Voice biometrics solves most authentication problems

March 2014 Access Control & Identity Management

Voice biometrics is one of those technologies: it changes the game. It’s not in wide use anywhere in the world, yet, but it’s going to be the norm for authenticating identity within the next few years. It’s been worked on and refined for almost 15 years. So it’s at the point where it can be smoothly integrated with an organisation’s other systems, both front and back end. All that remains is to build it into your strategy.

Darren Arnold
Darren Arnold

There are compelling reasons to supplement all your other ID and authentication systems with voice biometrics.

For one thing, voice biometrics confers a massive, positive step-change in your organisational security. As with iris and fingerprint recognition technology, it is almost impossible for criminals to replicate the human voice. So, you have a high degree of certainty that the person in contact with your organisation is who he or she claims to be.

Also, voice biometrics has an advantage over iris and fingerprint recognition in that a person’s identity can be verified remotely, using a phone. With iris and fingerprint recognition, the person must be physically present to be authenticated.

In addition, the time involved in verifying someone’s identity can be cut to the few seconds needed for a voice biometrics engine to match someone’s live voiceprint with one that has been recorded. No more asking for an ID or passport number, a PIN or profile number, addresses, phone numbers, or the name of the person’s dog or first teacher.

Organisations can, as a result, be much more flexible and fluid with their security rules and processes, adapting easily as business strategies and markets require.

For the customer, voice biometrics eliminates the need to remember multiple passwords, usernames, and PINs. Recent research in the United Kingdom showed that, on average, people have as many as 100 individual passwords and PINs.

Trouble is, they will often use one or two fairly simple passwords across many different types of authentication, from their bank accounts to their Facebook account. This poses a significant hacking risk not just for the individual but all the companies implicated in that person’s authentication activities. Voice biometrics all but eliminates this risk.

So, why isn’t everyone on the voice biometrics bandwagon?

One of the challenges is that organisations are not clear on the difference between speech recognition technology and voice biometrics. Speech recognition technology is programmed to understand statements or questions from customer and offer a specific response. By contrast, voice biometrics works on the unique tone, resonance, pitch and biological characteristics of a person’s voice, regardless of the words used. It is the uniqueness of each human voice that makes voice biometrics a security tool.

A bigger challenge to voice biometrics uptake, however, is getting consumers to record and register their voiceprints. There are two methods: passive and active. Passive enrolment entails simply recording a person talking and then checking all future calls from him or her against that particular voiceprint.

However, in some countries, recording someone without their knowledge or agreement is regarded as an abuse of their right to privacy. That aside, passive enrolment is less accurate than the active alternative – and preferred by most organisations.

With active enrolment, people are told what voice biometrics is and how it works before having their participation requested. Their participation is simple and ranges from speaking a sequence of numbers or reading an agreed pass phrase. In future conversations with the organisation, they are asked to speak the same numbers, but in a random order, or to repeat the phrase.

As a rule, when people understand how much time and effort voice biometrics saves them in dealing with the organisation, they participate perfectly willingly. Also as a rule, it’s the early adopter industries, such as cellular operators, that have customers not only willing but eager to use cutting edge technologies. For this reason, a large cellular operator was the first South African company to adopt voice biometrics.

Once the ice is broken, other sectors, such as banking tend to follow very quickly. In fact, the financial services sector has been using voice biometrics for some time to service its high net worth clients. JP Morgan recently authorised a transfer of US$550 million using a voice biometrics password.

Integrating a game changer

Because they are game changers, technologies like voice biometrics can’t simply be bolted on to the rest of an organisation’s systems, processes, and strategies. They alter the way an organisation behaves, internally and externally. They hold fairly profound implications for image and operations. For these implications to be beneficial to the organisation across the board, an integrated approach is needed. Not just in terms of systems, but also the impact voice biometrics will have on an organisation’s security value chain as a whole.

It’s vital, therefore, that organisations work closely with specialists in integration of customer interactive solutions, business process optimisation (BPO), contact centre operations, and voice biometrics itself.

For more information contact Dimension Data Middle East & Africa, +27 (0)11 575 6177, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...