SlideShare a Scribd company logo
My Voice is My
Passport: Verify Me
March 12, 2012
About the Speakers
   Dan Miller (Founder, Senior Analyst)
       Founded Opus Research (1985)
       Analyst at IDC/Link, The Kelsey Group, Zelos Group
       Industry experience: Atari, Time-Warner, PacTel (AT&T)
       Expertise: local, DA, speech integration with Web, mobility
        and enterprise software infrastructure
       Coverage Areas: Conversational Commerce, Internet2Go,
        Biometrics
   Isaac Chapa (VP Information Systems/Operations,
    CSID)
       Joined CSID 2006, overseeing ID Theft Platforms/Solutions
       Sr. Engineer, Grande Communications
       Designed and integrated DCM/VOIP Switches, Billing
        Platforms, SONET and FTTH, HFC networks

                                                                      2
Why We’re Here
 Talk about voice biometrics
 Share some ideas on stronger authentication for
  mobile transactions
 Get feedback as prospective
  users/developers/implementers
 Describe some “real world” use cases, business cases
  and demand drivers




                                                         3
Voice Biometrics & Speaker Verification
 Voice Biometrics is a technology
    Captures an utterance from a live caller
    Compares it to previously stored “voiceprint”
    Produces a score
 Speaker Verification is an application
    Employs a biometric engine plus business logic
    Enrolls customers by obtaining voice prints
    Compares live utterances to voice prints to produce a
    “pass” or “fail” responses




                                                             4
Speaker Verification Components
 Core Verification Engine
    Receives voice sample (“utterance”); compares it to a voiceprint
     (“template”)
    Confirms who said it
 Core Recognition Engine
    Compares utterance to ASR grammar
    Determines what was said
 Business Logic
    Decides if the caller passes or fails
    Dictates required “next steps”




                                                                        5
What is Voice Print?
Physical Characteristics         Behavioral Characteristics
The unique physical traits of    The harmonic and resonant
the individual’s vocal tract,    frequencies, such as accents, the
such as shape and size.          speed of your speech, and how
                                 words are pronounced and
                                 emphasized.




      Voiceprint - Together these physiological and
      behavioral factors combine to produce unique voice
      patterns for every individual


                                                                     6
Text Dependent vs. Text Independent
 Applications that require a specific pass phrase are Text
  Dependent
    Require training
    Customarily involve enrollment
 Text Independent applications can use any utterance
    Simplify enrollment
    Support “conversational authentication”




                                                              7
Why Now?




           8
Fraud Protection Requirements
   Multifactor
       Mandated in more use cases
       Includes “something you are”
   Multimodal
       Because “the customer is always on”
       Embraces social networks and multiple sign-ons
   Mobile
       Approaching 6 billion subscribers
       Mobile devices are becoming virtual assistants




                                                         9
+ 1 = Momentum
 Passwords getting more difficult
    Multiple digits and special characters
    Frequently updated
    Fragmented across sites (and IDs)
 User authentication vital
    To access multiple sites, domains and devices
    For more activities, transactions and interactions
    “Open” approaches only as strong as weakest link




                                                          10
Entering 3rd Generation
                                                    Password replacement
                                                    Leverage device id
                             Voiceprint on identity Random phrase liveness
“My voice is my              claim                       3rd Generation
password”
                             Leverage KV & ANI/CLI
“ 0 1 2 3 4 5 6 7 8 9”                                  Enhanced ID&V
                             Random word liveness
Random digit liveness                                Secure Mobile Access
                                  2nd   Generation      Voice Signatures
     1st Generation                                         Embedded
                                                       -Internet via OOB
                                 Enhanced ID&V              Verification
                                                     - Mobile multi-media
  IVR PIN replacement            Multi-factor Auth        Convenience
    Password Reset                Automation
  Emphasis on Security

2000                  2005                    2010           2015
 Source: Nuance Communications

                                                                            11
Estimated Revenues




                     12
Results: Registered Voiceprints
                 In Millions




                                  13
This is My Wallet




                    14
This is My Wallet on Phone




                             15
Mobile Commerce is Exploding
 Mobile transactions
    Will reach $670 billion by 2015
    Up from $240 billion in 2011
 Global in nature
    East Asia and China
    Western Europe
    North America

    represent 75% gross transaction value.
    (Juniper Research)




                                             16
But Inherently Insecure
 At the device level
    OSes have no security shell
    Personal info (including PINs) stored as text
 At the network level
    Encryption is the exception
    Prone to keystroke logging, Bluetooth sniffing and the like


                What about authenticating users?




