SlideShare a Scribd company logo
1 of 5
Download to read offline
TECHNOLOGY WHITEPAPER


                         Securing Citizen Self-Service for Government




AURAYA SYSTEMS
One Tara Boulevard | Nashua, New Hampshire 03062 | +1 603 123 7654 | twitter.com/armorvox | linkedin/in/armorvox
Securing Citizen Self-Service for Government

How cash-strapped government agencies can deliver secure self-services even
in economically challenging times.

The Problem: Government Needs to Deliver More Services with Less Budget

Government, law enforcement and intelligence agencies are bolstering their identity verification
methods in response to epidemic levels of security breaches, identity theft, password hacks and fraud.
Moreover, the problem is only going to get worse as economies struggle and citizens find themselves in
financial difficulty. At the same time, Governments are under pressure to deliver more services, more
effectively and more efficiently to their citizens, yet with reduced budgets and funding.


Increased Use of Citizen Self-Service Fraught with Risk
In this environment, Governments often look to increase use of citizen self-service, either delivered
through the Internet or via the telephone. But the traditional secure solutions, such as PINs,
passwords and the use of personal information questions to authenticate identity to enable secure self-
service is rapidly becoming completely inadequate. These measures are no longer sufficient to
maintain strong identity authentication needed to deliver effective and secure government services.


Apart from the inconvenience of remembering yet another set of PIN’s and passwords for a government
service, there is the high cost and inconvenience of resetting them when they are forgotten, stolen or
compromised. Further, simply knowing a PIN or password does not mean to say it is you. PINs and
passwords are regularly shared, stolen and misused. In addition, providing personal information to
authenticate identity in call centers and helps desks (often to reset forgotten passwords) is equally
fraught with danger. Firstly, knowing a name, address, telephone number and other information is no
guarantee that you are who you say you are.


Furthermore, in government call centers and help desks; there is the added security threat from agents
being exposing citizens’ personal information to staff. In this situation, governments often need to vet
and closely manage call center and help-desk staff, adding further cost to already stretched budgets.
Amid these challenges, government agencies are increasingly turning to voice biometrics as a
technology to provide strong but efficient citizen identity authentication. Voice biometrics, a technology

2
ARMORVOX – ImpostorMaps™
© 2012 Auraya Systems www.ArmorVox.com
that authenticates a caller from their voice characteristics, is increasingly being used in citizen facing
services to streamline call center services and as an enabler of secure self-service applications.
Voice, like a fingerprint, is unique to each person. This fact can be used in telephone and Internet
services to positively authenticate that a person “is, literally, who they say they are”. Typically, in a
telephone service, for example, a person quotes an account number (or other information) to the
system. The system uses speech recognition to recogniser the account number and voice biometrics to
confirm it is the account holder saying their account number (and not an imposter trying to break into
their account).

The Solution: Voice Biometric Solution Ensures “You Are Who You Say You Are”

This way the technology eliminates the need for citizens to have PINs or passwords to access secure
services or indeed provide personal information to a call center or help desk staff to prove they are who
they say they are!


Centerlink, for example (the Australian social security department), has had a voice biometric system
in operation since 2009. This system, which now has around 1 million registered users, enables
regular callers to authenticate their identity by simply saying their Centerlink number, name and the
answer to a secret question. The system analyses the voice of the caller to confirm they are the
account holder and their request can then be immediately processed, either by a call center agent, or
by the telephone self-service system. The system eliminates the need for callers to quote personal
information to Centerlink staff or the need for citizens to remember PINs and passwords for access to
self-service applications.


IRD, the New Zealand tax office, is also rolling out a voice biometric system configured to authenticate
upwards of 800,000 citizens to make accessing taxation services that much more convenient for tax
payers, whilst driving cost saving for the government agency. Whilst designed primarily to streamline
access to taxation services and eliminate the hassle of PINs and passwords, the system has the side
benefit of addressing the upsurge of taxation fraud, which has been on the increase as economic
conditions worsen.




