» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

Because IDENTITY Matters.. AIRPORT Public, Press Political Concerns Public, Press Political Concerns No fences or gates.
© Aastra 2012 CMG 7.5 Speech Attendant Sales Presentation.
Rob Marchand Genesys Telecommunications
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
Planning Ahead for Optimal Contact Center Deployment Phil Odence, VP Contact Center Business, Empirix.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Tele’Ware Software Application. Helping you manage your clients….
Voice Biometric Overview for SfTelephony Meetup March 10, 2011 Dan Miller Opus Research.
Utilize AITech’s UC Technology to Differentiate your Voice Service Offering Greg Lohrenz - CEO Nashville FISPA LIVE.
We make it easier for businesses of all sizes to safely accept checks transmodus offers clients automation utilizing our online processing platform for.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
By: Monika Achury and Shuchita Singh
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
School Management Software
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
Lexmark Print Management
SpeechTek West 2007 Automating Password Reset to Make Employees More Efficient Jason Groshart Director of Product Engineering Password Reset.
Biometrics: Voice Recognition
MELLON SPECIALIZED SERVICES WITH THE HELP OF ITS CONTACT CENTER 8 th of June 2005 Delivered by Dragomir Mihaela Office Manager.
TEL 355: Communication and Information Systems in Organizations Speech-Enabled Interactive Voice Response Systems Professor John F. Clark.
Bonus Features Available Paid Add-ons in CSO Sam & Chris.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
African Banking Technology Conference 3 April 2008 Nairobi - Kenya Patrick Mburu Director, ATS - Africa.
Tools of the Trade: Building the Business Case and Legacy System Integration Presented by: Jerry Keely Customer Service Administrator.
AITech’s UC Voice Technology for FISPA CLECs and ISPs Welcome to FISPALIVE Atlanta 2014.
SIV Applications Claudia Daboul (IBP) Martin Eckert (T-Systems) Judith Markowitz (J. Markowitz, Consultants) 08. Aug 2006.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Genesys – Business Overview
Welcome! Stands for integration.  Cronus eBusiness Delivers Internet Protocol Contact Center Solutions  Speaker: Laurentiu Zanca.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Servicing Market information & Identification Requirements July 2013 AUCTION HOLDINGS LIMITED (Msika wa Fodya)
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
Identity Management Working Group 2006 Member Meeting Tempe, AZ Barry Ribbeck Rice University.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Use your Voice to Access the WEB Christian Dugast Director European Operations Nuance Communications.
PRESENTATION ON BIOMETRICS
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
1 Efficient- Flexible- Cost Effective. 2 The key is to ensure that your clients have a positive experience remotely irrespective of the process you wish.
Connecticut Interactive (CI) Customer Database Billing System (CDB)
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Out of Sight, But Not Out of Touch Remote Office, Branch Office IP Telephony Solutions Charles Henderson Director, Product Management EADS TELECOM North.
Raj Bank Universal Core Banking System FCBS FINCBS INC Universal Core Banking Solution FCBS – Fin Core Banking Solution
A Global fully incorporated Virtual ecommerce Software Solution.
NATIONAL IT AUTHORITY MODULE 5 PROCESS HANDLING SKILLS AND KNOWLEDGE.
 STARTAPRO Global System Integrators Company Profile.
Education Solution.
January 23-26, 2007 Ft. Lauderdale, Florida Leveraging Next Gen Collaborative Technologies to Make Unified Messaging a Reality Sanjeev Sawai Vice President,
Raj Bank Universal Core Banking System FCBS FINCBS INC Banking Systems & Consulting
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Rohde & Schwarz Topex TOPEX CallMeBridge July 2011.
WEBINAR Fight Fraud And Offer A Better Customer Experience With Voice Biometrics May 18, Call in at 1:55 p.m. Eastern time Andras Cser, Vice President,
Munix Saloon & SPA Customer Profiling, Attendance Management, SMS Alerts, Workout Schedule, Diet Management, and much more …. Internet Gateway & Business.
Summary Physical Access & Time and Attendance PC/Network Access
Speech Technology Center Solutions
By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
TIME & ATTENDANCE SYSTEM
CTI Contact Center For CustomerSoft ESP
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Biometric technology.
IPortal Integration Customer Bank Employees Management Support iPortal.
Modern benefits administration and HR software, supported by us.
Streamlining Processes Across Retail Banking Channels
Presentation transcript:

» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing

» Jun 9, 2003 Founded 2000 Verint (Comverse Infosys) (NASDAQ:VRNT) Spin-Off Technology being developed for the last 6 years for Military & Security applications Security and monitoring implementations. Persay -The Company

» Jun 9, 2003 What is Speaker Verification The ability to verify who you are in a Secure and Efficient way,using your voice. Voice as a signature Why use Voice? - Voice is Unique Voice is a biometric measure like fingerprint, Iris scan, etc

» Jun 9, 2003 First Direct Bank Contact Center

» Jun 9, 2003 The challenge Current access process Verification questions - The X letter of: Your first school ? Your best friend’s name? Your mother’s name? Your grandmother’s name?

