Voice biometrics. Advait Deshpande Nuance Communications, Inc. All rights reserved. Page 1
|
|
|
- Jody Crawford
- 10 years ago
- Views:
Transcription
1 Voice biometrics Advait Deshpande Nuance Communications, Inc. All rights reserved. Page 1
2 Imagine a world without PINS/Passwords Nuance Communications, Inc. All rights reserved. Page 2
3 Nuance Communications, Inc. All rights reserved. Page 3
4 Nuance Nuance Communications, Inc. All rights reserved. Page 4
5 Who is Nuance? Reinventing the relationship between people and technology Defining the next generation of human-computer interaction: Intelligent Systems Deeply invested in creating effortless and natural user experiences Best known for rapidly advancing voice-recognition technology The only publicly held USbased Voice Biometrics solutions provider Nuance Confidential Nuance Communications, Inc. All rights reserved. Page 5
6 7 billion mobile cloud transactions annually 4,100 patents & applications 65+ countries 14+ billion customer engagements per year 12,000 employees 80+ languages 800 million mobile keyboards shipped annually 15,000 mobile app developers 1,200 voice and language scientists and engineers 5 billion lines of medical data transcribed annually 25 million voice-enabled cars sold annually 6,500+ companies use Nuance Enterprise solutions Nuance Communications, Inc. All rights reserved. Page 6
7 What is voice biometrics? Nuance Communications, Inc. All rights reserved. Page 7
8 How it Works? Behavioral Characteristics Pronunciation, emphasis, speed of speech, accents Physical Characteristics Unique physical traits of your vocal tract, mouth shape and size, nasal passages Nuance Communications, Inc. All rights reserved. Page 8
9 Why voice biometrics? User convenience Nuance Communications, Inc. All rights reserved. Page 9
10 85% respondents dissatisfied with current automated authentication system. The questionnaire was designed by Coleman Parkes Research in close conjunction with both Opus and Nuance. The research was conducted in May 2012 and undertaken under the strict rules of MRS Nuance Communications, Inc. All rights reserved. Page 10
11 Nuance Communications, Inc. All rights reserved. Page 11
12 Why voice biometrics? Better Security Nuance Communications, Inc. All rights reserved. Page 12
13 Threat landscape Identity theft achieved easily via social networks, Phishing, Vishing, Smishing Phone channel is new frontier for Fraudsters. Stop relying on Challenge questions facebook has all the answers! Don't rely on easily exposed data to identify callers: Birth Date, Account Numbers Nuance Communications, Inc. All rights reserved. Page 13
14 Mul$ factor authen$ca$on not an op$on anymore! Something you have: Mobile Phone Token Card/Document Something you know Password PIN Question Something you are Voice signature Fingerprint Facial recognition Regulatory (FFIEC, Basel) Recommendations Single-factor authentication methods are inadequate for high-risk financial transactions Financial Institutions can us a variety of methods to establish authentication, including These methods can be either single factor or multi-factor Multi-factor authentication is not just a good idea its required by regulators!! Nuance Communications, Inc. All rights reserved. Page 14
15 More Secure than PINs, Password Up to 30% of financial account takeover fraud is perpetrated on channels with PIN/Password authentication Up to 60% of US consumers use the same Passwords for multiple credentials* Up to 25% of users fail knowledge based authentication while fraudster successfully get through Nuance Communications, Inc. All rights reserved. Page 15
16 How and where is it used? Nuance Communications, Inc. All rights reserved. Page 16
17 Voice Biometrics Solutions Active Speaker Verification Passive Speaker Verification Verifies a speaker s identity based on voiceprints acquired during an interaction with IVR, web, or mobile applications IVR/Mobile/Web Interaction Transparently verifies the speaker s identifies during the course of natural conversation Agent Interaction Nuance Communications, Inc. All rights reserved. Page 17
18 What is Voice Biometrics used for today? Use cases Business cases Improved call automation Reduced call handle time Improved agent satisfaction Increased client satisfaction Increased revenues Reduced fraud Nuance Communications, Inc. All rights reserved. Page 18
19 Voice Biometric Deployments Financial Services Telecom pid=newsarchive&sid=af9oh5v36.mo private/active_docs/ customer_references/ SS_NA_MTS_Allstream_Consulting_scr een.pdf /2011_CIO_100_How_Three_Compa nies_are_using_it_to_rethink_consumer_ Services /Barclays-streamlines-phonebanking-with-voice-biometrics announcements/ announcements_ _globalbilgi_voi ce_bio_and_satisfaction.pdf ArticleID= Nuance Communications, Inc. All rights reserved. Page 19
20 How to quantify the business value? Nuance Communications, Inc. All rights reserved. Page 20
21 Building a compelling business case The traditional business case is based on AHT savings Increased IVR containment, FCR Cost avoidance by reducing fraud Nuance Communications, Inc. All rights reserved. Page 21
22 New approach to business case Operational savings Improved customer experience Revenue generation Evolving approach *Harvard business review July august Nuance Communications, Inc. All rights reserved. Page 22
