Configuration and Management of Speaker Verification Systems



Similar documents
LEARNING SOLUTIONS website milner.com/learning phone

I. Application Development

ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS

Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper

Speaker Identification and Verification (SIV) Introduction and Best Practices Document

INCITS 456 Speaker Recognition Format for Raw Data Interchange (SIVR-1)

Software Requirements. Specification. Day Health Manager. for. Version 1.1. Prepared by 4yourhealth 2/10/2015

VoiceSign TM Solution. Voice Signature Overview

Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc Mira.LaCous@bio-key.

Common Criteria Evaluations for the Biometrics Industry

day 1 2 Windows Azure Platform Overview... 2 Windows Azure Compute... 3 Windows Azure Storage... 3 day 2 5

How To Protect Freespeech From Attack From A Hacker Attack

Visual Studio Team Edition for Database Professionals. Woody Pewitt Developer Evangelist

Interoperability Test Plan for International Voice services (Release 6) May 2014

SPEAKER IDENTIFICATION & VERIFICATION

Seema Sundara, Timothy Chorma, Ying Hu, Jagannathan Srinivasan Oracle Corporation New England Development Center Nashua, New Hampshire

Oracle 11g DBA Online Course - Smart Mind Online Training, Hyderabad. Oracle 11g DBA Online Training Course Content

inforouter V8.0 Distributed versus the Simple Model

Creating Connection with Hive

VoiceXML and VoIP. Architectural Elements of Next-Generation Telephone Services. RJ Auburn

W3C Speaker Identification and Verification Workshop

Deploying iphone and ipad Apple Configurator

Course 50382A: Implementing Forefront Identity Manager 2010 OVERVIEW

Deploying a Service into the Cloud. Michael Eichenberger CEO stepping stone GmbH Open Cloud Day 16 th of June 2015

Quest Soft Token for Windows Phone User Guide

VOICE INFORMATION RETRIEVAL FOR DOCUMENTS. Except where reference is made to the work of others, the work described in this thesis is.

customer care solutions

Detecting Credit Card Fraud

Fingerprint Identity User Manual for the Griaule Biometric Framework Rev 1.00

Oracle Communications Cartridge Feature Specification for Broadsoft Broadworks Enterprise Services

GlobalSCAPE Wide Area File Services

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

Moving Enterprise Applications into VoiceXML. May 2002

Sage CRM Connector Tool White Paper

Voic . Advanced User s Guide. Version 2.0

RemoteLab 2.0 Admin Guide

VocalPassword : voice biometrics authentication.

Day 1 - Technology Introduction & Digital Asset Management

Phone Routing Stepping Through the Basics

DBMS Questions. 3.) For which two constraints are indexes created when the constraint is added?

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko

Get started with Lync 2013

Database as a Service (DaaS) Version 1.02

Oracle IVR Integrator

intertrax Suite intertrax exchange intertrax monitor intertrax connect intertrax PIV manager User Guide Version

Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud

Toad for Oracle 8.6 SQL Tuning

Custom Software Development Portfolio. Innovation Collaboration Evolution Results

Recording Supervisor Manual Presence Software

WELCOME TO CITUS CLOUD LOAD TEST

Release Notes For Versant/ODBC On Windows. Release

Archive Attender Version 3.5

3.11 System Administration

INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An International online open access peer reviewed journal

Oracle BI Applications (BI Apps) is a prebuilt business intelligence solution.

Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led

Web services to allow access for all in dotlrn

Using Service Oriented Architecture (SOA) for Speaker-Biometrics Applications

Course: 8911B: Installation and Deployment in Microsoft Dynamics CRM 4.0

CL_50382 Implementing Forefront Identity Manager 2010

SEER Enterprise Shared Database Administrator s Guide

Version 2.6. Virtual Receptionist Stepping Through the Basics

Remote Support. User Guide 7.23


High Availability Using Raima Database Manager Server

Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment

Dell InTrust Preparing for Auditing Microsoft SQL Server

How to overcome SQL Server maintenance challenges White Paper

Skype for Business for Android

How To Use An Avaya Aura Call Center Desktop For Multi-Channel Communication

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

Oracle USF

Module 11 Setting up Customization Environment

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

SIV Workshop March Security, Privacy and Management. March 2009 Valene Skerpac, ibiometrics 1

Green Migration from Oracle

Getting Started. Sign in and get started. If you re already logged on to your organization s network, sign in by starting Lync.