3
ARMORVOX – ImpostorMaps™
© 2012 Auraya Systems www.ArmorVox.com
More Benefits: Additional Security Expands Citizen Self-Service Applications That Can Be
Offered

The additional security provided by the voice biometrics has enabled Government departments to roll-
out a number of high security self-services applications that could not otherwise be deployed. One
example of this is “change-of-address”, a high-value high-use application, especially amongst young
and often highly mobile demographic (students for example). But whilst, implementing change-of-
address as a self-service application is relatively straightforward, deploying is not. The problem here is
that many identity fraud cases start with changing a victim’s address. PINs and passwords just do not
provide the level of security necessary to deploy such an application and prevent identity take-overs.
But, as voice biometrics (like fingerprinting) provide a strong positive authentication of a citizen’s
identity, it now possible and practical to deploy such applications and streamline high use services.

Government Secure Self-Services Pave the Way for Civilian Applications
And it is not just in telephone services that voice biometrics is finding applications. Developers are
increasingly using voice biometrics as a replacement for PINs and passwords to not only strengthen
security as required in Government services, but enhance convenience and usability in mobile and
tablet applications. These new government applications promise a bright future, not just for cash
strapped Government departments to deliver more efficient services, but enabling them to deliver these
services more effectively and with enhanced security in economically challenging times.




4
ARMORVOX – ImpostorMaps™
© 2012 Auraya Systems www.ArmorVox.com
About the Author

               Dr. Clive Summerfield is Auraya Systems’ Founder and Chief Executive Officer.
               Clive is an internationally recognized authority on voice technology and holds numerous
               patents in Australia, USA and UK in radar processing, speech chip design and speech
               recognition and voice biometrics.


As a former Founder Deputy Director of the National Center for Biometric Studies (NCBS) at University
of Canberra, in 2005 Clive undertook at the time the world’s largest scientific analysis of the voice
biometric systems leading to the adoption of voice biometrics by for secure services. That experience
lead Clive in 2006 founding Auraya, a business exclusively focused on advanced voice biometric
technologies for enterprise and cloud based services. Visit ArmorVox.com for Clive Summerfield’s full
bio.


About Auraya Systems
Founded in 2006, Auraya Systems, the creators of ArmorVox™ Speaker Identity System is a global
leader in the delivery of advanced voice biometric technologies for security and identity management
applications in a wide range of markets including banks, government, and health services. Offices are
located near Boston USA, Canberra and Sydney Australia. For more information, please
visit www.armorvox.com.com.




5
ARMORVOX – ImpostorMaps™
© 2012 Auraya Systems www.ArmorVox.com

More Related Content

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Featured

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Armor vox wp-securing-citizen-self-service-for-government

