LOS ANGELES--(BUSINESS WIRE)--InAuth, which delivers and deploys advanced mobile security software to protect financial institutions and their customers from fraud and advanced cyber threats, announced its Voice Biometrics Authentication Module, an opt-in solution that leverages the voice “fingerprint” of a mobile-device user to secure their financial transactions. InAuth's new software solution runs unobtrusively on the mobile device of a financial institution's account user and dynamically identifies the user based on unique voice characteristics.
Financial institutions conventionally utilize security measures based on passwords, PINs and second-form authentication processes such as personalized security questions to confirm their mobile customers' identity. But these methods cannot actually identify who is using the physical device. So, not only do they create lengthy processes for legitimate users to get the information they need and conduct transactions via their mobile devices, they also fail to provide adequate protection against malware and personal attacks.
The voice fingerprinting delivered with this InAuth solution can dynamically identify whether mobile users actually are who they say they are, instead of proxies—all without adding complexity to the mobile user’s experience. Consequently, the InAuth Voice Biometrics Authentication Module provides a comprehensive, easy and quick authenticating and audit trail without frustrating a financial institution’s customers.
“Like a fingerprint, each individual's voice is unique. Our new Voice Biometrics Authentication Module maps specific voice characteristics such as pitch and rhythm to accurately verify identity and convey confidence to financial institutions in the validity of their mobile user base,” said Mike Patterson, CEO, InAuth. “Mobile applications are the most vulnerable access point for fraud and advanced cyber threats, as most financial institutions’ mobile security is far behind that of their solutions and strategies for preventing and mitigating PC-based attacks. InAuth is singularly focused on providing the most effective protection for the evolving, mobile-specific fraud threat.”
The Voice Biometrics Authentication Module is the newest addition to InAuth’s flexible, modular menu of authentication and fraud detection countermeasures to address evolving attacks, per a financial institution’s specific security requirements. Working with a dedicated network of financial institutions, InAuth proactively seeks out new threats and attack tactics to ensure that its products convey state-of-the-art protection against an “attack industry” that is constantly innovating. InAuth’s security software is unique in the industry in that it can be bought and implemented on a module-by-module basis.
InAuth provides advanced mobile defense countermeasures for the world’s largest financial institutions, mobile-transactions companies and mobile-wallet issuers. InAuth’s products are the most effective and easily implemented mobile security software in the industry, and they provide comprehensive protection that is invisible to the end user. InAuth’s professionals have been securing mobile applications since the inception of the mobile industry. For more information, please visit www.InAuth.com or www.twitter.com/InAuth.
U.S. Federal Banking Compliance
InAuth Inc.’s mobile transaction solutions are compliant with the security standards set for U.S. financial institutions by the Federal Financial Institutions Examination Council. Our mobile commerce solutions provide the means to authorize, authenticate, confirm integrity and maintain confidentiality of mobile users throughout the financial transaction for both the financial institutions and their customers as governed by the following ruling bodies:
- Board of Governors of the Federal Reserve System (FRB)
- Federal Deposit Insurance Corporation (FDIC)
- National Credit Union Administration (NCUA)
- Office of the Comptroller of the Currency (OCC)
- Consumer Financial Protection Bureau (CFPB)
Please see the following link for further information – http://ithandbook.ffiec.gov/