Menu

Auto-Authentication Techniques to Save Time and Improve CX

Consider Multi-Factor and Voice Biometrics to Improve Security

Auto authentication using multi-factor authentication and biometrics

Despite the appetite of contact centers and customers to use digital, human-free engagement channels, voice communications are still desired, necessary, and appropriate for some interactions. Interactions that are particularly complex or require multiple steps are still often best handled by human agents, rather than automated bots.

However, one of the key challenges faced by customers is the authentication process, which refers to the agent on the line ensuring that the person calling in is an authorized user for a specific service. This is important for most account-based relationships, but is particularly important for companies in the financial services, healthcare, hospitality, government, telecommunications, and other industries where personal or financial data is involved.

Typically, a telephone-based agent will ask a caller to verify specific information, including account numbers, the last four digits of their Social Security number, and, depending upon the organization and the sensitivity level of the account, some additional “challenge” questions that ostensibly only the owner of the account knows.

This creates additional friction, for several reasons. For one, answering these questions can take additional time, and for customers that are trying to get a problem or issue addressed, it can exacerbate their frustration. Further, due to the large number of accounts a person may have, it can be difficult to remember challenge questions and their answers, particularly if the customer set up the account months or years prior to the interaction. Some senior citizens may struggle with this type of authentication. Most frustratingly, to improve security often these same authentication questions are asked each time a customer is transferred to a new agent.

Another major concern with this type of information-based authentication is that it allows unauthorized users, such as account holders’ children, to access the account if they can provide this information. Fraudsters are also able to use this method of authentication to confirm information they may have stolen, or is available on the web, thereby providing them access to not only this account, but perhaps others, a consequence of people re-using usernames, passwords, and challenge questions across multiple accounts.

That is where moving to more advanced and secure processes for authenticating genuine users can reduce friction and provide greater security. One of the easiest ways to provide additional security is to employ multifactor authentication. In this case, once a user provides their authenticating information, such as a username, password, and answer to a challenge question, a text message with a one-time PIN will be sent to the mobile device number on file, which will then need to be provided to the agent to continue with the transaction. While this does not stop in-household users or bad actors who may have access to the mobile device from accessing the account, it does prevent fraudsters without the authenticating device to access the account.

Another more complex and robust solution is the use of voice biometrics to secure an account. Biometric authentication uses unique biological characteristics to verify an individual’s identity, and it is generally harder to spoof and more convenient for users, since they do not need to remember passwords, or carry a physical token than can be stolen or lost. Voice authentication is a biometric authentication technique that uses an analysis of a person’s voice to identify their identity. The shape and movement of a person’s mouth and jaw, combined with the individual shape and size of airways and other soft-tissue cavities, influence voice patterns to create voiceprint that is unique to each person. Moreover, recent research that tested voice recognition tools from VoiceVantage (a THC Technologies Corporation subsidiary), Verint, and Microsoft Azure, found that even identical twins’ voice biometrics are not identical, because, according to the research, “voice is just not mere words, it carries the emotional characteristics of the person at the moment of recording.”

Voice prints are made from reciting a specific text or passphrase, and this passphrase is spoken a few times to create a comprehensive sample. When a person uses the passphrase, certain words are compared with the stored voice print. Other systems do not rely on stored recordings, and instead are trained to recognize similarities between individuals’ voice patterns. Once this sample has been captured and enrolled, it is analyzed for unique vocal qualities, including duration, intensity, dynamics, and pitch, and is then templated to compare against future authentication attempts.

To ensure that recordings or synthetic voices are not used to fool the system, liveness detection, a technology that ensures that a voice sample being used is real, can be deployed. Another way to ensure that the user is legitimate is to utilize continuous authentication, which repeatedly verifies an individual’s identity over the length of a session, rather than just once.  

The key advantages of voice recognition include ubiquity, as all phones have microphones, and the process of speaking into the phone is convenient and familiar to most users. It also allows remote authentication and authentication through “smart” devices, such as appliances, so long as the device has mobile voice capabilities.