  • 1. TECHNOLOGY WHITEPAPER Securing Citizen Self-Service for Government AURAYA SYSTEMS One Tara Boulevard | Nashua, New Hampshire 03062 | +1 603 123 7654 | twitter.com/armorvox | linkedin/in/armorvox
  • 2. Securing Citizen Self-Service for Government How cash-strapped government agencies can deliver secure self-services even in economically challenging times. The Problem: Government Needs to Deliver More Services with Less Budget Government, law enforcement and intelligence agencies are bolstering their identity verification methods in response to epidemic levels of security breaches, identity theft, password hacks and fraud. Moreover, the problem is only going to get worse as economies struggle and citizens find themselves in financial difficulty. At the same time, Governments are under pressure to deliver more services, more effectively and more efficiently to their citizens, yet with reduced budgets and funding. Increased Use of Citizen Self-Service Fraught with Risk In this environment, Governments often look to increase use of citizen self-service, either delivered through the Internet or via the telephone. But the traditional secure solutions, such as PINs, passwords and the use of personal information questions to authenticate identity to enable secure self- service is rapidly becoming completely inadequate. These measures are no longer sufficient to maintain strong identity authentication needed to deliver effective and secure government services. Apart from the inconvenience of remembering yet another set of PIN’s and passwords for a government service, there is the high cost and inconvenience of resetting them when they are forgotten, stolen or compromised. Further, simply knowing a PIN or password does not mean to say it is you. PINs and passwords are regularly shared, stolen and misused. In addition, providing personal information to authenticate identity in call centers and helps desks (often to reset forgotten passwords) is equally fraught with danger. Firstly, knowing a name, address, telephone number and other information is no guarantee that you are who you say you are. Furthermore, in government call centers and help desks; there is the added security threat from agents being exposing citizens’ personal information to staff. In this situation, governments often need to vet and closely manage call center and help-desk staff, adding further cost to already stretched budgets. Amid these challenges, government agencies are increasingly turning to voice biometrics as a technology to provide strong but efficient citizen identity authentication. Voice biometrics, a technology 2 ARMORVOX – ImpostorMaps™ © 2012 Auraya Systems www.ArmorVox.com
  • 3. that authenticates a caller from their voice characteristics, is increasingly being used in citizen facing services to streamline call center services and as an enabler of secure self-service applications. Voice, like a fingerprint, is unique to each person. This fact can be used in telephone and Internet services to positively authenticate that a person “is, literally, who they say they are”. Typically, in a telephone service, for example, a person quotes an account number (or other information) to the system. The system uses speech recognition to recogniser the account number and voice biometrics to confirm it is the account holder saying their account number (and not an imposter trying to break into their account). The Solution: Voice Biometric Solution Ensures “You Are Who You Say You Are” This way the technology eliminates the need for citizens to have PINs or passwords to access secure services or indeed provide personal information to a call center or help desk staff to prove they are who they say they are! Centerlink, for example (the Australian social security department), has had a voice biometric system in operation since 2009. This system, which now has around 1 million registered users, enables regular callers to authenticate their identity by simply saying their Centerlink number, name and the answer to a secret question. The system analyses the voice of the caller to confirm they are the account holder and their request can then be immediately processed, either by a call center agent, or by the telephone self-service system. The system eliminates the need for callers to quote personal information to Centerlink staff or the need for citizens to remember PINs and passwords for access to self-service applications. IRD, the New Zealand tax office, is also rolling out a voice biometric system configured to authenticate upwards of 800,000 citizens to make accessing taxation services that much more convenient for tax payers, whilst driving cost saving for the government agency. Whilst designed primarily to streamline access to taxation services and eliminate the hassle of PINs and passwords, the system has the side benefit of addressing the upsurge of taxation fraud, which has been on the increase as economic conditions worsen. 3 ARMORVOX – ImpostorMaps™ © 2012 Auraya Systems www.ArmorVox.com
  • 4. More Benefits: Additional Security Expands Citizen Self-Service Applications That Can Be Offered The additional security provided by the voice biometrics has enabled Government departments to roll- out a number of high security self-services applications that could not otherwise be deployed. One example of this is “change-of-address”, a high-value high-use application, especially amongst young and often highly mobile demographic (students for example). But whilst, implementing change-of- address as a self-service application is relatively straightforward, deploying is not. The problem here is that many identity fraud cases start with changing a victim’s address. PINs and passwords just do not provide the level of security necessary to deploy such an application and prevent identity take-overs. But, as voice biometrics (like fingerprinting) provide a strong positive authentication of a citizen’s identity, it now possible and practical to deploy such applications and streamline high use services. Government Secure Self-Services Pave the Way for Civilian Applications And it is not just in telephone services that voice biometrics is finding applications. Developers are increasingly using voice biometrics as a replacement for PINs and passwords to not only strengthen security as required in Government services, but enhance convenience and usability in mobile and tablet applications. These new government applications promise a bright future, not just for cash strapped Government departments to deliver more efficient services, but enabling them to deliver these services more effectively and with enhanced security in economically challenging times. 4 ARMORVOX – ImpostorMaps™ © 2012 Auraya Systems www.ArmorVox.com
  • 5. About the Author Dr. Clive Summerfield is Auraya Systems’ Founder and Chief Executive Officer. Clive is an internationally recognized authority on voice technology and holds numerous patents in Australia, USA and UK in radar processing, speech chip design and speech recognition and voice biometrics. As a former Founder Deputy Director of the National Center for Biometric Studies (NCBS) at University of Canberra, in 2005 Clive undertook at the time the world’s largest scientific analysis of the voice biometric systems leading to the adoption of voice biometrics by for secure services. That experience lead Clive in 2006 founding Auraya, a business exclusively focused on advanced voice biometric technologies for enterprise and cloud based services. Visit ArmorVox.com for Clive Summerfield’s full bio. About Auraya Systems Founded in 2006, Auraya Systems, the creators of ArmorVox™ Speaker Identity System is a global leader in the delivery of advanced voice biometric technologies for security and identity management applications in a wide range of markets including banks, government, and health services. Offices are located near Boston USA, Canberra and Sydney Australia. For more information, please visit www.armorvox.com.com. 5 ARMORVOX – ImpostorMaps™ © 2012 Auraya Systems www.ArmorVox.com