1 Best Practices for Voice Authentication Charles R. Jankowski Jr., Ph. D. SpeechTek West 2007 February 21, 2007.

Slides:



Advertisements
Similar presentations
Setup Computer Based Training Launch Reg Manager and Log-in Launch Training Manager Create CBT Program Link Training Material (video, document, seminar,
Advertisements

Dr. Marc Valliant, VP & CTO
Medicaid Management Information System (MMIS) Replacement
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Bell’s Voice Identification Service Charles Giordano Fred Mackenzie November 3rd, 2006 CACR Conference.
Department of Labor HSPD-12
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
7/22/071 Avoiding Voice Fraud & Threats Are you Really Who You Claim to Be? Valene Skerpac, CISSP
Voice Biometric Overview for SfTelephony Meetup March 10, 2011 Dan Miller Opus Research.
Data Validation Documentation for Enrollments. Learning Objectives As a result of this training you will be able to: Describe the data validation process.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
The role of voice biometrics in a multi-factor authentication solution SpeechTek February 21, 2007 Chuck Buffum
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
SpeechTek West 2007 Automating Password Reset to Make Employees More Efficient Jason Groshart Director of Product Engineering Password Reset.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Creating a Single Sign On Account. To create a Single Sign On ID please visit and select the option to create a new account.
MyOMLab Student User Guide To ensure a quick and easy start to your course, check out the interactive, step by step MyOMLab Student User Guide on the.
Speaker Recognition By Afshan Hina.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
What’s cooking at Sponsorium Miami, February 10, 2015.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
June 28th, 2004 BioSecure, SecurePhone 1 Automatic Speaker Verification : Technologies, Evaluations and Possible Future Gérard CHOLLET CNRS-LTCI, GET-ENST.
Douglas A. Reynolds, PhD Senior Member of Technical Staff
SIV Applications Claudia Daboul (IBP) Martin Eckert (T-Systems) Judith Markowitz (J. Markowitz, Consultants) 08. Aug 2006.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Citizenship & Identity, Family & ABD Medicaid ( current as of 2/1/2010) GPS— A Guided Practice Series presented by the OFI Education & Training Section.
Utilities, Customers & SMS Rudi Leitner. Who in this room has a mobile phone? Who in this room has ever sent a text (SMS) message?
MyEconLab Student User Guide To ensure a quick and easy start to your course, check out the interactive, step by step MyEconLab Student User Guide on.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Secure Component Composition for Personal Ubiquitous Computing Project Overview and Potential Techniques —————— 16 th May 2003 —————— David Llewellyn-Jones.
Chapter 3 Receiving the Incident. Incident Management Process of receiving, processing and resolving user problems or requests. Here we are going to look.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Amber Johnson U.S. Department of Education WVASFAA Fall 2015 Conference October 29, 2015 FSA ID: The FSA PIN Replacement.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Authentication What you know? What you have? What you are?
Speaker Identification and Verification Dan Burnett, Nuance 58 th IETF.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
CSCE 201 Identification and Authentication Fall 2015.
1 Authentication Technologies Authentication Mechanisms –Something you know –Something you have –Something you are Features –Authenticator & Base secret.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Horizon Photo-mote. ability to access photographs and images stored online, with the aid of a wireless remote remote enables the user to identify and.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. SELECTED.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Ticket to Work Program Interactive Voice Response (IVR) Ticket Assignability by Phone.
WEBINAR Fight Fraud And Offer A Better Customer Experience With Voice Biometrics May 18, Call in at 1:55 p.m. Eastern time Andras Cser, Vice President,
WELCOME TO
Demonstration of Heritage Health Member Portal Automated Health systems CONFIDENTIALITY NOTICE: This information is for the sole use of the intended recipient(s)
Connectivity Solutions *NEW* Improved Message Center
Radius, LDAP, Radius used in Authenticating Users
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Welcome MyCelium phone number MyCelium phone number.
Strong Password Authentication Protocols
December 12, 2018 CPA Continuing Education Society of PA
Interim Assessment Overview Principals’ Meeting November 8, 2018
Computer Security Protection in general purpose Operating Systems
Employee Self-Service (ESS) Portal
MyBusinessLab First Day of Class Registration Walkthrough
Employee Self-Service (ESS) Portal
Presentation transcript:

1 Best Practices for Voice Authentication Charles R. Jankowski Jr., Ph. D. SpeechTek West 2007 February 21, 2007

2 Design for Voice Authentication Dialog design is the single most critical aspect of voice authentication performance

3 Make Verifier SECURE Make Verifier EASY to use Verifier Dialog and Application Design

4 Verifier Performance Measures Automation Rate –Percentage of repeat true speakers automated by system –100 – False Reject Rate Security Rate –100 – False Accept Rate

5 Baseline Performance

6 Existing ID/Authentication SSN/Account# PIN

7 Enrollment SSN/Account# PIN 1-9 KV selection Used by Verifier Optional

8 Verification SSN/Account# 1-9 KV Used by Verifier Optional

9 Summary of design takeaways 1.Maintain consistency between enrollment and verification dialogs 2.Collect enough data during enrollment and verification 3.Use variable length verification 4.Use knowledge verification 5.Use speaker adaptation

10 1.Maintain consistency between enrollment and verification SSN/Account# Authentication 1-9 KV selection SSN/Account# 1-9 KV Only using 1-9 for voiceprint creation and checking Could also use account number, phone number, etc…

11 Choice of Verification Utterance Why use identity claim? –One shorter dialog step –80% of users claim and verify in one step Why use common? –Many users do not like to speak their identity claim in public Identity theft Allow option to touch-tone identity claim –Multiple options for Identification Enrollment very complex and long –Common utterance performance more predictable Out-of-the-box performance better understood ID claim may vary in length –Evaluating performance with identity claim more complex Impostors MUST speak same text as enrollee Identity claim -> Need live impostors

12 2. Collect enough data during enrollment and verification SSN/Account# Authentication 1-9 KV selection SSN/Account# 1-9 KV 3 Enrollment utterances instead of 2: 1-3% lower automation 1 Verification utterance instead of 2: 1-3% lower automation

13 3. Use variable length verification SSN/Account# Authentication 1-9 KV selection SSN/Account# % % Same verification performance as with 2 required utterances

14 4. Use knowledge verification SSN/Account# Authentication 1-9 KV selection SSN/Account# % 10% KV 10% Examples: PIN, Secret Date Verifier not turned on Increases Automation Increases Effectiveness of Adaptation

15 5. Use speaker adaptation SSN/Account# Authentication 1-9 KV selection SSN/Account# 1-9 KV

16 Speaker Verification Performance Speaker Adaptation –Online: Score very well, adapt and get even better –Manual: Unsure, backoff to knowledge, adapt if knowledge passes Cross-channel

17 Thank You!