However, voice biometrics is not as accurate as say, face recognition, and is not suitable when there is a lot of background noise or when a speaker cannot talk at a normal volume (such as in a “quiet” commuter railcar.)

All told, voice biometrics should be considered as an additional security layer, rather than a standalone security solution. Even as the technology improves, the best defense against fraud is to utilize two or more low-friction security approaches to secure sensitive accounts and ensure the customer’s experience is positive.

Author Information

Keith Kirkpatrick is Research Director, Enterprise Software & Digital Workflows for The Futurum Group. Keith has over 25 years of experience in research, marketing, and consulting-based fields.

He has authored in-depth reports and market forecast studies covering artificial intelligence, biometrics, data analytics, robotics, high performance computing, and quantum computing, with a specific focus on the use of these technologies within large enterprise organizations and SMBs. He has also established strong working relationships with the international technology vendor community and is a frequent speaker at industry conferences and events.

In his career as a financial and technology journalist he has written for national and trade publications, including BusinessWeek, CNBC.com, Investment Dealers’ Digest, The Red Herring, The Communications of the ACM, and Mobile Computing & Communications, among others.

He is a member of the Association of Independent Information Professionals (AIIP).

Keith holds dual Bachelor of Arts degrees in Magazine Journalism and Sociology from Syracuse University.

Latest Insights:
ServiceNow Bets on OpenAI to Power Agentic Enterprise Workflows
January 23, 2026
Article
Article

ServiceNow Bets on OpenAI to Power Agentic Enterprise Workflows

Keith Kirkpatrick, Research Director at Futurum, examines ServiceNow’s multi-year collaboration with OpenAI, highlighting a shift toward agentic AI embedded in core enterprise workflows....
Is Tesla’s Multi-Foundry Strategy the Blueprint for Record AI Chip Volumes
January 22, 2026
Article
Article

Is Tesla’s Multi-Foundry Strategy the Blueprint for Record AI Chip Volumes?

Brendan Burke, Research Director at Futurum, explores how Tesla’s dual-foundry strategy for its AI5 chip enables record production scale and could make multi-foundry production the new standard for AI silicon....
Harness Incident Agent Is DevOps Now The AI Engineers of Software Delivery
January 22, 2026
Article
Article

Harness Incident Agent: Is DevOps Now The AI Engineers of Software Delivery?

Mitch Ashley, VP & Practice Lead, Software Lifecycle Engineering at Futurum, analyzes Harness's introduction of the Human-Aware Change Agent and what it signals about AI agents emerging across software delivery, incident response,...
January 21, 2026
Research
Research

AI-Enabled Enterprise Workspace – Futurum Signal

The enterprise workspace is entering a new phase—one shaped less by device refresh cycles and more by intelligent integration. As AI-enabled PCs enter the mainstream, the real challenge for IT leaders is...
Latest Research:
Modern Private Cloud: Balancing Operational Agility with Data Sovereignty
January 14, 2026
Research
Research

Modern Private Cloud: Balancing Operational Agility with Data Sovereignty

In this Market Brief, Modern Private Cloud: Balancing Operational Agility with Data Sovereignty, Futurum Research explores why enterprises are rethinking public cloud-first strategies and how modern private cloud platforms enable...
TAE Technologies: America’s Answer to Fusion Energy—And Why It Matters for AI Dominance
December 18, 2025

TAE Technologies: America’s Answer to Fusion Energy—And Why It Matters for AI Dominance

In our latest Analyst Insight Report, TAE Technologies: America’s Answer to Fusion Energy—And Why It Matters for AI Dominance, completed in partnership with TMTG, The Futurum Group covers the critical...
Dell’s Strategic Convergence How Innovation in Sustainable Product Design Delivers Quantifiable ROI and Reduced TCO
December 9, 2025
Research
Research

Dell’s Strategic Convergence: How Innovation in Sustainable Product Design Delivers Quantifiable ROI and Reduced TCO

In our latest market brief, Dell’s Strategic Convergence: How Innovation in Sustainable Product Design Delivers Quantifiable ROI and Reduced TCO, completed in partnership with Dell Technologies, Futurum Research explores how...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.