TECHNOLOGY WHITEPAPER



Similar documents
TECHNOLOGY WHITEPAPER

VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk

ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS

Voice biometrics. Advait Deshpande Nuance Communications, Inc. All rights reserved. Page 1

FFIEC CONSUMER GUIDANCE

Voice Authentication On-Demand: Your Voice as Your Key

Modern two-factor authentication: Easy. Affordable. Secure.

W3C Speaker Identification and Verification Workshop

Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps. An IDology, Inc. Whitepaper

The Convergence of IT Security and Physical Access Control

Token Security or Just Token Security? A Vanson Bourne report for Entrust

FFIEC CONSUMER GUIDANCE

Welcome Guide for MP-1 Token for Microsoft Windows

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Alternative authentication what does it really provide?

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Advanced Biometric Technology

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Privilege Gone Wild: The State of Privileged Account Management in 2015

FAQs Electronic residence permit

Global Deployment of Finger Vein Authentication

solutions Biometrics integration

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

PROTECT YOUR WORLD. Identity Management Solutions and Services

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

French Justice Portal. Authentication methods and technologies. Page n 1

DigitalPersona, Inc. Creating the authentication infrastructure for a digital world.

Entrust IdentityGuard

Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs

7-Eleven Prepaid Visa Card

Improving Online Security with Strong, Personalized User Authentication

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

User Behaviour Analytics

Framework for Biometric Enabled Unified Core Banking

Multi-factor authentication

Hitachi ID Password Manager Frequently Asked Questions for Help Desk Managers

Cybersecurity and Secure Authentication with SAP Single Sign-On

Application of Biometric Technology Solutions to Enhance Security

Biometrics for payments. The use of biometrics in banking

Privilege Gone Wild: The State of Privileged Account Management in 2015

Personal Information. About you. Personal information and your identity.

Unisys Security Insights: Global Summary A Consumer Viewpoint

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

The Leading Provider of Identity Solutions and Services in the U.S.

Unisys Security Insights: Germany A Consumer Viewpoint

Digital Identity in Healthcare: What's Coming Down the Pike. Lisa Gallagher, BSEE, CISM, CPHIMS, FHIMSS VP, Technology Solutions, HIMSS

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Driving License. National Insurance Number

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

A brief on Two-Factor Authentication

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

BlackShield Authentication Service

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

May For other information please contact:

The Top 5 Federated Single Sign-On Scenarios

FAQs - New German ID Card. General

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

The Convergence of IT Security and Physical Access Control

Top 5 Reasons to Choose User-Friendly Strong Authentication

Hitachi ID Password Manager Telephony Integration

IT S ABOUT TIME REMOVING TECHNOLOGICAL BARRIERS TO IMPROVE PATIENT CARE. Enabling Healthcare. Securely

Standardisation of definitions of identity crime terms: A step towards consistency Report Series No

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

OCR Level 2 CAMBRIDGE TECHNICAL

Payment Card Industry Data Security Standard PCI DSS

Multi-Factor Authentication Core User Policy and Procedures

Cyber Security - What Would a Breach Really Mean for your Business?

Transcription:

TECHNOLOGY WHITEPAPER Securing Citizen Self-Service for Government AURAYA SYSTEMS One Tara Boulevard Nashua, New Hampshire 03062 +1 603 123 7654 twitter.com/armorvox linkedin/in/armorvox

Securing Citizen Self-Service for Government How cash-strapped government agencies can deliver secure self-services even in economically challenging times. The Problem: Government Needs to Deliver More Services with Less Budget Government, law enforcement and intelligence agencies are bolstering their identity verification methods in response to epidemic levels of security breaches, identity theft, password hacks and fraud. Moreover, the problem is only going to get worse as economies struggle and citizens find themselves in financial difficulty. At the same time, Governments are under pressure to deliver more services, more effectively and more efficiently to their citizens, yet with reduced budgets and funding. Increased Use of Citizen Self-Service Fraught with Risk In this environment, Governments often look to increase use of citizen self-service, either delivered through the Internet or via the telephone. But the traditional secure solutions, such as PINs, passwords and the use of personal information questions to authenticate identity to enable secure selfservice is rapidly becoming completely inadequate. These measures are no longer sufficient to maintain strong identity authentication needed to deliver effective and secure government services. Apart from the inconvenience of remembering yet another set of PIN s and passwords for a government service, there is the high cost and inconvenience of resetting them when they are forgotten, stolen or compromised. Further, simply knowing a PIN or password does not mean to say it is you. PINs and passwords are regularly shared, stolen and misused. In addition, providing personal information to authenticate identity in call centers and helps desks (often to reset forgotten passwords) is equally fraught with danger. Firstly, knowing a name, address, telephone number and other information is no guarantee that you are who you say you are. Furthermore, in government call centers and help desks; there is the added security threat from agents being exposing citizens personal information to staff. In this situation, governments often need to vet and closely manage call center and help-desk staff, adding further cost to already stretched budgets. Amid these challenges, government agencies are increasingly turning to voice biometrics as a technology to provide strong but efficient citizen identity authentication. Voice biometrics, a technology 2

