Friday, December 31, 2010
Another One Bites the Dust
I'm afraid that this news does not bode well for the voice biometrics industry.
Sunday, November 7, 2010
Citibank to Roll Out Voice Biometrics in Australia
Citibank Australia CEO Roy Gori stated "I think the next step in the evolution of security is voice biometrics. A person's voiceprint is more accurate than their fingerprint, iris or any other means of identification."
According to Gor, implementing voice biometrics would save Citibank Australia a lot of time and money, because it would cut out the traditional asking of questions for identification. He also stated that the next step after testing is completed is to get people to register and agree to it. Trials began six weeks in August, and early adopters could be using the system by the beginning of 2011.
Wednesday, October 6, 2010
Voice Biometrics Helps Uncover Terror Plot in Europe
Voice biometrics experts believe that the technology has strong potential for streamlining intelligence operations. For example, both the U.S. and British intelligence gather huge amounts of electronic eavesdropping data. Persay's CEO, Almog Aley-Raz offered that "using voice biometrics could allow officials to scan a large number of phone conversations for several suspects' voices."
Voice biometrics may not be perfect (i.e., subject to background noise, etc.) but it has proven to be a valuable tool in the ongoing war on terror.
Tuesday, September 14, 2010
VoiceVault Offers Voice Biometrics Smartphone Developer Program
According to the article, the program includes several tools and resources that enable developers to design voice biometric-enabled smartphone applications. VoiceVault offers support to various smartphone platforms, including iPhone, Android and Blackberry.
Lee Cottle, Global Executive Vice President at VoiceVault, said that “smartphone users expect robust security and ease of use as a matter of course, and voice biometrics is a key technology to deliver this.” VoiceVault currently offers its VoiceVault Enterprise voice biometric enrollment, authentication, and signature components through 3G or WiFi networks, but has plans to provide an embedded on-device capability as well.
Monday, August 30, 2010
ANSI Standard for Voice Biometrics
The types of data to be included with the file are: the bandwidth used to make the recording; date and time of the recording; type of channel that was used to record the data, such as a wireless or landline phone; information about the speaker, such as gender, age, language, and accent; the input device used; security used, such as the type of encryption; and the sampling rate. According to the article, the format is intended to be vendor-neutral.
It should be noted that, although the standard is not mandatory, it can be very useful to organizations such as military, intelligence and law enforcement that often share data about potential threats.
Wednesday, August 25, 2010
Competition for Authenticating Mobile Phones via Biometrics Heats Up
According to the article, “the service, called FaceR CredentialME, is available on devices using the Android, Windows Mobile and RIM operating systems on the Sprint 3G or 4G networks and was launched in conjunction with Troy Security Solutions, a mobile products and solutions provider.”
“The biometric service allows a user to authenticate their identity via unique characteristics in their face recorded from the phone’s embedded camera for anything such as basic online services or corporate specific services. Further, the biometric authentication can be used to entirely replace standard login methods or layered on top of them as a second factor of authentication.”
This announcement comes on the heels of PerSay’s introduction of a voice biometrics solution for iPhones and Bio-Key’s upcoming release of a fingerprint biometrics solution for mobile phones.
The race is on!
Wednesday, August 11, 2010
Voice Biometrics is in the Army Now!
The article describes the process as follows: “It starts with the person’s employer filling out a paper application, knowing what privileges they should have and whether they should be escorted or not. That goes into an automated system along with the person’s biometric information and gets vetted against databases in West Virginia, which includes the FBI database. So then that information — hit [or] no hit — gets fed back to somebody at the local base, because every local commander gets to decide who can or can’t come on his base. And based on that information, whether it’s innocuous or whether they think it shows a threat, as well as other sources of information, they make a decision whether to allow that person on base. If they say “yes,” then the person is badged with a card that looks a lot like a Common Access Card.”
When the person arrives at the base, their card is first checked to ensure validity. Their biometrics (sample) are then compared against the biometrics (base) stored on the card to ensure that the person is who they claim to be.
Tuesday, August 3, 2010
PerSay Delivers Voice Biometrics Solution for iPhone, iPad and iPod Touch
Almog Aley-Raz, PerSay’s CEO, stated “iPhone and iPad users are demanding friendly Apps that utilize the most advanced technology for enhanced experience. By eliminating keyboard use, as well as the need for auto-filling names and passwords which poses a security risk, the PerSay solution provides optimal usability with maximum protection. Sensitive enterprise and personal applications, including mobile banking, social networks, payment services, membership clubs, and many more, can now provide their users with a sleek and innovative, yet strong authentication experience.”
As an iPhone user, I’m looking forward to demoing PerSay’s application.
Wednesday, July 28, 2010
Missed Opportunity for Voice Biometrics to Secure Smartphones!?
Now I have nothing against fingers; I have ten of them myself. It’s just that voice biometrics seems like such a natural choice for a device that has a microphone and speaker. As a matter of fact, in March I blogged about the feasibility of securing smartphones with voice biometrics. This is a golden opportunity and I hope the voice biometrics industry is able to deliver a robust solution before it’s too late.
Tuesday, July 20, 2010
Old MacDonald Had a Farm…with Voice Biometrics
According to the item, “farmers make a call to their organization's central "Voice ERP" system and feed in information they want to share with tillers. The information gets stored in the database and gets converted into text. The system then generates an SMS, which is sent to the mobile phones of the tillers.” The article goes on to say that “farmers are provided unique identity codes to ensure only authorized people access an organization's Voice ERP database. For additional security, a voice biometrics check can also be performed.”
The "Voice ERP" system is provided by Uniphore Software Systems.
Wednesday, July 14, 2010
PerSay Wins 2010 Speech Industry Award
The Speech Industry Awards are handed out each year by Speech Technology magazine. According to the magazine's website, "recipients were determined through an extensive process and proprietary rating formula that involves collecting industry analyst and consultant reviews, financial and corporate information, product and functionality assessments, and scores based on their importance to current and potential customers."
PerSay Ltd., with offices in Tel-Aviv, Israel and New York, is a provider of voice biometrics products.
Tuesday, July 6, 2010
Tongueprints to verify identity?
Here’s the abstract of Professor Lei Zhang’s research paper:
“Biometrics, which use human physiological or behavioral features for personal identification, currently face the challenge of designing a secure biometric system that will accept only the legitimate presentation of the biometric identifiers without being fooled by the doctored or spoofed measurements that are input into the system. More biometric traits are required for improving the performance of authentication systems. In this paper, we present a new number for the biometrics family, i.e. tongueprint, which uses particularly interesting properties of the human tongue to base a technology for noninvasive biometric assessment. The tongue is a unique organ which can be stuck out of the mouth for inspection, whose appearance is amenable to examination with the aid of a machine vision system. Yet it is otherwise well protected in the mouth and difficult to be forged. Furthermore, the involuntary squirm of the tongue is not only a convincing proof that the subject is alive, but also a feature for recognition. That is to say, the tongue can present both static features and dynamic features for authentication. However, little work has hitherto been done on the tongue as a biometric identifier. In this work, we make use of a database of tongue images obtained over a long period to examine the performance of the tongueprint as a biometric identifier. Our research shows that tongueprint is a promising candidate for biometric identification and worthy of further research.”
What's next?
Wednesday, June 23, 2010
Warning! Crude “Voice Verification Process” used to Scam Businesses
Let’s say you decide not to renew an existing contract (e.g., yellow pages advertising). The company calls you and asks you to confirm certain information, such as name, phone, etc., by providing “yes” and “no” answers to the questions. The company then claims that you answered “yes” to the terms of the renewal -- and will even play back a recording of you answering “yes” to the “renewal question.”
I can see this “process” being used to scam individuals as well. If you are a victim of this scam, immediately send a cancellation letter to the company. You may also want to contact the Better Business Bureau and Federal Trade Commission.
Wednesday, June 16, 2010
Voice Commerce Introduces Cloud-Based Voice Biometrics e-Commerce Platform
According to the article, there are two components to the platform – retailer and consumer. The retailer system, known as On4, “allows retailers to instantly set up and run their online business (e.g., stock control, shipping management, etc.), processing transactions using voice biometrics to authenticate/authorize their online and mobile-based electronic payments.” On4 is linked in to the Voice Commerce Payment system.
The consumer system, known as VoicePay, “allows consumers to set up their own voice biometric (base voiceprint) as an authenticator for use over the phone or mobile phone. The idea is that, once a user has set up their authenticator, any VoicePay-enabled retailer can use the biometrics and authenticate the user by simply calling him or her (and comparing the sample voiceprint to the base voiceprint).”
You may recall that I wrote about a similar mobile shopping application back in March. Let the games begin!
Thursday, June 10, 2010
Consumers Prefer Voice Above Other Biometrics
According to a Unisys study, cited in an article on the sourcesecurity.com Website, “the biometric measures ranked by consumer preference are: voice recognition (32%), fingerprints (27%), facial scan (20%), hand geometry (12%), and iris scan (10%). This ranking seems to confirm that people prefer convenience and familiarity when choosing a biometric technology. “
Voice biometrics compared to other biometrics is:
1) User-friendly - speaking is natural and requires no special effort
2) Cost effective - verification is accomplished via telephone or microphone
3) Convenient - enables remote verification of a person’s identity
Monday, June 7, 2010
Implanted Microchips to Verify Identity?
Once the chip is implanted, various devices (e.g., locks, etc.) can be programmed to recognize the device. In spite of undergoing the implant, it’s interesting to note that Mr. Graafstra believes biometrics – including voice -- will prove superior for verifying identity. His stated goal is simply to create a dialogue on technology and its uses.
The article points out some additional potential benefits of the technology, such as the ability to “identify an Alzheimer's patient who has become lost or warn that an unconscious patient is allergic to penicillin.” However, there are obviously a myriad of social and privacy concerns as well. We’ll have to keep an eye on this one.
Tuesday, June 1, 2010
SpeechTEK to Feature a Dedicated Voice Biometrics Track
• Understanding Voice Biometrics
• Voice Biometrics to the Aid of Preventing Identity Theft
• Determine the Identity of the Caller
In addition, several voice biometrics vendors, including Convergys and Persay, will be exhibiting. Additional details about the conference can be found on SpeechTEK’s Website.
There is free admission to the exhibit area. I hope to see you there.
Tuesday, May 25, 2010
Voice Biometrics Goes Back to Jail
According to the item, inmates at the Jefferson County Detention Center (Illinois) are using pay phones to call unsuspecting citizens and scam them. “This time, they are using a little different technique,” Jefferson County Sheriff Mulch explained. “The caller uses a calling card that has the ability to program it to Spanish. The person receiving the call only understands the ‘Jefferson County Detention Center,’ portion, and they hit the prompt to speak with the person. They get the detainee, who then speaks in English.”
The detainee pretends to be a police officer who is trying to identify someone who has been involved in a traffic accident, and the phone number they called was on the victim’s cell phone.
“People want to help and ask what they need,” Mulch said. “They are told to dial star 72 and enter a series of eight numbers, or they tell them to dial 1172 and a series of numbers. What that does is locks the phone number in and they can then use a calling card to make calls across the country using the victim’s phone number.”
Sheriff Mulch is in the process of researching the use of voice biometrics to track inmates’ fraudulent calls.