Query Organizer Tool for Oracle DBA Chennakeshava Ramesh Oracle DBA

Oracle Database Performance Management Best Practices Workshop. AIOUG Product Management Team Database Manageability

DBdeployer. About the Speaker: CJ Estel, Operations Database Engineer CoverMyMeds

Maximizing Performance on Cognos, Workflow, and BDMS

User Guide. NAS Compression Setup

Implementing Forefront Identity Manager 2010

CA Nimsoft Monitor. Probe Guide for CA ServiceDesk Gateway. casdgtw v2.4 series

PowerShell Configuration Guide

MS-40074: Microsoft SQL Server 2014 for Oracle DBAs

Performance Testing. What is performance testing? Why is performance testing necessary? Performance Testing Methodology EPM Performance Testing

TANDBERG Telepresence Interoperability. Internet2 Conference April 2009 Scott C. Wilcoxen Telepresence Architect

Oracle 11g DBA Training Course Content

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1

Master Data Management and Universal Customer Master Overview

Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute

Microsoft Dynamics NAV 2013 R2 Sizing Guidelines for Multitenant Deployments

Xerox Multifunction Devices. Tracking versus Accounting

Solution: Delete global.log. You will have to re-add a Global Event Viewer if that is something you want to use in your upgraded system.

Support and Compatibility

Chapter 6: Send and Receive Instant Messages

Encore. The Powerful, Affordable Answer for Contact Centers Like Yours. Product Description

Transcription:

Configuration and Management of Speaker Verification Systems Chuck Johnson Architect ibiometrics, Inc.

Introduction For peak performance of a Speaker Verification solution, the VoiceXML client (voice application) needs to be able to query and set the necessary initialization and configuration (setup) parameters, control the operation of Speaker Verification resources (engines), and interpret the verification results.

Interpretation of Verification Results Speaker Verification engines, depending on the vendor, are configured to return raw (numeric) verification scores, normalized verification scores, verification decisions, or some combination of scores and decisions - or error results. In addition, some engines return confidence scores. Some standardization of return data/info is necessary e.g. a consistent range for normalized scores. The engine should return a basic (minimum) set of error results. The engine should return a pass/fail or a pass/fail/inconclusive decision.

Enrollment Voice Model Creation Traditionally (in voice model enrollment scenarios) the client application implements the enrollment dialog - manages the voice dialog, the error handling and the associated call flow. Within the context of an enterprise security framework, the client application should manage the enrollment process: start/stop/resume/abort enrollment, query enrollment status (in-progress, aborted, etc), and retrieve the enrollment outcome. Some engines support multiple modes of operation. The client should be able to query and set the VoiceXML mode 3.0 of operation [for

Voice Model Database Management Set up of the voice model (voiceprint) database entails: creation of the schema (tables), creation of database users, and establishment of rights and access privileges - tasks that are governed by enterprises guidelines and security policies. Those tasks are usually performed by a system administrator or DBA not by the client application. Client applications may be able to manage the voice models: copy the voice model, W3C Workshop on Speaker Biometrics delete the voice model and/or rename the

Distinct User Populations Many SIV applications have distinct user populations e.g. Financial Services, Community Corrections, and Social Services. These populations (groups) include children, females, ethnic groups, regional speakers, and application specific groups. Some world [background] models are not optimized for distinct user populations. Custom or group specific background models can improve verification performance (accuracy). Client applications should be able to utilize custom or group specific background models. And, optionally, update (adapt) group

Different Classes of Users In Financial Services Applications, access to different features of the service may have a higher (or lower) security setting. In Corrections Applications, different classes of users will have different security settings or levels. The users are often put into classes based on risk typically high, medium, and low. Client applications should be able to: query and set the current operating point (security level), query and set unsupervised adaptation thresholds, and manage and

Voice Model Adaptation The idea of voice model adaptation is not intuitive! In the not so distant past there were articles saying that voice model adaptation not always needed or questing the efficacy of the adaptation process. Numerous articles/reports from vendors and industry experts have clearly demonstrated the need for, and effectiveness of voice, model adaptation. The client application should be able to query unsupervised adaptation settings, enable/disable adaptation, query adaptation outcome (result) and, optionally, set adaptation threshold and rollback adaptation [from the last turn]. The client should manage supervised adaptation: control audio buffers, make adaption requests, and, optionally, rollback adaptation [from the last turn].

Solution Architecture Issues ** Optional Slide ** Time permitting, I may give a brief presentation of interface, security and architectural issues associated with loosely coupled SIV systems. These are systems where most or all of the SIV components/resources (app server, data store, voice interpreter and/or SIV engine) are distributed across multiple systems, across the enterprise, or across multiple enterprises.

Summary and Wrap up