Voice identity verification is catching on, especially in finance. Talking is convenient, especially for users who are already familiar with voice technologies like Siri and Alexa. Voice ID offers a level of security that PIN codes and passwords cannot.
Passive vs. Active Voice Biometrics
Like a fingerprint, an iris, or a face, voice biometrics is unique to an individual. To create a voiceprint, a speaker provides a sample of her voice. When he wants to verify her identity, he uses another sample of her voice to compare it to that initial sample. What sets it apart from other biometrics is that every time someone speaks when prompted, the voiceprint is unique. No one can steal my voice because you cannot steal what I am going to say next. When users are asked to say their phone or account numbers or the digits shown on the screen, this is active biometrics, the passive is more in the background. So while I am talking to the call center agent my voice is being tested and the agent is being given a confirmation that it really is me.
Biometric voice identity security
An organization responsible for voice biometrics can store it with a trusted service provider. The last thing we advocate is for voice fingerprints to fly to some unknown location with limited security. We believe they should be safely locked behind the firewall of the clients, as [companies] protect the rest of their clients information.
Cheating on the voice identification system
Someone can record a user and play that audio, or someone can use a computer to generate synthetic versions of people's voices, also known as deep fakes. But there are ways to prevent this type of fraud. You can apply some kind of [live element], so maybe a random element of the sentence, or use passive voice biometrics to keep the user talking continuously. There is also technology that analyzes speech abnormalities. Does it appear to be recording and playing? Does it appear to have been produced synthetically or modified by a machine? So there are ways that scammers can potentially attempt to subvert the system, but we have measures in place to detect and prevent them.
By VentureBeat.com
Kommentarer