How ArmorVox Achieves Accurate and Efficient Security Performance

how-armorvox-achieves-accurate-and-efficient-security-performance.jpg

Integrating voice biometric capabilities into any business solution should be easy and hassle-free. However, security managers often spend countless hours tuning the settings and thresholds to obtain optimal security performance. Opting for a system-wide security setting can pose security issues as each speaker will have different levels of security, resulting in ineffective security performance. Auraya’s next-gen ArmorVox voice biometric engine and its patented features, allows organizations to easily deploy voice biometrics seamlessly and quickly. ArmorVox uses machine learning to optimize the security performance of every individual voiceprint automatically. Security managers can be assured of having the best security performance from day one of deployment with continuous optimisation for every user every time they use the system.

Automated Tuning of Background Models

ArmorVox uses a patented process of creating a speaker-specific background model for every voice print enrolled in a system. A speaker-specific background model means users can speak in their preferred language and achieve optimal performance from a security perspective and in terms of user experience. A speaker specific-background model ensures that each person enrolled has the maximum protection from attacks by people who closely resemble their voice such as a twin.

Automated Setting of Speaker-Specific Security Threshold

With ArmorVox, the security thresholds of each voiceprint are automatically calibrated using machine learning to create speaker-specific security thresholds. By calibrating each speaker’s security threshold levels, organizations can ensure a consistent level of security for every individual in the system. This means that organizations can truly achieve their desired False-Accept Rate (FAR) targets and satisfy any security requirements.

ArmorVox provides tools to allow security managers to simulate a massive hack attack where lots of enrolled users can be used to attack lots of other enrolled users. Using built-in tools to audit system performance, organizations can rest assured that their security is being constantly maintained at specified levels. The audit tools allow security managers to certify that the security thresholds that are nominated for different types of transactions are in fact being delivered by the solution.

 

Previous
Previous

Auraya Attending #ACCELERATERegTech 2020

Next
Next

How to Get an Identity Claim in A Frictionless Voice Biometric Verification Process