» Jun 9, 2003 Service Irritating the customers Cost seconds of agent time every call Security Low level of security Business Spending time with verification rather then the call reason Issues with existing process

» Jun 9, 2003 The need: A Secure and Efficient solution The solution Verification questions - The X letter of: Your first school ? Your best friend’s name? Your mother’s name? Your grandmother’s name?

» Jun 9, 2003 Persay VocalPassword Persay FreeSpeech Secured Transaction Customer IVRTransaction Live Agent ACD Persay Solutions

» Jun 9, 2003 Authentication is performed while any natural conversation between people is being conducted Totally Language and accent independent Initial training for voice signature creation is seamless,natural and easy Continues authentication - The Ability to continuously authenticate the speakers during the conversation, without interfering with the call Natural Dialog Persay FreeSpeech

» Jun 9, 2003 Do not want to change customer call flow Keep the process transparent to the customer Not add new process to agent (explaining enrolment) Why choose FreeSpeech

» Jun 9, 2003 Numbers Working since July ,000 voice signatures stored in the system Average call duration reduced by 17 seconds 95% of callers authenticated only by their voice

» Jun 9, 2003 Transaction Verification

» Jun 9, 2003 Credit verification 400 agents 45,000 calls per month The Challenge –issues of customer authentication for account and credit transaction verification –Long verification process using agents The Solution : Persay VocalPassword –Integrated within IVR system –The Agent begins the call once the customer is already authenticated –Saving Time –Secure Transaction Benefit – Calls 15% shorter

» Jun 9, 2003  Content + Voice matching  Immediate Response  Highly Robust – mobile / fixed line, voice variations due to cold, etc.  Simple enrolment – chose your V.Signature and repeat it 3 times.  Example: Customer: “John Smith 07631” any language, any content! Persay VocalPassword

» Jun 9, 2003 Authorized Directory assistance Remote data access

» Jun 9, 2003 Authorized access to information More then 10,000 employees The Challenge –Access to internal Financial institute personal information using phone –The need for authorized access to employees information The Solution : Persay VocalPassword –Integrated within IVR system and Speech recognition Engine –Fully automated and secure access. –Eliminating the need for human interface

» Jun 9, 2003 Other applications using Persay Speaker Verification Customer / Internal Password reset –More then 30 % of calls are in regards to forgotten passwords, this offers a automated process that’ saves time and money to the bank Internet banking access using Speaker verification Time Attendance –The ability to report time from remote using phone and voice as the biometric identification of the employee. Caller id or location based services

» Jun 9, 2003 Architecture

» Jun 9, 2003 The Persay Solution Persay Authentication Platform Persay FreeSpeech ™ Persay VocalPassword ™ Applications Transaction Verification Time Attendance System Access Password Reset Voice Portal Identity Verification

» Jun 9, 2003 System Architecture Administrator CTI / CRM Server CTI Link LAN E1/T1 ACD IVR Operator Internet VocalPassword FreeSpeech

» Jun 9, 2003 Administration Visualization Reports Alerts Call CTI data CRM info Call business data External info Phone,Cell Persay Verification Platform Many info sources Open Architecture Integrated into Call center environment VOIP Many Audio sources WEB IVR info

» Jun 9, 2003 Collecting a voice signature Automated Training Voice Print Creation Verification Comparison and Decision Enrollment  Initial training of voice print  VocalPassword: 2-3 repetitions of pass phrase  FreeSpeech:3 calls of ~ 1 minute long  Any Language any accent

» Jun 9, 2003 Any Scenario Where Customer Identity Is Required  Financial services  Contact Centers  Enterprise Infrastructure (password reset)  E, M-Commerce (Credit card transactions)  Voice Portals  Law enforcement Markets

» Jun 9, 2003 Thank You for listening Jonathan Moav Director of Marketing