The role of voice biometrics in a multi-factor authentication solution SpeechTek February 21, 2007 Chuck Buffum

Slides:



Advertisements
Similar presentations
CUSTOMER SERVICE. Customer service is a series of activities designed to enhance the level of customer satisfaction – that is, the feeling that a product.
Advertisements

Microsoft Dynamics CRM Online Choice Begins Today! Ralph R. Zerbonia President Universe Central Corporation.
Convergys Confidential and Proprietary Copyright © 2007 Convergys Corporation To Confirm, or Not to Confirm … That is the Question Kristie Goss Convergys.
Which server is right for you? Get in Contact with us
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
1 Profit from usage data analytics: Recent trends in gathering and analyzing IVR usage data Vasudeva Akula, Convergys Corporation 08/08/2006.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
SalesPad SalesPad delivers an all-in-one order entry, inventory and sales management solution integrate seamlessly with Dynamics GP SalesPad simplifies.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
Department of Labor HSPD-12
1 Best Practices for Voice Authentication Charles R. Jankowski Jr., Ph. D. SpeechTek West 2007 February 21, 2007.
Student Privacy Issues Sailing away the winter blues with ISFAA … 2015 Winter Conference.
CARD ACCEPTANCE PROCEDURES Facilitator: Kristy A Stanley Fraud and Compliance Officer June
Voice Biometric Overview for SfTelephony Meetup March 10, 2011 Dan Miller Opus Research.
Substitute FAQs SubFinder Overview. FAQs Do I have to have touch-tone service to use SubFinder? No, but you do need a telephone that can be switched from.
By: Monika Achury and Shuchita Singh
Security Controls – What Works
Data. Where does data come from? Acquisition of information –The acquisition of information is how the data is provided to the system. –It can be done.
1 LBSC 690: Week 9 SQL, Web Forms. 2 Discussion Points Websites that are really databases Deep vs. Surface Web.
Biometrics and Authentication Shivani Kirubanandan.
SpeechTek West 2007 Automating Password Reset to Make Employees More Efficient Jason Groshart Director of Product Engineering Password Reset.
Biometrics: Voice Recognition
Voice Mail Instruction for University of Arkansas Campus
Chapter 9 Servicing Fund Shareholders Viewing recommendations for Windows: Use the Arial TrueType font and set your screen area to at least 800 by 600.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Wireless Password: ONLINE GAMING / GAMBLING KNOW - YOUR - CUSTOMER AND RISK MANAGEMENT.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
Electronic Banking Risk Assessment - Product Training
E-MetroTel UC X Wallboard Overview Sales Overview 05 Dec 2013 E-MetroTel Proprietary and Confidential E-MetroTel is where EVERGREEN is alive and well.
Beyond Call Recording: Speech Improves Quality Assurance Larry Mark Chief Technology Officer SER Solutions, Inc.
Electronic authentication: validating and verifying customer identities and bank details Presented by: Stan Matthews & Scott Robertson 13 th November 2007.
Utilities, Customers & SMS Rudi Leitner. Who in this room has a mobile phone? Who in this room has ever sent a text (SMS) message?
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
“Stronger” Web Authentication: A Security Review Cory Scott.
0 Service: The Customer Perspective What is important to you when doing business with a mutual fund sponsor? What do you expect from that company when.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
Data Security in a Mobile World Emmitt Wells – Getronics.
Biometrics Authentication Technology
By Anthony W. Hill & Course Technology 1 Help Desk Operation Beisse.
C4HCO Security and Privacy Discussion Bill Jenkins C4HCO Security and Privacy Officer 16 October 2013.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
PRESENTATION ON BIOMETRICS
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
e-Learning Module Credit/Debit Payment Card Acceptance and Security
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
THIS TRAINING IS REQUIRED IN ORDER TO OBTAIN SECURITY TO INITIATE HIRING PACKETS FOR NEW EMPLOYEES. Hire Xpress User’s Training NAU’s Automated Hiring.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Welcome to our Presentation on ORACLE Flexcube & Bank Asia- Banking Technology.
WEBINAR Fight Fraud And Offer A Better Customer Experience With Voice Biometrics May 18, Call in at 1:55 p.m. Eastern time Andras Cser, Vice President,
Personal Finance Credit Cards. Types of Credit Cards Bank card – Visa, MasterCard Store card – Macy’s, Kohl’s, Boscovs Travel and Entertainment – American.
Mastercard Identity Check Mobile
How to Protect Yourself from ID Theft and Social Engineering
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Call Center System Software Solution
Circle Wallet Errors And Solutions. Some common issues of Circle wallet during transaction are- Unable to log in into the wallet. Unable to send digital.
CIP Express Software 11/15/2018 6:40 PM Ragini
CONVERCENT INCIDENT REPORTING Employee Training
Citi Commercial Cards – Fraud Early Warning
Jeremy Grant Coordinator Better Identity Coalition
Employee Self-Service (ESS) Portal
Presentation transcript:

The role of voice biometrics in a multi-factor authentication solution SpeechTek February 21, 2007 Chuck Buffum

Voice biometrics in the call center Why is this worth our attention? What applications are the best fit? How should we measure success? How well does it really work? Who has already done this?

Why? Identity theft is a serious problem Fraud losses Damage to corporate brand Erosion of customer confidence … and too easy in call centers … and the FFIEC guidance Increasing government/regulatory pressure Increased protection of phone records (Verizon, HP, etc.) Restrictions on use of full SSN HIPAA, SOX, USA Patriot Act

What applications? Business transaction calls are where the fraud occurs ($$$) Telephone banking Order entry Loyalty rewards redemption Either automated (IVR) or agent handled Account info calls are where the identity theft occurs (Bad Press) Customer service Account/order/payment status Profile/password management Either automated (IVR) or agent handled The vast majority of typical call volume

Multi Factor Authentication (MFA) What you know Account number Mother’s maiden name (MMN) Last 4 SSN Zip Code Date of Birth Challenge/Response questions What you have ANI Who you are Voiceprint What you do Behavior patterns

How does MFA fit into my call center? Front end Plug in IVR MFA Server Answer call Send ANI Collect ANI Request account # Play prompt Recognize account # Send result & audio Collect account # Fetch voiceprint & match Fetch ANI & match Request content info (zip) Play prompt Recognize zip Send result Collect zip & match Generate auth score Send id & auth result Go to main menu IVR MFA Server Answer call Collect & store ANI Collect & store account # Present main menu - if low risk transaction, continue - if high risk transaction, invoke MFA Collect ANI Collect account # Fetch voiceprint Fetch ANI & match Request voice utterance Play prompt Recognize & record Send result & audio Match voiceprint Generate auth score Send result or request content Continue to high risk transaction Or collect content for more auth.

Measures of success? Business GoalsKey Metrics Critical Success Factors Improved Security Customer acceptance Minimal disruption Affordability Multi-factor auth. Compliance reporting Convenience Effectiveness Utilize installed “kit” Comfortable dialogs Fair price Quantifiable benefits FA/FR Reduced fraud/ID theft Enrollment rate Customer satisfaction Length of install Call duration ROI

Realistic performance (your mileage may will vary) Contributors to voiceprint error rate Richness of enrollment Richness of verification utterance Environmental noise Phone-channel mismatch Change in voice (severe cold) Contributors to authentication error rate ANI spoofing “Content” acquisition Recorded audio Observed field performance Voice biometric: 4-8% EER (1% FA, 7-15% FR) MFA: 1-5% EER (<1% FA, 1-9% FR) Customer acceptance very positive IF dialog is short and familiar

Happy early adopters US Bank Marriott Washington Mutual First Horizon Visa Harvard Pilgrim Deutsche Bank Southern Pacific RR Ameritrade Air Canada Wells Fargo RBOS

Summary Voice biometrics is a key technology in a MFA solution Voiceprint technology works and is effectively deployed Most call center applications are appropriate It should be in your planning horizon If you respond to the carrot (ROI & better customer protection) Or the stick (emerging regulatory compliance)

Thank you!