Monday, May 24, 2010
American Safety Council uses Voice Biometrics to Validate Identity of eLearning Students
Two months ago, I posted an item about a similar voice biometrics application being offered by I DRIVE SAFELY. Does anyone know if they one and the same?
Thursday, May 20, 2010
Alternative to Voice Biometrics? Online "Handwriting and Gesture" Biometrics
Enrollment Process
• An individual is asked to draw their unique signature with any characters/shapes/initials, using their mouse, in an online box. This process is repeated three times to create a “base” signature
• The individual is then directed to a second non-biometric layer of security called Click-ID Technology (i.e., they click on a selection of objects) to complete the enrollment process. There is even a third-level of security using complex security questions
Verification Process
• An individual accesses the online application and is asked to draw their signature once. This process creates a “sample” signature
• If the individual’s “sample” signature matches their “base” signature, access is granted to the application
• If the signatures don’t match, additional levels of security are activated
BioSig-ID was recently selected to complete a pilot trial at University of Maryland University College.
Friday, May 14, 2010
Voice Biometrics Facilitates Automated Password Resets
Mike started off by listing some examples of password reset “pain” compiled from Atos Origin clients:
• Up to 25% of all contacts to the help desk
• Up to 15 minutes to reset a password
• Up to $22.50 per contact
• Post weekend and holiday spike in contacts
• Support unavailable outside of normal office hours
He then proceeded to describe a fully-automated approach to password resets, using voice biometrics to verify the user’s identity, and identified the benefits. Using an automated approach…
• Resetting a password takes, on average, 1 minute
• The need for human intervention to complete low level tasks is reduced, significantly lowering overhead
• Password resets are not affected by heavy call volumes and, therefore, spikes in contacts become a thing of the past
• Password reset is available 24/7 365 from anywhere in the world, using any type of phone
Mike concluded with the following ROI example:
Company performs approximately 115,000 password resets per year:
• Currently costs $12 per call, or $1,380,000 per year
• Lost productivity, using an average of 7 minutes per call, amounts to 13,500 hours
Using an automated password reset (with voice biometrics) approach, the cost per contact is reduced to $7.50 per call, or $862,500 per year:
• $517,500 savings per year
• Help desk downtime reduced to approximately 2000 hours (i.e., reduction of 11,500 hours per year)
Wednesday, May 12, 2010
Voice Biometrics Case Study - T-Mobile Netherlands
T-Mobile Netherlands selected Agnito’s KIVOX voice biometrics product to achieve the following objectives:
1) Reduce the average handling time spent on caller verification
2) Provide an enhanced user experience
3) Enable reliable self service options in the short to mid-term
Enrollment
• The customer will be prompted to provide their PIN code and repeat three sentences, three times (i.e., “base” voiceprint will be captured and stored in the database)
Verification
• The customer will be prompted to repeat one sentence once (i.e., “sample” voiceprint is captured)
• If the “sample” voiceprint matches the “base” voiceprint, the customer’s identity is verified
T-Mobile Netherlands expects to realize the following benefits from their voice biometrics application:
• Improved customer satisfaction
• Decreased call handling time
• Increased level of security
• T-Mobile Netherlands will be perceived as an innovation leader
The pilot is scheduled to commence July 2010. Stay tuned!
Monday, May 10, 2010
Voice Biometrics to Monitor Florida Home Health Providers
The voice biometrics system, which is powered by PerSay’s VocalPassword™ product, will confirm home health visits by taking calls from home health personnel (nurses and home health aides), who directly provide services to Medicaid recipients, at the beginning and end of each home health visit using the recipient's home telephone. The system will verify that the correct caregiver provided the service by comparing their sample voiceprint to their base voiceprint on file.
Thursday, May 6, 2010
Voice Biometrics Conference 2010
Over the next week, or so, I plan to share some new case studies that should resolve any lingering concerns about the efficacy of voice biometrics technology. The bottom line is that voice biometrics systems have been deployed at leading organizations throughout the world, and are successfully identifying and verifying individuals by their voice 24/7.
My take away from the conference is as follows: the voice biometrics industry offers an excellent solution, with a compelling value proposition, but still appears to be treading water in the market place.
Monday, May 3, 2010
New iPhone biometrics application? Not sure…
Feelie monitors a person’s behavior (e.g., terseness of texts and emails, amount of movement, etc.) for two to three days. A base profile is then constructed based on data from psychological studies. From then on, the person's emotional state is dynamically updated and broadcast to their registered recipients. A color-coded tinge over the person’s profile picture identifies how they're feeling as follows:
• Yellow – happy
• Blue - calm
• Green – nervous
• Purple - lying
• Red – angry
I was hoping to put Feelie through its paces -- to see if there was a voice biometrics angle to be exploited. Unfortunately, I could not find any reference to the app in the iTunes store. Too good to be true?
Friday, April 30, 2010
Online Banking and Voice Biometrics – Odds and Ends
This should be music to the ears for voice biometrics vendors. After all, voice biometrics is an ideal way to remotely authenticate online banking customers – and the technology is beginning to get some legs. For example, a recent posting in my blog mentioned that the top three banks in Israel have all implemented public-facing voice biometrics solutions.
One cautionary note comes from George Tubin, senior research director, TowerGroup, who says “voice biometrics still needs work. There's background noise and connection issues. There's also the matter of how well it functions." I’ve been hearing these concerns since I entered the space five years ago – and they continue to be a serious hurdle. It is incumbent upon the voice biometrics industry to find a way to overcome these legitimate concerns. The potential remote authentication market is just too big!
