Biometric Voice Recognition Credit Cards 122
securitas writes "New Scientist's Celeste Biever reports on the latest in biometric security devices: voice recognition credit cards. The device is three times the size of a normal credit card, has a 'microphone, a loudspeaker, a battery and a voice-recognition chip' and is intended to help reduce credit card fraud. The owner speaks a password into the card and the card emits an authentication squawk. Bruce Schneier loves the concept of BeepCard's related sound authentication technology. Other articles at the Telegraph and The Register."
Re:3x the size!?! (Score:3, Interesting)
and no, I did not RTFA
Miss Piggy in the Middle of a Sandwich (Score:5, Interesting)
People have to remember that the transaction isnt secure until its been made.
Hmmm... (Score:4, Interesting)
This seems to be one of those technologies that either flop or revolutionize the way business is done.
It's a nice concept, but what happens when someone "loses their voice", so to speak? Can't buy anything until with it until their voice returns? How well does it interact with accents, background noise, etc?
I don't know how feasible this is but I'd imagine a thumbprint-sensitive card would be much more easier to deal with.
Voice print?!?! (Score:2, Interesting)
no special hardware? (Score:5, Interesting)
I don't see why a microphone is any less special than a USB port or an IR port. If anything, just about any computer these days has a USB port.
And using IR for authentication, many modern phones and almost all modern PDAs will do; all you need to do is plug an IR dongle costing a few dollars (in quantity) into the USB port. And IR can be made interference proof much more easily than sound.
You know what... (Score:2, Interesting)
Merchants can afford to take their chances, too. According to that well-known radical organ, The Wall Street Journal, credit card fraud amounts to $0.06/$100 of overall charges. Oh, the humanity! You can see why merchants spend so very much time whinging about a massive 0.06% loss rate.
Re:Potential problems... (Score:2, Interesting)
Re:Convenience? (Score:1, Interesting)
I'm a bit hazy on how these unique sequences work. Off the top of my head, I think the card has a local high-precision timer in it, and it uses the timer value as an input value to a cryptographic function. If the timer is accurate WRT the server timer, then the encrypted values can be compared. But the factor of the time-input prevents a replay attack.
Re:Convenience? (Score:3, Interesting)