SlideShare a Scribd company logo
1 of 17
Automatic Password Reset (APR) Name, Title Email, Contact info
The Pain:  Enterprise Password Challenges Challenge #1:   Lower costs   at the IT help desk Challenge #2:   Increase security   for password resets Challenge #3:   Increase efficiency   by enabling self-help The Solution:   The Nuance Password Reset Application
  Introducing the Employee Productivity Suite - A building block approach to introducing speech Flat File, LDAP, etc PBX/IVR Speech-Enabled Employee Directory EPS Base Unit ,[object Object],[object Object],[object Object]
EPS: The foundation for supporting speech base applications  to increase organizational communications and business processes. The building blocks to simplifying communications Internal Dialer Automated Password Reset Emergency Broadcast Messaging Speech Attendant/ OpenSpeechAttendant EPS Base Unit Speech-Enabled Employee Directory
[object Object],[object Object],[object Object],[object Object],[object Object],The need for Automated Password Reset (APR) comes from…
The need for Automated Password Reset (APR)  comes from…  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Approximately 30% of calls to the IT help-desk are password-related, and manual password resets cost an average of $10 to $17 each." – The Gartner Group/Frost & Sullivan
Speech-enabled APR The Benefits: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
APR Step by step…The Caller Experience 1 2 3 The caller dials the password reset number and is prompted to say an identifying phrase, such as a phone number or a name.  Phrase can be configured to meet any corporate policy The system compares the voice to the voiceprint on file for the caller .  If the voiceprint matches, the system issues a new password to the caller
APR how does it work? Behind the Scenes… 1 2 3 Powerful voice biometric algorithms are applied to caller’s voice, encrypting it and creating a mathematical, binary voice print that is unique to that person. This voice print serves as the “fingerprint” for that caller, using over 80 characteristics of the human voice. The caller’s voice is quickly and efficiently compared to the voice print on file, allowing users to progress further in the call flow once authorized   The caller can choose which system to reset, and the appropriate connector handles the reset of the backend system, retrieving/setting the temporary password, and resetting the system at the same time. Other options such as expiry dates, strong password enforcement, and others are also possible
The Technology -How It Works: Enrollment Enroll password Speak 1-3 times 0 1 2 3 4 5 6 7 9 0 0 1 2 3 4 5 6 7 9 0 0 1 2 3 4 5 6 7 9 0 Provide I.D. (Acct #, policy #, 1-time PIN…) Analyze speech to create voiceprint Store in  voiceprint database
System Connectors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Speech Enabled Password Reset – the connection PSTN Phone Network Synch Triggers UNIX ,  Windows ,  LDAP Password Agent Nuance  EPS Enterprise  PBX/IVR Target Systems Remote Agent Proxy Server Remote Physical  Site Email System Help desk Ticketing Unix,OS390,RSA HR System Directory Flat File, LDAP, etc
The Value of APR ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The results of APR Save Money 1 Improve Security 2 Increase Efficiency 3
Thank You
Quoting Questions for ROI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
APR Connector Support ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],See complete list by clicking on the icon below

More Related Content

Similar to Voice Biometrics automated password_reset

Avaya Sip Within Your Enterprise
Avaya   Sip Within Your EnterpriseAvaya   Sip Within Your Enterprise
Avaya Sip Within Your Enterprise
hypknight
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
webhostingguy
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
webhostingguy
 
Metaphor Customer Presentation Von Mar08
Metaphor Customer Presentation   Von Mar08Metaphor Customer Presentation   Von Mar08
Metaphor Customer Presentation Von Mar08
Carl Ford
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
papdev
 
DisasterRecoveryPlanReport.docxby Varun ShahSubmissi.docx
DisasterRecoveryPlanReport.docxby Varun ShahSubmissi.docxDisasterRecoveryPlanReport.docxby Varun ShahSubmissi.docx
DisasterRecoveryPlanReport.docxby Varun ShahSubmissi.docx
salmonpybus
 
Xarios Call Recorder Overview 2010
Xarios Call Recorder Overview   2010Xarios Call Recorder Overview   2010
Xarios Call Recorder Overview 2010
Jason King
 
TSI Managed Network Services and IT Support
TSI Managed Network Services and IT SupportTSI Managed Network Services and IT Support
TSI Managed Network Services and IT Support
Jeffery Walker
 
Best Practices for the Service Cloud
Best Practices for the Service CloudBest Practices for the Service Cloud
Best Practices for the Service Cloud
Ross Bauer
 

Similar to Voice Biometrics automated password_reset (20)

Improving Service Centre Performance
Improving Service Centre PerformanceImproving Service Centre Performance
Improving Service Centre Performance
 
BPOS sales deck
BPOS sales deckBPOS sales deck
BPOS sales deck
 
Avaya Sip Within Your Enterprise
Avaya   Sip Within Your EnterpriseAvaya   Sip Within Your Enterprise
Avaya Sip Within Your Enterprise
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
 
Metaphor Customer Presentation Von Mar08
Metaphor Customer Presentation   Von Mar08Metaphor Customer Presentation   Von Mar08
Metaphor Customer Presentation Von Mar08
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
 
Itms 2010
Itms 2010Itms 2010
Itms 2010
 
eFACiLiTY Helpdesk and Knowledge Base System
eFACiLiTY Helpdesk and Knowledge Base SystemeFACiLiTY Helpdesk and Knowledge Base System
eFACiLiTY Helpdesk and Knowledge Base System
 
