SlideShare a Scribd company logo
1 of 9
Download to read offline
1
Embedded Voice Biometrics
For Mobile & Consumer
Electronics
Voice Biometrics Conference May 2013
2
Topics
§  Why Embedded Voice Biometrics?
§  The TrulyHandsfree Approach
§  Uses of Speaker Verification and ID in CE
§  Improving Accuracy and What the Future
Holds
3
Why Embedded Biometrics?
•  Smaller footprint
–  Lower cost consumer devices
–  Works more efficiently in the cloud too!
•  Lower power
–  Green
–  Less battery replacement/longer lasting devices
–  Saves $$ to consumer
•  No cloud/connection needed
–  Always works
–  Faster responses
–  Lower cost
•  Can improve accuracy–independent approaches
–  Comparison between client and cloud biometrics
–  Spot checks if/when needed
4
Truly Handsfree & VUI Components
5
Speaker Verification & ID
in Consumer Electronics
•  Speaker Verification to NOT Respond
•  Speaker Verification for Security
–  Lets right user in keeps others out
–  Examples:
•  Keep children from turning on stove/burners
•  Backdoor lock for joggers
•  Mobile phone easy access/entrance
•  Speaker ID for shared products
–  Remembers presets, favorites, history, etc.
–  Adds security and convenience
•  User defined speaker verification
•  Training/Adaptation
6
Telephony Automotive
Home
Electronics
Toys & Learning Bluetooth
Diverse and Growing Customer Base
In Consumer Electronics
More Customers, More Products, More Experience
7
A few demo’s
THF Speaker Verification
http://www.youtube.com/watch?v=9Ib0WR5YgSM
THF Speaker ID
http://www.youtube.com/watch?v=OypENHHrDfk
8
Future courses For
Embedded Biometrics
•  Improve accuracy by combining 2
different independent approaches
–  Combine Platforms - Client & Cloud
–  Combine sensors - Voice & Vision
–  Combined Tech - Sensory’s Hybrid SV
•  Increasing Client/Cloud Interactions
–  FIDO Alliance
–  Security for transactions
–  Transactions through mobile devices and CE
–  “I want to buy that song”
9
THANKS!!!
Tmozer@Sensoryinc.com
THF 3.0 with USER DEFINED SV and SID
http://www.youtube.com/watch?v=Kjp2QpgkIT4&feature=player_embedded

More Related Content

Similar to Introduction to Truly Handsfree 3.0

Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobile
OKsystem
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01
Walter Sinchak,
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
NCC Group
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
Hai Nguyen
 

Similar to Introduction to Truly Handsfree 3.0 (20)

Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Product Health Talk, Knot Event at Arup
Product Health Talk, Knot Event at ArupProduct Health Talk, Knot Event at Arup
Product Health Talk, Knot Event at Arup
 
People dream about smart living
People dream about smart livingPeople dream about smart living
People dream about smart living
 
Connected Home- HomeBrain Internet of Things project
Connected Home- HomeBrain   Internet of Things projectConnected Home- HomeBrain   Internet of Things project
Connected Home- HomeBrain Internet of Things project
 
Is Video the Future of Qualitative Research?
Is Video the Future of Qualitative Research? Is Video the Future of Qualitative Research?
Is Video the Future of Qualitative Research?
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobile
 
Biometrics: The Ultimate Identifier
Biometrics: The Ultimate IdentifierBiometrics: The Ultimate Identifier
Biometrics: The Ultimate Identifier
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authentication
 
Technology for Seniors at Aging in America Conference
Technology for Seniors at Aging in America ConferenceTechnology for Seniors at Aging in America Conference
Technology for Seniors at Aging in America Conference
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
User & Mobile Centric Identity
User & Mobile Centric IdentityUser & Mobile Centric Identity
User & Mobile Centric Identity
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital Trust
 
Intelligent infra arpan pal_bit
Intelligent infra arpan pal_bitIntelligent infra arpan pal_bit
Intelligent infra arpan pal_bit
 
Bhadale group of companies business project plan
Bhadale group of companies business project planBhadale group of companies business project plan
Bhadale group of companies business project plan
 
Connected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems IntegrationConnected Health: The Importance of Systems Integration
Connected Health: The Importance of Systems Integration
 

