019; Allowed: 24 Sept 2021; Issued: 22 Feb 2022).
LeCun Y, Bengio Y., Hinton G. Deep learning. Nature 521, 436–44 (2015). https://doi.org/10.1038/nature14539
Latinus M and Belin P. Human voice perception. Curr Biol 2011;21(4):R143-5. https://doi.org/10.1016/j.cub.2010.12.033.
Sundararajan K, Woodard DL. 2018. Deep Learning for Biometrics: A Survey. ACM Comput. Surv. 51, 3, Article 65 (May 2018), 34 pages. https://doi.org/10.1145/3190618.
User authentication using images interpreted by the individual. IPCOM000267639D. The IP.com Journal. 2021.
Teoli D, Sanvictores T, An J. SWOT Analysis. [Updated 2021 Sep 8]. In: StatPearls [Internet]. Treasure Island (FL): StatPearls Publishing; 2022 Jan-. Available from: https://www.ncbi.nlm.nih.gov/books/NBK537302/
Wing JM. 2006. Computational thinking. Commun. ACM 49, 3 (March 2006), 33–35. https://doi.org/10.1145/1118178.1118215
Hodgson T, Coiera E. Risks and benefits of speech recognition for clinical documentation: a systematic review. J Am Med Inform Assoc. 2016;23(e1):e169-e179. https://doi.org/10.1093/jamia/ocv152
Funding
The project was funded by IBM.
Author information
Authors and Affiliations
Contributions
Uri Kartoun is the sole author of the manuscript.
Corresponding author
Ethics declarations
Conflict of Interest
Uri Kartoun is an employee of IBM.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Topical Collection on Patient Facing Systems
Rights and permissions
About this article
Cite this article
Kartoun, U. Memory-memory (M2) Authentication. J Med Syst 46, 33 (2022). https://doi.org/10.1007/s10916-022-01820-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-022-01820-4