RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

CST: VoiceKey.Fraud

Product
The name of the base system (platform): CST: VoiceKey.Platform
Developers: Center of Speech Technologies (CST)
Last Release Date: 2016/12/12
Branches: Government and social institutions,  Financial services, investments and audit
Technology: Cybersecurity - Biometric identification,  cybersecurity - the Fraud detection system (fraud)

For March 14, 2017 VoiceKey.Fraud is the system of biometric determination of a voice. The specialized solution created on technologies of voice biometrics VoiceKey. It is intended for identification of swindlers among subscribers of contact centers.

At a call to contact center it is rather difficult for operator to define - he says with the client or the swindler. As the only reliable confirmation to that can serve verification of the subscriber on a voice - for each person the voice is unique, it cannot be stolen or forged.

The VoiceKey.Fraud technology helps to solve this problem. At any call to contact center, VoiceKey.Fraud will determine the swindler by a voice and to notify a security service and the operator on need of taking measures.

Scheme of action of a system, (2016)


A system fixes all possible attempts of fraud from subscribers and sends notifications to a security service of the organization. Identification of the swindler can be initiated, both in online, and in offline mode. It gives the chance if necessary in addition to study a call recording. Such approach is implemented, as for the maximum security of the organization and clients, and cost reduction of the organization on processing of a call recording by security service specialists.

The technology is focused on use in access control products to personal information or managements of the personal account:

  • finance (banks, insurance, trust management)
  • telecom (mobile, fixed connection, broadband access, cable networks)
  • pension funds.

VoiceKey.Fraud works in heterogeneous architecture and gives opportunities for integration with contact center and CRM.

System architecture, (2016)