SlideShare uma empresa Scribd logo
1 de 21
Biometrics: Voice
Recognition

Justin Eng
Coen150
Outline of Presentation
Introduction to voice biometrics
The history of voice recognition and its
milestones
How voice biometric works
Benefits and problems that voice
recognition encounters
Current applications and the future of
this technology
Introduction to Voice
Biometrics
-Voice biometrics is a growing technology in
computer security
-It uses a measurable, physical characteristic, or
personal behavioral trait to verify and authenticate
an individual
-It uses what you are as a way to identify yourself
-Compares two (2) samples of data and verifies
if they match
Speech Recognition
vs
Speaker Verification
-The most important
difference is that:
-Speech recognition
identifies what you are
saying
-Speaker verification
verifies that you are who
you say you are
Speech Recognition
A speech recognition
system is designed to
assist the speaker in
accomplishing what that
person wants to do
Speaker Verification
However, if an
application needs to
know who is
speaking, then it must
authenticate the
person and verify that
he or she is in fact that
person
Combining Speech
recognition and speaker
verification
Speech recognition
and speaker
verification systems
are combined to
create voice
biometric systems
History of voice
recognition

-Radio Rex who was created by the
Elmwood Button Company in 1922

-During the 1940’s and 1950’s the
United States Department of Defense
and MIT became the largest
contributors to the speech recognition
field
-In the 1960’s and 1970’s, the
technology can be attributed to the
educational institutions
-Today, voice recognition systems are
important
Voices are Unique
-Voice recognition systems must be able to
distinguish between various people’s voices
-Frequency and Intensity
-Training our body’s nasal and oral passages, as
well as our lips, teeth, tongue, and jaw muscles
How Voice Biometrics
Work
-Voices are nearly
impossible to
recreate
-Digitizing a
person's speech to
produce a “voice
print”
Capturing a Voice
Sample
Within these smaller
segments they are
“captured” in a digital
form and plotted on a
spectrum.
Verification Process
The voiceprint is then
stored as a table of
numbers, where the
presence of each
dominant frequency in
each segment is
expressed as a binary
number. Since all table
entries are either a 1 or
0, each column can be
read bottom to top as a
long binary code.
Trying to Fool Voice
Recognition Systems
-Voice biometrics should be able to tell the differences
between real and fake users
-One of the concerns about voice recognition systems is
the threat of recording a person’s voice
-Anti-spoofing is the key!
-Challenge Response Mechanism
Benefits of Voice
Recognition Systems
-Another layer of security
for computer systems
-Produces a more efficient
and cost effective
environment
-Saves costs: Employee’s
do not need ID access cards
-Saves time for companies
Problems with Voice
Recognition
Biometrics over one’s
-Human voices do not necessarily remain the same
lifetime
-Uses of microphones
-Environmental noise
-Poor phone, or cellular connections
-Vocal variations: accents
-Telephone devices: voice samples are converted and transferred
from an analog format to a digital format for processing
Current Applications
of Voice Biometrics

-Security system for physical access entry
into a building
-Corrections industries: inmates on parole

-Telephone companies use voice-enabling
services
-Voice verification in telephone banking:
ATM machines
-Voice verification in credit cards
Voice Recognition on
the Rise
-Voice recognition applications are slowly growing
-Vocent Solutions, Inc. suggested that:
(1) Telephones are the primary means by which consumers will
conduct financial transactions and access financial account information
(2) Consumers know about the problem of identity theft
(3) Consumers feel that PIN Numbers and passwords are not secure
enough
(4) A strong amount of concern exists when communicating
confidential information over the telephone
(5) As a result of these security concerns and fears, consumers would
be willing to participate in a voice recognition system, and also feel that
it could potentially reduce fraud as well as identity theft
Statistics
More Statistics
-Voice recognition is
on the rise as it has
slowly been
improving on its
accuracy rates and
meeting users’ needs
for applications
Conclusion
The main purpose and benefit of a voice recognition system
is the amount of security that it provides. Although voice
recognition is mostly secure, it still has flaws. To aid its
acceptance, this biometric system can be combined with
more traditional security features to provide an additional
layer of security. These can include using other biometrics,
or security mechanisms such as RSA, PINs or a combination
of several different mechanisms. Through further
development, voice recognition can be one of the most
successful and largest applications of biometrics in the future
to come.
Questions?

