Auraya Mobilizes Voice Authentication with Amorvox for Android

armorvox-logoAustralian voice biometrics specialist Auraya now offers a version of core software designed specifically for on-device authentication. Called “ArmorVox for Android,” its purpose is to enable device manufacturers to integrate accurate, voice-based user authentication without reliance on applications or stored voiceprints that reside in the cloud or on enterprise servers.

According to company co-founder Clive Summerfield, this capability is accomplished by offering a “cut-down” version of its more robust AmorVox10 suite, which places emphasis on its flexibility and myriad of deployment options. With its ability to support both text-dependent or text-independent enrollment and authentication in multiple languages, AmorVox has been actively deployed in systems that support roughly 2 million individual customers and clients of government agencies, banks and healthcare providers, among others.

In order to fit on a mobile device, ArmorVox for Android, will operate in single-language, text-dependent mode for both enrollment and authentication. But it is important to note that the device-based version uses the same algorithms as the full-blown version, making the two engines interchangeable and enabling implementers to switch strategies or choose the strategy that meets specific business requirements or data privacy compliance requirements.

Smartphones are the preferred platform for digital commerce. We are witnessing their integration into the multi-channel engagement models of banks, retailers, airlines and many other verticals. Yet it is still early days in terms of incorporating voice-based authentication into any “mobile-first” customer engagement strategy. That’s why Auraya’s approach, which doesn’t care about the channel, mode or deployment model, should be of great interest to the marketplace. Flexibility is a necessity as we let end-users define their preferred methods for both authentication and personalization.



Categories: Intelligent Authentication, Articles

Tags: , , , ,