Wednesday, April 28, 2010
Voice Biometrics is the Right Choice for Contact Centers
Voice biometrics has been successfully deployed at contact centers throughout the world. Want to learn more? Here are links to five case studies:
Australia Health Management
Bell Canada
National Australia Bank
TD Waterhouse Canada
Vodafone Turkey
Monday, April 26, 2010
Embedded Voice Biometrics Solutions
What I do know is that embedded voice biometrics, where enrollment and verification functionality is self-contained, is a natural fit for smart phones and other devices with a microphone. Additionally, several voice biometrics vendors (e.g., PerSay) are actively engaged in developing embedded solutions.
One company, Sensory, Inc., based in Sunnyvale, CA, has been providing embedded voice biometrics solutions to the toy and robotics industry for years. I’ve seen this technology in use in a toy voice activated biometric-safe. According to Sensory’s Website, their product’s “equal error rate (where the probability of an incorrect acceptance equals that of an incorrect rejection) ranges between 0.01-7% depending on the number of words and whether the passwords are known to the fraudster.”
I’m certain that, in the not too distant future, we’ll have a robust voice biometrics solution which can be embedded in a variety of mobile devices.
Friday, April 23, 2010
Voice Biometrics and HIPAA
In his article, Gaya identifies several features that a biometric system used to secure health records should have:
• Cost-effective
• User-friendly
• Easy to deploy
• Fast verification process
• High degree of accuracy (e.g., low crossover error rate (CER))
• Interoperability
• Customized to the environment (e.g., factor in background noise of emergency room, etc.)
I believe that a voice biometrics solution has those features. Additionally, it’s a proven technology which can ensure HIPAA compliance by allowing only authorized access to health records.
Wednesday, April 21, 2010
Criteria for Selecting a Voice Biometrics System
• Effectiveness: “The basic measure of any authentication solution is accuracy. However, biometrics accuracy often comes with a price - in the form of “false negatives” or improper rejection of individuals who should have been successfully authenticated. While this is often attributed to “user error,” the potential end result in user frustration and time lost in re-authenticating must still be part of the measurement of overall effectiveness.”
• Ease of deployment and use: “No technology can be effective unless, and until, it’s operational and in regular use. A “bleeding edge” biometrics solution, even if it’s potentially more effective, may never get out of pilot, and one that users find confusing or cumbersome may not even make it that far. The solution should be easy to deploy and maintain and shouldn’t require significant changes to business processes.”
• Enterprise-wide capability: “While an organization may deploy an authentication solution to meet a single need today, it makes sense early in the selection process to look at where and how the use of biometrics may be expanded to meet future needs. This can save money and simplify administration.”
• Economic considerations: “Keeping costs under control is important – even when budgets aren’t under the strain they are today. …While the software is usually proprietary, a strong ongoing maintenance and support agreement can help ensure that the software can be enhanced on an ongoing basis, extending the life cycle of the solution, even as technology changes.”
Monday, April 19, 2010
Voice Biometrics Opportunity -- Authenticating the Identity of e-Prescribers
Of particular interest to the voice biometrics community is that the new rule allows "biometrics" (including voice) to be used, as one of two-factors, to authenticate the identity of the e-prescriber. Specifically, the rule states that the “DEA is allowing the use of a biometric as a substitute for a hard token or password.” For a biometric to be acceptable, it must meet several requirements (e.g., a “false accept rate” of 0.001 or better, etc.).
The opportunity is there. Who will be the first to step up to the plate?
Thursday, April 15, 2010
Top Three Banks in Israel Deploy Voice Biometrics
Bank HaPoalim’s Contact Center manager commented about voice biometrics on Israeli TV as follows:”Besides the efficiency we gained by eliminating authentication questions, we have significantly improved our service accessibility and customer experience.” Also, Israel’s former Chief Scientist (and PerSay Board Member), Dr. Orna Berry, commented that she expects to see a global expansion of voice biometrics in the next few years to accessing remote services and applications over the phone, Internet, as well as mobile devices.
This latest news can only enhance the credibility of voice biometrics as the right technology for remote identity verification in contact centers. As my recent article on speechtechmag.com asks, “What’s Everyone Waiting for?”
Wednesday, April 14, 2010
Opus Research: Voice Biometrics Webcast Recap
The central theme was that voice biometrics should be seen as an enabling technology (i.e., for transactions and interactions) over a number of channels and networks. Paul presented several examples, including:
• Identity and authentication – voice biometrics authenticates that the person is actually who they claim to be
• Increased customer convenience and reduced operations costs – live agent knowledge-based authentication takes 30 seconds to 2 minutes while voice biometrics authentication takes less than 9 seconds
• Privacy protection – voice biometrics strengthens authentication which can lead to a stronger privacy protection policy
Click here to view the archived Webcast.
Monday, April 12, 2010
Alternative to Voice Biometrics? Eye-Movement Patterns
According to ID-U’s Website, the system works as follows: “the person to be identified (user) watches a moving target (visual stimulus) on a monitor, while a small, low-resolution camera acquires the user's eye-movement response; a processing unit, either inside the local device or remotely located at another physical site, uses both the stimuli and response to identify the user.” The “sample” pattern is compared to a “base” pattern previously captured. I’m not 100% certain if the person can enroll via their own camera (e.g., computer, cell phone, etc.).
ID-U lists several advantages of using eye-movement patterns, including: the product is software driven, it’s virtually impossible to reproduce a user’s response to stimuli and the product’s inherent liveness detection. Of particular interest to the voice biometrics industry is the Company’s statement that their biometrics technology can be used to secure mobile transactions by simply using a cell phone’s display and camera.
I plan to learn more about this technology (e.g., enrollment process, failure rates, etc.) and report back.