DisasterRecoveryPlanReport.docxby Varun ShahSubmissi.docx
DisasterRecoveryPlanReport.docxby Varun ShahSubmissi.docxDisasterRecoveryPlanReport.docxby Varun ShahSubmissi.docx
DisasterRecoveryPlanReport.docxby Varun ShahSubmissi.docx
 
Detack1de
Detack1deDetack1de
Detack1de
 
Introduction to theITSupportCenter
Introduction to theITSupportCenterIntroduction to theITSupportCenter
Introduction to theITSupportCenter
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
Bestpractices
BestpracticesBestpractices
Bestpractices
 
Xarios Call Recorder Overview 2010
Xarios Call Recorder Overview   2010Xarios Call Recorder Overview   2010
Xarios Call Recorder Overview 2010
 
Paywings - Payroll Software
Paywings - Payroll SoftwarePaywings - Payroll Software
Paywings - Payroll Software
 
TSI Managed Network Services and IT Support
TSI Managed Network Services and IT SupportTSI Managed Network Services and IT Support
TSI Managed Network Services and IT Support
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Proactive Services Customer V8
Proactive Services Customer V8Proactive Services Customer V8
Proactive Services Customer V8
 
Best Practices for the Service Cloud
Best Practices for the Service CloudBest Practices for the Service Cloud
Best Practices for the Service Cloud
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 

Voice Biometrics automated password_reset

  • 1. Automatic Password Reset (APR) Name, Title Email, Contact info
  • 2. The Pain: Enterprise Password Challenges Challenge #1: Lower costs at the IT help desk Challenge #2: Increase security for password resets Challenge #3: Increase efficiency by enabling self-help The Solution: The Nuance Password Reset Application
  • 3.
  • 4. EPS: The foundation for supporting speech base applications to increase organizational communications and business processes. The building blocks to simplifying communications Internal Dialer Automated Password Reset Emergency Broadcast Messaging Speech Attendant/ OpenSpeechAttendant EPS Base Unit Speech-Enabled Employee Directory
  • 5.
  • 6.
  • 7.
  • 8. APR Step by step…The Caller Experience 1 2 3 The caller dials the password reset number and is prompted to say an identifying phrase, such as a phone number or a name. Phrase can be configured to meet any corporate policy The system compares the voice to the voiceprint on file for the caller . If the voiceprint matches, the system issues a new password to the caller
  • 9. APR how does it work? Behind the Scenes… 1 2 3 Powerful voice biometric algorithms are applied to caller’s voice, encrypting it and creating a mathematical, binary voice print that is unique to that person. This voice print serves as the “fingerprint” for that caller, using over 80 characteristics of the human voice. The caller’s voice is quickly and efficiently compared to the voice print on file, allowing users to progress further in the call flow once authorized The caller can choose which system to reset, and the appropriate connector handles the reset of the backend system, retrieving/setting the temporary password, and resetting the system at the same time. Other options such as expiry dates, strong password enforcement, and others are also possible
  • 10. The Technology -How It Works: Enrollment Enroll password Speak 1-3 times 0 1 2 3 4 5 6 7 9 0 0 1 2 3 4 5 6 7 9 0 0 1 2 3 4 5 6 7 9 0 Provide I.D. (Acct #, policy #, 1-time PIN…) Analyze speech to create voiceprint Store in voiceprint database
  • 11.
  • 12. Speech Enabled Password Reset – the connection PSTN Phone Network Synch Triggers UNIX , Windows , LDAP Password Agent Nuance EPS Enterprise PBX/IVR Target Systems Remote Agent Proxy Server Remote Physical Site Email System Help desk Ticketing Unix,OS390,RSA HR System Directory Flat File, LDAP, etc
  • 13.
  • 14.
  • 16.
  • 17.

Editor's Notes

  1. EPS base unit: Speech enable your employee directory and build the foundation for supporting speech base applications to increase organizational communications and business processes Internal Dialer: Voice activated corporate dialer: Takes care of all internals calls between employees on or off site. Boost employee productivity. No need for operators to transfer employee calls SpeechAttendant: Speech Enabled Auto Attendant: Handles all incoming calls to your organization, 24-7, reduce telecom cost Speech-enabling your password reset process: Employees use their voice to reset their network passwords via any telephone quickly and easily without involving a live agent. Voice-automated emergency event notification The Emergency Notification module empowers an organization to use voice commands to simultaneously broadcast messages to virtually any number of employees
  2. EPS base unit: Speech enable your employee directory and build the foundation for supporting speech base applications to increase organizational communications and business processes Internal Dialer: Voice activated corporate dialer: Takes care of all internals calls between employees on or off site. Boost employee productivity. No need for operators to transfer employee calls SpeechAttendant: Speech Enabled Auto Attendant: Handles all incoming calls to your organization, 24-7, reduce telecom cost Speech-enabling your password reset process: Employees use their voice to reset their network passwords via any telephone quickly and easily without involving a live agent. Voice-automated emergency event notification The Emergency Notification module empowers an organization to use voice commands to simultaneously broadcast messages to virtually any number of employees
  3. There are three key areas for cost savings that we will review in this presentation – all related to increased automation. They are: Reduced agent time in verification Increased containment Reduced PIN resets Companies may also consider: An increase in security, resulting in reduced fraud. (We won’t be quantifying fraud in this presentation). Improved customer service due to providing a more convenient means of identification.