that authenticates a caller from their voice characteristics, is increasingly being used in citizen facing services to streamline call center services and as an enabler of secure self-service applications. Voice, like a fingerprint, is unique to each person. This fact can be used in telephone and Internet services to positively authenticate that a person is, literally, who they say they are. Typically, in a telephone service, for example, a person quotes an account number (or other information) to the system. The system uses speech recognition to recogniser the account number and voice biometrics to confirm it is the account holder saying their account number (and not an imposter trying to break into their account). The Solution: Voice Biometric Solution Ensures You Are Who You Say You Are This way the technology eliminates the need for citizens to have PINs or passwords to access secure services or indeed provide personal information to a call center or help desk staff to prove they are who they say they are! Centerlink, for example (the Australian social security department), has had a voice biometric system in operation since 2009. This system, which now has around 1 million registered users, enables regular callers to authenticate their identity by simply saying their Centerlink number, name and the answer to a secret question. The system analyses the voice of the caller to confirm they are the account holder and their request can then be immediately processed, either by a call center agent, or by the telephone self-service system. The system eliminates the need for callers to quote personal information to Centerlink staff or the need for citizens to remember PINs and passwords for access to self-service applications. IRD, the New Zealand tax office, is also rolling out a voice biometric system configured to authenticate upwards of 800,000 citizens to make accessing taxation services that much more convenient for tax payers, whilst driving cost saving for the government agency. Whilst designed primarily to streamline access to taxation services and eliminate the hassle of PINs and passwords, the system has the side benefit of addressing the upsurge of taxation fraud, which has been on the increase as economic conditions worsen. 3

More Benefits: Additional Security Expands Citizen Self-Service Applications That Can Be Offered The additional security provided by the voice biometrics has enabled Government departments to rollout a number of high security self-services applications that could not otherwise be deployed. One example of this is change-of-address, a high-value high-use application, especially amongst young and often highly mobile demographic (students for example). But whilst, implementing change-ofaddress as a self-service application is relatively straightforward, deploying is not. The problem here is that many identity fraud cases start with changing a victim s address. PINs and passwords just do not provide the level of security necessary to deploy such an application and prevent identity take-overs. But, as voice biometrics (like fingerprinting) provide a strong positive authentication of a citizen s identity, it now possible and practical to deploy such applications and streamline high use services. Government Secure Self-Services Pave the Way for Civilian Applications And it is not just in telephone services that voice biometrics is finding applications. Developers are increasingly using voice biometrics as a replacement for PINs and passwords to not only strengthen security as required in Government services, but enhance convenience and usability in mobile and tablet applications. These new government applications promise a bright future, not just for cash strapped Government departments to deliver more efficient services, but enabling them to deliver these services more effectively and with enhanced security in economically challenging times. 4

About the Author Dr. Clive Summerfield is Auraya Systems Founder and Chief Executive Officer. Clive is an internationally recognized authority on voice technology and holds numerous patents in Australia, USA and UK in radar processing, speech chip design and speech recognition and voice biometrics. As a former Founder Deputy Director of the National Center for Biometric Studies (NCBS) at University of Canberra, in 2005 Clive undertook at the time the world s largest scientific analysis of the voice biometric systems leading to the adoption of voice biometrics by for secure services. That experience lead Clive in 2006 founding Auraya, a business exclusively focused on advanced voice biometric technologies for enterprise and cloud based services. Visit ArmorVox.com for Clive Summerfield s full bio. About Auraya Systems Founded in 2006, Auraya Systems, the creators of ArmorVox Speaker Identity System is a global leader in the delivery of advanced voice biometric technologies for security and identity management applications in a wide range of markets including banks, government, and health services. Offices are located near Boston USA, Canberra and Sydney Australia. For more information, please visit www.armorvox.com.com. 5