Mais conteúdo relacionado

Mais procurados

Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 

Mais procurados (20)

Forensic audio
Forensic audioForensic audio
Forensic audio
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics
BiometricsBiometrics
Biometrics
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognition
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 

Destaque

Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
Piyush Mittal
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEM
Nikhil Ravi
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Agrani Rastogi
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
laknatha
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
human computer interface
human computer interfacehuman computer interface
human computer interface
Santosh Kumar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 
Voice Recognition
Voice RecognitionVoice Recognition
Voice Recognition
Amrita More
 

Destaque (20)

Voice Recognition Car
Voice Recognition CarVoice Recognition Car
Voice Recognition Car
 
Voice controlled Robot
Voice controlled RobotVoice controlled Robot
Voice controlled Robot
 
Voice controlled spy robot for security system
Voice controlled spy robot for security systemVoice controlled spy robot for security system
Voice controlled spy robot for security system
 
biometrics
biometricsbiometrics
biometrics
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEM
 
Voice Recognition
Voice RecognitionVoice Recognition
Voice Recognition
 
「大數據」時代的「小問題」-- 以數據分析的手法處理虛擬歌手聲源參數
「大數據」時代的「小問題」-- 以數據分析的手法處理虛擬歌手聲源參數「大數據」時代的「小問題」-- 以數據分析的手法處理虛擬歌手聲源參數
「大數據」時代的「小問題」-- 以數據分析的手法處理虛擬歌手聲源參數
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
biometrics
biometricsbiometrics
biometrics
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
(Deep) Neural Networks在 NLP 和 Text Mining 总结
(Deep) Neural Networks在 NLP 和 Text Mining 总结(Deep) Neural Networks在 NLP 和 Text Mining 总结
(Deep) Neural Networks在 NLP 和 Text Mining 总结
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Voice Recognition
Voice RecognitionVoice Recognition
Voice Recognition
 
Voice recognition security systems
Voice recognition security systemsVoice recognition security systems
Voice recognition security systems
 

Semelhante a Voice recognition

Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
Anshuli Mittal
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
Anshuli Mittal
 
Speaker Recognition System
Speaker  Recognition SystemSpeaker  Recognition System
Speaker Recognition System
Kiran Conquer
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEM
Nikhil Ravi
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
danas19
 

Semelhante a Voice recognition (20)

Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Story Voice authentication systems .pdf
Story Voice authentication systems .pdfStory Voice authentication systems .pdf
Story Voice authentication systems .pdf
 
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
 
Voice biometric authentication
Voice biometric authenticationVoice biometric authentication
Voice biometric authentication
 
Voice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authenticationVoice Biometrics – The way forward in remote user authentication
Voice Biometrics – The way forward in remote user authentication
 
Speaker Recognition System
Speaker  Recognition SystemSpeaker  Recognition System
Speaker Recognition System
 
Pattern recognition voice biometrics
Pattern recognition voice biometricsPattern recognition voice biometrics
Pattern recognition voice biometrics
 
How to build a voice biometric system.pdf
How to build a voice biometric system.pdfHow to build a voice biometric system.pdf
How to build a voice biometric system.pdf
 
Voice Recognition information hiding.ppt
Voice Recognition information hiding.pptVoice Recognition information hiding.ppt
Voice Recognition information hiding.ppt
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEM
 
The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognition
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Voice-based Login System
Voice-based Login SystemVoice-based Login System
Voice-based Login System
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
The Benefits and Drawbacks of Using Voice.pdf
The Benefits and Drawbacks of Using Voice.pdfThe Benefits and Drawbacks of Using Voice.pdf
The Benefits and Drawbacks of Using Voice.pdf
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 

Mais de Kenneth Carnesi, JD (7)

Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Linkedinpotionoct13 131031130548-phpapp01
Linkedinpotionoct13 131031130548-phpapp01Linkedinpotionoct13 131031130548-phpapp01
Linkedinpotionoct13 131031130548-phpapp01
 
Thegivingtree 110602182730-phpapp01
Thegivingtree 110602182730-phpapp01Thegivingtree 110602182730-phpapp01
Thegivingtree 110602182730-phpapp01
 
Monkeetech let me know
Monkeetech let me knowMonkeetech let me know
Monkeetech let me know
 
Monkeetech security swipe 1.3
Monkeetech security swipe 1.3Monkeetech security swipe 1.3
Monkeetech security swipe 1.3
 
