Your word is your log-in, literally

Your word is your log-in, literally

Summary: Voice recognition technology has yet to deliver anything like the "Enhance!" scene from the film Blade Runner. But voice biometric authentication does work — and Australia is a world leader.

SHARE:

Voice recognition technology has yet to deliver anything like the "Enhance!" scene from the film Blade Runner. But voice biometric authentication does work — and Australia is a world leader.

Centrelink's call centre, which handles 33 million calls a year, has been using voice biometrics since 2005 to authenticate more than 95 per cent of callers.

The Australian company Auraya was founded in 2006 to develop that technology further, hiring the man behind it, Dr Clive Summerfield, as its chief executive. Auraya's technology is now used by some Australian banks and has been sold in the US, New Zealand, Europe and the Middle East.

In January this year, Auraya launched the ArmorVox Speaker Identity System, which wraps up the company's improved technology into software for Windows and Linux that can process 50,000 verifications per hour on an eight-core server.

ArmorVox can be delivered from customer premises equipment or the cloud, or as a hosted authentication service, and can be integrated into existing applications through a web services API.

In this week's Patch Monday podcast, Summerfield explains some of Auraya's patented technology and other tricks of the trade, and how voice biometrics can be used for security applications beyond authentication and even to support surveillance.

To leave an audio comment on the program, Skype to stilgherrian, or phone (02) 8011 3733.

Running time: 34 minutes, 23 seconds

Topics: Security, Privacy, Unified Comms

About

Stilgherrian is a freelance journalist, commentator and podcaster interested in big-picture internet issues, especially security, cybercrime and hoovering up bulldust.

He studied computing science and linguistics before a wide-ranging media career and a stint at running an IT business. He can write iptables firewall rules, set a rabbit trap, clear a jam in an IBM model 026 card punch and mix a mean whiskey sour.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

3 comments
Log in or register to join the discussion
  • Most of the Stories leads the same ;)
    celena-103a6
    • Maybe it's just lack of sleep here, celene, but I don't actually understand what you're saying.
      stilgherrian
  • Yup!! Really.
    Manasy