SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
TECHNOLOGY WHITEPAPER


                         Securing Citizen Self-Service for Government




AURAYA SYSTEMS
One Tara Boulevard | Nashua, New Hampshire 03062 | +1 603 123 7654 | twitter.com/armorvox | linkedin/in/armorvox
Securing Citizen Self-Service for Government

How cash-strapped government agencies can deliver secure self-services even
in economically challenging times.

The Problem: Government Needs to Deliver More Services with Less Budget

Government, law enforcement and intelligence agencies are bolstering their identity verification
methods in response to epidemic levels of security breaches, identity theft, password hacks and fraud.
Moreover, the problem is only going to get worse as economies struggle and citizens find themselves in
financial difficulty. At the same time, Governments are under pressure to deliver more services, more
effectively and more efficiently to their citizens, yet with reduced budgets and funding.


Increased Use of Citizen Self-Service Fraught with Risk
In this environment, Governments often look to increase use of citizen self-service, either delivered
through the Internet or via the telephone. But the traditional secure solutions, such as PINs,
passwords and the use of personal information questions to authenticate identity to enable secure self-
service is rapidly becoming completely inadequate. These measures are no longer sufficient to
maintain strong identity authentication needed to deliver effective and secure government services.


Apart from the inconvenience of remembering yet another set of PIN’s and passwords for a government
service, there is the high cost and inconvenience of resetting them when they are forgotten, stolen or
compromised. Further, simply knowing a PIN or password does not mean to say it is you. PINs and
passwords are regularly shared, stolen and misused. In addition, providing personal information to
authenticate identity in call centers and helps desks (often to reset forgotten passwords) is equally
fraught with danger. Firstly, knowing a name, address, telephone number and other information is no
guarantee that you are who you say you are.


Furthermore, in government call centers and help desks; there is the added security threat from agents
being exposing citizens’ personal information to staff. In this situation, governments often need to vet
and closely manage call center and help-desk staff, adding further cost to already stretched budgets.
Amid these challenges, government agencies are increasingly turning to voice biometrics as a
technology to provide strong but efficient citizen identity authentication. Voice biometrics, a technology

2
ARMORVOX – ImpostorMaps™
© 2012 Auraya Systems www.ArmorVox.com
that authenticates a caller from their voice characteristics, is increasingly being used in citizen facing
services to streamline call center services and as an enabler of secure self-service applications.
Voice, like a fingerprint, is unique to each person. This fact can be used in telephone and Internet
services to positively authenticate that a person “is, literally, who they say they are”. Typically, in a
telephone service, for example, a person quotes an account number (or other information) to the
system. The system uses speech recognition to recogniser the account number and voice biometrics to
confirm it is the account holder saying their account number (and not an imposter trying to break into
their account).

The Solution: Voice Biometric Solution Ensures “You Are Who You Say You Are”

This way the technology eliminates the need for citizens to have PINs or passwords to access secure
services or indeed provide personal information to a call center or help desk staff to prove they are who
they say they are!


Centerlink, for example (the Australian social security department), has had a voice biometric system
in operation since 2009. This system, which now has around 1 million registered users, enables
regular callers to authenticate their identity by simply saying their Centerlink number, name and the
answer to a secret question. The system analyses the voice of the caller to confirm they are the
account holder and their request can then be immediately processed, either by a call center agent, or
by the telephone self-service system. The system eliminates the need for callers to quote personal
information to Centerlink staff or the need for citizens to remember PINs and passwords for access to
self-service applications.


IRD, the New Zealand tax office, is also rolling out a voice biometric system configured to authenticate
upwards of 800,000 citizens to make accessing taxation services that much more convenient for tax
payers, whilst driving cost saving for the government agency. Whilst designed primarily to streamline
access to taxation services and eliminate the hassle of PINs and passwords, the system has the side
benefit of addressing the upsurge of taxation fraud, which has been on the increase as economic
conditions worsen.




