Voice Biometric Overview for SfTelephony Meetup March 10, 2011 Dan Miller Opus Research.

Slides:



Advertisements
Similar presentations
Achieving online trust through Mutual Authentication.
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Module: 301 Set Up Issuer Accounts on NMHIX. It is recommended that all issuers using NMHIX should take this course.
Department of Labor HSPD-12
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
POST WEBSITE OVERVIEW Training Managers Workshop Computer Services Bureau 9/28/2014.
© 2008 RightNow Technologies, Inc. RightNow Feedback Overview & Demo Andrew Hull Director Product Marketing.
ACCESSIBLE TECHNOLOGIES FOR SPEECH MANAGEMENT “Making media accessible to all” ITU workshop – Geneva October 2013.
By: Monika Achury and Shuchita Singh
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Internet Cookies: Changing Internet Use and Privacy Lindsay Maidment & Katherine Hollander November 8, 2006.
Making Contact With Your Customers. Who are Klick2Contact? Highly experienced telecommunications professionals Backed by major European investment group.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Voice Recognition
Security-Authentication
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Quick Reference Guide Welcome TEST USER Version_NSU_ HELP RETIREMENT MANAGER DEMO FEEDBACK.
NetService Cardholder Tutorial GE Corporate Payment Services 4246 South Riverboat Road Salt Lake City, Utah Copyright Information.
Speaker Recognition By Afshan Hina.
Software Updates © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Supervisor: Dr. Eddie Jones Electronic Engineering Department Final Year Project 2008/09 Development of a Speaker Recognition/Verification System for Security.
SIV Applications Claudia Daboul (IBP) Martin Eckert (T-Systems) Judith Markowitz (J. Markowitz, Consultants) 08. Aug 2006.
Payment Gateways for e-Government services 24 May 2007
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
“Stronger” Web Authentication: A Security Review Cory Scott.
Voice Recognition All Talk No Walk.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
Multifactor Identification for Internet Banking Citizens State Bank Monticello, Iowa
Biometrics Authentication Technology
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
How Your Customers Will Pay Online & by Phone
VCE IT Theory Slideshows By Mark Kelly Vceit.com Websites & Data.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
CHAPTER 6 Concept of Virtual Store for Marketing Products and Services.
Catherine Metcalf | Dec U.S. Department of Education 2015 FSA Training Conference for Financial Aid Professionals The FSA ID – Resources for Assisting.
On-Line BankCard Center Presentation Cardholder Role During the Presentation click the mouse on this button to move back a slide During the Presentation.
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Problem being addressed –Fraudsters file in advance of the actual taxpayer resulting in lost government dollars ($5.2M in payments to fraudulent identities.
An Introduction to Biometrics
U.S. Department of Agriculture eGovernment Program eAuthentication Initiative eAuthentication Solution Screens Review Meeting October 7, 2003.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
WEBINAR Fight Fraud And Offer A Better Customer Experience With Voice Biometrics May 18, Call in at 1:55 p.m. Eastern time Andras Cser, Vice President,
Authentication.
By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard
Preparing for the Future
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
How To Create Cox New Account?
Travel Portal Overview for Integrys Group
smartmail & smartportal: Introducing Two-Factor Authentication
TECHNOLOGICAL PROGRESS
Faculty of Science IT Department Lecturer: Raz Dara MA.
Wolves of the Internet: Where do fraudsters hunt for data online?
Presentation transcript:

Voice Biometric Overview for SfTelephony Meetup March 10, 2011 Dan Miller Opus Research

© 2011 Opus Research, Inc. Why I’m here Talk about voice biometrics Share some ideas on stronger authentication for mobile transactions Get your feedback as prospective users/developers/implementers Describe some “real world” use cases, business cases and demand drivers 2

© 2011 Opus Research, Inc. Page 4 Voice Biometrics and Speaker Verification Voice Biometrics is a technology  Captures an utterance from a live caller  Compares it to previously stored “voiceprint”  Produces a score Speaker Verification is an application  Employs a biometric engine plus business logic  Enrolls customers by obtaining voice prints  Compares live utterances to voice prints to produce a “pass” or “fail” responses

© 2011 Opus Research, Inc. Page 4 Speaker Verification Components Core Verification Engine  Receives voice sample (“utterance”); compares it to a voiceprint (“template”)  Confirms who said it Core Recognition Engine  Compares utterance to ASR grammar  Determines what was said Business Logic  Decides if the caller passes or fails  Dictates required “next steps”

© 2011 Opus Research, Inc. Page 5 What is a Voice Print? Physical Characteristics The unique physical traits of the individual’s vocal tract, such as shape and size. Behavioral Characteristics The harmonic and resonant frequencies, such as accents, the speed of your speech, and how words are pronounced and emphasized. Voiceprint - Together these physiological and behavioral factors combine to produce unique voice patterns for every individual

© 2011 Opus Research, Inc. Page 6 Verification vs. Identification For Verification:  User claims an ID  Application matches voiceprint to that claim For Identification:  No claim of identity  ID System tries to detect “closest match” of captured utterances to voiceprint from a population of registered users

© 2011 Opus Research, Inc. Page 7 Text Dependent vs. Text Independent Applications that require a specific pass phrase are Text Dependent  Require training  Customarily involve enrollment Text Independent applications can use any utterance  Simplify enrollment  Support “conversational authentication”

© 2011 Opus Research, Inc. Why Now? 8

© 2011 Opus Research, Inc. Fraud protection persistence 9 Multifactor  Mandated in more use cases  Includes “something you are” Multimodal  Because “the customer is always on”  Embraces social networks and multiple sign-ons Mobile  Approaching 6 billion subscribers  Mobile devices are becoming virtual assistants

© 2011 Opus Research, Inc. +1 = Momentum Passwords getting more difficult  Multiple digits and special characters  Frequently updated  Fragmented across sites (and IDs) Authentication becoming important  To access multiple sites, domains and devices  For more activities, transactions and interactions  “Open” approaches only as strong as weakest link 10

© 2011 Opus Research, Inc. Application strengths Mobile payment authorization Device activation Access control Password reset Anonymous authentication 11

© 2011 Opus Research, Inc. Perspectives from RSA 12

The “Phone Channel” Traditionally Has Weaker Security ANI detection Voice profile (gender, age etc.) based on intuition Phone number Address Weak Identity verification Mother’s maiden name Social Security Number Basic account knowledge (last purchase etc.)

Fraudster call center online order form (with English translation) Fraudster call center online order form (with English translation) “Professional callers”: fluent in numerous languages, both male and female Caller-ID spoofing Service availability during American and Western European business hours. Cost: $7-$15 per phone call, Complete fraudulent transactions by impersonating people across a broad spectrum of demographics i.e. 77-year old female fluent in English or a middle-aged man fluent in Italian. Fraudster-Operated Call Centers Emerge in the Underground Economy to Facilitate Phone Fraud

Fraudster Operated Call Centers Underground forum post advertising "Professional Call Service"

Fraudster Operated Call Centers Review of a fraudster call center service

* Available H How Multi-Channel Fraud is Perpetrated

Tools of the trade: VOIP (IPBX) ID Spoofing Delivery: War dialing SMS Already in play in the US Vishing

How Fraudsters Bypass Blacklisted Call Center Numbers Fraudster calls Spoofing access point Directs call to non-blacklisted phone number with Spoofed Caller ID Call Forwarding Device Call is forwarded to call center 800 number Call Center services unsuspicious inbound call displaying spoofed ID of an existing customer

Fraudsters’ Interest in Phone Banking

© 2011 Opus Research, Inc. And Speaker V & I can help Questions? Contact: Or on Page 21