SlideShare a Scribd company logo
ONE  VOICE ™
OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Patented Application Service Provider  Automated Real-time Enrolment Portal for Biometric Biographic Voice Identity Management  ,[object Object],Why ID VoiceBANK?
[object Object],[object Object],[object Object],[object Object],[object Object]
Biographical Biometrics Our Patented Application automates methods of Enrolment and provides Authentication and Verification Through Voice Biometrics. Handwriting Analysis Fingerprint Voice Verification Retinal Scan Hand Geometry Our Voice Biometric Solution
OUR MARKETS
ID VoiceBANK Delivers Service Differentiation … Client-Centric Loyalty behind Brand Higher customer  satisfaction ratings Easy to use language independent Increase transactions Reduce fraud Redemption & reoccurrence Reduce  customer loss Non evasive, Non intrusive Provide multi-modal access Fast ROI New Markets, New applications, new Partners Minimize identity theft New revenue Cost reduction Competitive advantages & position
System Flow Authentication Consumer Corporation Government Devices ACCESS TRANSACTION PORTAL  WHO WANTS ACCESS TO MONEY AND INFORMATION? AUTOMATED PROCESSING
AUTOMATED UP-FRONT PROCESSING & AUTHENTICATION
Authentication Process Simple Steps ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Forms of Enrolment Wireless Telephone Web/VoIP Petitioner goes through a one-time enrolment process.  A sample of the voice is taken and a voiceprint is created and stored in
 
 
 
Technology
Technology Overview ID VoiceBANK Infrastructure Customer Application ID VoiceBANK Services User
Technology Overview User Identity Verification and Authentication User Voice Enrolment and Verification ID VoiceBANK Services Voice Identity Print Database Transaction Database IDVB Infrastructure
Technology Overview User Identity Verification User Identity Authentication User Voice Enrolment User Voice Verification Interface IDVB Engine IDVB Engine Indiv Identifier Assigned / Chosen Client Personal Profile Credit Authentication Wired / Wireless web clients, IVR Crystal  Reports Accounting Authentication Process Control Voice Identity Print Database (Oracle / SQL DB) Transaction Database (Oracle / SQL DB) IDVB Infrastructure Client Personal Privacy Profile Bell Network Client / User on Web / Telephone Service PSTN / Internet SQL Interface
Intellectual Property & Patents
WORLD COUNTY TREATY PATENTS
Patent Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Our Value Proposition and Substantiating Reports and Regulations
Our Integration Points ,[object Object],[object Object],[object Object],[object Object]
Automation of Form 1-94
Official Government Sites  &    Integrations
 
 
 
 
Affiliates and Future Affiliates
Zeliha Artan  Business Development and Marketing [email_address] 416.995.0074
ONE  VOICE ™

More Related Content

What's hot

TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer
 
Mobile Cloud Identity
Mobile Cloud IdentityMobile Cloud Identity
Mobile Cloud Identity
Mark Diodati
 
Survey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In MalaysiaSurvey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In Malaysia
FICO
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
andreeabrodo
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
Hitachi ID Systems, Inc.
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use Cases
Ubisecure
 
Single Sign-On
Single Sign-OnSingle Sign-On
Single Sign-On
Ubisecure
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
 
Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometrics
zia balti
 
Voice biometric authentication
Voice biometric authenticationVoice biometric authentication
Voice biometric authentication
Sensiple Inc.,
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactions
lfilliat
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
2FA, Inc.
 
Connective Digital Signatures
Connective Digital SignaturesConnective Digital Signatures
Connective Digital Signatures
Olivier Libert
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
Ubisecure
 
Web of Domotics Poster
Web of Domotics PosterWeb of Domotics Poster
Web of Domotics Poster
Faisal Razzak
 
Identity and Access Management Provider
Identity and Access Management ProviderIdentity and Access Management Provider
Identity and Access Management Provider
Priyanka Agarwal
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
Ubisecure
 
Monage.io identity presentation 3.22.17 v3
Monage.io   identity presentation 3.22.17 v3Monage.io   identity presentation 3.22.17 v3
Monage.io identity presentation 3.22.17 v3
Michael Queralt
 
megamind technosoft biometric device
megamind technosoft biometric device megamind technosoft biometric device
megamind technosoft biometric device
megamind technosoft
 

What's hot (20)

TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
 
Mobile Cloud Identity
Mobile Cloud IdentityMobile Cloud Identity
Mobile Cloud Identity
 
