GB2581595B - Detection of Replay Attack - Google Patents

Detection of Replay Attack Download PDF

Info

Publication number
GB2581595B
GB2581595B GB2004478.0A GB202004478A GB2581595B GB 2581595 B GB2581595 B GB 2581595B GB 202004478 A GB202004478 A GB 202004478A GB 2581595 B GB2581595 B GB 2581595B
Authority
GB
United Kingdom
Prior art keywords
detection
replay attack
replay
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB2004478.0A
Other versions
GB202004478D0 (en
GB2581595A (en
Inventor
Paul Lesso John
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cirrus Logic International Semiconductor Ltd
Original Assignee
Cirrus Logic International Semiconductor Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB1803570.9A external-priority patent/GB201803570D0/en
Priority claimed from GBGB1804843.9A external-priority patent/GB201804843D0/en
Application filed by Cirrus Logic International Semiconductor Ltd filed Critical Cirrus Logic International Semiconductor Ltd
Publication of GB202004478D0 publication Critical patent/GB202004478D0/en
Publication of GB2581595A publication Critical patent/GB2581595A/en
Application granted granted Critical
Publication of GB2581595B publication Critical patent/GB2581595B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/16Sound input; Sound output
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Biomedical Technology (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Measurement Of Velocity Or Position Using Acoustic Or Ultrasonic Waves (AREA)
  • Circuit For Audible Band Transducer (AREA)
GB2004478.0A 2017-10-13 2018-10-11 Detection of Replay Attack Active GB2581595B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201762571959P 2017-10-13 2017-10-13
US201762585721P 2017-11-14 2017-11-14
GBGB1803570.9A GB201803570D0 (en) 2017-10-13 2018-03-06 Detection of replay attack
GBGB1804843.9A GB201804843D0 (en) 2017-11-14 2018-03-26 Detection of replay attack
PCT/GB2018/052906 WO2019073234A1 (en) 2017-10-13 2018-10-11 Detection of replay attack

Publications (3)

Publication Number Publication Date
GB202004478D0 GB202004478D0 (en) 2020-05-13
GB2581595A GB2581595A (en) 2020-08-26
GB2581595B true GB2581595B (en) 2021-09-22

Family

ID=66100457

Family Applications (1)

Application Number Title Priority Date Filing Date
GB2004478.0A Active GB2581595B (en) 2017-10-13 2018-10-11 Detection of Replay Attack

Country Status (4)

Country Link
KR (1) KR102532584B1 (en)
CN (1) CN111194445A (en)
GB (1) GB2581595B (en)
WO (1) WO2019073234A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11039242B2 (en) * 2017-01-03 2021-06-15 Koninklijke Philips N.V. Audio capture using beamforming
CN112151038B (en) * 2020-09-10 2022-12-16 达闼机器人股份有限公司 Voice replay attack detection method and device, readable storage medium and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130289999A1 (en) * 2012-04-30 2013-10-31 Research In Motion Limited Dual microphone voice authentication for mobile device
WO2015163774A1 (en) * 2014-04-24 2015-10-29 Igor Muttik Methods and apparatus to enhance security of authentication
GB2541466A (en) * 2015-08-21 2017-02-22 Validsoft Uk Ltd Replay attack detection

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9767817B2 (en) * 2008-05-14 2017-09-19 Sony Corporation Adaptively filtering a microphone signal responsive to vibration sensed in a user's face while speaking
KR101166612B1 (en) * 2009-08-19 2012-07-18 엘지전자 주식회사 Method for processing sound source in terminal and terminal using the same
WO2013058728A1 (en) * 2011-10-17 2013-04-25 Nuance Communications, Inc. Speech signal enhancement using visual information
JP6220304B2 (en) * 2014-03-28 2017-10-25 セコム株式会社 Voice identification device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130289999A1 (en) * 2012-04-30 2013-10-31 Research In Motion Limited Dual microphone voice authentication for mobile device
WO2015163774A1 (en) * 2014-04-24 2015-10-29 Igor Muttik Methods and apparatus to enhance security of authentication
GB2541466A (en) * 2015-08-21 2017-02-22 Validsoft Uk Ltd Replay attack detection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHEN SI; REN KUI; PIAO SIXU; WANG CONG; WANG QIAN; WENG JIAN; SU LU; MOHAISEN AZIZ: "You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones", PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, IEEE COMPUTER SOCIETY, US, 5 June 2017 (2017-06-05), US, pages 183 - 195, XP033122979, ISSN: 1063-6927, DOI: 10.1109/ICDCS.2017.133 *

Also Published As

Publication number Publication date
CN111194445A (en) 2020-05-22
GB202004478D0 (en) 2020-05-13
KR102532584B1 (en) 2023-05-12
KR20200066691A (en) 2020-06-10
WO2019073234A1 (en) 2019-04-18
GB2581595A (en) 2020-08-26

Similar Documents

Publication Publication Date Title
GB2578386B (en) Detection of replay attack
GB2578541B (en) Detection of replay attack
GB201803570D0 (en) Detection of replay attack
GB201804843D0 (en) Detection of replay attack
GB2604747B (en) Detection of replay attack
GB2578545B (en) Magnetic detection of replay attack
GB2541466B (en) Replay attack detection
GB201801661D0 (en) Detection of liveness
GB201801663D0 (en) Detection of liveness
GB201801664D0 (en) Detection of liveness
GB2534654B (en) Detecting and removing spoofing signals
GB201710560D0 (en) Detection of manipulated images
IL240153B (en) Line of block detection
GB201509884D0 (en) Moving-vane angle of attack probe
PL3245493T3 (en) Structural damage detection
GB2545480B8 (en) Detection of coordinated cyber-attacks
GB201711689D0 (en) Ice detection
PL3589742T3 (en) Method of detection
SG11201707024XA (en) Remote detecting and tracking of objects
HUE057172T2 (en) Detection of an obstruction
GB2581595B (en) Detection of Replay Attack
GB2581594B (en) Detection of liveness
GB201500496D0 (en) Structural damage detection
GB201918494D0 (en) Detection of epigenetic modifications
GB2553005B (en) Method of line detection