meta data for this page
  •  

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
identification [2019/08/08 11:20]
lisa.illgen_concentrix.com Added Anchor Links
identification [2019/08/20 12:49] (current)
lisa.illgen_concentrix.com [When and Where to Identify and Authenticate]
Line 30: Line 30:
 Recent methods for collecting voiceprints and matching them to callers provides another means for automated caller identification. Some systems require callers to enroll using the exact phrase they will speak to the system; others allow callers to enroll using an enrollment script but without requiring callers to speak a set identification phrase. Recent methods for collecting voiceprints and matching them to callers provides another means for automated caller identification. Some systems require callers to enroll using the exact phrase they will speak to the system; others allow callers to enroll using an enrollment script but without requiring callers to speak a set identification phrase.
  
-For the process of speaker identification,​ the system has a set of voiceprints and uses them to attempt to identify who is speaking; for speaker authentication,​ the caller is claiming to be a specific person and the system is attempting to determine if the caller is who he or she claims to be ([[references#​vacca|Vacca,​ 2007]]). It is possible to combine speaker verification with other means of authentication by asking the caller to answer personal identification questions with answers known to the system (for a type of multifactor authentication) or with other authentication factors such as the caller placing the call from a personal cell phone (determined via ANI and comparison with the enterprise database) ([[references#​kaushanksy|Kaushansky,​ 2006]; [[references#​markowitz|Markowitz,​ 2010]]).+For the process of speaker identification,​ the system has a set of voiceprints and uses them to attempt to identify who is speaking; for speaker authentication,​ the caller is claiming to be a specific person and the system is attempting to determine if the caller is who he or she claims to be ([[references#​vacca|Vacca,​ 2007]]). It is possible to combine speaker verification with other means of authentication by asking the caller to answer personal identification questions with answers known to the system (for a type of multifactor authentication) or with other authentication factors such as the caller placing the call from a personal cell phone (determined via ANI and comparison with the enterprise database) ([[references#​kaushanksy|Kaushansky,​ 2006]]; [[references#​markowitz|Markowitz,​ 2010]]).
  
 Current speaker identification and authentication technologies are more error prone than purely physical biometric methods such as fingerprint,​ iris, or face ([[references#​jain|Jain & Pankanti, 2008]]). [[references#​toledano|Toledano et al.]] (2006) found speech verification to be more error prone than fingerprint scanning, but less than signature verification. Until speaker verification becomes more accurate, it will likely be useful only for low-security applications unless combined with other verification methods to achieve multifactor authentication. Current speaker identification and authentication technologies are more error prone than purely physical biometric methods such as fingerprint,​ iris, or face ([[references#​jain|Jain & Pankanti, 2008]]). [[references#​toledano|Toledano et al.]] (2006) found speech verification to be more error prone than fingerprint scanning, but less than signature verification. Until speaker verification becomes more accurate, it will likely be useful only for low-security applications unless combined with other verification methods to achieve multifactor authentication.