Survey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In MalaysiaSurvey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In Malaysia
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use Cases
 
Single Sign-On
Single Sign-OnSingle Sign-On
Single Sign-On
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometrics
 
Voice biometric authentication
Voice biometric authenticationVoice biometric authentication
Voice biometric authentication
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactions
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 
Connective Digital Signatures
Connective Digital SignaturesConnective Digital Signatures
Connective Digital Signatures
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
 
Web of Domotics Poster
Web of Domotics PosterWeb of Domotics Poster
Web of Domotics Poster
 
Identity and Access Management Provider
Identity and Access Management ProviderIdentity and Access Management Provider
Identity and Access Management Provider
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
Monage.io identity presentation 3.22.17 v3
Monage.io   identity presentation 3.22.17 v3Monage.io   identity presentation 3.22.17 v3
Monage.io identity presentation 3.22.17 v3
 
megamind technosoft biometric device
megamind technosoft biometric device megamind technosoft biometric device
megamind technosoft biometric device
 

Viewers also liked

PdfView (1)
PdfView (1)PdfView (1)
PdfView (1)
Lucia Aschettino
 
practica 17 becerra zamorano yadira
practica 17 becerra zamorano yadirapractica 17 becerra zamorano yadira
practica 17 becerra zamorano yadira
1f manda
 
FICHERITO3
FICHERITO3FICHERITO3
FICHERITO3
ficherito
 
[Parque De Bomberos San Vicente + FrontóN De Recoletos]
[Parque De Bomberos San Vicente + FrontóN De Recoletos][Parque De Bomberos San Vicente + FrontóN De Recoletos]
[Parque De Bomberos San Vicente + FrontóN De Recoletos]
nachocompany
 
Se deslindan del uso de pruebas de VIH falsas
Se deslindan del uso de pruebas de VIH falsasSe deslindan del uso de pruebas de VIH falsas
Se deslindan del uso de pruebas de VIH falsas
Jess Dector
 
Life+
Life+Life+
credit-suisse Slides - Presentation
credit-suisse Slides - Presentationcredit-suisse Slides - Presentation
credit-suisse Slides - Presentation
QuarterlyEarningsReports2
 
Presentation4
Presentation4Presentation4
Presentation4
Bill Whittome
 
Huerta poster 90x70
Huerta poster 90x70Huerta poster 90x70
Huerta poster 90x70
Jess Dector
 
Copy Of Black And White Sunshine[1]
Copy Of Black And White Sunshine[1]Copy Of Black And White Sunshine[1]
Copy Of Black And White Sunshine[1]
RichF62
 
Ahead in the cloud, Matt Wood, Amazon
Ahead in the cloud, Matt Wood, AmazonAhead in the cloud, Matt Wood, Amazon
Ahead in the cloud, Matt Wood, Amazon
FDIH
 
Learning Tools for Web 2.0: Integration vs. Frustration
Learning Tools for Web 2.0:Integration vs. FrustrationLearning Tools for Web 2.0:Integration vs. Frustration
Learning Tools for Web 2.0: Integration vs. Frustration
SharonGS
 
credit-suisse Sustainability Glossary
credit-suisse Sustainability Glossarycredit-suisse Sustainability Glossary
credit-suisse Sustainability Glossary
QuarterlyEarningsReports2
 
October 2015 Resume
October  2015 ResumeOctober  2015 Resume
October 2015 Resume
Steven Ng
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
Matt Mandich
 
credit suisse Presentation slides
credit suisse Presentation slidescredit suisse Presentation slides
credit suisse Presentation slides
QuarterlyEarningsReports2
 
INAC Online Hazards Database App
INAC Online Hazards Database AppINAC Online Hazards Database App
INAC Online Hazards Database App
Gerry James
 
Paneles Psicología Económica UFRO 2009
Paneles Psicología Económica UFRO 2009Paneles Psicología Económica UFRO 2009
1011寒假海外成長計畫 anita
1011寒假海外成長計畫 anita1011寒假海外成長計畫 anita
1011寒假海外成長計畫 anitaKevin Wu
 

Viewers also liked (20)

PdfView (1)
PdfView (1)PdfView (1)
PdfView (1)
 
Despedida Carol
Despedida CarolDespedida Carol
Despedida Carol
 
practica 17 becerra zamorano yadira
practica 17 becerra zamorano yadirapractica 17 becerra zamorano yadira
practica 17 becerra zamorano yadira
 
