Examples ofActive Client Deployments

The best test of any product is how it performs in the real world. We take pride in practical and therefore valuable deployments. Biometrics can never be 100% perfect and should always be part of a multi-factor solution and not standalone, but as the accuracy discussion in our tutorial points out, even less than 100% coverage delivers a compelling ROI. The real-world deployments on this page cover a variety of industries, languages, deployment types (Cloud and On-prem) and use cases. You'll find our RandomPIN™ is the most common, due to its robustness against playback attacks and speed of authentication, but we have clients using our technology for Static Passphrase and Identification (1 to N comparisons, commonly known as "one to many") also.

Authentication of Wire Transfers

Problem. Wire transfers are subject to increasing losses and liability exposure as skilled fraudsters are able to break traditional authentication with a bank official.

Solution. Our customer embedded voice biometrics within their services and provides wire transfer authorization to mid-sized banks. Their product uses voice biometrics in conjunction with a one-time password. Once the user authenticates with the password, the user must also verify against a random number voice biometric challenge. The random number challenge provides a strong barrier against recorded playback attacks.

Impact. Multi-factor authorization including voice biometrics provides stronger authentication than traditional processes. Furthermore, the multi-factor solution is automated, reducing costs for wire transfers and removing queues for bank personnel to authorize the more routine wire transfers. The cost is paid for by lower personnel costs and lower losses due to fraud.

Continuous Verification and Identification

Problem. Our customer provides phone services for prison systems. PIN codes are not sufficient to ensure that only the authorized inmate has access to make phone calls. Either voluntarily or involuntarily, inmates with privileges were giving up their rights to other inmates, even those who are not allowed access to make calls.

Solution. Our customer implemented a voice biometric system in conjunction with their prison phone system to ensure that the person authorized to start a call remains the owner of the call for the duration of the call. They implemented VBG’s technology to capture a Free Speech voiceprint passively on a call at the start of a call and then repeatedly capture voice samples during the call. This is Continuous Verification. If the Continuous Verification process determines that the inmate’s voice changed, then our customer compares the voiceprint against all other voiceprints in the database of voiceprints for the inmates in order to determine the identity of the new person on the line. This is Identification.

Impact. Compliant inmates were no longer coerced into giving up privileges. A second impact is unauthorized users were no longer able to use the phone to conduct criminal activity while incarcerated. The cost is absorbed in the standard telecommunication charges to the inmates.

Authentication of Students

Problem. Several state governments are mandating the use of voice biometrics or comparable security means to ensure the identity of people taking online courses, such as driver education, professional certification or continuing education, etc.

Solution. Our customer embeds VBG’s biometrics within their learning management system. At the start of the class, the students enroll in the system over their telephones. During the class, the learning management system randomly presents a string of digits for the student to speak to confirm their identity. The learning management system signals VBG’s IVR to outdial to the student’s phone in order to capture the audio for the verification. VBG returns the result back to the system through the API.

Impact. VBG technology cost-effectively enables our customer to comply with the state requirements. The relatively small cost of the verification is included in the cost for the driver education class.

Authenticated Employee Check-In

Problem. Out of a large population of field personnel, some employees were occasionally falsely reporting their presence on job sites. The amount of false reporting was not high, but each time it occurred and their end-customer discovered it, the company was subject to extremely high liability claims. The company needed a way to ensure greater compliance with service delivery with corresponding proof of compliance.

Solution. Verifying every employee on every shift is feasible but time-consuming. Instead, our customer implemented a random check on personnel. The Random Number use case is suited to this application because the employee has nothing to remember. Using their in-house cloud-based IVR, they built an outbound IVR application and it with voice biometrics and location-based services for mobile and landline phones. The combination of location information from the phone along with voice biometrics ensures compliance with both the location and identity of the employee. Furthermore, the verification provides a record useful for audits and proof of service delivery.

Impact. The random checks addressed the business problem. Just knowing that a check may happen encouraged greater compliance. The cost of implementing voice biometrics is far less than costs associated with liability exposure of their previous practice.

Fraud Detection in Language Testing

Problem. People taking language tests must take a series of tests to prove proficiency. In many cases, the stakes are high, driving some test-takers to hire other people, including professional test-takers, to complete tests on their behalf. Prior to using voice biometrics, the company manually spot-checked by listening to audio recordings.

Solution. The company administering the language tests deployed our technology to scan all of the audio from the language tests off-line. The scan first verifies that the speaker is the same speaker during the course of the tests. If the speaker changes, that’s a clue that cheating occurred. Further, the company compares all speakers to a known database of professional test-takers and to prior test-takers.

Impact. This application dramatically improved test integrity and greatly reduced the ability of professional test-takers to commit fraud. The cost for the voice biometrics was recovered through higher sales due to the company’s ability to demonstrate greater test integrity.

Immigrant Check-In

Problem. Certain visitors to a country are required to periodically check-in and validate presence and identity. Validation must occur in one of 35 languages. The government agency had no means to track visitors.

Solution. The government agency contracted our customer to perform the checks. Random Number ensures the speaker has nothing to remember and further cannot use a recording of a previous verification. Using their in-house, cloud-based IVR, they added VBG’s technology in 35 languages.

Impact. This application is important for the country’s security. Voice biometrics makes this application cost-effective and viable. Other options for periodic check-ins require costly in-person visits.

Surety Bond Monitoring

Problem. A Surety Guarantor, or similarly a Bail Bondsman, takes a risk in guaranteeing that a person charged with a crime will properly appear in front of the court and not flee. The Guarantor would like means to keep track of the person without having to physically watch over the person at all times. The Guarantor hires a company that tracks location using devices such as ankle security bracelets. Should the person wearing the bracelet leave the geographic zone to which they are allowed, an alert occurs. Sometimes exceptions or changes to the zone are necessary. The Guarantor does not want any unauthorized person to approve or allow exceptions or changes.

Solution. The security company monitoring the tracking devices uses voice biometrics as an additional factor to ensure that only the Guarantor is approving changes and exceptions. This is convenient for the Guarantor and fully automated through an inbound or optionally outbound IVR interface. Random Number ensures the speaker has nothing to remember and further cannot be easily spoofed by the alleged offender. They used VBG's turnkey IVR and voice biometrics in French and English.

Impact. For a modest additional authorization fee to add a voice biometric factor, the Surety company lowers risk tremendously while also enjoying the convenience of a fully automated, available anytime and anywhere solution. Other options for managing authorizations are susceptible to social engineering, less availability, and longer transaction time.