23 Voice Biometrics delivers cost savings 4% Contact Center Operation Savings $1m Annual savings Nuance Communications, Inc. All rights reserved. Page 23
24 Thank You Nuance Communications, Inc. All rights reserved. Page 24
Agenda. Announcement: Verint Acquires Victrio Victrio Solutions Client Results in Deployment Critical Success Factors Verint + Victrio Synergy
1 Agenda Announcement: Verint Acquires Victrio Victrio Solutions Client Results in Deployment Critical Success Factors Verint + Victrio Synergy 2 October 29: Verint Acquires Victrio Who is Verint? (NASDAQ:VRNT)
Voice Authentication On-Demand: Your Voice as Your Key
Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009 Convergys Corporation A Global Leader in Relationship
Shared VRU. A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy
Shared VRU A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy Agenda Voice response within FIS Telephone banking today FIS shared VRU roadmap Speech recognition Unleash
FFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
Pursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES
Pursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES Contents PART I An Increasing Threat: Identity Theft The FFIEC Response Risk Assessment Fundamentals The FFIEC
TECHNOLOGY WHITEPAPER
TECHNOLOGY WHITEPAPER Securing Citizen Self-Service for Government AURAYA SYSTEMS One Tara Boulevard Nashua, New Hampshire 03062 +1 603 123 7654 twitter.com/armorvox linkedin/in/armorvox Securing Citizen
FFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper
Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog A Nuance Education Paper 2009 Definition of Multi-Factor Authentication Dialog Many automated authentication applications
VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk
VoiceTrust Whitepaper Employee Password Reset for the Enterprise IT Helpdesk Table of Contents Introduction: The State of the IT Helpdesk...3 Challenge #1: Password-Related Helpdesk Costs are Out of Control...
User Behaviour Analytics
User Behaviour Analytics How do they know its really you? White Paper Sept 2015 Ezmcom Inc. 4701 Patrick Henry Drive BLDG 7, Santa Clara, CA, 95054, US Executive Summary Authentication has traditionally
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
customer care solutions
customer care solutions from Nuance white paper :: The ROI of Hosted IVR Why Organizations are Investing in Customers, Not Equipment NUANCE :: customer care solutions Hosted speech IVR is rapidly overtaking
interactive product brochure :: Nina: The Virtual Assistant for Mobile Customer Service Apps
interactive product brochure :: Nina: The Virtual Assistant for Mobile Customer Service Apps This PDF contains embedded interactive features. Make sure to download and save the file to your computer to
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored
Customer experience roulette: are banks making the right investments?
Customer experience roulette: are banks making the right investments? A survey of banking consumers and executives. 1 Executive summary Nuance commissioned a survey of 1,000 American consumers to learn
Advanced Biometric Technology
INC Internet Biometric Security Systems Internet Biometric Security System,Inc.White Papers Advanced Biometric Technology THE SIMPLE SOLUTION FOR IMPROVING ONLINE SECURITY Biometric Superiority Over Traditional
Online Banking Risks efraud: Hands off my Account!
Online Banking Risks efraud: Hands off my Account! 1 Assault on Authentication Online Banking Fraud Significant increase in account compromises via online banking systems Business accounts are primary
Voice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the
Mobile E-Commerce: Friend or Foe? A Cyber Security Study
Research February 2015 Mobile E-Commerce: Friend or Foe? A A J.Gold Associates Research Report Many consumers now interact with the Internet primarily through mobile devices, avoiding traditional PC devices
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.
Polling Question Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Please type in your response. This poll will close promptly at 1:00 pm CDT Getting the
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Telephone Banking Authentication Practical Approaches to Securing a Popular yet Vulnerable Channel
Telephone Banking Authentication yet Vulnerable Channel March 2007 Overview Financial institutions (FIs) must implement effective authentication solutions that address specific, often mutually exclusive
2 FACTOR + 2. Authentication WAY
2 FACTOR + 2 WAY Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
How To Use Usher For Business
MicroStrategy Enterprise Security Secure your enterprise with MicroStrategy Usher, the revolutionary new enterprise security platform Nearly 90% of IT Security Professionals Are Concerned About A Data
Creating Trust Online TM. Comodo Mutual Authentication Solution Overview: Comodo Two Factor Authentication Comodo Content Verification Certificates
Creating Trust Online TM Comodo Mutual Authentication Solution Overview: Comodo Two Factor Authentication Comodo Content Verification Certificates January 2007 Setting the stage Banking and doing business
VocalPassword : voice biometrics authentication.