Friday, April 9, 2010
Voice Biometrics Case Study: Australian Health Management
• Members would no longer need to go through the manual verification process every time they call
• Membership details would be accessed quicker to reduce waiting time
• Member’s health insurance information would be more secure
Enrollment Process:
• The enrollment process is voluntary and guided by a live agent
• Member is prompted to say their membership ID number
• This process creates the client’s “base” voiceprint and stores it in the database for future use
Verification Process:
• Member calls AHM and is prompted to say their membership ID number
• This process creates the member’s “sample” voiceprint which is then compared to their “base” voiceprint in the database
• If the voiceprints match, the member’s identity is verified
• If the voiceprints don’t match, the member is transferred to a live agent
Using voice biometrics, AHM is saving an average of 30 seconds per call.
Wednesday, April 7, 2010
PerSay Forms Alliance with Global Telecom Solutions Provider
Reacting to the announcement, Almog Aley-Raz, PerSay’s CEO stated “While more and more solution providers, system integrators, and value added resellers realize the benefits of voice biometrics, Huawei has taken a unique proactive approach, integrating voice biometrics into its product suite and offering it to its customers. With this strategic alliance, we are more confident than ever that voice biometrics and PerSay products will play a role in every modern contact center.”
Coming on the heels of the recent TradeHarbor-USAN partnership announcement, I'm hopeful that contact centers will soon begin deploying voice biometrics en masse!
9EZG58FGVCXG
Monday, April 5, 2010
Voice Biometrics Basics - Standards
There are several organizations actively engaged in the development of biometric (including voice) industry standards, including:
• American National Standards Institute (ANSI)
• BioAPI Consortium (BioAPI)
• International Standards Organization (ISO)
• Internet Engineering Task Force (IETF)
• World Wide Web Consortium (W3C)
Two examples of standards under development include:
Media Resource Control Protocol (MRCP): MRCP is a protocol, developed by Cisco Systems, Inc., Nuance Communications, Inc., and SpeechWorks, and backed by the IETF, that allows interoperability among various speech resources within telephony applications.
Voice Extensible Markup Language (VoiceXML): According to Wikipedia, “VoiceXML is the W3C’s standard XML format for specifying interactive voice dialogues between a human and a computer. It allows voice applications to be developed and deployed in an analogous way to HTML for visual applications. Just as HTML documents are interpreted by a visual web browser, VoiceXML documents are interpreted by a voice browser or IVR.”
Friday, April 2, 2010
Identity Thieves/Fraudsters Find New Hunting Grounds
E-Payments
New online and mobile payment methods, such as peer-to-peer (P2P) payments (already available as a Facebook application) are creating opportunities for identity thieves. According to the article, some of these payment modes do not ensure adequate identity verification when processing a transaction.
Mobile Payment
Many mobile devices can now be used as “electronic wallets” to facilitate financial transactions. Unfortunately, this technology provides additional opportunities for fraudsters to not only steal your identity, but your money as well.
Social Media
Social networking sites, such as Facebook and LinkedIn, contain personal information which can be “borrowed” by identity fraudsters to create fake accounts in your name.
The article goes on to recommend the use of multi-factor authentication, with biometrics, including voice, as one of the factors, to help prevent identity fraud.
For more information on identity theft, including steps you can take to safeguard your personal information, click here.
Wednesday, March 31, 2010
Voice Biometrics Case Study - National Australia Bank
Enrollment Process:
• The enrollment process is voluntary and takes approximately three minutes
• Customer is prompted to repeat a series of words
• This process creates the client’s “base” voiceprint and stores it in the database for future use
Verification Process:
• Customer calls NAB and is prompted to say their account number and date of birth
• This process creates the customer’s “sample” voiceprint which is then compared to their “base” voiceprint in the database
• If the voiceprints match, the customer’s identity is verified
Speech Security was initially rolled-out to 3.3 million NAB customers.
Friday, March 26, 2010
Voice Biometrics Case Study – I DRIVE SAFELY
A 2009 Speech Technology article, by Judith Markowitz, described the enrollment and verification processes as follows:
Enrollment
• During the online registration process, the student provides their phone number
• An automated outbound call is made to the student and they are prompted to repeat six separate five-digit phrases (i.e., “base” voiceprint is captured and stored in the database)
Verification
• At key course intervals (e.g., completion of chapter, etc.), an automated outbound call is made to the student and they are prompted to verify their identity by repeating a five-digit phrase (i.e., “sample” voiceprint is captured)
• If the “sample” voiceprint matches the “base” voiceprint, the student’s identity is verified and they are permitted to advance to the next phase of the course
Since 2008, I DRIVE SAFELY has enrolled over 60,000 voice prints and completed over 300,000 verifications.
Thursday, March 25, 2010
Speech Technology Voice Biometrics Webinar - Summary
Judith Markowitz began the session with a review of voice biometrics basics. According to her, organizations deploy voice biometrics to:
• Combat identity theft and other fraud
• Protect personal data - privacy
• Comply with regulations
• Enhance convenience and simplify the authentication process
Judith also mentioned that voice biometrics has been deployed in the following sectors: financial services, healthcare, distance learning, telecom, transportation and government.
Chuck Buffum next presented an interesting overview of voice biometrics metrics. He discussed business, solution and technology metrics. Business metrics measure reduced operating expenses, improved customer experience/satisfaction and improved security. Solution metrics include: automated authentication rate, security rate (1 – imposter rate), offer acceptance rate, enrollment success rate, and re-use rate (opposite of opt-out after enrollment). Technology metrics include: false reject, false accept and enrollment success rate.
Chuck also discussed some of the factors that influence voice biometrics performance, including: richness of voice enrollment (i.e., broad and deep phonetic coverage), quality of audio sample (e.g., signal noise ratio) and environmental characteristics (e.g., background noise).
William Morrow stressed the growing rate of identity theft and fraud as a driver for deploying voice biometrics. From 2007 to 2009, there was a 37% increase in the number of victims. He said that the cost of identity fraud in 2009, in the U.S., was $54 billion. William ended by presenting a brief case study about the use of voice biometrics to ensure academic integrity for distance learning company “I DRIVE SAFELY” (IDS).