FICHERITO3
FICHERITO3FICHERITO3
FICHERITO3
 
[Parque De Bomberos San Vicente + FrontóN De Recoletos]
[Parque De Bomberos San Vicente + FrontóN De Recoletos][Parque De Bomberos San Vicente + FrontóN De Recoletos]
[Parque De Bomberos San Vicente + FrontóN De Recoletos]
 
Se deslindan del uso de pruebas de VIH falsas
Se deslindan del uso de pruebas de VIH falsasSe deslindan del uso de pruebas de VIH falsas
Se deslindan del uso de pruebas de VIH falsas
 
Life+
Life+Life+
Life+
 
credit-suisse Slides - Presentation
credit-suisse Slides - Presentationcredit-suisse Slides - Presentation
credit-suisse Slides - Presentation
 
Presentation4
Presentation4Presentation4
Presentation4
 
Huerta poster 90x70
Huerta poster 90x70Huerta poster 90x70
Huerta poster 90x70
 
Copy Of Black And White Sunshine[1]
Copy Of Black And White Sunshine[1]Copy Of Black And White Sunshine[1]
Copy Of Black And White Sunshine[1]
 
Ahead in the cloud, Matt Wood, Amazon
Ahead in the cloud, Matt Wood, AmazonAhead in the cloud, Matt Wood, Amazon
Ahead in the cloud, Matt Wood, Amazon
 
Learning Tools for Web 2.0: Integration vs. Frustration
Learning Tools for Web 2.0:Integration vs. FrustrationLearning Tools for Web 2.0:Integration vs. Frustration
Learning Tools for Web 2.0: Integration vs. Frustration
 
credit-suisse Sustainability Glossary
credit-suisse Sustainability Glossarycredit-suisse Sustainability Glossary
credit-suisse Sustainability Glossary
 
October 2015 Resume
October  2015 ResumeOctober  2015 Resume
October 2015 Resume
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
credit suisse Presentation slides
credit suisse Presentation slidescredit suisse Presentation slides
credit suisse Presentation slides
 
INAC Online Hazards Database App
INAC Online Hazards Database AppINAC Online Hazards Database App
INAC Online Hazards Database App
 
Paneles Psicología Económica UFRO 2009
Paneles Psicología Económica UFRO 2009Paneles Psicología Económica UFRO 2009
Paneles Psicología Económica UFRO 2009
 
1011寒假海外成長計畫 anita
1011寒假海外成長計畫 anita1011寒假海外成長計畫 anita
1011寒假海外成長計畫 anita
 

Similar to US Security for Cyber Security

Procert Authentication Platform by Mcarbon
Procert Authentication Platform by McarbonProcert Authentication Platform by Mcarbon
Procert Authentication Platform by Mcarbon
Mcarbon Tech Innovation Pvt Ltd
 
Voice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationVoice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authentication
Uniphore
 
Sestek presentation 2014
Sestek presentation 2014Sestek presentation 2014
Sestek presentation 2014
Mustafa Kuğu
 
Shufti Pro| Digital Identity Verification Solution
Shufti Pro| Digital Identity Verification SolutionShufti Pro| Digital Identity Verification Solution
Shufti Pro| Digital Identity Verification Solution
JoshuaVictor10
 
Audio card - VoIP - Phonecard
Audio card - VoIP - PhonecardAudio card - VoIP - Phonecard
Audio card - VoIP - Phonecard
Guy Romanus
 
Passwordless Mobile Banking.pdf
Passwordless Mobile Banking.pdfPasswordless Mobile Banking.pdf
Passwordless Mobile Banking.pdf
KMSSolutionsMarketin
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
CTIN
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
WAFAA AL SALMAN
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
TelcoBridges Inc.
 
