Voice to verify online payments

New call-in payment processing system to battle fraud and allow sales via mobile phone.

Consumers could soon use their voice to sign off on internet and mobile transactions, as a UK firm launches a voice-verification payment processing system.

No software or hardware is needed to use the Voice Pay system, according to chief executive officer Nick Ogden.

"No special software or hardware is required - just access to a phone," he said in a statement. "Consumers complete a short, one-time only enrolment process during which a few spoken words are used to generate a unique biometric voiceprint. Subsequently whenever a purchase is made, the user voice verifies the transaction over the phone or internet."

Voice Pay could reduce fraud and improve customer confidence in online and mobile payments by using a client's voice to digitally sign for payments. Similar biometric authentication technology is already in use in banks, insurers and public sector organisations.

The system isn't limited to the internet, said Ogden. Voice Pay could also be used to instantly buy via a mobile phone a product seen on a TV or print advertisement, or even to pay for goods in a shop, he said.

Users can either set up a pre-pay account or they can link a Visa or MasterCard to pay by credit card.

Featured Resources

Security analytics for your multi-cloud deployments

IBM Security QRadar SIEM solution brief

Download now

Five reasons to move to the cloud

Join the enterprises moving their workloads to the cloud

Download now

Architecting hybrid IT and edge for digital advantage

Why business leaders should consider a hybrid IT strategy

Download now

Six reasons to accelerate remote asset monitoring with AI

How to optimise resources, increase productivity, and grow profit margins with AI

Download now

Recommended

Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021
CISA warns of ongoing Accellion File Transfer Appliance attacks
hacking

CISA warns of ongoing Accellion File Transfer Appliance attacks

25 Feb 2021
What is a Trojan?
Security

What is a Trojan?

25 Feb 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

26 Feb 2021