The final panelist, Paul Heirendt presented an overview of TradeHarbor’s voice biometrics product (VoiceSignatureService(SM)). He also addressed many of the benefits that organizations can realize by deploying voice biometrics.
When the presentations were over, the panelists addressed questions submitted by the participants.
The archived webinar should be available for viewing on Speech Technology’s Website.
Tuesday, March 23, 2010
TradeHarbor Partners with Call Center Solutions Provider
Bob Nelson, Vice President of Partner Development at TradeHarbor said that the Voice Signature Service(SM) will be deployed to authenticate inbound calls, as well as “online authentication for transactions made from computers and mobile devices based on outbound calls to their wired or mobile phones.”
I am pleased that USAN recognized the value of deploying voice biometrics to secure call center transactions.
Monday, March 22, 2010
Biometrics and Privacy Concerns
Personal Privacy. For some people, the use of biometrics is seen as inherently offensive. Being required to verify one’s identity through a finger-scan or voice-scan can be seen as intrusive, impersonal, or mistrustful. These objections to biometrics are based on personal privacy.
[My two-cents: I’m surprised that IBG considers finger-scans and voice-scans to be equally “intrusive.” Voice-scans can be captured via a telephone or microphone in a natural way – speaking.]
Informational Privacy. A more common objection to biometrics is based on informational privacy; how biometric data might be misused, tracked, linked, and otherwise abused. Potential privacy-invasive misuses of biometrics are as follows:
Unnecessary or unauthorized collection – gathering biometric information without the user’s permission or knowledge, or gathering biometric data without explicitly defined purposes
Unauthorized use – using biometric information for purposes other than those for which it was originally acquired
Unauthorized disclosure – sharing or transmitting biometric information without the user’s explicit permission
Unique identifier – using biometric information to track a user across various databases, to link different identities, and to amalgamate personal data for the purposes of surveillance or social control
Improper storage – storing biometric information in logical proximity to personal data such as name, address, social security number
Improper transmission – transmitting biometric information in logical proximity to personal data such as name, address, social security number
Forensic usage – using biometric information to facilitate investigative searches, which may be categorized as unreasonable search and seizure
Function creep – gradually using biometric data for a variety of purposes beyond its original intention and scope
[My two-cents: With the exception of military and law enforcement applications, I believe it is absolutely critical to provide full-disclosure (e.g., how data will be used, stored, etc.) to people who use a biometrics system.]
Friday, March 19, 2010
Voice Biometrics Case Study – Union Pacific Railroad
A 2004 whitepaper issued by the SANS Institute, provided the following description of the railroad's application:
“Union Pacific moves railcars back and forth across the United States every day. The railcars travel loaded in one direction and empty on the way back. When the loaded railcar arrives, the customer is notified to come pick up the contents. Once emptied, the customer needs to alert Union Pacific to put the railcar back to work. Union Pacific now has an automated system that utilizes voice authentication to allow a customer to release empty railcars. Customers enroll in the voice authentication system over the phone. When they call back to release an empty railcar, the system authenticates them and allows them to release their railcars. In this case, voice authentication has allowed customers to get off the phone faster, and Union Pacific to guarantee that a customer is not releasing a railcar that doesn’t belong to him.”
When a customer called the railroad's IVR, they were given the option to enroll in the system (i.e., provide a “base” voiceprint). Once enrolled, a customer could verify their identity by providing a “sample” voiceprint. If the voiceprints matched, the customer’s empty railcar was released. If the voiceprints did not match, the customer was transferred to a live agent.
Does anyone know if this application is still in use by the Union Pacific Railroad?
Thursday, March 18, 2010
Securing Mobile Devices with Voice Biometrics – A Natural Fit
Voice biometrics, on the other hand, can provide robust security and is also a natural fit for smart phones and other mobile devices with a microphone. Let’s see how the technology would work with mobile devices. There are two approaches:
• Embedded – all voice biometrics functionality (enrollment and verification) is self-contained on the mobile device
• Remote – some voice biometrics functionality (e.g., “voiceprint capture”) resides on the mobile device and the remaining functionality lives on a server
Several organizations are actively engaged in developing voice biometrics solutions for the growing mobile device market.
Tuesday, March 16, 2010
Will Biometrics Replace NYC Doormen?
According to the article, the biometric door works as follows:
When a resident approaches the door to their building, a facial recognition camera captures a “sample” image, which is then compared to their “base” image in the database. If the images match, the door is unlocked for the resident.
If the facial images don’t match, the resident is prompted to say their name and where they are going. A “sample” voiceprint is captured through this process. If the “sample” voiceprint matches the resident’s “base” voiceprint, the door is unlocked. If there is no match, the resident is subject to further remote verification by central security staffers.
On February 22nd, I wrote about an Israeli company, FST21 Ltd., that is offering a similar technology.
Monday, March 15, 2010
Voice Biometrics Basics: Multi-Factor Authentication
• Something the person knows (e.g., password or PIN)
• Something the person has (e.g., security token, smartcard, cell phone)
• Something the person is (e.g., biometric such as voiceprint)
Combining two or more factors, where one of the factors is a biometric, provides the strongest level of authentication. For example, passwords or PINs can be shared, observed or broken. Smartcards or cell phones can be lost or stolen.
Friday, March 12, 2010
U.S. Secret Service on Identity Theft
The agent covered a number of topics including: how fraudsters get personal information, how fraudsters use that information, what to do if personal information is stolen and, finally, how to safeguard personal information.
How Fraudsters get Personal Information
According to the Secret Service, some of the methods used by fraudsters to get personal information are:
• Stealing mail (e.g., credit card statements, tax information, etc.)
