{"id":4600,"date":"2013-08-13T19:16:00","date_gmt":"2013-08-13T19:16:00","guid":{"rendered":"https:\/\/evssolutions.com\/their-voice-your-identity-proper-authentication-in-biometrics\/"},"modified":"2013-08-13T19:16:00","modified_gmt":"2013-08-13T19:16:00","slug":"their-voice-your-identity-proper-authentication-in-biometrics","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/their-voice-your-identity-proper-authentication-in-biometrics\/","title":{"rendered":"Their Voice, Your Identity: Proper Authentication in Biometrics"},"content":{"rendered":"

Theres no doubt that there is a lot of really innovative
\nand cool technology in our world.<\/span>Prior to working with EVS<\/a>, I worked in
\ntelecommunications.<\/span>I used to love
\nthe opportunity to play with the latest and greatest mobile gadgets on the
\nmarket.<\/span>When I see a phone screen that
\nscrolls based on the movement of my eyes, I think its a little freaky and
\nreally awesome all at the same time.<\/span>Theres no doubt that things that were once only imagined in movies, are
\nbecoming a reality today.<\/p>\n

<\/p>\n

It is also great to see this type of innovation and
\ningenuity in the
fraud prevention<\/a>
\nindustry.<\/span>A method of verification
\nthat is becoming increasing popular, and will continue to experience rapid
\ngrowth, is voice biometrics.<\/span>Essentially,
\na biometrics company will do an analysis of an individuals voice to identity
\ntheir specific speaking patterns and unique differentiators.<\/span>This voice information is then stored so
\nthat the users voice can be authenticated in the future to login to their
\naccount or access a software platform.<\/span>There is no doubt that this technology is cutting edge, and it appears
\nto be much more secure than the traditional username and password combo that
\ncustomers are accustomed to in putting.<\/p>\n

An issue that companies struggle with is how to authenticate
\nthat a voice belongs to a user at the point of enrollment or account
\ncreation.<\/span>To assess this problem,
\nmany companies will do a verification of the users information before they
\ntake a sample of their voice, so a user will login and input their name,
\naddress and possibly additional information, such as last four of SSN or
\nDOB.<\/span>The company may then use a
third party
\nidentity verification company<\/a>, such as EVS, to ensure that the information
\nis accurate.<\/span>If the information is
\naccurate, the user will then move forward with voice biometrics.<\/span>While I applaud companies for taking a
\nstep towards fraud prevention, I think there is a still a gaping hole in the
\nprocess. <\/span><\/p>\n

What happens if John Doe gets my name, address and SSN and
\nprovides all valid information?<\/span>ABC Company then allows them to login to my account, not only at point
\nof enrollment, but on a continual basis, via his voice.<\/span>This situation could be avoided if
\nproper authentication was included at the very beginning of the process.<\/span>I would recommend a solution called
Dynamic
\nKBA<\/a> (Knowledge Based Authentication) or out of wallet questions, that could
\nbe posed at account creation.<\/span>These are simple, non-intrusive questions that only the user could
\nanswer to validate their identity, and at the same time, it would bridge gap in
\nverification and authentication.<\/span>It protects the user from potential identity theft and helps to protect
\nthe company from lost revenue. <\/span><\/span><\/p>\n<\/p>\n

[Contributed by Shea Allen, Account Specialist]<\/p>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Theres no doubt that there is a lot of really innovative and cool technology in our world.Prior to working with EVS, I worked in telecommunications.I used to love the opportunity to play with the latest and greatest mobile gadgets on<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4600"}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4600"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4600\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}