                                                                   17
What Are We Protecting
 Integrity
 Confidentiality
 Availability of Data
    Loosely coupled from infrastructure
 Secure applications and runtime environments
 The critical focus of security shifts:
    From owning everything to owning nothing
    From “Where are you from?” to “Who are you?”
       • Identity, credential, and access management
    From “Internal vs. External” to “Distrust everyone equally”
 Need strong authentication independent from current
  form factors


                                                                   18
What Are We Using
 Usually a four digit number.
    There's only 10,000 possible combinations
    Four character, alpha only, password has more than
     45,000 possibilities
    Alphanumeric and there's more than a million and a half
 Fast computers can crack these in less than a
  second (and often don’t have to)




                                                               19
Today’s Requirements
 “Layered”
    To apply appropriate level of security for
    risk profile
 Multi-Factor
    To augment PINs or PWD
 Device-oriented
    Complex device identification
    considered more secure
    (per 2011 “guidance” from FFIEC)




                                                  20
Lead To These Solutions
 Treating mobile phones as “non-
  traditional endpoints”
 Popular solutions:
    One Time Passwords – using SMS text
    Knowledge-based Authentication –
     using non-public info
    “A Biometric” – fingerprint, face
     recognition, iris scans…and voice!




                                           21
Before You’d Try These




                         22
You Should Think About These
 User Authentication
 Device Activation
 Transaction Authorization
 Mobile Signatures
 Password Reset
 ID Proofing




                               23
Superior Factor for Phones
 Works on all phones
 Includes both physical and behavioral attributes
 Physical Characteristics        Behavioral Characteristics
 The unique physical traits of   The harmonic and resonant
 the individual’s vocal tract,   frequencies, such as accents,
 such as shape and size.         the speed of your speech, and
                                 how words are pronounced and
                                 emphasized.




                                                                 24
On Par With Biometric Alternatives
 Error rates are “acceptable”
 Registration is relatively easy
 No special equipment needed for authentication
 Solutions integrate with or augment existing security
  infrastructure




                                                          25
Has Surprising Acceptance
 In contact centers
    8.5 million voice prints registered
    ROI justified shaving minutes from authentication practices
    + fraud reduction
 For remote and mobile workers
    For Password Reset
    Secure access to VPN
    Strong authentication for conference calls




                                                                   26
Applications & Use Cases
 Personalized, trusted customer care
 Proof of life
 Mobile payment authorization
 Device activation, “Wake Up”
 Enterprise VPN access control
 Password reset
 Anonymous authentication




                                        27
But Real Security Comes With
 Layering multiple factors
    Like gestures
    Location
    Motion detection
    Out-of-band authentication
 And leveraging existing infrastructure
    For compliance
    As a go-faster
    To support Natural Language Interactions




                                                28
Thank you.
Dan Miller
Dmiller@opusresearch.net
@dnm54 on Twitter

Isaac Chapa
ichapa@csid.com




                           29

More Related Content

What's hot

Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
lfilliat
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
OKsystem
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Systems, Inc.
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
OKsystem
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
lfilliat
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
Fresh Digital Group
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authentication
lfilliat
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
Eduserv
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Systems, Inc.
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneID
pii2011
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
Hitachi ID Systems, Inc.
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Systems, Inc.
 
ekey+ Presentation
ekey+ Presentationekey+ Presentation
ekey+ Presentation
Creus Moreira Carlos
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
itforum-roundtable
 
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinJan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Droidcon Berlin
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta
Abhilash Ravishankar
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CloudIDSummit
 
Axsionics quick presentation for slideshare
Axsionics quick presentation for slideshareAxsionics quick presentation for slideshare
Axsionics quick presentation for slideshare
martine reindle
 

What's hot (19)

Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authentication
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneID
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
ekey+ Presentation
ekey+ Presentationekey+ Presentation
ekey+ Presentation
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinJan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
 
Axsionics quick presentation for slideshare
Axsionics quick presentation for slideshareAxsionics quick presentation for slideshare
Axsionics quick presentation for slideshare
 

Viewers also liked

Camtasia getting started guide
Camtasia getting started guideCamtasia getting started guide
Camtasia getting started guide
edwingferneyabrilcoronado
 
Forum ict
Forum ictForum ict
Forum ict
Suzanne Ye
 
The More The Merrier
The More The MerrierThe More The Merrier
The More The Merrier
Suzanne Ye
 
