Related Links

  • VoiceTransact
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Related Stories

Top 5 Stories


Voice Commerce introduces web-based interface to its voice authentication biometric technology

09 November 2009

Voice Commerce, the IT / financial service group founded by veteran IT entrepreneur Nick Ogden, has implemented an API (application programming interface) for its voice authentication biometric technology.

The idea behind VoiceTransact, as the API is called, is that it allows third party software developers to interface directly to Voice Commerce's voice authentication technology.

In use, Voice Commerce said, the API enables the voice authentication biometric technology Voice Transact Services to be integrated into any business process.

The Voice Transact Services suite of voice authentication biometric software is billed as an integral part of the VoiceTransact Trust Centre - Voice Commerce's core operating platform and network that provides voice-based identification, verification and payment services.

To launch the API, Voice Commerce is offering firms interested in using the voice biometric technology a free two-week trial of what it calls its "voice signature" system for transactions.

Ogden - who is best known for founding WorldPay, the online transaction number later acquired by the RBS Group, - said that identity security and payment fraud remain two of the biggest concerns facing businesses and consumers today.

"Our success in the past year has already shown that voice-based authentication is now emerging as the new global standard for making secure payment and identity authentication", he said.

"By simplifying access to the VoiceTransact Trust Centre and allowing organisations to trial voice-based authentication within their processes for two weeks, Voice Commerce will be able to clearly demonstrate the security, cost and customer service benefits that voice-based authentication brings", he added.

This article is featured in:
Biometrics  •  Internet and Network Security  •  Wireless and Mobile Security


Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×