T3 logo

T3 Viometrics

Datasheet »

Viometrics

The Need

The phone is one of the ways your customers and internal users most frequently access critical information, and the need to protect this private data is a challenge organizations increasingly face. Managing security breaches has become a source of concern in recent years, leading organizations to continually explore new ways of making business-critical applications ever more secure.

The Solution

No longer a technology of the future, voice biometrics is increasingly used by organizations that provide access to sensitive systems. Everyone's voice is unique, just like a fingerprint. T3 Viometrics enables organizations to use a convenient, non-intrusive, and cutting-edge technology to authenticate a person's identity based on their vocal pattern. With T3 Viometrics you are better able to protect yourself and your customers by reducing and managing the risks involved with providing remote services.

How does it work?

T3 Viometrics functions as a password replacement tool and works in two steps: registration and authentication. During the registration phase, the system is trained to recognize the unique characteristics of a person's voice. The user simply repeats the same sentence a few times, which typically takes less than a minute to complete. This reference voiceprint is then used in the future to authenticate the user and allow access to private data or services.

Benefits

  • Reduce expenses associated with administering password policies and manual verification methods using live agent support.
  • Users no longer have to remember passwords/pins and the risk of stolen or shared passwords is eliminated.
  • Remote cell phone users have the convenience of hands-free access to important information and services.
  • T3 Viometrics does not require special hardware or training. Users simply speak into their regular phone, cell phone, or VoIP end point, to activate voice verification.
  • T3 Viometrics is fully integrated with T3main, providing you with a flexible telephony solution that meets your needs now, and continues to grow with your business.

Features

  • 4As of business risk management: Authentication, Authorization, Administration, and Audit.
  • Patented and proven technology: T3 Viometrics demonstrates a significantly lower rate of both false rejection (wrongly rejected) and the highly critical false acceptance (wrongly accepted) than other voice biometric systems.
  • Two levels of security: In the Optimally Secured Solution, the user speaks a single sentence during the authorization process. The Extremely Secured Solution adds an additional layer of security by asking the user to also repeat random sets of numbers.
  • Reporting: T3 Viometrics allows administrators to report on usage, as well receive real time alerts on potential security breeches.
  • Scheduling: Administrators can set time/date parameters for access of a system.
  • Physical access & security: T3 Viometrics is more than just data access. Phone lines can also be used to secure physical spaces.
  • Accent independent.

Applications

Secure Voice Mail access

A user's identity is authenticated through voice biometrics, rather than via password entry, providing secure access to personal voicemail boxes.

Secure access to account information

In call center or IVR scenarios, financial institutions, health clinics, and any other organizations that provide highly personal information or services to clients benefit from voice biometrics.

Physical access control and security

Phone lines often control access to physical spaces such as offices, or manage security in home or dorm situations. This method poses problems: someone must be available to buzz an individual in, or passwords may be forgotten in moments of stress.

T3 Viometrics can authenticate specific individuals who should be provided access to a physical space, and even the specific times they should be granted access, for example, a cleaning staff that should only enter the building after business hours. In a security situation, authentication can be managed simply by voice: consider a home security company who needs to authenticate a home owner by phone when a false alarm is triggered.

« T3main
« T3 Catalog
« Product Catalog