Smart school
Smart schoolSmart school
Smart school
Suzanne Ye
 
Data Logger
Data LoggerData Logger
Data Logger
Suzanne Ye
 
David Shanks CV 2010
David Shanks CV 2010David Shanks CV 2010
David Shanks CV 2010
David Shanks
 
Alternative conception
Alternative conceptionAlternative conception
Alternative conception
Suzanne Ye
 

Viewers also liked (7)

Camtasia getting started guide
Camtasia getting started guideCamtasia getting started guide
Camtasia getting started guide
 
Forum ict
Forum ictForum ict
Forum ict
 
The More The Merrier
The More The MerrierThe More The Merrier
The More The Merrier
 
Smart school
Smart schoolSmart school
Smart school
 
Data Logger
Data LoggerData Logger
Data Logger
 
David Shanks CV 2010
David Shanks CV 2010David Shanks CV 2010
David Shanks CV 2010
 
Alternative conception
Alternative conceptionAlternative conception
Alternative conception
 

Similar to Sxsw ppt voice-1

FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
frontone
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
IBM Danmark
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CloudIDSummit
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
Solus
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
CTIN
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
Carahsoft
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
CA API Management
 
Usher overview.2014.02 hi
Usher overview.2014.02 hiUsher overview.2014.02 hi
Usher overview.2014.02 hi
Mark Fazackerley
 
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍAAUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
Asociación de Marketing Bancario Argentino
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Maxim Salnikov
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
ForgeRock
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologies
marketingkobil
 
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
ForgeRock
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
Information Security Services SA
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
indragantiSaiHiranma
 
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincIdentity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Violet Le, MBA MIS
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Micro Focus
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
andreeabrodo
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
FIDO Alliance
 

Similar to Sxsw ppt voice-1 (20)

FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 
Usher overview.2014.02 hi
Usher overview.2014.02 hiUsher overview.2014.02 hi
Usher overview.2014.02 hi
 
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍAAUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologies
 
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSincIdentity as a Services in a Mobile World - David Harding CTO IWSinc
Identity as a Services in a Mobile World - David Harding CTO IWSinc
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 

