FAQ Category: Uncategorized FAQ

One Single Largest Drawback Against Voice Authentication System?

Of course, the system results vary due to noise/network disturbances. Too much noise is the only enemy. Users must be in a less noisy environment to allow successful enrollment and authentication of a human voice. We recommend using other factors in addition to voiceprints if it is a noisy work environment

What are Some of the Arguments Against Iris/ Fingerprint/facial Recognition Systems?

These are very well established biometrics options. They offer good results, but they need specific readers/ scanners at all access points. Most of the access equipment wears out in a few months, to reduce the effectiveness score. Dust, moisture, wear-tear, low maintenance affects the results of a scan. Voice biometrics will work through any mobile/landline…

What is Active and Passive Voice Authentication?

– Active authentication is where the customer is aware of the process, voluntarily participates in the authentication and provides time for the same. This is before he is connected to a live agent/contact center axis – Passive authentication is where the customer has contacted the service help desk, is describing his/her problem and the biometric…

What are Some of the Guiding Standards for Voice Authentication?

National Institute of Standards and Technology (NIST) Special Publication 800-63-2 discusses various forms of two-factor authentication and guides on using them in business processes requiring different levels of assurance. We adhere to all the norms and comply with We adhere to all the norms and comply with NIST standards. Customers can seek 3rd party validation…

Integration Touch points with CTI/IVRS

KSV has published web services for integration touch-points with other 3rd party apps like CRM, IVRS and ERP. During the deployment, voice-stream [min 9 Sec string] of users is routed from the IVRS port to the cache of CTI, later to the biometric server. This is an established best practice. Media gateway through the SIP…

Can a Channel Partner Learn the Product Implementation?

Do you want to deliver the project fully? Yes, that can be organized. Partners can focus on selling the product initially in a chosen territory. If they can invest in resources, KSV team will train them on best practices and involve in one project implementation, working alongside the KSV implementation team. Learn, get certified and…

Details on GMM Algorithm used in Voice Authentication

Gaussian mixture models are a probabilistic model for representing normally distributed subpopulations within an overall population. Mixture models in general don’t require knowing which subpopulation a data point belongs to, allowing the model to learn the subpopulations automatically. Since subpopulation assignment is not known, this constitutes a form of unsupervised learning. For example, in modeling…