• HOME
  • SERVICES
    • CYBER SECURITY
    • RISK MANAGEMENT
    • DATA PRIVACY
    • PROCESS IMPROVEMENT
    • CHANGE MANAGEMENT
    • TRAINING
  • ABOUT
    • ADVANTAGES
    • METHODOLOGIES
    • A + RESULTS
    • CLIENTS
    • SPEAKING/WRITING
    • MISSION-VISION-VALUES
    • TEAM
    • PRESS RELEASES
  • CONTACT
  • BLOG
  • PODCAST

Charles Schwab, Chase, Wells Fargo, and others Use New Voice IAM Biometrics Technology

6 years ago
abstractfwd1987
No Comments

Over the last few two years, many financial firms have introduced a new voice identity and access (IAM) management service which uses voice biometrics technology to identify you by your unique voice. This starts each customer interaction with effortless biometric authentication improving customer experience.

Fig. 1. Voice Biometric Authentication Graphic, Source: Si-Gal/Getty Images, 2020.

Charles Schwab describes it this way (2020):

  • Whether you want to use our automated phone service or speak with one of our financial professionals, our voice ID service is one of the fastest and most convenient ways to securely identify yourself over the phone.
  • We know that you have a lot of passwords and pins to remember. Voice ID helps reduce the hassle of answering security questions when we can verify you by the sound of your voice.
  • When you call us, you will simply be prompted to say the passphrase “At Schwab, my voice is my password” to be securely verified. No more personal questions. No more PINs.

According to leading voice technology vendor Nuance (2020):

  • Biometric authentication delivers simpler, stronger customer authentication.
  • It reduces the average handling time (AHT) by 37 seconds.
  • Just like your fingerprint, your voiceprint is uniquely yours.

To make this work, the technology stores a digital representation of your voice using a proprietary algorithm. This unique voiceprint is created from more than 100 different physical and behavioral characteristics such as pitch, accent, shape of your mouth and vocal tract as you speak with a customer service representative. Your voice ID only works with the system you provide your voice to, etc.

Using this service requires the collation of data to know that you are you. Melissa Looker of Fast Company describes how Chase does this as follows (2019):

  • But Chase isn’t just amassing data on its customers. It’s also collecting intel on known fraudsters for so-called “voice biometric blacklists,” which keep tabs on identity thieves and credit card scammers and prevent them from accessing bank information or requesting new credit cards. 
  • Of course, it’s not just JPMorgan Chase & Co. using the technology. According to the Associated Press, Wells Fargo, Barclays, and U.S. Bank all use some form of Voice ID (IAM). In 2017, Pindrop, a company that offers sound-based fraud detection tools to call centers, told Fast Company it worked with eight of the top 10 U.S. banks and two of the top 5 insurers to detect phone scams.

Although voice IAM is a good start, I think more research needs to be done to validate the long-term viability of this authentication. What if a fraudster has a recording of your voice, or can mimic your voice pattern with a computer? Also, a lot of people’s voices sound the same. According to a 2017 BBC report voice, biometric authentication was easily passed by a twin brother when they tested it, and the technology has improved little since then (Dan Simmons).

Previous Post
3 Key Points From “Unsecurity” By Evan Francen
Next Post
Watch Out for Coronavirus (COVID-19) Scams and Malware

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

The reCAPTCHA verification period has expired. Please reload the page.

Recent Posts

  • The Importance of the 3-2-1 Back-Up Method.
  • No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.
  • Seven Cyber-Tech Observations of 2022 and What it Means for 2023.
  • The Main Purpose of Cryptocurrency Mixer and/or Splitter Services is Fraud and Money Laundering.
  • Top 16 Ways SMBs Can Mitigate Cyber Risks and Threats.
X
LinkedIn

Recent Posts

  • The Importance of the 3-2-1 Back-Up Method.
  • No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.
  • Seven Cyber-Tech Observations of 2022 and What it Means for 2023.
  • The Main Purpose of Cryptocurrency Mixer and/or Splitter Services is Fraud and Money Laundering.
  • Top 16 Ways SMBs Can Mitigate Cyber Risks and Threats.

