SlideShare a Scribd company logo
1 of 29
My Voice is My
Passport: Verify Me
March 12, 2012
About the Speakers
   Dan Miller (Founder, Senior Analyst)
       Founded Opus Research (1985)
       Analyst at IDC/Link, The Kelsey Group, Zelos Group
       Industry experience: Atari, Time-Warner, PacTel (AT&T)
       Expertise: local, DA, speech integration with Web, mobility
        and enterprise software infrastructure
       Coverage Areas: Conversational Commerce, Internet2Go,
        Biometrics
   Isaac Chapa (VP Information Systems/Operations,
    CSID)
       Joined CSID 2006, overseeing ID Theft Platforms/Solutions
       Sr. Engineer, Grande Communications
       Designed and integrated DCM/VOIP Switches, Billing
        Platforms, SONET and FTTH, HFC networks

                                                                      2
Why We’re Here
 Talk about voice biometrics
 Share some ideas on stronger authentication for
  mobile transactions
 Get feedback as prospective
  users/developers/implementers
 Describe some “real world” use cases, business cases
  and demand drivers




                                                         3
Voice Biometrics & Speaker Verification
 Voice Biometrics is a technology
    Captures an utterance from a live caller
    Compares it to previously stored “voiceprint”
    Produces a score
 Speaker Verification is an application
    Employs a biometric engine plus business logic
    Enrolls customers by obtaining voice prints
    Compares live utterances to voice prints to produce a
    “pass” or “fail” responses




                                                             4
Speaker Verification Components
 Core Verification Engine
    Receives voice sample (“utterance”); compares it to a voiceprint
     (“template”)
    Confirms who said it
 Core Recognition Engine
    Compares utterance to ASR grammar
    Determines what was said
 Business Logic
    Decides if the caller passes or fails
    Dictates required “next steps”




                                                                        5
What is Voice Print?
Physical Characteristics         Behavioral Characteristics
The unique physical traits of    The harmonic and resonant
the individual’s vocal tract,    frequencies, such as accents, the
such as shape and size.          speed of your speech, and how
                                 words are pronounced and
                                 emphasized.




      Voiceprint - Together these physiological and
      behavioral factors combine to produce unique voice
      patterns for every individual


                                                                     6
Text Dependent vs. Text Independent
 Applications that require a specific pass phrase are Text
  Dependent
    Require training
    Customarily involve enrollment
 Text Independent applications can use any utterance
    Simplify enrollment
    Support “conversational authentication”




                                                              7
Why Now?




           8
Fraud Protection Requirements
   Multifactor
       Mandated in more use cases
       Includes “something you are”
   Multimodal
       Because “the customer is always on”
       Embraces social networks and multiple sign-ons
   Mobile
       Approaching 6 billion subscribers
       Mobile devices are becoming virtual assistants




                                                         9
+ 1 = Momentum
 Passwords getting more difficult
    Multiple digits and special characters
    Frequently updated
    Fragmented across sites (and IDs)
 User authentication vital
    To access multiple sites, domains and devices
    For more activities, transactions and interactions
    “Open” approaches only as strong as weakest link




                                                          10
Entering 3rd Generation
                                                    Password replacement
                                                    Leverage device id
                             Voiceprint on identity Random phrase liveness
“My voice is my              claim                       3rd Generation
password”
                             Leverage KV & ANI/CLI
“ 0 1 2 3 4 5 6 7 8 9”                                  Enhanced ID&V
                             Random word liveness
Random digit liveness                                Secure Mobile Access
                                  2nd   Generation      Voice Signatures
     1st Generation                                         Embedded
                                                       -Internet via OOB
                                 Enhanced ID&V              Verification
                                                     - Mobile multi-media
  IVR PIN replacement            Multi-factor Auth        Convenience
    Password Reset                Automation
  Emphasis on Security

2000                  2005                    2010           2015
 Source: Nuance Communications

                                                                            11
Estimated Revenues




                     12
Results: Registered Voiceprints
                 In Millions




                                  13
This is My Wallet




                    14
This is My Wallet on Phone




                             15
Mobile Commerce is Exploding
 Mobile transactions
    Will reach $670 billion by 2015
    Up from $240 billion in 2011
 Global in nature
    East Asia and China
    Western Europe
    North America

    represent 75% gross transaction value.
    (Juniper Research)




                                             16
But Inherently Insecure
 At the device level
    OSes have no security shell
    Personal info (including PINs) stored as text
 At the network level
    Encryption is the exception
    Prone to keystroke logging, Bluetooth sniffing and the like


                What about authenticating users?