More from derektop

More from derektop (12)

Operationalizing Voice Biometrics
Operationalizing Voice BiometricsOperationalizing Voice Biometrics
Operationalizing Voice Biometrics
 
e-Government Applications for Voice Authentication
e-Government Applications for Voice Authenticatione-Government Applications for Voice Authentication
e-Government Applications for Voice Authentication
 
Mobile Voice Authentication
Mobile Voice AuthenticationMobile Voice Authentication
Mobile Voice Authentication
 
Future of Mobile Authentication
Future of Mobile AuthenticationFuture of Mobile Authentication
Future of Mobile Authentication
 
The Future of Secure, Mobile Authentication
The Future of Secure, Mobile AuthenticationThe Future of Secure, Mobile Authentication
The Future of Secure, Mobile Authentication
 
The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognition
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White List
 
Case Study: Passive Authentication at Barclays
Case Study: Passive Authentication at BarclaysCase Study: Passive Authentication at Barclays
Case Study: Passive Authentication at Barclays
 
Powering Security and Easy Authentication in a Multi-Channel World
Powering Security and Easy Authentication in a Multi-Channel WorldPowering Security and Easy Authentication in a Multi-Channel World
Powering Security and Easy Authentication in a Multi-Channel World
 
Natural Interaction in the Connected Home
Natural Interaction in the Connected HomeNatural Interaction in the Connected Home
Natural Interaction in the Connected Home
 
Case Study: Voice Verification by Mobile Operator Avea
Case Study: Voice Verification by Mobile Operator AveaCase Study: Voice Verification by Mobile Operator Avea
Case Study: Voice Verification by Mobile Operator Avea
 
Voice Biometrics: The Big Picture Gets Bigger
Voice Biometrics: The Big Picture Gets BiggerVoice Biometrics: The Big Picture Gets Bigger
Voice Biometrics: The Big Picture Gets Bigger
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Introduction to Truly Handsfree 3.0

  • 1. 1 Embedded Voice Biometrics For Mobile & Consumer Electronics Voice Biometrics Conference May 2013
  • 2. 2 Topics §  Why Embedded Voice Biometrics? §  The TrulyHandsfree Approach §  Uses of Speaker Verification and ID in CE §  Improving Accuracy and What the Future Holds
  • 3. 3 Why Embedded Biometrics? •  Smaller footprint –  Lower cost consumer devices –  Works more efficiently in the cloud too! •  Lower power –  Green –  Less battery replacement/longer lasting devices –  Saves $$ to consumer •  No cloud/connection needed –  Always works –  Faster responses –  Lower cost •  Can improve accuracy–independent approaches –  Comparison between client and cloud biometrics –  Spot checks if/when needed
  • 4. 4 Truly Handsfree & VUI Components
  • 5. 5 Speaker Verification & ID in Consumer Electronics •  Speaker Verification to NOT Respond •  Speaker Verification for Security –  Lets right user in keeps others out –  Examples: •  Keep children from turning on stove/burners •  Backdoor lock for joggers •  Mobile phone easy access/entrance •  Speaker ID for shared products –  Remembers presets, favorites, history, etc. –  Adds security and convenience •  User defined speaker verification •  Training/Adaptation
  • 6. 6 Telephony Automotive Home Electronics Toys & Learning Bluetooth Diverse and Growing Customer Base In Consumer Electronics More Customers, More Products, More Experience
  • 7. 7 A few demo’s THF Speaker Verification http://www.youtube.com/watch?v=9Ib0WR5YgSM THF Speaker ID http://www.youtube.com/watch?v=OypENHHrDfk
  • 8. 8 Future courses For Embedded Biometrics •  Improve accuracy by combining 2 different independent approaches –  Combine Platforms - Client & Cloud –  Combine sensors - Voice & Vision –  Combined Tech - Sensory’s Hybrid SV •  Increasing Client/Cloud Interactions –  FIDO Alliance –  Security for transactions –  Transactions through mobile devices and CE –  “I want to buy that song”
  • 9. 9 THANKS!!! Tmozer@Sensoryinc.com THF 3.0 with USER DEFINED SV and SID http://www.youtube.com/watch?v=Kjp2QpgkIT4&feature=player_embedded