Recent Comments

  • Abstract Forward Partners with Ignyte on Abstract Forward Partners With Newer Cyber GRC Tool: Ignyte Assurance Platform
  • Abstract Forward Partners with Ignyte | Ignyte Assurance Platform on Abstract Forward Partners With Newer Cyber GRC Tool: Ignyte Assurance Platform
  • Michael Kirk Please Interview US for your new Prince movie “Prince: R U Listening”! | Economic, Technology, & Marketing Thought Leadership on Social Tech CEO Jimmy Chamberlin Rejoins Smashing Pumpkins
  • Michael Kirk Please Interview US for your new Prince movie “Prince: R U Listening”! | Economic, Technology, & Marketing Thought Leadership on Prince and Purple Rain 30 years later: Business and Music Innovation
  • brianfpennington on Demystifying 9 Common Types of Cyber Risk

Archives

  • November 2023
  • January 2023
  • June 2022
  • April 2022
  • January 2022
  • June 2021
  • December 2020
  • August 2020
  • March 2020
  • January 2020
  • August 2019
  • March 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • December 2017
  • November 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • July 2016
  • May 2016
  • March 2016
  • February 2016
  • August 2015
  • June 2015
  • February 2015
  • January 2015
  • December 2014
  • August 2014
  • May 2014
  • April 2014

Categories

  • 2016 election hack
  • 2016 tech review
  • 360 net lab
  • 80s music
  • Alternative music
  • Amazon
  • Android
  • apple
  • arlines hack
  • artificial intelligence
  • Billy Corgan
  • Bitcoin security
  • british airways breach
  • Business
  • business analysis
  • business continuity
  • Chinese hackers
  • cloud computing
  • CoinHive
  • Coronavirus malware
  • COVID-19 scams
  • crypto mixing
  • Crypto Money Laundering
  • crypto-jacking
  • currency
  • cyber insurance
  • Cyber Security
  • cyber security framework
  • Cyber-Espionage
  • Cybersecuity summit
  • data back up
  • data breach
  • Data Exfiltration Detection
  • data security
  • Denial of Service (DoS) Attacks
  • Direct x12
  • disinformation
  • drones
  • election security
  • equifax breach
  • esports security
  • EU Privacy
  • FDIC
  • federal reserve
  • GDPR
  • gdpr test british airways breach
  • google glass
  • Google Mandiant
  • grc
  • GroupOn
  • iam
  • Ignyte Assurance Platform
  • iphone
  • Jimmy Chamberlin
  • leadership vs. management
  • LinkedIn
  • Live Streaming
  • LiveOne
  • Lumia Phone
  • management consulting
  • Microsoft
  • microsoft azure
  • Microsoft Continuum
  • MikroTik Routers
  • MN Start-Up
  • mobile os
  • mobile web
  • NASA
  • navy cyber hack
  • net neutrality
  • network intrusion
  • OpenStack
  • PBS Frontline
  • personal aircraft
  • phone market share
  • Prince: R U Listening
  • project management
  • Project Sparta
  • Purple Rain
  • Rackspace
  • ransomware
  • ransomware removal
  • retail
  • risk management
  • Salesforce
  • self driving cars
  • small business
  • small business cyber security
  • Smashing Pumpkins
  • SME Infosec
  • Social Media
  • socrates
  • sony pictures
  • stalkerware
  • Stuxnet
  • target
  • Tech Year In Review
  • third party risk management
  • Unit 61398
  • vendor risk mgmt
  • video surveillance
  • Web App Attack
  • WEP vs WPA2
  • Windows 10

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

All rights reserved © 2018 to present. Abstract Forward Consulting, LLC. Privacy Policy | Terms of Service | Web Accessibility | Sitemap.