Top Banner
My Voice is My Passport: Verify Me March 12, 2012
29

Sxsw ppt voice-1

Jun 01, 2015

Download

Technology

Dan Miller

A superset of the slides I presented on voice biometrics at SxSW Interactive. The session (in conjunction with CSIdentity was to raise awareness VB as a physical and behavioral biometric.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Sxsw ppt voice-1

My Voice is My Passport: Verify Me

March 12, 2012

Page 2: Sxsw ppt voice-1

2

About the Speakers Dan Miller (Founder, Senior Analyst)

Founded Opus Research (1985) Analyst at IDC/Link, The Kelsey Group, Zelos Group Industry experience: Atari, Time-Warner, PacTel (AT&T) Expertise: local, DA, speech integration with Web, mobility

and enterprise software infrastructure Coverage Areas: Conversational Commerce, Internet2Go,

Biometrics Isaac Chapa (VP Information Systems/Operations,

CSID) Joined CSID 2006, overseeing ID Theft Platforms/Solutions Sr. Engineer, Grande Communications Designed and integrated DCM/VOIP Switches, Billing

Platforms, SONET and FTTH, HFC networks

Page 3: Sxsw ppt voice-1

3

Why We’re Here

Talk about voice biometrics Share some ideas on stronger authentication for

mobile transactions Get feedback as prospective

users/developers/implementers Describe some “real world” use cases, business cases

and demand drivers

Page 4: Sxsw ppt voice-1

4

Voice Biometrics & Speaker Verification

Voice Biometrics is a technology Captures an utterance from a live callerCompares it to previously stored “voiceprint”Produces a score

Speaker Verification is an application Employs a biometric engine plus business logicEnrolls customers by obtaining voice printsCompares live utterances to voice prints to produce a

“pass” or “fail” responses

Page 5: Sxsw ppt voice-1

5

Speaker Verification Components

Core Verification EngineReceives voice sample (“utterance”); compares it to a voiceprint

(“template”)Confirms who said it

Core Recognition EngineCompares utterance to ASR grammarDetermines what was said

Business LogicDecides if the caller passes or fails Dictates required “next steps”

Page 6: Sxsw ppt voice-1

6

What is Voice Print?Physical Characteristics The unique physical traits of the individual’s vocal tract, such as shape and size.

Behavioral Characteristics The harmonic and resonant frequencies, such as accents, the speed of your speech, and how words are pronounced and emphasized.

Voiceprint - Together these physiological and behavioral factors combine to produce unique voice patterns for every individual

Page 7: Sxsw ppt voice-1

7

Text Dependent vs. Text Independent Applications that require a specific pass phrase are Text

DependentRequire trainingCustomarily involve enrollment

Text Independent applications can use any utteranceSimplify enrollmentSupport “conversational authentication”

Page 8: Sxsw ppt voice-1

8

Why Now?

Page 9: Sxsw ppt voice-1

9

Fraud Protection Requirements

Multifactor Mandated in more use cases Includes “something you are”

Multimodal Because “the customer is always on” Embraces social networks and multiple sign-ons

Mobile Approaching 6 billion subscribers Mobile devices are becoming virtual assistants

Page 10: Sxsw ppt voice-1

10

+ 1 = Momentum

Passwords getting more difficultMultiple digits and special charactersFrequently updatedFragmented across sites (and IDs)

User authentication vitalTo access multiple sites, domains and devicesFor more activities, transactions and interactions“Open” approaches only as strong as weakest link