3
ARMORVOX – ImpostorMaps™
© 2012 Auraya Systems www.ArmorVox.com
More Benefits: Additional Security Expands Citizen Self-Service Applications That Can Be
Offered

The additional security provided by the voice biometrics has enabled Government departments to roll-
out a number of high security self-services applications that could not otherwise be deployed. One
example of this is “change-of-address”, a high-value high-use application, especially amongst young
and often highly mobile demographic (students for example). But whilst, implementing change-of-
address as a self-service application is relatively straightforward, deploying is not. The problem here is
that many identity fraud cases start with changing a victim’s address. PINs and passwords just do not
provide the level of security necessary to deploy such an application and prevent identity take-overs.
But, as voice biometrics (like fingerprinting) provide a strong positive authentication of a citizen’s
identity, it now possible and practical to deploy such applications and streamline high use services.

Government Secure Self-Services Pave the Way for Civilian Applications
And it is not just in telephone services that voice biometrics is finding applications. Developers are
increasingly using voice biometrics as a replacement for PINs and passwords to not only strengthen
security as required in Government services, but enhance convenience and usability in mobile and
tablet applications. These new government applications promise a bright future, not just for cash
strapped Government departments to deliver more efficient services, but enabling them to deliver these
services more effectively and with enhanced security in economically challenging times.




4
ARMORVOX – ImpostorMaps™
© 2012 Auraya Systems www.ArmorVox.com
About the Author

               Dr. Clive Summerfield is Auraya Systems’ Founder and Chief Executive Officer.
               Clive is an internationally recognized authority on voice technology and holds numerous
               patents in Australia, USA and UK in radar processing, speech chip design and speech
               recognition and voice biometrics.


As a former Founder Deputy Director of the National Center for Biometric Studies (NCBS) at University
of Canberra, in 2005 Clive undertook at the time the world’s largest scientific analysis of the voice
biometric systems leading to the adoption of voice biometrics by for secure services. That experience
lead Clive in 2006 founding Auraya, a business exclusively focused on advanced voice biometric
technologies for enterprise and cloud based services. Visit ArmorVox.com for Clive Summerfield’s full
bio.


About Auraya Systems
Founded in 2006, Auraya Systems, the creators of ArmorVox™ Speaker Identity System is a global
leader in the delivery of advanced voice biometric technologies for security and identity management
applications in a wide range of markets including banks, government, and health services. Offices are
located near Boston USA, Canberra and Sydney Australia. For more information, please
visit www.armorvox.com.com.




5
ARMORVOX – ImpostorMaps™
© 2012 Auraya Systems www.ArmorVox.com

Mais conteúdo relacionado

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Destaque

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destaque (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Armor vox wp-securing-citizen-self-service-for-government

