Voice biometrics solves most authentication problems

March 2014 Access Control & Identity Management

Voice biometrics is one of those technologies: it changes the game. It’s not in wide use anywhere in the world, yet, but it’s going to be the norm for authenticating identity within the next few years. It’s been worked on and refined for almost 15 years. So it’s at the point where it can be smoothly integrated with an organisation’s other systems, both front and back end. All that remains is to build it into your strategy.

Darren Arnold
Darren Arnold

There are compelling reasons to supplement all your other ID and authentication systems with voice biometrics.

For one thing, voice biometrics confers a massive, positive step-change in your organisational security. As with iris and fingerprint recognition technology, it is almost impossible for criminals to replicate the human voice. So, you have a high degree of certainty that the person in contact with your organisation is who he or she claims to be.

Also, voice biometrics has an advantage over iris and fingerprint recognition in that a person’s identity can be verified remotely, using a phone. With iris and fingerprint recognition, the person must be physically present to be authenticated.

In addition, the time involved in verifying someone’s identity can be cut to the few seconds needed for a voice biometrics engine to match someone’s live voiceprint with one that has been recorded. No more asking for an ID or passport number, a PIN or profile number, addresses, phone numbers, or the name of the person’s dog or first teacher.

Organisations can, as a result, be much more flexible and fluid with their security rules and processes, adapting easily as business strategies and markets require.

For the customer, voice biometrics eliminates the need to remember multiple passwords, usernames, and PINs. Recent research in the United Kingdom showed that, on average, people have as many as 100 individual passwords and PINs.

Trouble is, they will often use one or two fairly simple passwords across many different types of authentication, from their bank accounts to their Facebook account. This poses a significant hacking risk not just for the individual but all the companies implicated in that person’s authentication activities. Voice biometrics all but eliminates this risk.

So, why isn’t everyone on the voice biometrics bandwagon?

One of the challenges is that organisations are not clear on the difference between speech recognition technology and voice biometrics. Speech recognition technology is programmed to understand statements or questions from customer and offer a specific response. By contrast, voice biometrics works on the unique tone, resonance, pitch and biological characteristics of a person’s voice, regardless of the words used. It is the uniqueness of each human voice that makes voice biometrics a security tool.

A bigger challenge to voice biometrics uptake, however, is getting consumers to record and register their voiceprints. There are two methods: passive and active. Passive enrolment entails simply recording a person talking and then checking all future calls from him or her against that particular voiceprint.

However, in some countries, recording someone without their knowledge or agreement is regarded as an abuse of their right to privacy. That aside, passive enrolment is less accurate than the active alternative – and preferred by most organisations.

With active enrolment, people are told what voice biometrics is and how it works before having their participation requested. Their participation is simple and ranges from speaking a sequence of numbers or reading an agreed pass phrase. In future conversations with the organisation, they are asked to speak the same numbers, but in a random order, or to repeat the phrase.

As a rule, when people understand how much time and effort voice biometrics saves them in dealing with the organisation, they participate perfectly willingly. Also as a rule, it’s the early adopter industries, such as cellular operators, that have customers not only willing but eager to use cutting edge technologies. For this reason, a large cellular operator was the first South African company to adopt voice biometrics.

Once the ice is broken, other sectors, such as banking tend to follow very quickly. In fact, the financial services sector has been using voice biometrics for some time to service its high net worth clients. JP Morgan recently authorised a transfer of US$550 million using a voice biometrics password.

Integrating a game changer

Because they are game changers, technologies like voice biometrics can’t simply be bolted on to the rest of an organisation’s systems, processes, and strategies. They alter the way an organisation behaves, internally and externally. They hold fairly profound implications for image and operations. For these implications to be beneficial to the organisation across the board, an integrated approach is needed. Not just in terms of systems, but also the impact voice biometrics will have on an organisation’s security value chain as a whole.

It’s vital, therefore, that organisations work closely with specialists in integration of customer interactive solutions, business process optimisation (BPO), contact centre operations, and voice biometrics itself.

For more information contact Dimension Data Middle East & Africa, +27 (0)11 575 6177, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Reliability, innovation and flexibility
Entry Pro Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Through constant innovation and advancement in technology and systems, Entry Pro strives to provide its clients with not only the most suitable, but also the most advanced solution.

Read more...
Smarter security with automated visitor management
LD Africa Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Automated visitor management solutions, like LD Access, are transforming this process by reducing human workload, while enhancing security and efficiency.

Read more...
Paxton enhances installer loyalty programme
Paxton Access Control & Identity Management News & Events
Paxton has made it easier for security installers to benefit from its popular loyalty programme, Paxton Rewards, with points now added automatically when purchasing through approved distribution partners.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Rethinking access control in high-risk logistics environments
ATG Digital Access Control & Identity Management Transport (Industry) Logistics (Industry) Facilities & Building Management
South Africa’s logistics sector is under constant pressure, not only from external threats like hijackings and cargo theft, but also from internal vulnerabilities, operational blind spots, and limited support.

Read more...
Nice unveils MyNice Smartgo
News & Events Access Control & Identity Management
Nice SA has announced the release of MyNice Smartgo, a compact access automation solution, designed specifically for the South African market, combining an easy-to-install device with a user-friendly smartphone application.friendly smartphone application.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.