Product Watch: Voice Biometrics Service Adds Third Factor Of AuthenticationProduct Watch: Voice Biometrics Service Adds Third Factor Of Authentication
PhoneFactor matches user's voice with 'voiceprint' when he logs in
January 15, 2010
![Dark Reading Dark Reading logo in a gray background | Dark Reading](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
PhoneFactor next week will release a voice biometrics authentication service that it says can serve as yet another layer of ensuring a user is who he says he is.
The voice biometrics offering verifies the user's voice: When a user logs in, he receives a voice call that prompts him to say his passphrase, which confirms his identity based on his "voiceprint." A voiceprint is set up once and then used in subsequent authentication sessions.
"This is for the most security-conscious [organizations] that have the most to lose," says Steve Dispensa, CTO at PhoneFactor. "Something you know, something you have, and something you are are all collected for authentication."
Dispensa says voice biometrics is aimed at financial services, government, and B2C environments that need an extra layer of user authentication due to their sensitive operations. PhoneFactor's service doesn't require a biometrics reader. It works with the user's phone system.
PhoneFactor says the out-of-band voice authentication call protects against man-in-the-middle attacks and keystroke loggers. The voice biometric service costs $15 to $30 per user for an organization with 5,000 to 10,000 users.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
Read more about:
2010About the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025