Text Independent System
The main function of the system is to verify the identity of users and to monitor unauthorized access attempts – also alarm activation, if necessary, automatic blocking of unauthorized user or prompting suggestion to add suspect to the Blacklist.
Deployment of our biometric voice Text-Independent system does not require from the Call Centre customer more than mere speech. The system relies on the safety, convenience and voice communication channels speed of use.
- Detection of access attempts by impersonation
- Verification of the correctness and consistency of speech samples used for training and testing the System
- Monitoring of the signal quality for speech training and testing
- Intelligent adaptation of the system to new voice patterns
- Constant efficiency of the solution regardless of the language used
- Support for multiple voice communication channels (GSM, PSTN, VoIP, WEB)
- Compatibile with automated dialog systems that use automatic speech recognition (ASR) to confirm the identity by using additional criteria (eg. user number, social security number)
- Scalability according to the number of registered users and the number of simultaneous channels
- Integration with existing ICT solutions (call centers, IVR systems, infolines) via dedicated API
- Compliant with all application security standards
Solution Flow Blacklist
Audio replay spoofing constitute a threat in biometric speaker verification systems. It occurs when a previously recorded vocal passphrase is played back by an unprivileged person in order to gain access to someone else’s account.
Our voice biometrics solution solves this problem. Our system implements Playback Detection capabilities which protect each user from such recording-based spoofing in fixed-passphrase mode. Each utterance of the biometric passphrase is different from other utterances. Even two similar utterances from the single speaker are in reality slightly different from each other due to behavioural reasons. Playback Detection measures such variability and utilizes it to tell whether the provided sample is a new utterance, or one of the previously observed utterances of the particular speaker. Therefore, playback attack can be detected if the sample used for spoofing was intercepted using software (internal) or hardware (external microphone) eavesdropping during any previous verification of a legitimate speaker’s account.
Fixed-passphrase Playback Detection feature can easily be toggled using Our Solution web-based administration platform.