- Print
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Knovvu Biometrics offers four main use cases to enhance security and convenience in various applications:
Use Cases | Description |
---|---|
Accumulation | The accumulation feature allows audio data to be collected and buffered in small chunks before performing actual biometric operations. This incremental accumulation makes it possible to process audio over time, which is particularly useful in environments like IVRs, virtual agents, and other self-service systems. By handling voice data in batches, Knovvu Biometrics ensures flexibility in managing and analyzing large volumes of audio efficiently. |
Enrollment | Enrollment is the process of creating a unique voiceprint for users. The system allows for incremental enrollment, where voice data can be captured gradually. Once the accumulated voice data reaches the minimum required threshold, the system generates a user’s voiceprint. The ability to enroll users in stages makes this process more flexible and accommodates various real-world usage scenarios, such as noisy environments or interrupted sessions. |
Authentication | Authentication verifies an individual’s identity based on their unique voiceprint. The system provides both passive authentication, where verification occurs in the background without user intervention, and active authentication, where users are prompted to say a specific passphrase for added security. Authentication results are categorized as "accepted" (with low, medium, or high confidence) or "rejected" (due to reasons such as speaker change, background noise, short speech, presence of blacklisted users, or detected fraud). This robust authentication mechanism ensures secure and reliable verification in both routine and high-risk scenarios, safeguarding sensitive transactions and customer interactions. |
Identification | Identification performs a 1-to-N comparison, allowing multi-user authentication by comparing the speaker's voiceprint against a predefined list of users. This is particularly valuable in environments such as call centers or high-security systems, where multiple users may attempt authentication simultaneously. The identification feature provides robust protection against fraud by ensuring that only genuine users are identified and authenticated accurately. |
Was this article helpful?