SOTP_Introduction
SOTP_IntroductionSOTP_Introduction
SOTP_Introduction
Johnson Wu
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
Alan Percy
 
Veri5Digital_Master Brochure.pdf
Veri5Digital_Master Brochure.pdfVeri5Digital_Master Brochure.pdf
Veri5Digital_Master Brochure.pdf
veri5digita
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf
CIO Look Magazine
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
Sylvain Maret
 
Boosting Your Business with KYC Analysis Software | ScoreMe Solutions
Boosting Your Business with KYC Analysis Software | ScoreMe SolutionsBoosting Your Business with KYC Analysis Software | ScoreMe Solutions
Boosting Your Business with KYC Analysis Software | ScoreMe Solutions
Scoreme Solutions
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
SC Leung
 
HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015
Chandra Patni
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
Pankaj Rane
 

Similar to US Security for Cyber Security (20)

Procert Authentication Platform by Mcarbon
Procert Authentication Platform by McarbonProcert Authentication Platform by Mcarbon
Procert Authentication Platform by Mcarbon
 
Voice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationVoice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authentication
 
Sestek presentation 2014
Sestek presentation 2014Sestek presentation 2014
Sestek presentation 2014
 
Shufti Pro| Digital Identity Verification Solution
Shufti Pro| Digital Identity Verification SolutionShufti Pro| Digital Identity Verification Solution
Shufti Pro| Digital Identity Verification Solution
 
Audio card - VoIP - Phonecard
Audio card - VoIP - PhonecardAudio card - VoIP - Phonecard
Audio card - VoIP - Phonecard
 
Passwordless Mobile Banking.pdf
Passwordless Mobile Banking.pdfPasswordless Mobile Banking.pdf
Passwordless Mobile Banking.pdf
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
SOTP_Introduction
SOTP_IntroductionSOTP_Introduction
SOTP_Introduction
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
Veri5Digital_Master Brochure.pdf
Veri5Digital_Master Brochure.pdfVeri5Digital_Master Brochure.pdf
Veri5Digital_Master Brochure.pdf
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
 
Boosting Your Business with KYC Analysis Software | ScoreMe Solutions
Boosting Your Business with KYC Analysis Software | ScoreMe SolutionsBoosting Your Business with KYC Analysis Software | ScoreMe Solutions
Boosting Your Business with KYC Analysis Software | ScoreMe Solutions
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 

US Security for Cyber Security

  • 1. ONE VOICE
  • 2.
  • 3.
  • 4.
  • 5. Biographical Biometrics Our Patented Application automates methods of Enrolment and provides Authentication and Verification Through Voice Biometrics. Handwriting Analysis Fingerprint Voice Verification Retinal Scan Hand Geometry Our Voice Biometric Solution
  • 7. ID VoiceBANK Delivers Service Differentiation … Client-Centric Loyalty behind Brand Higher customer satisfaction ratings Easy to use language independent Increase transactions Reduce fraud Redemption & reoccurrence Reduce customer loss Non evasive, Non intrusive Provide multi-modal access Fast ROI New Markets, New applications, new Partners Minimize identity theft New revenue Cost reduction Competitive advantages & position
  • 8. System Flow Authentication Consumer Corporation Government Devices ACCESS TRANSACTION PORTAL WHO WANTS ACCESS TO MONEY AND INFORMATION? AUTOMATED PROCESSING
  • 9. AUTOMATED UP-FRONT PROCESSING & AUTHENTICATION
  • 10.
  • 11. Forms of Enrolment Wireless Telephone Web/VoIP Petitioner goes through a one-time enrolment process. A sample of the voice is taken and a voiceprint is created and stored in
  • 12.  
  • 13.  
  • 14.  
  • 16. Technology Overview ID VoiceBANK Infrastructure Customer Application ID VoiceBANK Services User
  • 17. Technology Overview User Identity Verification and Authentication User Voice Enrolment and Verification ID VoiceBANK Services Voice Identity Print Database Transaction Database IDVB Infrastructure
  • 18. Technology Overview User Identity Verification User Identity Authentication User Voice Enrolment User Voice Verification Interface IDVB Engine IDVB Engine Indiv Identifier Assigned / Chosen Client Personal Profile Credit Authentication Wired / Wireless web clients, IVR Crystal Reports Accounting Authentication Process Control Voice Identity Print Database (Oracle / SQL DB) Transaction Database (Oracle / SQL DB) IDVB Infrastructure Client Personal Privacy Profile Bell Network Client / User on Web / Telephone Service PSTN / Internet SQL Interface
  • 21.
  • 22. Our Value Proposition and Substantiating Reports and Regulations
  • 23.
  • 25. Official Government Sites & Integrations
  • 26.  
  • 27.  
  • 28.  
  • 29.  
  • 30. Affiliates and Future Affiliates
  • 31. Zeliha Artan Business Development and Marketing [email_address] 416.995.0074
  • 32. ONE VOICE