right  Talk To Us!

An introduction to voice biometrics

I know who I am, but can I prove it? A person’s identity sits at the very core of their existence. I don’t mean from a metaphysical point of view, but from an everyday, practical perspective. Our ability to prove our identity governs everything from our ability to go on holiday to accessing our place of work or simply paying our bills. Our identity is a power thing. It has great value. Which is why is has become a valuable commodity for criminals, cyber or otherwise.  It’s no surprise that data breach statistics for the past five years reveal identity theft is the motivation behind over 60% of stolen records. In a security aware environment, the burden of ’proof of identity‘, naturally, becomes more onerous. That burden becomes greater still when we introduce distance into the equation. A single reference point is no longer enough to prove who we are in many applications. Multi-factor authentication has become the new standard for everything from remote access to business applications to caller identification in contact centres. Two-factor authentication typically comprises something you know, such as a password or a PIN, and something you own (a mobile phone or a pass card). With the emergence of mainstream biometrics, multi-factor authentication now involves something you are! Fingerprints have been used as a form of identification since the very end of the nineteenth century. One hundred years later, facial and iris recognition technologies came to the fore, but there are impracticalities associated with all those methods of identification. If biometrics are to be used for mainstream identification purposes, they need to be used in conjunction with ubiquitous technology. What’s more ubiquitous than the telephone? After all, two-thirds of the world’s population, or 4.8 billion people, own one.Despite living in a multi-channel world, the majority of contact centre engagements are still via the telephone. It just makes sense to leverage voice as a means of user identification and verification. Our voiceprint is as unique as our fingerprints. Instead of swirls and ridges, it’s everything from our physicality and idiosyncratic articulatory movements to our dialect or regional accent that makes us sound different. Our voiceprint is the result of a detailed statistical analysis of all those variables. It is stored as characters encoded in a manner similar to one-way encryption. So, from a security perspective, it’s not possible to recreate (or reverse engineer) a spoken reference from a discrete voiceprint file. Establishing a voiceprint can take the form of a prompt and response session with a customer, using a pre-determined set of phrases that cover the primary sounds of speech. Alternatively, a profile can be built up over time, during the course of a natural conversation. Once created, a voiceprint is used as a biometric reference that has significant implications for fraud prevention. Passphrases can be lost or stolen. Whilst it’s possible to lose your voice, it’s much harder to have it stolen. Find out more information on speaker verification and authentication, check out our Look who’s talking white paper.

Archive

The Aculab blog

News, views and industry insights from Aculab

  • Eliminating Barriers to Communication with Live Audio Translation for Phone Calls

    In an increasingly interconnected world, clear and effective communication is more essential than ever. That’s why Aculab intends to help break down language barriers and foster cross-cultural communications.

    Continue reading

  • The End of the PSTN in the US

    As the technical world has evolved, so has the way we communicate. The gradual, global transition away from the Public Switched Telephone Network (PSTN) is the most noticeable change in recent years. This begs the question, is the PSTN in the US headed towards a slow end as we transition into the digital era?

    Continue reading

  • Revolutionising the Landscape of Remote Authentication

    In a time where borders blur and workplaces extend beyond the confines of traditional offices, the significance of remote authentication has taken centre stage. As we advance, so does the need for secure and efficient ways to verify and authenticate our identity remotely. Finding the balance between security and user convenience is key when seeking to implement successful remote authentication.

     

    Continue reading

  • Choosing The Ideal Communication Platform: Key Considerations to Optimise Your Business

    Communication Platforms as a Service have become a necessity in the current digital age; allowing businesses to obtain frictionless means of communicating effectively. However, as technology rapidly evolves, so must communications. Much of the platforms on offer today are homogenous, so choosing the best fit for your business can be difficult. In this blog, we have shared some key points and trends for to consider, so your business can amplify communications and increase operational efficiency!

     

    Continue reading

  • 10 questions people are asking about The Big Switch Off

    With The Big Switch Off fast approaching, people naturally have questions and concerns ahead of the shutdown. The transition from conventional networks to digital technology is unavoidable in the fast-evolving world of telecommunications. In this blog, we address ten common questions people have about the Big PSTN Switch Off, shedding light on the topic and providing clarity.

     

    Continue reading