• Rummaging through trash
• Bribing employees who have access to personal information
• Hacking databases containing personal information
• Stealing personal information from a place of work
• Obtaining a person’s credit report by posing as their landlord, employer, etc.
• Stealing card numbers by capturing data in an electronic “skimming” device
• Stealing wallet or purse
• Breaking into a home to steal personal information
• “Phishing” for personal information via email
How Fraudsters use Personal Information
According to the Secret Service, some of the ways fraudsters use personal information are:
• Call credit card issuers to change victim’s billing address
• Open new credit cards in victim’s name
• Establish new phone service in victim’s name
• Open a bank account in victim’s name and write bad checks
• Counterfeit checks or credit cards in victim’s name
• Authorize electronic transfer of victim’s funds
• File for bankruptcy in victim’s name to avoid debts fraudster incurred using victim’s name
• Taking out a loan in victim’s name
• Seeking employment in victim’s name
• If arrested, giving victim’s name to police
What to do if Personal Information is Stolen
According to the Secret Service, the following four immediate steps should be taken if personal information is stolen:
• Review and place a fraud alert on credit reports
• Close all accounts that may have been tampered with or opened fraudulently
• File a police report
• File a complaint with the Federal Trade Commission
How to Safeguard Personal Information
According to the Secret Service, these are some of the ways to safeguard personal information:
• Setup “strong” passwords for all accounts (e.g., avoid easily available information)
• Secure personal information at home
• Be vigilant when providing personal information on the phone, through email, etc.
• Deposit outgoing mail at post office and remove mail from mailbox promptly
• Shred personal information before placing in trash
• Don’t carry Social Security Card
• Limit amount of identification information and credit/debit cards when going out
• Install virus protection software
• Don’t open files sent by strangers
• Don’t store financial information on laptops
• Delete personal information from computers before disposing
After the presentation, the agent and I spoke about how voice biometrics can help stem the rising tide of U.S. identity theft and fraud. For example, financial institutions could deploy voice biometrics in their call centers. Fraudsters who obtained a victim’s personal information (e.g., mother’s maiden name, date of birth, etc.), would be thwarted when they are prompted to provide a sample voiceprint (which would then be compared to the victim’s base voiceprint). Also, credit card companies could require voice biometrics identity verification, at point of purchase, for certain transactions. These are just some of the ways that voice biometrics could be used to reduce identity theft related crimes.
Wednesday, March 10, 2010
Voice Biometrics Case Study - Vodafone Turkey
According to PerSay, the primary drivers for Voice Signature were to enhance customer service and improve security. Subscriber benefits include the ability to perform secure self-service transactions such as resetting a blocked mobile device. Enrollment in the Voice Signature application is voluntary.
Vodafone Turkey also benefits by a reduction in call center costs. According to them, thanks to Voice Signature, call durations decreased by about 15%, while customer satisfaction increased 85%.
As a testament to their voice biometrics implementation, Vodafone Turkey won “The Best Technology Solution” award at the “Istanbul Call Center Awards 2009” ceremony.
Tuesday, March 9, 2010
NC State Professor Streamlines Voice Biometrics Verification Process
Dr. Rodman’s research, “Joint Frame and Gaussian Selection for Text Independent Speaker Verification,” will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19.
Stay tuned for more on this topic.
Monday, March 8, 2010
Voice Biometrics Case Study – TD Waterhouse Canada
• Enhanced convenience and speed – automates verification of client’s identity allowing quicker access to their accounts and transactions
• Improved security – voice biometrics verifies that the client is who they claim to be
Enrollment Process:
• Client calls TD Waterhouse’s contact center and, when prompted, says “I’m not enrolled.” The client’s identity is manually verified by a rep, who also explains the Voice Print System. The client is then connected to the enrollment system
• Client is prompted to speak their phone number
• Client is prompted to say the phrase “my voice is my password”
• Client is prompted to speak a secret date (month & date), as well as a hint
• This process creates the client’s “base” voiceprint and stores it in the database for future use
Verification Process:
• Clients call the TD Waterhouse contact center and, when prompted, say their phone number and secret date. This process creates the client’s “sample” voiceprint which is then compared to their “base” voiceprint in the database. If the voiceprints match, the client’s identity is verified
According to Nuance, most TD Waterhouse clients have elected to participate in the Voice Print System service. This may be due in part to their personalized approach of having a rep explain the process to clients. The Voice Print System has also allowed TD Waterhouse to reduce agent talk time by 30+ seconds.
Friday, March 5, 2010
Voice Biometrics Case Study - Bell Canada
Bell is Canada’s largest communications company. According to Persay’s Website, the principal project driver for Bell was to fight identity theft and make the privacy protection (i.e., verification) process more convenient for customers.
Enrollment process:
• Customer calls Bell’s contact center and is presented with the option to enroll using an IVR system
• If the customer opts in, the enrollment process is initiated. Or, if the customer opts out, they can ask for a re-prompt to enroll in 60 days
• Customer enrolls by repeating a pass phrase “At Bell, my voice is my password” three times (process takes approximately 2 minutes). The captured “base” voiceprint is stored in the database for future verification
• The enrollment is secured by the customer’s PIN and an account number and they are notified (via callback or SMS) when the enrollment process is completed
Click here for a demo.
Verification process:
• In subsequent calls to Bell’s contact center, the customer is prompted to repeat their “At Bell, my voice is my password” pass phrase. The captured “sample” voiceprint is then compared to the customer’s “base” voiceprint
• If the voiceprints match, the customer is successfully verified and is automatically granted access to the IVR or a live agent (who is alerted that the customer’s identity has already been verified – saving time)
• Customer can add multiple voiceprints per account to enable access for additional authorized co-users (e.g., spouse)
Click here for a demo.
