Blog Tags: agnitio voice id
Posted: Friday,September 19,2014
When Nike launched its Nike+ FuelBand in 2012 there were few, if any, other wearable fitness wristbands available, and at the time appeared to be just another nifty tool to track the progress of our exercise regimens. Not so anymore with mobile device giant Apple jumping into the wearable technology arena this week with its Watch. Apple joins a rapidly growing market that includes Fitbit, Jawbone, Misfit Wearables and even Ralph Lauren who just debuted its new Polo Tech shirt on opening day of the US Open that merges biometrics into active lifestyle apparel. Many of these start-ups are beginning to receive some serious funding from the VC community. According to Cromwell Schubarth, Senior Technology Reporter at Silicon Valley Business Journal, in his September 9th article, Wearables are hot: Here's who invested and who got the most VC funding, “database research firm CB Insights issued a report that said $1.4 billion in ventu...
Posted: Wednesday,July 23,2014
If you’ve seen the movie, you know what I am talking about. Sugar Man was a completely unknown American singer (Sixto Rodriguez) that became unbelievably popular in South Africa. He remained fairly unknown in his own country until the Academy Award-winning documentary was released a few years ago.
The “Sugar Man” equivalent in the Voice Biometrics world is the South African Social Security Administration (SASSA) project deployed by Net1 and AGNITIO. More than 7 million citizens have already been enrolled and almost 400K verifications are done per month. But very little is known about it outside of South Africa.
In February 2014 SASSA announced the launch of a Proof of Life biometric certification for all pensioners. A clever combination of fingerprints and voiceprin...
Posted: Friday,June 06,2014
As most people know by now, Apple announced at their WWDC this week that they are opening Touch ID APIs to 3rd party developers. This is a great next step for the biometrics industry, as it introduces a means to use Touch ID for mobile payments and other transactions. The implications, however, are greatly understated.
Apple’s model for protecting a user’s fingerprint is that the user’s credentials are kept securely on the device and never shared over the network. This is very consistent with the model advocated by the FIDO Alliance, and this decision now opens up the possibility for IOS devices to be used as part of FIDO deployments. While the devil is in the details (we need to learn more about the specifics of the new Touch ID APIs), it seems feasible for a FIDO client to integrate with the Touch ID sensor using the new APIs.
But what does it have to do with other biometric m...
Posted: Friday,May 23,2014
Voice Biometrics Conference Focuses on Stronger Security via Voice ID
Showcases Use of Multiple Factors for Fraud Detection and Authentication
The demand for stronger mobile device security is driving the creation of more multi-factor authentication solutions to hit the market, and AGNITIO Voice ID is positioned to be one of those key factors. Secure Voice ID was a hot topic at the Voice Biometrics Conference last week in San Francisco, and how to combat fraudsters was the predominant theme concerning everyone from consumers to businesses to government agencies.
Multi-factor authentication provides much stronger security by combining two or more factors, and it can provide more convenience to the user by giving them a choice to use the easiest...
Posted: Friday,April 25,2014
The latest fingerprint spoofing incident, demonstrated by researchers from Germany-based Security Research Labs on the Samsung Galaxy S5, highlights the prevailing confusion over the differences between spoofing and hacking a device and the subsequent risks they present to users and service providers. Both Apple iPhone 5S and Samsung Galaxy S5 fingerprint sensor attacks were spoofs. The devices were defeated by imitating a single fingerprint. This is very different from a hack, which could compromise a high volume of users at once.
In both the fingerprint spoofing cases, neither the device nor the user credentials were compromised. This would have to be accomplished by a hack, which requires a break-in of a device and subsequent theft of the biometric template and related data, or by the depositing of malware. So how do we maintain the security of personal, biometric data?
In a FIDO authentication mod...