<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2022-7-1-0-4</article-id><article-id pub-id-type="publisher-id">2698</article-id><article-categories><subj-group subj-group-type="heading"><subject>AUTOMATION AND CONTROL</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;POSSIBLE THREATS AND ATTACKS ON THE USER VOICE IDENTIFICATION SYSTEM&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;POSSIBLE THREATS AND ATTACKS ON THE USER VOICE IDENTIFICATION SYSTEM&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Gerasimov</surname><given-names>Viktor Mikhailovich</given-names></name><name xml:lang="en"><surname>Gerasimov</surname><given-names>Viktor Mikhailovich</given-names></name></name-alternatives><email>my.virus.kaspersky@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2022</year></pub-date><volume>7</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2022/1/Информационные_технологии_7_1-4.pdf" /><abstract xml:lang="ru"><p>Times change. Technologies are used that not only simplify our lives, but also help us to effectively use all the benefits, as well as the achievements of mankind. We are talking about the technology of speech identification and the use of a voice print as a user protection. This technology is interesting because due to the spread of mobile devices, using speech technologies, it has become available to everyone. Many of us can no longer imagine life without devices that allow us to transmit verbal (voice) information to other users. Each new technology carries not only positive, but also negative aspects of using means of protection against an intruder. That is why it is necessary to take into account all the factors of a particular technology. This article discusses possible threats, methods of influencing the user, as well as an analysis of possible measures to prevent possible attacks using the user&amp;#39;s voice print.</p></abstract><trans-abstract xml:lang="en"><p>Times change. Technologies are used that not only simplify our lives, but also help us to effectively use all the benefits, as well as the achievements of mankind. We are talking about the technology of speech identification and the use of a voice print as a user protection. This technology is interesting because due to the spread of mobile devices, using speech technologies, it has become available to everyone. Many of us can no longer imagine life without devices that allow us to transmit verbal (voice) information to other users. Each new technology carries not only positive, but also negative aspects of using means of protection against an intruder. That is why it is necessary to take into account all the factors of a particular technology. This article discusses possible threats, methods of influencing the user, as well as an analysis of possible measures to prevent possible attacks using the user&amp;#39;s voice print.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>threats to voice identification</kwd><kwd>threats to the use of speech technology</kwd><kwd>information security of voice prints</kwd><kwd>methods and techniques to protect the voice system</kwd></kwd-group><kwd-group xml:lang="en"><kwd>threats to voice identification</kwd><kwd>threats to the use of speech technology</kwd><kwd>information security of voice prints</kwd><kwd>methods and techniques to protect the voice system</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>1. Digital 2021: The Latest on the &amp;#39;State of Digital&amp;#39; &amp;ndash; We Are Social UK (https://wearesocial.com/uk/blog/2021/01/digital-2021-the-latest-insights-into-the-state -of-digital/)</mixed-citation></ref><ref id="B2"><mixed-citation>2. https://www.forbes.com/sites/forbestechcouncil/2021/05/07/how-voice-ai-is-changing-the-way-people-order-food/?sh=52b2c6af7709</mixed-citation></ref><ref id="B3"><mixed-citation>3. https://www.fastcasual.com/news/study-1-in-4-consumers-who-get-a-restaurant-result-in-voice-search-visit-that-restaurant/</mixed-citation></ref><ref id="B4"><mixed-citation>4. https://www.pwc.com/us/en/services/consulting/library/consumer-intelligence-series/voice-assistants.html</mixed-citation></ref><ref id="B5"><mixed-citation>5. Kostikov V.A., Maslova M.A. Using the voice identification system as additional user protection // 17th International Youth Scientific and Technical Conference &amp;quot;Modern problems of radio electronics and telecommunications, RT-2021&amp;quot;, October 11 - 15, 2021, Sevastopol, Russian Federation, P. 223-224</mixed-citation></ref><ref id="B6"><mixed-citation>6. Maslova M.A. Improving the data protection system in information systems using voice biometrics // New Science: Strategies and vectors of development. 2016. No. 2-1 (64). pp. 20-22</mixed-citation></ref><ref id="B7"><mixed-citation>7. Password Check | Kaspersky (https://password.kaspersky.com/ru/)</mixed-citation></ref><ref id="B8"><mixed-citation>8. Devitsyna S., Eletskaya T., Meshkov A. Developing facial recognition software to control access to campus facilities // CEUR Workshop Proceedings. 2. Ser. &amp;quot;InnoCSE 2019 &amp;ndash; Proceedings of the 2nd Workshop on Innovative Approaches in Computer Science within Higher Education&amp;quot; 2019. P. 68-76</mixed-citation></ref><ref id="B9"><mixed-citation>9. Devitsyna S.N., Kargin A.S., Balabanova T.N. Creation of a neural network model for user authentication by voice // Information technologies in science, education and production (ITNOP-2020). collection of materials of the VIII International Scientific and Technical Conference. Belgorod, 2020. P. 38-42</mixed-citation></ref><ref id="B10"><mixed-citation>10. Devitsyna S.N., Eletskaya T.А., Balabanova T.N., Gakhova N.N. The development of intelligent biometric identification system user // Belgorod State University. Scientific Bulletin. Series: Economics. Information technologies. 2019. T. 46. № 1. P. 148-160. DOI: 10.18413/2411-3808-2019-46-1-148-160</mixed-citation></ref></ref-list></back></article>