https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Events
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Events
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
  • IWCE
    • Back
    • Conference
    • WHY ATTEND
    • Exhibitor Listings
    • Floor Plan
    • Exhibiting Information
    • Registration Opens April 2019-Join Our Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Analytics


Sensory leverages voice, facial biometrics in TrulySecure 2.0 on-device authentication solution

  • Written by Donny Jackson
  • 24th November 2015
Silicon Valley-based Sensory announces the availability of TrulySecure 2.0, a multimodal biometric authentication technology that leverages both voice and facial biometrics technologies to ensure secure access to application on mobile Android devices.

What is in this article?

  • Sensory leverages voice, facial biometrics in TrulySecure 2.0 on-device authentication solution
  • Sensory leverages voice, facial biometrics in TrulySecure 2.0 on-device authentication solution

Sensory leverages voice, facial biometrics in TrulySecure 2.0 on-device authentication solution

Silicon Valley-based Sensory last week announced the availability of TrulySecure 2.0, a multimodal biometric authentication technology that leverages both voice and facial biometrics technologies to ensure secure access to application on mobile Android devices.

Sensory has built its reputation in the speech-recognition arena, but TrulySecure 2.0—available via the AppLock by Sensory application for Android mobile devices—also utilizes facial-recognition and deep-learning-neural-network technologies to improve security and accuracy, according to Sensory CEO Todd Mozer.

“Over the past year, we’ve substantially improved both our speaker-verification and our vision technology, and TrulySecure 2.0 is the result of that, which we think is really is the best of all worlds,” Mozer said during an interview with IWCE’s Urgent Communications. “It’s got a whole lot of convenience. It’s really fast at identifying the right user.

“You can use face, or you can use voice. Or, you can set it up in a mode to require face and voice, and that’s what we call the TrulySecure mode, because that’s the mode where we can get one in a million false accepts. So, it’s a very, very accurate solution, yet it’s still quite convenient and flexible.”

Other biometric approaches exist for user verification, but many of the most-discussed technologies—fingerprint and retinal scans—require additional hardware that often is not embedded in a mobile device or require connectivity to a cloud-computing environment, Mozer said. In contrast, Sensory’s TrulySecure 2.0 technology in embedded on the device—no cloud connection is needed—and utilizes microphones and cameras that are virtually ubiquitous on modern mobile devices, he said.

 “We got into vision about two years ago, and we had the strategy of combining vision and voice together to offer a really secure biometric authentication that was not only secure but really convenient,” Mozer said.

“We saw a real opportunity, because everyone kept telling us that they were frustrated with fingerprint—the manufacturers didn’t want to pay so much for fingerprint readers, and the end users got frustrated, because they kept getting locked out of the fingerprint things. In the era where people are trying to make things smaller and smaller, having a dedicated sensor for a fingerprint made no sense to us. We really wanted to use the microphone and camera that were built into mobile phones.”

1 | 2 |
Sensory leverages voice, facial biometrics in TrulySecure 2.0 on-device authentication solution
Tags: Security Analytics Applications Cybersecurity Enterprise News Security Software Subscriber Devices News

One comment

  1. Avatar Hitoshi Anatomi 26th November 2015 @ 7:00 am
    Reply

    Criminals would be
    Criminals would be pleased.

    Whether face, iris, fingerprint, typing, gesture, heartbeat or brainwave, biometric authentication could be a candidate for displacing the password if/when (only if/when) it has stopped depending on a password to be registered in case of false rejection while keeping the near-zero false acceptance.

    Threats that can be thwarted by biometric products operated together with fallback/backup passwords can be thwarted more securely by passwords alone. We could be certain that biometrics would help for better security only when it is operated together with another factor by AND/Conjunction (we need to go through both of the two), not when operated with another factor by OR/Disjunction (we need only to go through either one of the two) as in the cases of Touch ID and many other biometric products on the market that require a backup/fallback password, which only increase the convenience by bringing down the security.

    In short, biometric solutions could be recommended to the people who want convenience but should not be recommended to those who need security. 

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Anterix inks $50 million deal with San Diego Gas & Electric to support 900 MHz private LTE system
  • Newscan: White House says 9 fed agencies, 100 companies hit by SolarWinds hack
  • Redefining communications for today’s mobile workforces

Commentary


Ransomware? Let’s call it what it really is: extortionware

21st February 2021

Redefining communications for today’s mobile workforces

18th February 2021

Hi-tech sewer can help safeguard public health, environment and economies

18th February 2021
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Why Tuscon is building its own 4G network dlvr.it/RtPDG5

24th February 2021
UrgentComm

SolarWinds attackers lurked for ‘several months’ in FireEye’s network dlvr.it/RtP07s

24th February 2021
UrgentComm

Buffalo’s 48 hours to navigate a mission-critical transition to remote work dlvr.it/RtNwfl

24th February 2021
UrgentComm

Digital transformation, connectivity create platform for sustainable mobility dlvr.it/RtNwYm

24th February 2021
UrgentComm

Florida SLERS renewal could wait until May as SLERS-2 procurement begins dlvr.it/RtLWGB

23rd February 2021
UrgentComm

Westell, End-to-End Public Safety BDA Solutions dlvr.it/RtKrf9

23rd February 2021
UrgentComm

Newscan: SolarWinds CEO recommends liability protections for sharing information about incidents dlvr.it/RtJwP7

23rd February 2021
UrgentComm

Mission Critical Partners: New CEO Darrin Reilly discusses acquisition, company growth and outlook dlvr.it/RtGJyj

22nd February 2021

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • Microwave/RF
  • T&D World
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X