To date, more than 2,000,000 Bell Canada customers have voluntary enrolled and verification rates exceed 4,000,000 a year.
Thursday, March 4, 2010
Updated Voice Biometrics Market Forecast through 2014
As you can see from the chart, the market is expected to grow from $124 million (2009) to $260 million (2014). This represents a compounded annual growth rate of approximately 16%. According to the chart, the steepest growth is expected to occur between 2010-2011. So let's make this the year of voice biometrics!
Voice Biometrics Basics – Metrics
• Enrollment rate – % of authorized users who successfully enrolled (i.e., “base” voiceprint captured)
• Verification rate - % of authorized users who are successfully verified (i.e., “sample” voice print captured and matched against “base” voiceprint)
• False acceptance rate (FAR) - % of unauthorized users who are accepted by the system. Also known as false positive or type I error.
• False rejection rate (FRR) - % of authorized users who are rejected by the system. Also known as false negative or type II error.
• Crossover error rate (CER) – point of intersection when FAR and FRR are plotted against each other (i.e., FAR = FRR). In general, the lower the CER the better.
It’s a fine art to tune a voice biometrics system to achieve simultaneously low FARs (i.e., keeping the unauthorized folks out) and low FRRs (letting the authorized folks in).
Wednesday, March 3, 2010
Voice Biometrics Market Projections (2009–2011)
I’m puzzled by the % growth decrease (i.e., 62%-->15%) projected for next year. I would expect % growth to continue increasing once voice biometrics systems gain momentum in the marketplace.
What say you?
Tuesday, March 2, 2010
Voice Biometrics Basics – Verification
Text-dependent voice biometrics systems require a person to speak the same pass phrase(s) during enrollment and verification. Text–independent systems do not. The person can be asked to repeat a series of random pass phrases to capture a “sample” voiceprint. Or, the “base” and “sample” voiceprints can be obtained in the background – even without the person’s knowledge (ideal for forensic applications).
Monday, March 1, 2010
My Neighbor Secures Mobile Commerce Transactions with Voice Biometrics
According to their Website, Planet Payment works with merchants to set up their mobile commerce (“Voice”) stores. Shoppers also need to enroll and provide a “base” voiceprint. Enrolled shoppers can see a product in an ad, browse a storefront after hours, or respond to an in-store display, then call Shop BuyVoice and buy the item simply by saying the product code and verifying their identity (i.e., by entering their phone number and providing a “sample” voiceprint). Click here for a demo.
Another step closer to making voice biometrics a commercial reality.
Sunday, February 28, 2010
Voice Biometrics Basics - Enrollment
Saturday, February 27, 2010
Voice Biometrics Basics: Voiceprints
Components of a Vocal Tract
• Nasal cavity
• Palate
• Soft palate vellum
• Uvula
• Tonsils
• Tongue
• Pharynx
• Epiglottis
• Vocal cords (glottis)
• Larynx
• Esophagus
• Thyroid cartilage
• Hyoid
• Lower jaw
• Lips
• Teeth
• Alveolar ridge
• Upper gums (alveolus)
Voiceprints are unique to each person (similar to fingerprints). A person's identity can be verified by matching a “sample” voiceprint with a “base” voiceprint.
Friday, February 26, 2010
Certified Biometrics Professional Programs
In yesterdays posting, I wrote that several colleges are offering degrees in biometrics. Today, I'd like to make you aware of two options for obtaining certification in biometrics (Note: this is not an endorsement of either program).
The first program, sponsored by the Institute of Electrical and Electronics Engineers, Inc. (IEEE), leads to the designation “Certified Biometrics Professional™.” According to the Website, “to earn the IEEE CBP credential, candidates must pass one rigorous, multiple-choice examination. Individuals who earn the CBP credential will be required to maintain their knowledge and skills by participating in continuing education and professional development activities.”
The exam covers the following topics:
• Biometrics Fundamentals
• Biometric Modalities
• Biometric System Design and Evaluation
• Biometrics Standards
• Social, Cultural and Legal Implications
• Biometrics Applications
Exams are given during two 1-month testing periods. Total fees are $495 for IEEE members and $595 for non-members.
The second program, offered by the Certified Biometrics Security Professional Institute, leads to the designation “Certified Biometrics Security Professional,” “Certified Biometrics Security Engineer” or “Certified Biometrics Solutions Developer.”
The “Certified Biometrics Security Professional” exam covers the following topics:
• Introduction to Biometrics
• Type of Biometrics
• Why Biometrics
• Usage of Biometric Technologies
• Biometrics In Operation
• Biometrics Standards
• Comparison
• Smart Cards
• Multistage Authentication With Biometrics
• Integrating Biometrics with other Technologies
• Privacy and Confidentiality Issues and Concerns
• Biometrics and Security Compliances
• Security Issues
• Basic Biometric Lifecycle
• Risks associated with users of Biometrics systems
Fees start at $995.
I’d be interested to hear if any of you have received any of these certifications.
Thursday, February 25, 2010
Looking for a Degree in Biometrics?
Biometrics courses offered at Davenport include:
• Biometrics Fundamentals
• Applicable Biometrics
• Biometric Spoofing
• Information Warfare and Security
• Authentication and Audits
• Biometric ID and Privacy Laws
• Credential Hardening
• Biometric Security Architectures
• Advances in Biometric Technologies
West Virginia University appears to be a hub for biometrics research. According to their Website, they house the Center for Identification Technology Research and are the lead academic partner for the FBI’s Biometric Center of Excellence.
Back to school anyone?
Wednesday, February 24, 2010
Books on amazon.com that Reference Voice Biometrics
If you have read any of the books, please feel free to post your comments.