                                                                   17
What Are We Protecting
 Integrity
 Confidentiality
 Availability of Data
    Loosely coupled from infrastructure
 Secure applications and runtime environments
 The critical focus of security shifts:
    From owning everything to owning nothing
    From “Where are you from?” to “Who are you?”
       • Identity, credential, and access management
    From “Internal vs. External” to “Distrust everyone equally”
 Need strong authentication independent from current
  form factors


                                                                   18
What Are We Using
 Usually a four digit number.
    There's only 10,000 possible combinations
    Four character, alpha only, password has more than
     45,000 possibilities
    Alphanumeric and there's more than a million and a half
 Fast computers can crack these in less than a
  second (and often don’t have to)




                                                               19
Today’s Requirements
 “Layered”
    To apply appropriate level of security for
    risk profile
 Multi-Factor
    To augment PINs or PWD
 Device-oriented
    Complex device identification
    considered more secure
    (per 2011 “guidance” from FFIEC)




                                                  20
Lead To These Solutions
 Treating mobile phones as “non-
  traditional endpoints”
 Popular solutions:
    One Time Passwords – using SMS text
    Knowledge-based Authentication –
     using non-public info
    “A Biometric” – fingerprint, face
     recognition, iris scans…and voice!




                                           21
Before You’d Try These




                         22
You Should Think About These
 User Authentication
 Device Activation
 Transaction Authorization
 Mobile Signatures
 Password Reset
 ID Proofing




                               23
Superior Factor for Phones
 Works on all phones
 Includes both physical and behavioral attributes
 Physical Characteristics        Behavioral Characteristics
 The unique physical traits of   The harmonic and resonant
 the individual’s vocal tract,   frequencies, such as accents,
 such as shape and size.         the speed of your speech, and
                                 how words are pronounced and
                                 emphasized.




                                                                 24
On Par With Biometric Alternatives
 Error rates are “acceptable”
 Registration is relatively easy
 No special equipment needed for authentication
 Solutions integrate with or augment existing security
  infrastructure




                                                          25
Has Surprising Acceptance
 In contact centers
    8.5 million voice prints registered
    ROI justified shaving minutes from authentication practices
    + fraud reduction
 For remote and mobile workers
    For Password Reset
    Secure access to VPN
    Strong authentication for conference calls




                                                                   26
Applications & Use Cases
 Personalized, trusted customer care
 Proof of life
 Mobile payment authorization
 Device activation, “Wake Up”
 Enterprise VPN access control
 Password reset
 Anonymous authentication




                                        27
But Real Security Comes With
 Layering multiple factors
    Like gestures
    Location
    Motion detection
    Out-of-band authentication
 And leveraging existing infrastructure
    For compliance
    As a go-faster
    To support Natural Language Interactions




                                                28
Thank you.
Dan Miller
Dmiller@opusresearch.net
@dnm54 on Twitter

Isaac Chapa
ichapa@csid.com




                           29

More Related Content

What's hot

Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011lfilliat
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Systems, Inc.
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12lfilliat
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authenticationlfilliat
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonEduserv
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneIDpii2011
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Systems, Inc.
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinJan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinDroidcon Berlin
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep GuptaAbhilash Ravishankar
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCloudIDSummit
 
Axsionics quick presentation for slideshare
Axsionics quick presentation for slideshareAxsionics quick presentation for slideshare
Axsionics quick presentation for slidesharemartine reindle
 

What's hot (19)

Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authentication
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneID
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
ekey+ Presentation
ekey+ Presentationekey+ Presentation
ekey+ Presentation
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinJan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
 
