Javier Castaño,COO"},"industry":{"wt":"[[Voice Biometrics]]"},"num_employees":{"wt":">35"},"products":{"wt":"ASIS
BS3
BATVOX
KIVOX Verifier"},"homepage":{"wt":"[http://www.agnitio-corp.com/ www.agnitio-corp.com]"},"footnotes":{"wt":""}},"i":0}}]}" id="mwBA">.mw-parser-output .infobox-subbox{padding:0;border:none;margin:-3px;width:auto;min-width:100%;font-size:100%;clear:none;float:none;background-color:transparent}.mw-parser-output .infobox-3cols-child{margin:auto}.mw-parser-output .infobox .navbar{font-size:100%}body.skin-minerva .mw-parser-output .infobox-header,body.skin-minerva .mw-parser-output .infobox-subheader,body.skin-minerva .mw-parser-output .infobox-above,body.skin-minerva .mw-parser-output .infobox-title,body.skin-minerva .mw-parser-output .infobox-image,body.skin-minerva .mw-parser-output .infobox-full-data,body.skin-minerva .mw-parser-output .infobox-below{text-align:center}
![]() | |
Company type | Acquired |
---|---|
Industry | Voice Biometrics |
Founded | 2004, Acquired by Nuance Communications Inc. |
Headquarters | , |
Key people | Emilio Martínez, CEO Javier Castaño, COO |
Products | ASIS BS3 BATVOX KIVOX Verifier |
Number of employees | > 35 |
Website | www.agnitio-corp.com |
AGNITIO S.L. was a voice biometrics technology company, headquartered in Madrid, Spain. Biometric authentication uses unique biological characteristics to verify an individual’s identity. It’s harder to spoof and considered more convenient for some users since they do not have to remember passwords or worry about passwords being stolen. Agnitio provides voice biometrics services for homeland security and corporate clients.
AGNITIO was founded in 2004 as a spin-off from the Biometric Recognition Group — ATVS at the Technical University of Madrid. [1] Its products are used by police departments in more than 35 countries across Europe, Asia and the Americas, [2] resulting in AGNITIO being considered a market leader in forensic voice biometrics. On October 19, 2016, Nuance Communications Inc. acquired Agnitio and then Microsoft acquired Nuance.Miller, Dan (October 19, 2016). "IAuth Chronicles: Nuance Acquires Agnitio". AGNITIO was acquired by Bigtincan in October 2020.
In addition to forensic applications, voice biometrics is generally considered to be one of the technologies (along with one - time PIN generators such as SecurID) suitable for strong authentication of telephone and electronic transactions. However, unlike token-based one-time PIN generators, voice biometrics does not require the user to have any specific hardware, making it more economically suitable for mass-market applications. Users simply need access to a mobile or landline telephone. [3] This makes voice biometrics a very promising technology for phone and on-line banking, as well as many other corporate voice applications and security needs. Automated password reset procedures, presence monitoring, time and attendance, call center user verification and verification based on free speech are some examples of typical applications that can be front-ended with voice biometrics.
AGNITIO's success in the homeland security market attracted venture capital funding, which was being used to enter deeper into the enterprise/corporate market. KIVOX, AGNITiO's corporate-focused offering, expands upon the inherent benefits of voice biometrics by utilizing the same core technologies found in its homeland security solutions.[ buzzword ]
AGNITIO develops both forensic and real time speaker identification services, such as BATVOX, as well as speaker authentication applications (see Verification vs. identification) that share the same text-independent technology core. In addition, a text-dependent, digit based voice biometric authentication service is offered for corporate implementors.
AGNITIO's core technologies were based on the NIST-evaluated, [4] [5] ATVS biometrics technology, which was transferred to AGNITIO as part of its founding.
In 2013, AGNITIO appeared in WikiLeaks Spyfiles as an example of mass surveillance technology used by world intelligence agencies. The event raised doubts about some Agnitio customers. [6] [7] [ vague ]
A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services that a typical individual accesses can make memorization of unique passwords for each service impractical. Using the terminology of the NIST Digital Identity Guidelines, the secret is held by a party called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity.
An authenticator is a means used to confirm a user's identity, that is, to perform digital authentication. A person authenticates to a computer system or application by demonstrating that he or she has possession and control of an authenticator. In the simplest case, the authenticator is a common password.
Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.
Biometrics are body measurements and calculations related to human characteristics. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance. The discriminating powers of all biometric technologies depend on the amount of entropy they are able to encode and use in matching. Iris recognition is exceptional in this regard, enabling the avoidance of "collisions" even in cross-comparisons across massive populations. Its major limitation is that image acquisition from distances greater than a meter or two, or without cooperation, can be very difficult. However, the technology is in development and iris recognition can be accomplished from even up to 10 meters away or in a live camera feed.
Speaker recognition is the identification of a person from characteristics of voices. It is used to answer the question "Who is speaking?" The term voice recognition can refer to speaker recognition or speech recognition. Speaker verification contrasts with identification, and speaker recognition differs from speaker diarisation.
Self-service password reset (SSPR) is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk. It is a common feature in identity management software and often bundled in the same software package as a password synchronization capability.
Living in the intersection of cryptography and psychology, password psychology is the study of what makes passwords or cryptographic keys easy to remember or guess.
In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder. Unauthorized users watch the keystrokes inputted on a device or listen to sensitive information being spoken, which is also known as eavesdropping.
Electronic authentication is the process of establishing confidence in user identities electronically presented to an information system. Digital authentication, or e-authentication, may be used synonymously when referring to the authentication process that confirms or certifies a person's identity and works. When used in conjunction with an electronic signature, it can provide evidence of whether data received has been tampered with after being signed by its original sender. Electronic authentication can reduce the risk of fraud and identity theft by verifying that a person is who they say they are when performing transactions online.
PerSay was an Israeli start-up company specializing in Voice Biometrics technology. Founded in 2000, its voice biometrics systems are used in the banking, insurance, governments, and telecommunications industries worldwide.
Daon is an international biometrics and identity assurance software company founded in 1999 by Irish entrepreneur Dermot Desmond. The name, Daon, was chosen because it stems from the Celtic word for human being, duine daonna. Daon is headquartered just miles outside of Washington, DC in Fairfax, VA. Daon also has major operations in Dublin, located in the International Financial Services Center (IFSC). It has an additional offices in Belgrade, Serbia and Canberra, Australia.
Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password.
Vein matching, also called vascular technology, is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin. Though used by the Federal Bureau of Investigation and the Central Intelligence Agency, this method of identification is still in development and has not yet been universally adopted by crime labs as it is not considered as reliable as more established techniques, such as fingerprinting. However, it can be used in conjunction with existing forensic data in support of a conclusion.
A whole new range of techniques has been developed to identify people since the 1960s from the measurement and analysis of parts of their bodies to DNA profiles. Forms of identification are used to ensure that citizens are eligible for rights to benefits and to vote without fear of impersonation while private individuals have used seals and signatures for centuries to lay claim to real and personal estate. Generally, the amount of proof of identity that is required to gain access to something is proportionate to the value of what is being sought. It is estimated that only 4% of online transactions use methods other than simple passwords. Security of systems resources generally follows a three-step process of identification, authentication and authorization. Today, a high level of trust is as critical to eCommerce transactions as it is to traditional face-to-face transactions.
Eye vein verification is a method of biometric authentication that applies pattern-recognition techniques to video images of the veins in a user's eyes. The complex and random patterns are unique, and modern hardware and software can detect and differentiate those patterns at some distance from the eyes.
Identity-based security is a type of security that focuses on access to digital information or services based on the authenticated identity of an entity. It ensures that the users and services of these digital resources are entitled to what they receive. The most common form of identity-based security involves the login of an account with a username and password. However, recent technology has evolved into fingerprinting or facial recognition.
EyeVerify, Inc. is a biometric security technology company based in Kansas City, Missouri owned by Ant Group. Its chief product, Eyeprint ID, provides verification using eye veins and other micro-features in and around the eye. Images of the human eye are used to authenticate mobile device users. EyeVerify licenses its software for use in mobile banking applications, such as those offered by Tangerine Bank, NCR/Digital Insight and Wells Fargo.
A biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic. These characteristics include fingerprints, facial images, iris and voice recognition.
Passwordless authentication is an authentication method in which a user can log in to a computer system without the entering a password or any other knowledge-based secret. In most common implementations users are asked to enter their public identifier and then complete the authentication process by providing a secure proof of identity through a registered device or token.