Man using smartphone

Voice biometrics plays key role in security

A report from fraud prevention company ValidSoft and research house Opus Research predicts that the global number of registered voiceprints will increase from 10 million to over 25 million in 2015.

The 'Voice Biometrics Authentication Best Practices: Overcoming Obstacles to Adoption' report evaluates previous voice biometrics projects and the increase of security risks associated with smartphones and incidences of data theft and fraud in banks, businesses and governments. Senior analyst at Opus Research Dan Miller advises them to take another look at methods of authenticating end users as organisations want assurances that the individual at that end point is the person he or she claims to be.

According to Miller, the best practices when introducing voice biometrics to their customers are:

  • ensure security is balanced with customer usability;
  • engage stakeholders early in the process and leverage existing resources;
  • gain their trust by proving that the technology works; be ready to adapt;
  • look ahead and bear in mind future upgrades and new technology.

The general public are becoming more familiar with using their voice for mobile search, device control and dictation and according to the report voice authentication will follow. Voice biometrics can act as a part of a multi-layer authentication process to help reduce fraud and to confirm that the endpoint user is genuine.

“A multi-factor/four-factor approach to user authentication and transaction verification provides robust security that not only applies to financial services and government sectors, but is also relevant to the social media industry and the latest challenges it faces with users’ stolen identities,” said CEO of ValidSoft Pat Carroll. “The four aspects of a person’s identity that need to be checked are: something you are, namely your voiceprint; something you have which is your mobile phone; something you know, this will be your PIN or password; and somewhere you are (or not), which can be established using privacy-protected signalling services associated with the global mobile networks.”

More information:

Recent articles

Info Message

Our sites use cookies to support some functionality, and to collect anonymous user data.

Learn more about IET cookies and how to control them