Payfone (1)
Payfone (1)Payfone (1)
Payfone (1)
 
Hoyos deck
Hoyos deckHoyos deck
Hoyos deck
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Voice recognition

  • 2. Outline of Presentation Introduction to voice biometrics The history of voice recognition and its milestones How voice biometric works Benefits and problems that voice recognition encounters Current applications and the future of this technology
  • 3. Introduction to Voice Biometrics -Voice biometrics is a growing technology in computer security -It uses a measurable, physical characteristic, or personal behavioral trait to verify and authenticate an individual -It uses what you are as a way to identify yourself -Compares two (2) samples of data and verifies if they match
  • 4. Speech Recognition vs Speaker Verification -The most important difference is that: -Speech recognition identifies what you are saying -Speaker verification verifies that you are who you say you are
  • 5. Speech Recognition A speech recognition system is designed to assist the speaker in accomplishing what that person wants to do
  • 6. Speaker Verification However, if an application needs to know who is speaking, then it must authenticate the person and verify that he or she is in fact that person
  • 7. Combining Speech recognition and speaker verification Speech recognition and speaker verification systems are combined to create voice biometric systems
  • 8. History of voice recognition -Radio Rex who was created by the Elmwood Button Company in 1922 -During the 1940’s and 1950’s the United States Department of Defense and MIT became the largest contributors to the speech recognition field -In the 1960’s and 1970’s, the technology can be attributed to the educational institutions -Today, voice recognition systems are important
  • 9. Voices are Unique -Voice recognition systems must be able to distinguish between various people’s voices -Frequency and Intensity -Training our body’s nasal and oral passages, as well as our lips, teeth, tongue, and jaw muscles
  • 10. How Voice Biometrics Work -Voices are nearly impossible to recreate -Digitizing a person's speech to produce a “voice print”
  • 11. Capturing a Voice Sample Within these smaller segments they are “captured” in a digital form and plotted on a spectrum.
  • 12. Verification Process The voiceprint is then stored as a table of numbers, where the presence of each dominant frequency in each segment is expressed as a binary number. Since all table entries are either a 1 or 0, each column can be read bottom to top as a long binary code.
  • 13. Trying to Fool Voice Recognition Systems -Voice biometrics should be able to tell the differences between real and fake users -One of the concerns about voice recognition systems is the threat of recording a person’s voice -Anti-spoofing is the key! -Challenge Response Mechanism
  • 14. Benefits of Voice Recognition Systems -Another layer of security for computer systems -Produces a more efficient and cost effective environment -Saves costs: Employee’s do not need ID access cards -Saves time for companies
  • 15. Problems with Voice Recognition Biometrics over one’s -Human voices do not necessarily remain the same lifetime -Uses of microphones -Environmental noise -Poor phone, or cellular connections -Vocal variations: accents -Telephone devices: voice samples are converted and transferred from an analog format to a digital format for processing
  • 16. Current Applications of Voice Biometrics -Security system for physical access entry into a building -Corrections industries: inmates on parole -Telephone companies use voice-enabling services -Voice verification in telephone banking: ATM machines -Voice verification in credit cards
  • 17. Voice Recognition on the Rise -Voice recognition applications are slowly growing -Vocent Solutions, Inc. suggested that: (1) Telephones are the primary means by which consumers will conduct financial transactions and access financial account information (2) Consumers know about the problem of identity theft (3) Consumers feel that PIN Numbers and passwords are not secure enough (4) A strong amount of concern exists when communicating confidential information over the telephone (5) As a result of these security concerns and fears, consumers would be willing to participate in a voice recognition system, and also feel that it could potentially reduce fraud as well as identity theft
  • 19. More Statistics -Voice recognition is on the rise as it has slowly been improving on its accuracy rates and meeting users’ needs for applications
  • 20. Conclusion The main purpose and benefit of a voice recognition system is the amount of security that it provides. Although voice recognition is mostly secure, it still has flaws. To aid its acceptance, this biometric system can be combined with more traditional security features to provide an additional layer of security. These can include using other biometrics, or security mechanisms such as RSA, PINs or a combination of several different mechanisms. Through further development, voice recognition can be one of the most successful and largest applications of biometrics in the future to come.

Notas do Editor

  1. In this biometric system a device captures a sample from a user and then compare it against the data contained in its database. The system then decides how well the two match and indicates whether or not an identification or verification has been achieved