Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Voice Biometrics Profile Set To Rise In 2012

ValidSoft : 19 January, 2012  (Technical Article)
Payment authentication usage of voice biometrics to become more significant in the coming year depending on adoption obstacles according to new research report
Voice Biometrics Profile Set To Rise In 2012
ValidSoft has partnered with Opus Research to produce a report titled, Voice Biometrics Authentication Best Practices: Overcoming Obstacles to Adoption. The study, led by Dan Miller, senior analyst at Opus Research, evaluates previous voice biometric projects as well as the current industry landscape in order to identify a number of best practices to rolling out the technology and taking the industry forward. ValidSoft is a wholly-owned subsidiary of Elephant Talk Communications, a provider of business software to the telecommunications and the financial services industry.

The increasing use of, and security risks associated with, smartphones for payments and banking, along with heightened incidences of data theft and increasing awareness of fraud, highlight the need for banks, businesses and governments to take another look at methods of authenticating end users. It is no longer sufficient to merely secure hardware end points. Organizations want assurances that the individual at that end point is the person he or she claims to be.

Voice biometrics has the potential to play an important role in doing this.   The general public is becoming more familiar with using their voice for mobile search, device control and dictation and today’s study shows how, with the proper approach, voice authentication with soon follow. Voice biometrics can act as a part of a multi-layer authentication process to help reduce fraud and to confirm that the endpoint user is genuine. Opus Research predicts that the global number of registered voiceprints will increase from 10 million today to over 25 million in 2015.

Opus’ Dan Miller said: “Voice biometrics strikes the right balance of strong authentication and usability. It is a powerful tool for preventing fraud and promoting empowerment through self-service, and will in the long run help financial institutions save money from fraudulent transactions and reduced administration costs. The security industry should adopt best practices when introducing voice biometrics to their customers.

According to Miller these are:

* Ensure security is balanced with customer usability
* Engage stakeholders early in the process and leverage existing resources
* Gain their trust by proving that the technology works; be ready to adapt
* Look ahead and bear in mind future upgrades and new technology

“In a social, mobile environment, user authentication has become more important than ever in order to protect unauthorized access to corporate resources and to prevent fraudulent transactions,” said Miller.

Pat Carroll, CEO of ValidSoft, added: “A multi-factor/four-factor approach to user authentication and transaction verification provides robust security without compromising customer experience, and voice biometrics can play an important role in this. This not only applies to Financial Services and Government sectors, but is also relevant to the social media industry and the latest challenges it faces with users’ stolen identities. The four aspects of a person’s identity that need to be checked are: something you are, namely your voiceprint; something you have which is your mobile phone; something you know, this will be your PIN or password; and somewhere you are (or not), which can be established using privacy-protected signaling services associated with the global mobile networks.”
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo