SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
SESTEK VOICE VERIFICATION
FOR AVEA CALL CENTER
Serdar Karadayı
Managing Director
Gökhan Ayas
Alternative Channels &
Project Mng Dep. Man.
About Sestek
Sestek is the leader company of speech technology market in Turkey with its
v  rich product range
v  dominator role in the market
v  pioneer role in the university-industry collaboration
v  financial power which is proven in Deloitte’s Fast500 program since 2008
v  social responsibility projects for the visually disabled
‘First’s of Sestek
www.sestek.com.tr/english
speech
recognition
implementation
of Turkey
voice
conversion
application
of the
world
voice
controlled
white goods
integration
in Turkey
2001 2013
Turkish
speaking
Internet
newspaper
with TTS
technology
Turkish
Speech
Analytics
software in
the world
patented
Seamless
Agent that
combines
ASR with
hidden live
agents
Voice
Verification
implementati
on of Turkish
banking
industry:
DenizBank
Solutions of Sestek
Text-To-Speech (TTS)
Speech Analytics
Voice Verification
About Avea
v  Avea is a subsidiary of Turkish Telecom Group which is the fifth
largest company in Turkey and fifteenth largest telecom company in the
world!
v  Covers >98% of Turkey’s population
v  In order to expand globally Avea has signed agreements with 644
operators in 197 countries
v  Avea is the first and only mobile operator which is R&D certificated in
Turkey
One of the leading R&D projects of Avea is «Voice
Verification», which was accomplished with Sestek .
Avea Call Center
Avea Customer Services Call Center
answers various questions and
compelete transactions of its
customers
v  Provides 7/24 customer service
v  Hires >2500 employees
v  Receives thousands of calls each
day (100K Daily)
v  Owns tens of rewards from various
corporations such as;
-International Business Awards
-Contact Center World
-IMI Istanbul Call Center Awards
-Consumer Academy Awards
We invest in IT infrastructure & speech technologies
2010 2011 2012-2013
Inbound IVR (500)
Outbound IVR
Home agent
CRM system (Siebel)
Billing system
Flex IVR
Credit management
VOICE
VERIFICATION
Knowledge
management
Speech Analytics
Call Steering
CTI Replacement
Mobile app.
Before Sestek Voice Verification
Prior to the deployment a large
volume of calls required identity
verification via a manual agent-
assisted procedure which causes;
v  time loss
v  customer dissatisfaction
v  long call duration
v  increased telecom costs
RESULT: Search for an alternative
security solution & solution provider
Decision Making
1
• What do we need?
• A new intelligent technology solution
2
•  Which technology solution?
•  Voice Verification
3
•  Which provider?
•  Sestek
We need to answer the following questions:
trust &
confidence
time
efficiency
customer
satisfaction
enhanced
security
ease of use
Which Solution & Technology ?
Voice
Verification
Motivations of Voice Verification
CUSTOMER
Safe & secure customer information
No need to remember a password
No expiry of the password
Customer satisfaction
Saving of time
AVEA
Keeping customer data more secure
Easy to identify the line owner
Shorter Call handle time
Efficiency & Less fraud risk
Reduced repeat calls
Increased loyalty
EMPLOYEE
Easy authentication
No need to ask customer information
Get over complicated security process
Higher motivation and performance
Less average handle time
Win Win
Which Solution Partner?
Solution
Partner
Sestek
Continuity of
Product
Development
Strong Support
Capability
	
  
Price	
  	
  
effective	
  	
  	
  
Easy Know-How
Transfer
Quick
installation
and
result-
oriented
approach
Defining
Requirement
s
Company
Product
Presentations
&Evaluation
Business
Plan
IVR
Implementation
Deciding on
Password
& Data Collection
Optimization
(Sestek)
LAUNCH
Internal Tests
by Avea
employees
Production
POC
2010-Q2 2010-Q3 2010-Q4 2011-Q1 2011-Q2
For the voice verification project, all products in the market have been
investigated
Voice Verification system has been implemented by Avea R&D team and
Sestek
@BabySitting ; Built a Strong&Flexibility support between Avea R&D and
Sestek
Project Roadmap
IVR Integration
v  R&D teams of Avea and Sestek
worked together during the
process.
v  User-friendly IVR scripts were
prepared.
v  Evaluation results were able to be
seen on screens of agents with the
help of CRM integration.
POC
v  In order to evaluate feasibility of the
project whole system was tested
during POC.
v  Password Selection is important;
v  Easy to pronounce
v  Easy to remember
v  Also Brand name included
v  The attendance of volunteer
employees accelarated testing
process.
v  Performance tests with identical
twins were applied to check out
the security level of the
implementation via professional
studios
Implementation:Live Project
Main Steps & Challenges
Technology
• In order to evaluate feasibility of the project whole system was tested during POC.
• Stress tests with identical twins were applied to check out the security level of the
implementation.
• Evaluation results were able to be seen on screens of agents with the help of CRM
integration.
Process
• Passphrase was recorded by 300 people using 10 different phones
• The attendance of volunteer employees accelarated the process.
• The most efficient IVR process for customers has been devoloped in 6 months.
Customer
• OPT IN
•  Using voice prints was optional. Technology adoption was increased by providing
various promotions to customers.
30% of customers
OB IVR
1 million SMS &
MMS
Banners on
invoices
Banners at Avea
web site Promotion:
Free
minutes
Bu gönderiyi düzgüngörüntüleyemiyorsanız lütfen tıklayınız.
Detaylı bilgi için tıklayınız.
E-newsletterStrategy ;
Only OPT
IN
Customer
First !
Define your voice
print for the first
time and Avea will
never forget you
Promotional Activities
After Sestek Voice Verification
1 million voice prints in 1 year.
2012 target: 1,5 million voice prints.
2013 target: 2 million active voice prints.
1 out of 5 calls use voice prints.
Each call is shortened by 15 seconds. (min
250.000 $ annual saving)
Tips
v  Design your requirements clearly
v  Set the password cleverly
v  Change management is critical
v  For Customer satisfaction run as OPT-IN
v  Give benefits to your customers
v  Technology Partner is important !!
v  Design your products and processes based on customer demands
v  Train and motivate your staff
v  Train your customers also & Listen to in all channels
v  Be innovative and invest on Voice Verification, trust yourself :o)
Results
no need to remember
password
shorter call duration
easier security
process
increased
security
lesser telecom costs
non repeating
calls
CUSTOMER
EMPLOYEE AVEA
no time loss
customer satisfaction
no need to ask extra
questions
higher motivation
less fraud risk
efficiency
THANKS FOR LISTENING

Weitere ähnliche Inhalte

Ähnlich wie Case Study: Voice Verification by Mobile Operator Avea

AVT Systems Ltd - Solutions & Services
AVT Systems Ltd - Solutions & ServicesAVT Systems Ltd - Solutions & Services
AVT Systems Ltd - Solutions & ServicesWilliams_j_j
 
Perennial systems corporate overview presentation
Perennial systems corporate overview presentationPerennial systems corporate overview presentation
Perennial systems corporate overview presentationPerennial Systems
 
Corp. Fintech.pptx
Corp. Fintech.pptxCorp. Fintech.pptx
Corp. Fintech.pptxSunil kumar
 
Exponential e-unified-communications-presentations
Exponential e-unified-communications-presentationsExponential e-unified-communications-presentations
Exponential e-unified-communications-presentationsExponential_e
 
Unified Communications - Collaborative services that deliver greater busines...
Unified Communications  - Collaborative services that deliver greater busines...Unified Communications  - Collaborative services that deliver greater busines...
Unified Communications - Collaborative services that deliver greater busines...Exponential_e
 
Updated Flatworld Solutions - Call Center
Updated Flatworld Solutions - Call CenterUpdated Flatworld Solutions - Call Center
Updated Flatworld Solutions - Call CenterMichael Hermano
 
5 Fears of Speech Recogntion
5 Fears of Speech Recogntion5 Fears of Speech Recogntion
5 Fears of Speech RecogntionSpeechStorm
 
Software Presentation A
Software Presentation ASoftware Presentation A
Software Presentation Ajoenilesh
 
How to implement voice biometrics.pdf
How to implement voice biometrics.pdfHow to implement voice biometrics.pdf
How to implement voice biometrics.pdfBahaa Abdulhadi
 
IPera Communication Technologies 2010
IPera Communication Technologies 2010IPera Communication Technologies 2010
IPera Communication Technologies 2010ukavurmaci
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profileIrfan Ullah
 

Ähnlich wie Case Study: Voice Verification by Mobile Operator Avea (20)

Global KTech Corporate_3
Global KTech Corporate_3Global KTech Corporate_3
Global KTech Corporate_3
 
Global KTech Corporate Deck
Global KTech Corporate DeckGlobal KTech Corporate Deck
Global KTech Corporate Deck
 
Global KTech Corporate Deck
Global KTech Corporate DeckGlobal KTech Corporate Deck
Global KTech Corporate Deck
 
Aryavrat corporate profile
Aryavrat corporate  profileAryavrat corporate  profile
Aryavrat corporate profile
 
AVT Systems Ltd - Solutions & Services
AVT Systems Ltd - Solutions & ServicesAVT Systems Ltd - Solutions & Services
AVT Systems Ltd - Solutions & Services
 
Perennial systems corporate overview presentation
Perennial systems corporate overview presentationPerennial systems corporate overview presentation
Perennial systems corporate overview presentation
 
K soft corporate
K soft corporateK soft corporate
K soft corporate
 
Corp. Fintech.pptx
Corp. Fintech.pptxCorp. Fintech.pptx
Corp. Fintech.pptx
 
Exponential e-unified-communications-presentations
Exponential e-unified-communications-presentationsExponential e-unified-communications-presentations
Exponential e-unified-communications-presentations
 
Unified Communications - Collaborative services that deliver greater busines...
Unified Communications  - Collaborative services that deliver greater busines...Unified Communications  - Collaborative services that deliver greater busines...
Unified Communications - Collaborative services that deliver greater busines...
 
Dit prequalification profile
Dit prequalification profileDit prequalification profile
Dit prequalification profile
 
Updated Flatworld Solutions - Call Center
Updated Flatworld Solutions - Call CenterUpdated Flatworld Solutions - Call Center
Updated Flatworld Solutions - Call Center
 
Faith Call Center
Faith Call CenterFaith Call Center
Faith Call Center
 
5 Fears of Speech Recogntion
5 Fears of Speech Recogntion5 Fears of Speech Recogntion
5 Fears of Speech Recogntion
 
Software Presentation A
Software Presentation ASoftware Presentation A
Software Presentation A
 
How to implement voice biometrics.pdf
How to implement voice biometrics.pdfHow to implement voice biometrics.pdf
How to implement voice biometrics.pdf
 
Virtutech Solutions Corp Presentation
Virtutech Solutions Corp PresentationVirtutech Solutions Corp Presentation
Virtutech Solutions Corp Presentation
 
IPera Communication Technologies 2010
IPera Communication Technologies 2010IPera Communication Technologies 2010
IPera Communication Technologies 2010
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profile
 
LumiNet Presentation
LumiNet PresentationLumiNet Presentation
LumiNet Presentation
 

Mehr von derektop

Operationalizing Voice Biometrics
Operationalizing Voice BiometricsOperationalizing Voice Biometrics
Operationalizing Voice Biometricsderektop
 
Introduction to Truly Handsfree 3.0
Introduction to Truly Handsfree 3.0Introduction to Truly Handsfree 3.0
Introduction to Truly Handsfree 3.0derektop
 
e-Government Applications for Voice Authentication
e-Government Applications for Voice Authenticatione-Government Applications for Voice Authentication
e-Government Applications for Voice Authenticationderektop
 
Mobile Voice Authentication
Mobile Voice AuthenticationMobile Voice Authentication
Mobile Voice Authenticationderektop
 
Future of Mobile Authentication
Future of Mobile AuthenticationFuture of Mobile Authentication
Future of Mobile Authenticationderektop
 
The Future of Secure, Mobile Authentication
The Future of Secure, Mobile AuthenticationThe Future of Secure, Mobile Authentication
The Future of Secure, Mobile Authenticationderektop
 
The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognitionderektop
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White Listderektop
 
Case Study: Passive Authentication at Barclays
Case Study: Passive Authentication at BarclaysCase Study: Passive Authentication at Barclays
Case Study: Passive Authentication at Barclaysderektop
 
Powering Security and Easy Authentication in a Multi-Channel World
Powering Security and Easy Authentication in a Multi-Channel WorldPowering Security and Easy Authentication in a Multi-Channel World
Powering Security and Easy Authentication in a Multi-Channel Worldderektop
 
Natural Interaction in the Connected Home
Natural Interaction in the Connected HomeNatural Interaction in the Connected Home
Natural Interaction in the Connected Homederektop
 
Voice Biometrics: The Big Picture Gets Bigger
Voice Biometrics: The Big Picture Gets BiggerVoice Biometrics: The Big Picture Gets Bigger
Voice Biometrics: The Big Picture Gets Biggerderektop
 

Mehr von derektop (12)

Operationalizing Voice Biometrics
Operationalizing Voice BiometricsOperationalizing Voice Biometrics
Operationalizing Voice Biometrics
 
Introduction to Truly Handsfree 3.0
Introduction to Truly Handsfree 3.0Introduction to Truly Handsfree 3.0
Introduction to Truly Handsfree 3.0
 
e-Government Applications for Voice Authentication
e-Government Applications for Voice Authenticatione-Government Applications for Voice Authentication
e-Government Applications for Voice Authentication
 
Mobile Voice Authentication
Mobile Voice AuthenticationMobile Voice Authentication
Mobile Voice Authentication
 
Future of Mobile Authentication
Future of Mobile AuthenticationFuture of Mobile Authentication
Future of Mobile Authentication
 
The Future of Secure, Mobile Authentication
The Future of Secure, Mobile AuthenticationThe Future of Secure, Mobile Authentication
The Future of Secure, Mobile Authentication
 
The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognition
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White List
 
Case Study: Passive Authentication at Barclays
Case Study: Passive Authentication at BarclaysCase Study: Passive Authentication at Barclays
Case Study: Passive Authentication at Barclays
 
Powering Security and Easy Authentication in a Multi-Channel World
Powering Security and Easy Authentication in a Multi-Channel WorldPowering Security and Easy Authentication in a Multi-Channel World
Powering Security and Easy Authentication in a Multi-Channel World
 
Natural Interaction in the Connected Home
Natural Interaction in the Connected HomeNatural Interaction in the Connected Home
Natural Interaction in the Connected Home
 
Voice Biometrics: The Big Picture Gets Bigger
Voice Biometrics: The Big Picture Gets BiggerVoice Biometrics: The Big Picture Gets Bigger
Voice Biometrics: The Big Picture Gets Bigger
 

Kürzlich hochgeladen

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Kürzlich hochgeladen (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Case Study: Voice Verification by Mobile Operator Avea

  • 1. SESTEK VOICE VERIFICATION FOR AVEA CALL CENTER Serdar Karadayı Managing Director Gökhan Ayas Alternative Channels & Project Mng Dep. Man.
  • 2. About Sestek Sestek is the leader company of speech technology market in Turkey with its v  rich product range v  dominator role in the market v  pioneer role in the university-industry collaboration v  financial power which is proven in Deloitte’s Fast500 program since 2008 v  social responsibility projects for the visually disabled ‘First’s of Sestek www.sestek.com.tr/english speech recognition implementation of Turkey voice conversion application of the world voice controlled white goods integration in Turkey 2001 2013 Turkish speaking Internet newspaper with TTS technology Turkish Speech Analytics software in the world patented Seamless Agent that combines ASR with hidden live agents Voice Verification implementati on of Turkish banking industry: DenizBank
  • 3. Solutions of Sestek Text-To-Speech (TTS) Speech Analytics Voice Verification
  • 4. About Avea v  Avea is a subsidiary of Turkish Telecom Group which is the fifth largest company in Turkey and fifteenth largest telecom company in the world! v  Covers >98% of Turkey’s population v  In order to expand globally Avea has signed agreements with 644 operators in 197 countries v  Avea is the first and only mobile operator which is R&D certificated in Turkey One of the leading R&D projects of Avea is «Voice Verification», which was accomplished with Sestek .
  • 5. Avea Call Center Avea Customer Services Call Center answers various questions and compelete transactions of its customers v  Provides 7/24 customer service v  Hires >2500 employees v  Receives thousands of calls each day (100K Daily) v  Owns tens of rewards from various corporations such as; -International Business Awards -Contact Center World -IMI Istanbul Call Center Awards -Consumer Academy Awards
  • 6. We invest in IT infrastructure & speech technologies 2010 2011 2012-2013 Inbound IVR (500) Outbound IVR Home agent CRM system (Siebel) Billing system Flex IVR Credit management VOICE VERIFICATION Knowledge management Speech Analytics Call Steering CTI Replacement Mobile app.
  • 7. Before Sestek Voice Verification Prior to the deployment a large volume of calls required identity verification via a manual agent- assisted procedure which causes; v  time loss v  customer dissatisfaction v  long call duration v  increased telecom costs RESULT: Search for an alternative security solution & solution provider
  • 8. Decision Making 1 • What do we need? • A new intelligent technology solution 2 •  Which technology solution? •  Voice Verification 3 •  Which provider? •  Sestek We need to answer the following questions:
  • 9. trust & confidence time efficiency customer satisfaction enhanced security ease of use Which Solution & Technology ? Voice Verification
  • 10. Motivations of Voice Verification CUSTOMER Safe & secure customer information No need to remember a password No expiry of the password Customer satisfaction Saving of time AVEA Keeping customer data more secure Easy to identify the line owner Shorter Call handle time Efficiency & Less fraud risk Reduced repeat calls Increased loyalty EMPLOYEE Easy authentication No need to ask customer information Get over complicated security process Higher motivation and performance Less average handle time Win Win
  • 11. Which Solution Partner? Solution Partner Sestek Continuity of Product Development Strong Support Capability   Price     effective       Easy Know-How Transfer Quick installation and result- oriented approach
  • 12. Defining Requirement s Company Product Presentations &Evaluation Business Plan IVR Implementation Deciding on Password & Data Collection Optimization (Sestek) LAUNCH Internal Tests by Avea employees Production POC 2010-Q2 2010-Q3 2010-Q4 2011-Q1 2011-Q2 For the voice verification project, all products in the market have been investigated Voice Verification system has been implemented by Avea R&D team and Sestek @BabySitting ; Built a Strong&Flexibility support between Avea R&D and Sestek Project Roadmap
  • 13. IVR Integration v  R&D teams of Avea and Sestek worked together during the process. v  User-friendly IVR scripts were prepared. v  Evaluation results were able to be seen on screens of agents with the help of CRM integration.
  • 14. POC v  In order to evaluate feasibility of the project whole system was tested during POC. v  Password Selection is important; v  Easy to pronounce v  Easy to remember v  Also Brand name included v  The attendance of volunteer employees accelarated testing process. v  Performance tests with identical twins were applied to check out the security level of the implementation via professional studios
  • 16. Main Steps & Challenges Technology • In order to evaluate feasibility of the project whole system was tested during POC. • Stress tests with identical twins were applied to check out the security level of the implementation. • Evaluation results were able to be seen on screens of agents with the help of CRM integration. Process • Passphrase was recorded by 300 people using 10 different phones • The attendance of volunteer employees accelarated the process. • The most efficient IVR process for customers has been devoloped in 6 months. Customer • OPT IN •  Using voice prints was optional. Technology adoption was increased by providing various promotions to customers.
  • 17. 30% of customers OB IVR 1 million SMS & MMS Banners on invoices Banners at Avea web site Promotion: Free minutes Bu gönderiyi düzgüngörüntüleyemiyorsanız lütfen tıklayınız. Detaylı bilgi için tıklayınız. E-newsletterStrategy ; Only OPT IN Customer First ! Define your voice print for the first time and Avea will never forget you Promotional Activities
  • 18. After Sestek Voice Verification 1 million voice prints in 1 year. 2012 target: 1,5 million voice prints. 2013 target: 2 million active voice prints. 1 out of 5 calls use voice prints. Each call is shortened by 15 seconds. (min 250.000 $ annual saving)
  • 19. Tips v  Design your requirements clearly v  Set the password cleverly v  Change management is critical v  For Customer satisfaction run as OPT-IN v  Give benefits to your customers v  Technology Partner is important !! v  Design your products and processes based on customer demands v  Train and motivate your staff v  Train your customers also & Listen to in all channels v  Be innovative and invest on Voice Verification, trust yourself :o)
  • 20. Results no need to remember password shorter call duration easier security process increased security lesser telecom costs non repeating calls CUSTOMER EMPLOYEE AVEA no time loss customer satisfaction no need to ask extra questions higher motivation less fraud risk efficiency