This defensive publication discloses a multi-modal biometric authentication system that resists AI voice cloning, deepfake audio, and replay attacks by verifying a neural–acoustic correlation between EEG activity and speech production. Conventional voice biometrics rely primarily on acoustic characteristics and can be defeated by modern speech synthesis and conversion. The disclosed method introduces a physiological verification layer that confirms speaker presence and cognitive intent by assessing timing and statistical alignment between EEG features and phoneme-level speech events.
AI, Cybersecurity & Electronics
© 2025 GABEY Consulting Pty Ltd
A patent (where granted) can provide enforceable exclusive rights for a limited term. A defensive publication is a public disclosure intended to establish prior art, reducing the chance others can later patent the same idea.
| Aspect | Patent | Defensive publication |
|---|---|---|
| Primary goal | Exclusive rights / licensing leverage | Prevent others from patenting (prior art) |
| Timeline | Often months–years (jurisdiction dependent) | Immediate on publication |
| Outcome | Enforceable rights (where granted) | Public record for prior art and verification |
| Who can implement? | Typically patent holder/licensees only | Concepts are publicly disclosed (see caveats below) |
Note: A defensive publication is not legal advice and does not itself grant a “license.” If you’re commercialising at scale, consider an IP review for your specific implementation and jurisdiction.
Generally, yes - defensive publications are intended to make concepts publicly known and usable. However, you should still consider the broader IP landscape for your specific implementation.
Typical use cases
Practical caveats (worth reading)
If you want clarification on scope or implementation considerations, use the Contact / Support form and include the Document ID.
Each publication includes SHA-256 hashes so you can independently verify that the artefacts you downloaded match the published record.
sha256sum -c GABEY-DP-2026-02-06-MULTIMODAL-VOICE-VERIFICATION-v1.0.HASHES.txt
Get-FileHash -Algorithm SHA256 .\filename.pdf
shasum -a 256 filename.pdf
Match: file is authentic and unmodified
Mismatch: file differs - re-download from the official page and re-check
Tip: When requesting help, include your OS, the filename, and whether you verified the HASHES.txt file or computed hashes manually.
For questions not covered here, use the contact form:
Contact / SupportNOMATEQ: Building security through transparency.
Tip: Include the Document ID and which artefact (PDF/MD/HASHES) you’re referring to.