Axsionics quick presentation for slideshare
Axsionics quick presentation for slideshareAxsionics quick presentation for slideshare
Axsionics quick presentation for slideshare
 

Viewers also liked

Viewers also liked (7)

Camtasia getting started guide
Camtasia getting started guideCamtasia getting started guide
Camtasia getting started guide
 
Forum ict
Forum ictForum ict
Forum ict
 
The More The Merrier
The More The MerrierThe More The Merrier
The More The Merrier
 
Smart school
Smart schoolSmart school
Smart school
 
Data Logger
Data LoggerData Logger
Data Logger
 
David Shanks CV 2010
David Shanks CV 2010David Shanks CV 2010
David Shanks CV 2010
 
Alternative conception
Alternative conceptionAlternative conception
Alternative conception
 

Similar to Sxsw ppt voice-1

FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market TrendsForgeRock
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesmarketingkobil
 
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsForgeRock
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincIdentity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincViolet Le, MBA MIS
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO Alliance
 

Similar to Sxsw ppt voice-1 (20)

FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 
Usher overview.2014.02 hi
Usher overview.2014.02 hiUsher overview.2014.02 hi
Usher overview.2014.02 hi
 
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍAAUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologies
 
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincIdentity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSinc
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
 

Recently uploaded

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Recently uploaded (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

