US Security for Cyber Security

759 views

Published on

I have been researching DHS Co-ops for the past three years and have built strong compliance based research knowledge pertaining to identity theft, biometrics and Cyber Security.

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
759
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

US Security for Cyber Security

  1. 1. ONE VOICE ™
  2. 2. OUTLINE <ul><ul><li>Overview </li></ul></ul><ul><ul><li>Patented Real-Time Automated Authentication Process </li></ul></ul><ul><ul><li>Technology Architecture </li></ul></ul><ul><ul><li>Patents </li></ul></ul><ul><ul><li>Market Integrations </li></ul></ul><ul><ul><li>Next Steps - Partnership </li></ul></ul>
  3. 3. Patented Application Service Provider Automated Real-time Enrolment Portal for Biometric Biographic Voice Identity Management <ul><li>has proprietary systems and processes that have been architected, designed, integrated and patented around the world. </li></ul>Why ID VoiceBANK?
  4. 4. <ul><li>is the Worlds Voice Biometric and Biographic Identity Services Portal into the Digital Virtual World. </li></ul><ul><li>can remotely authenticate and take a biometric VIP (Voice Identity Print) through any network, is easy to use, language independent and cost effective </li></ul><ul><li>was founded in 2002 whose principal partners are the worlds largest credit companies. </li></ul><ul><li>has function and feature rich technology, global patents, IP and signed contracts with fortune 100 companies. </li></ul><ul><li>has created and is deploying the world’s largest voice identity database for a multitude of services. </li></ul>
  5. 5. Biographical Biometrics Our Patented Application automates methods of Enrolment and provides Authentication and Verification Through Voice Biometrics. Handwriting Analysis Fingerprint Voice Verification Retinal Scan Hand Geometry Our Voice Biometric Solution
  6. 6. OUR MARKETS
  7. 7. ID VoiceBANK Delivers Service Differentiation … Client-Centric Loyalty behind Brand Higher customer satisfaction ratings Easy to use language independent Increase transactions Reduce fraud Redemption & reoccurrence Reduce customer loss Non evasive, Non intrusive Provide multi-modal access Fast ROI New Markets, New applications, new Partners Minimize identity theft New revenue Cost reduction Competitive advantages & position
  8. 8. System Flow Authentication Consumer Corporation Government Devices ACCESS TRANSACTION PORTAL WHO WANTS ACCESS TO MONEY AND INFORMATION? AUTOMATED PROCESSING
  9. 9. AUTOMATED UP-FRONT PROCESSING & AUTHENTICATION
  10. 10. Authentication Process Simple Steps <ul><li>Step #1 Verbally Submit personal Information </li></ul><ul><li>Step #2 Information gets verified and matched to multiple data bases. </li></ul><ul><li>Step #3 Random multiple choice questionnaire is based on personal financial history </li></ul><ul><li>Step #4 Consumer answers the questions </li></ul><ul><li>Step #5 Series of Algorithms are applied to supply user information and answers </li></ul><ul><li>Step #6 Score and a reason codes determine the outcome of authentication. </li></ul>
  11. 11. Forms of Enrolment Wireless Telephone Web/VoIP Petitioner goes through a one-time enrolment process. A sample of the voice is taken and a voiceprint is created and stored in
  12. 15. Technology
  13. 16. Technology Overview ID VoiceBANK Infrastructure Customer Application ID VoiceBANK Services User
  14. 17. Technology Overview User Identity Verification and Authentication User Voice Enrolment and Verification ID VoiceBANK Services Voice Identity Print Database Transaction Database IDVB Infrastructure
  15. 18. Technology Overview User Identity Verification User Identity Authentication User Voice Enrolment User Voice Verification Interface IDVB Engine IDVB Engine Indiv Identifier Assigned / Chosen Client Personal Profile Credit Authentication Wired / Wireless web clients, IVR Crystal Reports Accounting Authentication Process Control Voice Identity Print Database (Oracle / SQL DB) Transaction Database (Oracle / SQL DB) IDVB Infrastructure Client Personal Privacy Profile Bell Network Client / User on Web / Telephone Service PSTN / Internet SQL Interface
  16. 19. Intellectual Property & Patents
  17. 20. WORLD COUNTY TREATY PATENTS
  18. 21. Patent Summary <ul><li>0009 According to a broad aspect of an embodiment of the invention, there is provided a method of enrolling a user for voice authentication. </li></ul><ul><li>The method includes: </li></ul><ul><li>Authentication who a user is by use of a Credit Database Profile; </li></ul><ul><li>Identification of the user; </li></ul><ul><li>Generating an enrolment enumerator identifier to the user; </li></ul><ul><li>Assigning an enrolment enumerator identifier to the user </li></ul><ul><li>Prompting the user to utter a personal voice authentication password; </li></ul><ul><li>Receiving and storing the personal password uttered by the user; </li></ul><ul><li>Generating a voice print model for the user from the personal password uttered by the user; </li></ul><ul><li>Storing the voice print model; </li></ul><ul><li>Finally associating the voice print model and the personal password with the enrolment identifier assigned to the user to facilitate retrieval thereof during voice authentication of the user. </li></ul>
  19. 22. Our Value Proposition and Substantiating Reports and Regulations
  20. 23. Our Integration Points <ul><li>Automated check-in kiosk Systems for - APIS </li></ul><ul><li>Have designed and architected the Biometric Storage System (BSS) </li></ul><ul><li>Systems Integrations into S.A.V.E </li></ul><ul><li>Automation of Green Cards and I-94, Licencses </li></ul>
  21. 24. Automation of Form 1-94
  22. 25. Official Government Sites & Integrations
  23. 30. Affiliates and Future Affiliates
  24. 31. Zeliha Artan Business Development and Marketing [email_address] 416.995.0074
  25. 32. ONE VOICE ™

×