Auraya’s EVA voice biometrics platform is now compatible with OpenID Connect 1.0, paving the way for more extensive integrations into third party platforms and systems.
First announced earlier this summer, EVA is a voice recognition solution designed for Amazon Connect, Amazon Web Services’ contact center platform. It essentially allows clients using Amazon Connect to leverage voice biometrics in order to identify callers and end users, regardless of language or accent.
Now, the solution’s compatibility with OpenID Connect 1.0 means that it could be used even more widely and easily. OpenID Connect 1.0 is an identity layer built on the popular OAuth 2.0 authentication protocol, and is designed to allow clients to confirm the identities of end users through an authentication server, and to request and receive information about authentication sessions and authenticated users. It’s built on standard APIs; and, as Auraya explained in a statement, the OpenID Connect 1.0 and OAuth 2.0 standards “are now the default way to provide federated trust and single-sign-on functionality across organisations.”
In practical terms, the compatibility means that organizations can deploy the EVA solution through HTML5 browser-based services, enabling their end customers to log into their online accounts through voice verification, whether they’re accessing these services from a laptop, PC, or smartphone.
“Organisations can deploy EVA on any standards-compliant platform to securely verify end-user identity and obtain basic identity claims, all without exposing or being exposed to confidential or personally identifiable information,” explained Auraya in its announcement of the OpenID Connect 1.0 compatibility. “Since OpenID Connect 1.0 is based on standard APIs, it is proven to be highly secure and extendable to EVA implementations on digital channels such as web browsers and mobile applications.”
It’s a pitch that could appeal to a wide range of organizations as more customer services are performed online, and concerns about the security vulnerabilities of archaic username-and-password login systems continue to deepen.
August 29, 2019 – by Alex Perala