“…like its facial recognition technology, Knomi’s voice recognition is supported with anti-spoofing algorithms designed to ensure that a bona fide human being is at the other end of an authentication session, and that the biometrics being used are not synthetic presentation attacks that only mimic legitimate user credentials.”
Aware, Inc. has added a whole other modality to its Knomi biometric authentication solution. In addition to facial recognition, the platform now supports voice recognition as well.
The modalities can be used independently, but Knomi 2.6 also lets users combine them for a highly secure, multimodal form of biometric authentication. And like its facial recognition technology, Knomi’s voice recognition is supported with anti-spoofing algorithms designed to ensure that a bona fide human being is at the other end of an authentication session, and that the biometrics being used are not synthetic presentation attacks that only mimic legitimate user credentials.
“Using face and voice liveness detection running on the user’s device, Knomi 2.6 raises the bar on protecting user privacy and security against presentation attacks, with the convenience of taking a selfie and recording a voice memo,” explained Aware’s Chief Technology Officer, Mohamed Lazzouni, in a statement announcing the upgrade.
“An advanced architecture that uses minimal on device software while retaining key processing on the server helps both users and administrators take full advantage of the technology while keeping the management overhead of the platform low, easy to maintain, and highly adaptable to customer needs,” he added.
The upgraded platform arrives after Aware’s announcement in February that multiple financial services organizations in Latin America had integrated Knomi authentication into their mobile banking apps. It also arrives amid growing awareness about the dangers of presentation attacks (commonly known as spoofing), and may garner some particular interest for its efforts to address those threats via liveness detection algorithms.
–
May 20, 2020 – by Alex Perala
Follow Us