1 / 15

Voice Based Autonomous Access Control Terminals

Explore how HEXIUM Ltd. addresses access control challenges through voice-based biometric technology. Discover the advantages, market analysis, and contact information.

ericascott
Télécharger la présentation

Voice Based Autonomous Access Control Terminals

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Voice Based Autonomous Access Control Terminals HEXIUM Technical Development Co., Ltd. 2003

  2. Table of Contents • Introducing Hexium Ltd. • The problem • Access control • Biometrics • Voice-print properties • Innovation • Preliminary market analysis • Summary

  3. HEXIUM Technical Development Co., Ltd. • Research, development, production (hardware, software) • Security control, image processing, industrial measurement, signal processing and automation

  4. Communication network Server RS485 TriMediaTerminal RS485 TriMediaTerminal The problem • Physical access/time control • Inexpensive, reliable, fast, user-friendly

  5. Issues with ownership based access control • What to identify? • a card? • a keyword? • a PIN code? • … and NOT the PERSON! • Gives rise to abuse..

  6. Biometrics • Identification of human subjects based on • Physical parameters • Behavioral parameters Examples: • Fingerprint, iris, face, ear, hand • Signature, voice

  7. Comparision of biometrics

  8. But..Issues with biometrics • Expensive sensors • Poor acceptance by users due to.. • Uncomfortable use • Mistrust • Precision, reliability • Recall • Slow processing

  9. Properties Speaker dependent, independent of the message Speaker independent butcontent dependent Properties of voice • Identitity verification: Speaker dependent features (speaker verificaton)Message verification: Message dependent features (speech recognition)

  10. Voice-print properties The figures show the spectogram of a sentence spoken twice by the same person Both the rhythm (a behavioral property) and the spectral distribution of identical sounds (physical parameters) stay remarkably constant. Speech of different people show vastly different rythmic and spectral patterns. People are generally good at copying behavioral patterns (a behavioral property), but is is impossible for them to copy the physical “layout” of sounds.

  11. Issues with speaker verification • Noisy environment • People staying close • Takes time (dialogue) • Goal: scaleable, multi-layer system • FAR 0.01%-0.0001% • FRR small (below 1%) FAR: false acceptance rate FRR: false reject rate

  12. Innovation • Advanced noise filtering • “Liveness” verification using array microphones • Optimized implementations • Robust dialogue design minimizing the error rate • Multi-model user interface • Open system architecture

  13. Preliminary market analysis We are here.. • IDC • Access control, 2002: USD 4.2M • Biometrics, only banks, 2004: USD 1,800M

  14. Summary • Advanced, autonomous voice based access control terminals • Competitive technology • Better acceptance than that of competing biometrics technologies • Growing market demand

  15. Contact • HEXIUM Technical Development Co., Ltd. • H-1134 Budapest, Váci út 51/b, HUNGARY • Phone: (+36 1) 320-8338 • Fax: (+36 1) 340-8072 • E-mail: mail@hexium.hutamas.nagy@hexium.hucsaba.szepesvari@hexium.hu • Honlap: www.hexium.huwww.hexium.hu/voiceterminals

More Related