Sxsw ppt voice-1

  • 1. My Voice is My Passport: Verify Me March 12, 2012
  • 2. About the Speakers  Dan Miller (Founder, Senior Analyst)  Founded Opus Research (1985)  Analyst at IDC/Link, The Kelsey Group, Zelos Group  Industry experience: Atari, Time-Warner, PacTel (AT&T)  Expertise: local, DA, speech integration with Web, mobility and enterprise software infrastructure  Coverage Areas: Conversational Commerce, Internet2Go, Biometrics  Isaac Chapa (VP Information Systems/Operations, CSID)  Joined CSID 2006, overseeing ID Theft Platforms/Solutions  Sr. Engineer, Grande Communications  Designed and integrated DCM/VOIP Switches, Billing Platforms, SONET and FTTH, HFC networks 2
  • 3. Why We’re Here  Talk about voice biometrics  Share some ideas on stronger authentication for mobile transactions  Get feedback as prospective users/developers/implementers  Describe some “real world” use cases, business cases and demand drivers 3
  • 4. Voice Biometrics & Speaker Verification  Voice Biometrics is a technology  Captures an utterance from a live caller  Compares it to previously stored “voiceprint”  Produces a score  Speaker Verification is an application  Employs a biometric engine plus business logic  Enrolls customers by obtaining voice prints  Compares live utterances to voice prints to produce a “pass” or “fail” responses 4
  • 5. Speaker Verification Components  Core Verification Engine  Receives voice sample (“utterance”); compares it to a voiceprint (“template”)  Confirms who said it  Core Recognition Engine  Compares utterance to ASR grammar  Determines what was said  Business Logic  Decides if the caller passes or fails  Dictates required “next steps” 5
  • 6. What is Voice Print? Physical Characteristics Behavioral Characteristics The unique physical traits of The harmonic and resonant the individual’s vocal tract, frequencies, such as accents, the such as shape and size. speed of your speech, and how words are pronounced and emphasized. Voiceprint - Together these physiological and behavioral factors combine to produce unique voice patterns for every individual 6
  • 7. Text Dependent vs. Text Independent  Applications that require a specific pass phrase are Text Dependent  Require training  Customarily involve enrollment  Text Independent applications can use any utterance  Simplify enrollment  Support “conversational authentication” 7
  • 9. Fraud Protection Requirements  Multifactor  Mandated in more use cases  Includes “something you are”  Multimodal  Because “the customer is always on”  Embraces social networks and multiple sign-ons  Mobile  Approaching 6 billion subscribers  Mobile devices are becoming virtual assistants 9
  • 10. + 1 = Momentum  Passwords getting more difficult  Multiple digits and special characters  Frequently updated  Fragmented across sites (and IDs)  User authentication vital  To access multiple sites, domains and devices  For more activities, transactions and interactions  “Open” approaches only as strong as weakest link 10
  • 11. Entering 3rd Generation Password replacement Leverage device id Voiceprint on identity Random phrase liveness “My voice is my claim 3rd Generation password” Leverage KV & ANI/CLI “ 0 1 2 3 4 5 6 7 8 9” Enhanced ID&V Random word liveness Random digit liveness Secure Mobile Access 2nd Generation Voice Signatures 1st Generation Embedded -Internet via OOB Enhanced ID&V Verification - Mobile multi-media IVR PIN replacement Multi-factor Auth Convenience Password Reset Automation Emphasis on Security 2000 2005 2010 2015 Source: Nuance Communications 11
  • 14. This is My Wallet 14
  • 15. This is My Wallet on Phone 15
  • 16. Mobile Commerce is Exploding  Mobile transactions  Will reach $670 billion by 2015  Up from $240 billion in 2011  Global in nature  East Asia and China  Western Europe  North America represent 75% gross transaction value. (Juniper Research) 16
  • 17. But Inherently Insecure  At the device level  OSes have no security shell  Personal info (including PINs) stored as text  At the network level  Encryption is the exception  Prone to keystroke logging, Bluetooth sniffing and the like What about authenticating users? 17
  • 18. What Are We Protecting  Integrity  Confidentiality  Availability of Data  Loosely coupled from infrastructure  Secure applications and runtime environments  The critical focus of security shifts:  From owning everything to owning nothing  From “Where are you from?” to “Who are you?” • Identity, credential, and access management  From “Internal vs. External” to “Distrust everyone equally”  Need strong authentication independent from current form factors 18
  • 19. What Are We Using  Usually a four digit number.  There's only 10,000 possible combinations  Four character, alpha only, password has more than 45,000 possibilities  Alphanumeric and there's more than a million and a half  Fast computers can crack these in less than a second (and often don’t have to) 19
  • 20. Today’s Requirements  “Layered”  To apply appropriate level of security for risk profile  Multi-Factor  To augment PINs or PWD  Device-oriented  Complex device identification considered more secure (per 2011 “guidance” from FFIEC) 20
  • 21. Lead To These Solutions  Treating mobile phones as “non- traditional endpoints”  Popular solutions:  One Time Passwords – using SMS text  Knowledge-based Authentication – using non-public info  “A Biometric” – fingerprint, face recognition, iris scans…and voice! 21
  • 22. Before You’d Try These 22
  • 23. You Should Think About These  User Authentication  Device Activation  Transaction Authorization  Mobile Signatures  Password Reset  ID Proofing 23
  • 24. Superior Factor for Phones  Works on all phones  Includes both physical and behavioral attributes Physical Characteristics Behavioral Characteristics The unique physical traits of The harmonic and resonant the individual’s vocal tract, frequencies, such as accents, such as shape and size. the speed of your speech, and how words are pronounced and emphasized. 24
  • 25. On Par With Biometric Alternatives  Error rates are “acceptable”  Registration is relatively easy  No special equipment needed for authentication  Solutions integrate with or augment existing security infrastructure 25
  • 26. Has Surprising Acceptance  In contact centers  8.5 million voice prints registered  ROI justified shaving minutes from authentication practices + fraud reduction  For remote and mobile workers  For Password Reset  Secure access to VPN  Strong authentication for conference calls 26
  • 27. Applications & Use Cases  Personalized, trusted customer care  Proof of life  Mobile payment authorization  Device activation, “Wake Up”  Enterprise VPN access control  Password reset  Anonymous authentication 27
  • 28. But Real Security Comes With  Layering multiple factors  Like gestures  Location  Motion detection  Out-of-band authentication  And leveraging existing infrastructure  For compliance  As a go-faster  To support Natural Language Interactions 28
  • 29. Thank you. Dan Miller Dmiller@opusresearch.net @dnm54 on Twitter Isaac Chapa ichapa@csid.com 29