Your Voice Will Now be Signing Your Documents

/, Digital Literacy/Your Voice Will Now be Signing Your Documents

Companies in the financial sector and the real sector can already count on the biometric voice authentication system, whereby people can sign documents only with their voice and without their physical presence.

Through a call from a fixed or cellular telephone, the process can be done in no more than two minutes to process credits, enter into contracts, manage promissory notes, among others, and with a security of 88% when verifying the identity.

This technology for “voice signature” offers a degree of sophistication in detail that does not allow imitations and applies to all sectors that require authentication and signing of documents by their customers.

In addition, it generates savings on stationery, printing, storage, transport, and physical expenses associated with the physical promissory note, as well as savings in travel time, since documents can be securely signed from anywhere.

At the moment when the signature of the persons is required, they are called by telephone, and the voice of the person on the other side of the line that is going to sign a document must coincide with that of the recorded record, because no voice is equal to another. The security level of voice authentication recognizes a user even when they encounter diseases that change the tone of the voice.

These technologies are subjected to tests of environments with exposure to noise, recordings, imitators and altered voices that fail to deceive the system because the biometric characteristics are unique and non-transferable.

Unisono in Latin America will be one such company that will adapt this process. Besides, private and governmental entities worldwide have begun to implement this type of systems.

By |2017-05-24T16:14:11+00:00May 24th, 2017|Digital Empowerment, Digital Literacy|2 Comments


  1. Daniel Ogeto O. September 14, 2017 at 9:54 am - Reply

    I think of knowledge-based security as sprawl. When one level becomes ineffective, another level is added. PINS become passwords and passwords then require security questions to back them up. This is hard and stressful work for the customer, and it puts them further and further away from completing their intended task. Thanks to the advancements in digital technology, things like voice authentication are now available. By design, voice authentication overcomes the security issues facing knowledge-based authentication today. Voice biometrics cannot be compromised in this way. Because a voiceprint is a hashed string of numbers and characters, a compromised voiceprint has no value to a hacker. Not only that, each time a fraudster speaks within an IVR, call centre or mobile app, they leave behind their own voiceprint that can be used to proactively keep them out of the system and even alert law enforcement. The power of the voice really is in your hands. With the rise of the Internet of Things, voice and speech recognition are finding a niche. As experts search for solutions to secure the machine-to-machine network, voice and speech are commonly evoked as a convenient and secure pairing, ideal for devices on which design space is a premium. All voice and speech recognition needs is a microphone to listen. All this come as a benefit of advanced digital technologies and the many innovative startups dotting the internet security landscape.

  2. Vangeline September 19, 2017 at 3:13 am - Reply

    Very interesting. I actually learned about biometric voice authentication system only now. I didn’t know that this digital technology is possible. I was skeptical at first. I thought this would be a very problematic system because someone might easily tamper it. But then as I read the article and go deeper into the specifics, I think that this invention could be trusted. It will be very convenient for executives and transactions would be surely faster. I’m still not sure with the 88% security in verifying the voices though. I hope it could be more improved for increased realibility of the system. When that happens, this system would have more applications in different industries.

Leave A Comment