{"id":6603,"date":"2024-05-17T07:02:35","date_gmt":"2024-05-17T07:02:35","guid":{"rendered":"https:\/\/wordpress2.thedevelopment.in\/dd\/ccr.group\/vocal-password\/"},"modified":"2024-10-11T13:35:30","modified_gmt":"2024-10-11T13:35:30","slug":"vocal-password","status":"publish","type":"page","link":"https:\/\/ccr.group\/en\/vocal-password\/","title":{"rendered":"Vocal Password"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6603\" class=\"elementor elementor-6603 elementor-4407\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ab76187 e-flex e-con-boxed e-con e-parent\" data-id=\"6ab76187\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d865c0f e-con-full e-flex e-con e-child\" data-id=\"d865c0f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4095a6b elementor-widget elementor-widget-heading\" data-id=\"4095a6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Vocal Password\n\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc0591e elementor-widget elementor-widget-heading\" data-id=\"fc0591e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Voice Recognition\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24e4a90 elementor-widget elementor-widget-heading\" data-id=\"24e4a90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Fingerprint, Face, Voice, Eye (Iris) Recognition<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72aa0817 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"72aa0817\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAll of these have biometric characters and can be used for recognition, verification and authorization. Like our fingerprint, our voice is also unique.<\/p>\n\nVoice biometry examines many features, such as tone of voice, pitch, volume and even breathing pattern.<\/p>\n\nEvery voice has different characteristics. It is known that even identical twins has different voice characteristics. For that reason, there\u2019s a model that identifies people even by analyzing the way they utter a word:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-59cb3dbb e-con-full e-flex e-con e-child\" data-id=\"59cb3dbb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b3bfe5 elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"8b3bfe5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/ccr.group\/wp-content\/uploads\/2024\/09\/Vocal-Password.webp\" class=\"attachment-full size-full wp-image-16973\" alt=\"Vocal-Password\" srcset=\"https:\/\/ccr.group\/wp-content\/uploads\/2024\/09\/Vocal-Password.webp 500w, https:\/\/ccr.group\/wp-content\/uploads\/2024\/09\/Vocal-Password-300x300.webp 300w, https:\/\/ccr.group\/wp-content\/uploads\/2024\/09\/Vocal-Password-150x150.webp 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-610ec1c elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"610ec1c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-97f6a9e\" data-id=\"97f6a9e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2b06ddf elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2b06ddf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-649cf70\" data-id=\"649cf70\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9348b0d elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"9348b0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1804\" height=\"1000\" src=\"https:\/\/ccr.group\/wp-content\/uploads\/2024\/05\/ccr-ses-dalgalari.webp\" class=\"attachment-full size-full wp-image-5964\" alt=\"\" srcset=\"https:\/\/ccr.group\/wp-content\/uploads\/2024\/05\/ccr-ses-dalgalari.webp 1804w, https:\/\/ccr.group\/wp-content\/uploads\/2024\/05\/ccr-ses-dalgalari-300x166.webp 300w, https:\/\/ccr.group\/wp-content\/uploads\/2024\/05\/ccr-ses-dalgalari-1024x568.webp 1024w, https:\/\/ccr.group\/wp-content\/uploads\/2024\/05\/ccr-ses-dalgalari-768x426.webp 768w, https:\/\/ccr.group\/wp-content\/uploads\/2024\/05\/ccr-ses-dalgalari-1536x851.webp 1536w\" sizes=\"(max-width: 1804px) 100vw, 1804px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-02b90c6\" data-id=\"02b90c6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1fd2dbe elementor-widget elementor-widget-heading\" data-id=\"1fd2dbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Voice Biometrics\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b306a6 elementor-widget elementor-widget-text-editor\" data-id=\"6b306a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li>One time system identification is enough.<\/li>\n \t<li>The authorization process can be used to prevent IVR, Mobile Application and web application forgeries.<\/li>\n \t<li>Increases self-serve rate in IVR.<\/li>\n \t<li>Reduces the time customer representatives spend on a call.<\/li>\n \t<li>Removes any user identification that has the potential to be misused.<\/li>\n \t<li>Removes any forgery processes that even the customer representative may be involved.<\/li>\n \t<li>Biometric solutions are more secure than codes, passwords or questions on an application, SMS and OTP processes and they are compatible with all the channels.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-db26966 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"db26966\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2dbb3e8\" data-id=\"2dbb3e8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e477aea elementor-widget elementor-widget-heading\" data-id=\"e477aea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Voice biometry can be used as such:\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f944726 elementor-widget elementor-widget-text-editor\" data-id=\"f944726\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li>Determining the speaker on the other end of the phone<\/li>\n \t<li>Voice recognition: Is (s)he who (s)he claims to be?<\/li>\n \t<li>Authorization of the processes: Verification processes for payment transactions<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Vocal Password Voice Recognition Fingerprint, Face, Voice, Eye (Iris) Recognition All of these have biometric characters and can be used for recognition, verification and authorization. Like our fingerprint, our voice is also unique. Voice biometry examines many features, such as tone of voice, pitch, volume and even breathing pattern. Every voice has different characteristics. It [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-6603","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"ccr-yonetici","author_link":"https:\/\/ccr.group\/en\/author\/ccr-admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Vocal Password Voice Recognition Fingerprint, Face, Voice, Eye (Iris) Recognition All of these have biometric characters and can be used for recognition, verification and authorization. Like our fingerprint, our voice is also unique. Voice biometry examines many features, such as tone of voice, pitch, volume and even breathing pattern. Every voice has different characteristics. It&hellip;","_links":{"self":[{"href":"https:\/\/ccr.group\/en\/wp-json\/wp\/v2\/pages\/6603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ccr.group\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ccr.group\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ccr.group\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ccr.group\/en\/wp-json\/wp\/v2\/comments?post=6603"}],"version-history":[{"count":0,"href":"https:\/\/ccr.group\/en\/wp-json\/wp\/v2\/pages\/6603\/revisions"}],"wp:attachment":[{"href":"https:\/\/ccr.group\/en\/wp-json\/wp\/v2\/media?parent=6603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}