  • 1. TECHNOLOGY WHITEPAPER Securing Citizen Self-Service for Government AURAYA SYSTEMS One Tara Boulevard | Nashua, New Hampshire 03062 | +1 603 123 7654 | twitter.com/armorvox | linkedin/in/armorvox
  • 2. Securing Citizen Self-Service for Government How cash-strapped government agencies can deliver secure self-services even in economically challenging times. The Problem: Government Needs to Deliver More Services with Less Budget Government, law enforcement and intelligence agencies are bolstering their identity verification methods in response to epidemic levels of security breaches, identity theft, password hacks and fraud. Moreover, the problem is only going to get worse as economies struggle and citizens find themselves in financial difficulty. At the same time, Governments are under pressure to deliver more services, more effectively and more efficiently to their citizens, yet with reduced budgets and funding. Increased Use of Citizen Self-Service Fraught with Risk In this environment, Governments often look to increase use of citizen self-service, either delivered through the Internet or via the telephone. But the traditional secure solutions, such as PINs, passwords and the use of personal information questions to authenticate identity to enable secure self- service is rapidly becoming completely inadequate. These measures are no longer sufficient to maintain strong identity authentication needed to deliver effective and secure government services. Apart from the inconvenience of remembering yet another set of PIN’s and passwords for a government service, there is the high cost and inconvenience of resetting them when they are forgotten, stolen or compromised. Further, simply knowing a PIN or password does not mean to say it is you. PINs and passwords are regularly shared, stolen and misused. In addition, providing personal information to authenticate identity in call centers and helps desks (often to reset forgotten passwords) is equally fraught with danger. Firstly, knowing a name, address, telephone number and other information is no guarantee that you are who you say you are. Furthermore, in government call centers and help desks; there is the added security threat from agents being exposing citizens’ personal information to staff. In this situation, governments often need to vet and closely manage call center and help-desk staff, adding further cost to already stretched budgets. Amid these challenges, government agencies are increasingly turning to voice biometrics as a technology to provide strong but efficient citizen identity authentication. Voice biometrics, a technology 2 ARMORVOX – ImpostorMaps™ © 2012 Auraya Systems www.ArmorVox.com
  • 3. that authenticates a caller from their voice characteristics, is increasingly being used in citizen facing services to streamline call center services and as an enabler of secure self-service applications. Voice, like a fingerprint, is unique to each person. This fact can be used in telephone and Internet services to positively authenticate that a person “is, literally, who they say they are”. Typically, in a telephone service, for example, a person quotes an account number (or other information) to the system. The system uses speech recognition to recogniser the account number and voice biometrics to confirm it is the account holder saying their account number (and not an imposter trying to break into their account). The Solution: Voice Biometric Solution Ensures “You Are Who You Say You Are” This way the technology eliminates the need for citizens to have PINs or passwords to access secure services or indeed provide personal information to a call center or help desk staff to prove they are who they say they are! Centerlink, for example (the Australian social security department), has had a voice biometric system in operation since 2009. This system, which now has around 1 million registered users, enables regular callers to authenticate their identity by simply saying their Centerlink number, name and the answer to a secret question. The system analyses the voice of the caller to confirm they are the account holder and their request can then be immediately processed, either by a call center agent, or by the telephone self-service system. The system eliminates the need for callers to quote personal information to Centerlink staff or the need for citizens to remember PINs and passwords for access to self-service applications. IRD, the New Zealand tax office, is also rolling out a voice biometric system configured to authenticate upwards of 800,000 citizens to make accessing taxation services that much more convenient for tax payers, whilst driving cost saving for the government agency. Whilst designed primarily to streamline access to taxation services and eliminate the hassle of PINs and passwords, the system has the side benefit of addressing the upsurge of taxation fraud, which has been on the increase as economic conditions worsen. 3 ARMORVOX – ImpostorMaps™ © 2012 Auraya Systems www.ArmorVox.com
  • 4. More Benefits: Additional Security Expands Citizen Self-Service Applications That Can Be Offered The additional security provided by the voice biometrics has enabled Government departments to roll- out a number of high security self-services applications that could not otherwise be deployed. One example of this is “change-of-address”, a high-value high-use application, especially amongst young and often highly mobile demographic (students for example). But whilst, implementing change-of- address as a self-service application is relatively straightforward, deploying is not. The problem here is that many identity fraud cases start with changing a victim’s address. PINs and passwords just do not provide the level of security necessary to deploy such an application and prevent identity take-overs. But, as voice biometrics (like fingerprinting) provide a strong positive authentication of a citizen’s identity, it now possible and practical to deploy such applications and streamline high use services. Government Secure Self-Services Pave the Way for Civilian Applications And it is not just in telephone services that voice biometrics is finding applications. Developers are increasingly using voice biometrics as a replacement for PINs and passwords to not only strengthen security as required in Government services, but enhance convenience and usability in mobile and tablet applications. These new government applications promise a bright future, not just for cash strapped Government departments to deliver more efficient services, but enabling them to deliver these services more effectively and with enhanced security in economically challenging times. 4 ARMORVOX – ImpostorMaps™ © 2012 Auraya Systems www.ArmorVox.com
  • 5. About the Author Dr. Clive Summerfield is Auraya Systems’ Founder and Chief Executive Officer. Clive is an internationally recognized authority on voice technology and holds numerous patents in Australia, USA and UK in radar processing, speech chip design and speech recognition and voice biometrics. As a former Founder Deputy Director of the National Center for Biometric Studies (NCBS) at University of Canberra, in 2005 Clive undertook at the time the world’s largest scientific analysis of the voice biometric systems leading to the adoption of voice biometrics by for secure services. That experience lead Clive in 2006 founding Auraya, a business exclusively focused on advanced voice biometric technologies for enterprise and cloud based services. Visit ArmorVox.com for Clive Summerfield’s full bio. About Auraya Systems Founded in 2006, Auraya Systems, the creators of ArmorVox™ Speaker Identity System is a global leader in the delivery of advanced voice biometric technologies for security and identity management applications in a wide range of markets including banks, government, and health services. Offices are located near Boston USA, Canberra and Sydney Australia. For more information, please visit www.armorvox.com.com. 5 ARMORVOX – ImpostorMaps™ © 2012 Auraya Systems www.ArmorVox.com