Sxsw ppt voice-1

  • 1. My Voice is My Passport: Verify Me March 12, 2012
  • 2. About the Speakers  Dan Miller (Founder, Senior Analyst)  Founded Opus Research (1985)  Analyst at IDC/Link, The Kelsey Group, Zelos Group  Industry experience: Atari, Time-Warner, PacTel (AT&T)  Expertise: local, DA, speech integration with Web, mobility and enterprise software infrastructure  Coverage Areas: Conversational Commerce, Internet2Go, Biometrics  Isaac Chapa (VP Information Systems/Operations, CSID)  Joined CSID 2006, overseeing ID Theft Platforms/Solutions  Sr. Engineer, Grande Communications  Designed and integrated DCM/VOIP Switches, Billing Platforms, SONET and FTTH, HFC networks 2
  • 3. Why We’re Here  Talk about voice biometrics  Share some ideas on stronger authentication for mobile transactions  Get feedback as prospective users/developers/implementers  Describe some “real world” use cases, business cases and demand drivers 3
  • 4. Voice Biometrics & Speaker Verification  Voice Biometrics is a technology  Captures an utterance from a live caller  Compares it to previously stored “voiceprint”  Produces a score  Speaker Verification is an application  Employs a biometric engine plus business logic  Enrolls customers by obtaining voice prints  Compares live utterances to voice prints to produce a “pass” or “fail” responses 4
  • 5. Speaker Verification Components  Core Verification Engine  Receives voice sample (“utterance”); compares it to a voiceprint (“template”)  Confirms who said it  Core Recognition Engine  Compares utterance to ASR grammar  Determines what was said  Business Logic  Decides if the caller passes or fails  Dictates required “next steps” 5
  • 6. What is Voice Print? Physical Characteristics Behavioral Characteristics The unique physical traits of The harmonic and resonant the individual’s vocal tract, frequencies, such as accents, the such as shape and size. speed of your speech, and how words are pronounced and emphasized. Voiceprint - Together these physiological and behavioral factors combine to produce unique voice patterns for every individual 6
  • 7. Text Dependent vs. Text Independent  Applications that require a specific pass phrase are Text Dependent  Require training  Customarily involve enrollment  Text Independent applications can use any utterance  Simplify enrollment  Support “conversational authentication” 7
  • 9. Fraud Protection Requirements  Multifactor  Mandated in more use cases  Includes “something you are”  Multimodal  Because “the customer is always on”  Embraces social networks and multiple sign-ons  Mobile  Approaching 6 billion subscribers  Mobile devices are becoming virtual assistants 9
  • 10. + 1 = Momentum  Passwords getting more difficult  Multiple digits and special characters  Frequently updated  Fragmented across sites (and IDs)  User authentication vital  To access multiple sites, domains and devices  For more activities, transactions and interactions  “Open” approaches only as strong as weakest link 10
  • 11. Entering 3rd Generation Password replacement Leverage device id Voiceprint on identity Random phrase liveness “My voice is my claim 3rd Generation password” Leverage KV & ANI/CLI “ 0 1 2 3 4 5 6 7 8 9” Enhanced ID&V Random word liveness Random digit liveness Secure Mobile Access 2nd Generation Voice Signatures 1st Generation Embedded -Internet via OOB Enhanced ID&V Verification - Mobile multi-media IVR PIN replacement Multi-factor Auth Convenience Password Reset Automation Emphasis on Security 2000 2005 2010 2015 Source: Nuance Communications 11
  • 14. This is My Wallet 14
  • 15. This is My Wallet on Phone 15
  • 16. Mobile Commerce is Exploding  Mobile transactions  Will reach $670 billion by 2015  Up from $240 billion in 2011  Global in nature  East Asia and China  Western Europe  North America represent 75% gross transaction value. (Juniper Research) 16
  • 17. But Inherently Insecure  At the device level  OSes have no security shell  Personal info (including PINs) stored as text  At the network level  Encryption is the exception  Prone to keystroke logging, Bluetooth sniffing and the like What about authenticating users? 17
  • 18. What Are We Protecting  Integrity  Confidentiality  Availability of Data  Loosely coupled from infrastructure  Secure applications and runtime environments  The critical focus of security shifts:  From owning everything to owning nothing  From “Where are you from?” to “Who are you?” • Identity, credential, and access management  From “Internal vs. External” to “Distrust everyone equally”  Need strong authentication independent from current form factors 18
  • 19. What Are We Using  Usually a four digit number.  There's only 10,000 possible combinations  Four character, alpha only, password has more than 45,000 possibilities  Alphanumeric and there's more than a million and a half  Fast computers can crack these in less than a second (and often don’t have to) 19
  • 20. Today’s Requirements  “Layered”  To apply appropriate level of security for risk profile  Multi-Factor  To augment PINs or PWD  Device-oriented  Complex device identification considered more secure (per 2011 “guidance” from FFIEC) 20
  • 21. Lead To These Solutions  Treating mobile phones as “non- traditional endpoints”  Popular solutions:  One Time Passwords – using SMS text  Knowledge-based Authentication – using non-public info  “A Biometric” – fingerprint, face recognition, iris scans…and voice! 21
  • 22. Before You’d Try These 22
  • 23. You Should Think About These  User Authentication  Device Activation  Transaction Authorization  Mobile Signatures  Password Reset  ID Proofing 23
  • 24. Superior Factor for Phones  Works on all phones  Includes both physical and behavioral attributes Physical Characteristics Behavioral Characteristics The unique physical traits of The harmonic and resonant the individual’s vocal tract, frequencies, such as accents, such as shape and size. the speed of your speech, and how words are pronounced and emphasized. 24
  • 25. On Par With Biometric Alternatives  Error rates are “acceptable”  Registration is relatively easy  No special equipment needed for authentication  Solutions integrate with or augment existing security infrastructure 25
  • 26. Has Surprising Acceptance  In contact centers  8.5 million voice prints registered  ROI justified shaving minutes from authentication practices + fraud reduction  For remote and mobile workers  For Password Reset  Secure access to VPN  Strong authentication for conference calls 26
  • 27. Applications & Use Cases  Personalized, trusted customer care  Proof of life  Mobile payment authorization  Device activation, “Wake Up”  Enterprise VPN access control  Password reset  Anonymous authentication 27
  • 28. But Real Security Comes With  Layering multiple factors  Like gestures  Location  Motion detection  Out-of-band authentication  And leveraging existing infrastructure  For compliance  As a go-faster  To support Natural Language Interactions 28
  • 29. Thank you. Dan Miller Dmiller@opusresearch.net @dnm54 on Twitter Isaac Chapa ichapa@csid.com 29