smart phones. The proposed methods guarantee that the user is located close to the target
device by transmitting the challenge via an audio channel. We propose two authentication
methods; user authentication for a PC or a website using a smart phone as a hardware
token, and user authentication to log on to a smart phone using a PC as a token. Because
our methods use typical peripheral devices such as a microphone and a speaker, they do …