Intelligent Authentication: An Origin Story

A picture of a storybook
362
Filed under - Guest Blogs,

Dan Miller of Opus Research explores how we arrived at ‘Intelligent Authentication’ and where biometrics plays a role in providing secure, convenient authentication at scale.

At the turn of the century, Intelligent Authentication (IAuth) emerged from the same primordial goo that spawned every initiative to “Kill the Password”.

The value proposition was simple: “People should not have to remember a PIN or answer a series of questions in order to carry out business over the telephone.”

Spoken words were a natural for business or queries initiated over the phone, including the rapidly growing population of mobile customers and citizens.

The technologies to support what was pretty much limited to “text-dependent caller authentication” were so novel that a telco subsidiary that was responsible for developing a citizen authentication system for the tax authority in Australia called on Opus Research to investigate and describe the global market potential for voice authentication.

This led to some of the first spade work to discover solutions and use cases in other countries and in “the usual suspects” of industries, meaning banking, telecommunications and healthcare.

Our work gave rise to early optimism based on business cases that showed voice authentication shaved as much as a minute in the average handle time (AHT) for frequent calls.

This had the side benefit of improving customer experience while reducing the potential for the fraud loss that occurs when an imposter succeeds in gaining access to a personal information and financial assets. Improved customer experience was a further plus.

In the ensuing few years, we learned there were more barriers than we expected. Enrolment proved to be a major barrier.

Each caller needed to be convinced to register his or her voiceprint by repeating the chosen phrase three times. In the absence of a financial incentive (like accelerating a refund) or an “opt-out” approach, enrolment rates could be as low as 30%; hardly ubiquitous deployment.

Another concern at the time was accuracy. Remember, this was more than a decade before the world went wild over applications that used deep neural networks and artificial intelligence to detect patterns that affirmed an individual’s identity or anomalies that exposed imposters.

False accept rates in the 2% range matched with false reject rates in roughly the same range were fairly routine. The former was of concern to security departments that said they wanted “zero false accepts” while the latter referred to those horrible instances where a legitimate customer is rejected from accomplishing a task for no apparent reason.

These shortcomings were overcome by technological advances, improved packaging and integration, and proven use cases in the selected vertical markets.

Single-Channel Success: Intelligent Authentication’s Adolescence

Fast-forward to 2016. Over 200 million individuals had enrolled their voiceprints for use in IVR or contact centre-based customer authentication. In the introduction to our “Voice Biometrics Census” we asserted that the industry was “on the road to one billion enrolments” with the projected number of “protected users” as 600 million in 2020.

As for the mix of industries, they went pretty much as expected (as illustrated below). Large banks and brokerages eclipsed government implementations, with “Finance” representing over one-third of the companies deploying voice biometrics in their contact centres, and government agencies accounting for a little fewer than one-quarter. Telecom and healthcare were roughly tied with 13% and 12%, respectively.

The banks, healthcare companies, and telcos that implemented voice authentication in their contact centres share the characteristics of early adopters. Most were large companies with budgets allocated to “innovation” and “digital transformation”. The government agencies added cost-consciousness and compliance concerns.

All prospective deployers of voice biometrics-based solutions benefit from their input and feedback to solution providers.

Over the next five years, these single-factor, contact centre-based solutions served as the raw material for more formidable offerings that integrated multiple biometrics (finger, face, behavioural), accommodated multiple channels (web, messaging, video) and employed “artificial intelligence” for risk awareness and policy orchestration.

If there’s a single element that will shape the future of secure conversational commerce in the coming years, it is the addition of “fourth factor” for Intelligent Authentication. Common wisdom asserts that only three factors need to be employed for strong authentication of an asserted identity. As illustrated above, they are:

  • Possession: “Something you have” – like an ID card or, in the online world, a credential or smartphone that can illustrate a one-time password.
  • Knowledge: “Something you know” – primarily a PIN, password or answers to a challenge question.
  • Inherence: “Something you are” – which used to refer to a narrow range of biometrics (eye, fingerprint, voiceprint) but now adds behavioural factors (gait, breathing patterns).

Add to these basics a measure of “continuity” or a running tally of the probability that the person who was just on a retailer’s website using your phone in your home and who then initiates a phone call from a link in a mobile browser is, indeed, you. It calls for solutions with new key attributes. A quick checklist includes:

Real-time: Support rapid identification and authentication of a customer

  • Risk-Aware: Assign the proper level of security based on the risk associated with an individual or action
  • Multifactor: Achieve high levels of accuracy
  • Zero Effort: Enrol and authenticate individuals without requiring action on their part

That is the starting point. It took twenty years or so to get here but remember: “That journey of a million miles starts with a single step.” Well, chances are you needed a ride-share to get to the event’s starting line.

Author: Robyn Coppell

Published On: 14th Jul 2020 - Last modified: 16th Jul 2020
Read more about - Guest Blogs,

Follow Us on LinkedIn

Recommended Articles

Face detection AI technology authentication
It's Time to Rethink Customer Authentication
A picture of security icons and a laptop
Authentication Is Every Company’s First Impression, Unfortunately
A picture showing how multi-factor authentication works
What Is Multi-Factor Authentication?
A photo of the leadership concept
Nuance Named a Leader in Authentication and Fraud Prevention