Government

Home / Government

ArmorVox Next Generation Voice Biometrics for Government

ArmorVox has been designed to deliver optimum security and convenience - our team has been relentlessly pursuing this goal for decades. Our patented Impostor Mapping process has been designed to put you in charge of identifying duplicate enrollees. ArmorVox's fast cross matching with fraudster lists and hot lists help you identify fraudsters in real time - which means you get to proactively manage fraudsters. The security benefits are delivered  while empowering citizens to access services securely, conveniently and privately with their voice. Every individual’s voice print is unique – which means you can be sure that using our technology will support your vision of serving citizens more safely and securely.

New Zealand Government achieves 2.2 million citizen enrolments within 2.5 years of implementing ArmorVox technology

Vodafone NZ, in collaboration with Salmat, delivers the biometric voice verification project as a managed service for the government. Auraya was chosen as the voice biometric technology supplier for the managed service and provided high level consulting services for security and usability issue. The NZ Government and has actively engaged Auraya in marketing and promotional activities during implementation of the solution to ensure user acceptance and accelerated adoption.

ARMORVOX SOLUTIONS

Citizen Transactions on Digital Apps

Secure second-factor authentication for enabling high risk and high value transactions for citizens on digital apps. With a single step verification process, you can double the security while greatly enhancing user experience.

DIY Password Resets

Empower citizens to reset passwords on the go using their voice. Automating password resets saves you time, cost and money - and boosts business productivity.

Citizen Enquiries

By automating citizen authentication using voice biometrics, you can reduce government agent handling time by 10 - 15%. Agents can directly handle citizen enquiries and boost overall productivity and efficiency.

Impostor Map

Impostor Maps “wash” every new enrollee through the data base of existing enrollees to identify potential duplicate voice prints. Voice prints of known fraudsters can be enrolled - helping you proactively manage fraud.

Fraudster & Recent Activator Lists

Detect and track fraud using Fraudster Lists. ArmorVox fast cross-matching, operates at over 2,500,000 cross-matches per minute in real-time fraud detection and tracking. 

Voice E-Signatures

By empowering citizens to use their voice as e-signatures, you can implement legally binding transaction authorization securely and conveniently.

Delight your citizens with smarter experiences today. Verify citizens with ArmorVox so they can access public services seamlessly across multiple channels.

ACHIEVE DESIRED BUSINESS OUTCOMES WITH ARMORVOX

Business Productivity

 Dramatically reduce handling time per citizen in the call centre | Allow more self service in the IVR and digital channels | Reduced effort needed to handle complaints related to fraud | Eliminate post call authorization processes as digital signatures are automatic | Agent engagement increases by eliminating frustrating manual verification

Cost Savings

Dramatically reduce costs as digital channels can verify secure transactions | Eliminate SMS charges | Eliminate RSA tokens for secure log on and out of band authentication | Reduced cost to confirm transactions with mail outs and manual processes | Eliminate password reset costs | Biometric verification lowers the cost of regulatory compliance with AML and KYC

Delight Citizens

No more pins and passwords to remember! Citizens value privacy | All digital transactions will become easy, convenient and secure | Empower people with the latest technology and security offering | Citizen satisfaction improvements by eliminating frustrating manual verification process

Team Member Engagement

Implement automated verification to greatly improve government agent engagement | Allow agents to work from home knowing that only authenticated agents are talking to clients | Positive agent engagement equals better customer satisfaction and reduced agent turnover

Manage Fraud Proactively

Identify and mitigate fraud in real-time | Go from being reactive to proactive at managing fraudsters and nuisance callers | Retain a database of fraudsters and suspected fraudsters | Share real fraud data across the enterprise and across the industry 

Security Benefits

Deploy trusted transaction and communication online | Connect voice biometrics to other security and threat indicators to provide enterprise wide security for all channels | Add a layer of security to chat, social media and watches | Lower the cost of compliance by using voice biometrics | Offer trusted secure service from kiosks and bots

VOICE BIOMETRICS IMPLEMENTATION FOR GOVERNMENT

You don't to need to expose the personal information of citizens to offshore contact centres

Like you fingerprint, your voice is unique. And like your fingerprint, your voice can be used to automatically verify your identity. The ArmorVox technology is compliant with the Australian Privacy Act; a caller’s identity can be verified “in-country” and under the protection of Australian Privacy Law.  Only once verified is the caller transferred off-shore.

Read More
 

Setting the right security threshold need not be a hit-and-miss case anymore

Setting a “single global threshold” across the whole voice print database assumes that all voice prints exhibit the same security performance. In reality - noise, interference, distortion and speaker behaviour and variations in telecommunications channels often lead to voice prints with widely varying security performance. 

Read More

Overcoming security vulnerabilities with Next Generation Voice Biometrics

A recent BBC article detailed a voice biometric breach that occurred when a journalist gained access to his twin brother’s HSBC bank account. The article exposes some common flaws in the design of legacy voice biometric solutions that reflect poorly on the industry as a whole. A well-designed system would consider the threat model of adversaries so that the risks of a breach are well managed. 

Read More