Page 11: Sxsw ppt voice-1

11

Entering 3rd Generation

1st Generation

IVR PIN replacementPassword Reset

Emphasis on Security

“My voice is my password”“ 0 1 2 3 4 5 6 7 8 9”Random digit liveness

2000 2005 2010 2015

2nd Generation

Enhanced ID&VMulti-factor Auth

Automation

Voiceprint on identity claimLeverage KV & ANI/CLIRandom word liveness

3rd Generation

Enhanced ID&VSecure Mobile Access

Voice Signatures- Internet via OOB

- Mobile multi-mediaConvenience

Password replacementLeverage device idRandom phrase liveness

EmbeddedVerification

Source: Nuance Communications

Page 12: Sxsw ppt voice-1

12

Estimated Revenues

Page 13: Sxsw ppt voice-1

13

Results: Registered VoiceprintsIn Millions

Page 14: Sxsw ppt voice-1

14

This is My Wallet

Page 15: Sxsw ppt voice-1

15

This is My Wallet on Phone

Page 16: Sxsw ppt voice-1

16

Mobile Commerce is Exploding

Mobile transactionsWill reach $670 billion by 2015Up from $240 billion in 2011

Global in natureEast Asia and ChinaWestern EuropeNorth America

represent 75% gross transaction value. (Juniper Research)

Page 17: Sxsw ppt voice-1

17

But Inherently Insecure

At the device levelOSes have no security shellPersonal info (including PINs) stored as text

At the network levelEncryption is the exceptionProne to keystroke logging, Bluetooth sniffing and the like

What about authenticating users?

Page 18: Sxsw ppt voice-1

18

What Are We Protecting

Integrity Confidentiality Availability of Data

Loosely coupled from infrastructure Secure applications and runtime environments The critical focus of security shifts:

From owning everything to owning nothing From “Where are you from?” to “Who are you?”

• Identity, credential, and access managementFrom “Internal vs. External” to “Distrust everyone equally”

Need strong authentication independent from current form factors

Page 19: Sxsw ppt voice-1

19

What Are We Using Usually a four digit number.

There's only 10,000 possible combinationsFour character, alpha only, password has more than

45,000 possibilitiesAlphanumeric and there's more than a million and a half

Fast computers can crack these in less than a second (and often don’t have to)

Page 20: Sxsw ppt voice-1

20

Today’s Requirements “Layered”

To apply appropriate level of security for risk profile

Multi-FactorTo augment PINs or PWD

Device-orientedComplex device identification

considered more secure (per 2011 “guidance” from FFIEC)

Page 21: Sxsw ppt voice-1

21

Lead To These Solutions

Treating mobile phones as “non-traditional endpoints”

Popular solutions:One Time Passwords – using SMS textKnowledge-based Authentication –

using non-public info“A Biometric” – fingerprint, face

recognition, iris scans…and voice!

Page 22: Sxsw ppt voice-1

22

Before You’d Try These

Page 23: Sxsw ppt voice-1

23

You Should Think About These

User Authentication Device Activation Transaction Authorization Mobile Signatures Password Reset ID Proofing

Page 24: Sxsw ppt voice-1

24

Superior Factor for Phones

Works on all phones Includes both physical and behavioral attributes

Physical Characteristics The unique physical traits of the individual’s vocal tract, such as shape and size.

Behavioral Characteristics The harmonic and resonant frequencies, such as accents, the speed of your speech, and how words are pronounced and emphasized.

Page 25: Sxsw ppt voice-1

25

On Par With Biometric Alternatives

Error rates are “acceptable” Registration is relatively easy No special equipment needed for authentication Solutions integrate with or augment existing security

infrastructure

Page 26: Sxsw ppt voice-1

26

Has Surprising Acceptance

In contact centers8.5 million voice prints registeredROI justified shaving minutes from authentication practices

+ fraud reduction For remote and mobile workers

For Password ResetSecure access to VPNStrong authentication for conference calls

Page 27: Sxsw ppt voice-1

27

Applications & Use Cases

Personalized, trusted customer care Proof of life Mobile payment authorization Device activation, “Wake Up” Enterprise VPN access control Password reset Anonymous authentication

Page 28: Sxsw ppt voice-1

28

But Real Security Comes With

Layering multiple factorsLike gesturesLocationMotion detectionOut-of-band authentication

And leveraging existing infrastructureFor complianceAs a go-faster To support Natural Language Interactions