VocalPassword : authentication. Friendly voice authentication across web, IVR, call center, or mobile. 1 VocalPassword for easy and secure authentication. VocalPassword, the world s most widely deployed
Intelligent Contact Management with. Flexible cloud services from VoltDelta. Contact centre Self service Customer insight
R Intelligent Contact Management with Flexible cloud services from VoltDelta >> >> >> Contact centre Self service Customer insight Contact centre out of the cloud Intelligently manage every contact channel
REPORT. Next steps in cyber security
REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15
Building Secure Multi-Factor Authentication
Building Secure Multi-Factor Authentication Three best practices for engineering and product leaders Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 [email protected] I 1-888-722-7871 Introduction
Understanding It s Me 247 Security. A Guide for our Credit Union Clients and Owners
Understanding It s Me 247 Security A Guide for our Credit Union Clients and Owners October 2, 2014 It s Me 247 Security Review CU*Answers is committed to the protection of you and your members. CU*Answers
Authentication Solutions Through Keystroke Dynamics
Objective: The objective of this paper is to provide a basic understanding of the biometric science of keystroke dynamics, and how BioPassword is using keystroke dynamics technology to deliver enterprise
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
Supplement to Authentication in an Internet Banking Environment
Federal Financial Institutions Examination Council 3501 Fairfax Drive Room B7081a Arlington, VA 22226-3550 (703) 516-5588 FAX (703) 562-6446 http://www.ffiec.gov Purpose Supplement to Authentication in
TABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13
TABLE OF CONTENTS Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13 Introduction Our world is more Mobile now than ever. In 2013
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
The Implementation of Multifactor Authentication in Canadian Financial Institutions. By Wilson Yee Tsun Lo ACC 626
The Implementation of Multifactor Authentication in Canadian Financial Institutions By Wilson Yee Tsun Lo ACC 626 1.0 Introduction The Internet has enabled financial institutions to offer various additional
Frequently Asked Questions on FFIEC Guidance on Authentication in an Internet Banking Environment. August 15, 2006
Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation National Credit Union Administration Office of the Comptroller of the Currency Office of Thrift Supervision Frequently
Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs
Solutions White Paper Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs Table of Contents Executive Summary............................. 1 Business Challenge.............................
Enterprise Readiness Series: The Case for Passive, Voice-Based Authentication
Enterprise Readiness Series: The Case for Passive, Voice-Based Authentication Today s customer authentication methods are from another age. Opus Research interviewed security and customer care professionals
Top 5 Reasons to Choose User-Friendly Strong Authentication
SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts
Best Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
Interactive product brochure :: Nina TM Mobile: The Virtual Assistant for Mobile Customer Service Apps
TM Interactive product brochure :: Nina TM Mobile: The Virtual Assistant for Mobile Customer Service Apps This PDF contains embedded interactive features. Make sure to download and save the file to your
White Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
VoiceSign TM Solution. Voice Signature Overview
Voice Signature Overview VoiceSign adds 'speak on the dotted line' to transaction processes. Both business and client benefit from convenient and secure transaction verification process. How it works At
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries
TECHNOLOGY WHITEPAPER
TECHNOLOGY WHITEPAPER ArmorVox10 Targets Call Center Fraud How to provide fast voice-file cross-matching to detect and track fraud in call centers. AURAYA SYSTEMS One Tara Boulevard Nashua, New Hampshire
Business Banking Customer Login Experience for Enhanced Login Security
Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification
Multi-Factor Authentication Core User Policy and Procedures
Multi-Factor Authentication Core User Policy and Procedures Core Users with access to other people s sensitive or restrictive information must use one-time passwords (OTP) generated from approved fobs
Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment
Using Voice Biometrics in the Call Center Best Practices for Authentication and Anti-Fraud Technology Deployment This whitepaper is designed for executives and managers considering voice biometrics to
ACI Response to FFIEC Guidance
ACI Response to FFIEC Guidance Version 1 July 2011 Table of contents Introduction 3 FFIEC Supervisory Expectations 4 ACI Online Banking Fraud Management 8 Online Banking Fraud Detection and Prevention
ECONOMICS OF IDENTITY
ECONOMICS OF IDENTITY The size and potential of the UK market for identity assurance Economics of Identity White Paper THE OPEN IDENTITY EXCHANGE CTRL-SHIFT By Alan Mitchell and Jamie Smith Foreword By
The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device
The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-668-6536 www.phonefactor.com Executive
Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model
Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model Andrew Rolfe Authentify, Inc. [email protected] Presentation Overview Authentication basics What is OOBA? Why is it important?
Protect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
How to reduce the cost and complexity of two factor authentication
WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
