This Spring, The Times published a project commissioned by the London newspaper that recreated the speech John F. Kennedy was set to deliver on the day of his assassination, using more than 116,000 samples of the president’s own voice.
The ability to replicate biometric markers with technology will continue to improve to the point where we won’t be able to recognize whether it’s actually another person speaking to us or if their speech has been synthesized in some way. This reality has big implications for biometric voice authentication. It may only be a few years before fraudsters get so good at replication that the technology becomes obsolete as a security factor.
The same worry applies to authentication based on any biometric markers, such as facial recognition or fingerprints. When a document is signed with a verified fingerprint and that fingerprint can be digitally manipulated, that verification loses its credibility.
Intensity Analytics has the solution to this digitally evolving program.
IA takes biometric behavior and reduces it down into a patent-pending, encrypted token. The technology’s algorithm tracks the unique way each individual types — a process that cannot be imitated.
When a document is authenticated by an individual’s unique typing behavior, it becomes impossible to replicate. One of the hallmarks of the IA algorithm is that a fraudster can know what to do, type in the same way as the original document owner, but they still won’t be able to replicate it.
Imagine telling someone you are thinking of a famous singer and one of the songs they sing, without revealing the artist and the song. Then, ask them to sing that song in the exact same way you’re hearing it inside your head. Even if they could guess the tune, they would not be able to replicate it precisely.
Thinking beyond the application of using IA’s technology to secure a network or website access through authenticated credentials, another application for the IA technology involves securing the future evidentiary status of official documents.
The legal profession worked hard to get digitally created documents admissible as evidence. As technology accelerates, it is not long before people will start challenging voice samples and fingerprint verification. As the Kennedy speech recreation shows, it’s already possible to manipulate those.
The history of Social Security numbers is another example. Originally, they were very secure because the only people who had them were the Social Security Administration and the individuals assigned to them. Then, people started asking for them as a form of ID. The practice became prolific, reusing them for so many other purposes so that today it’s no longer reliably useful.
The more you give up about yourself, like your fingerprints or your facial structure or retinal scan or voice sample, the more people that use that the more opportunities there are for it to be misused.
It’ll become another piece of data fraudsters can capture and reuse. IA is different, insulated against the vulnerability of disclosure.