Key Manager Server (KMS)

When KMS is used for end-to-end encryption Encryption solution in which the system encrypts files at the time of recording, and then stores them in an encrypted format throughout their entire life cycle. of data stored on disk, if the KMS server is not available then the voice biometrics components of the Real-Time Analytics (RTA) Framework cannot perform verification Feature in voice biometrics where the speaker’s voice is compared to a collection of employee or customer voiceprints that should match the call. If a match occurs, the speaker is said to be verified. and detection Function of the IAFD product that compares a caller’s voice to one or more voiceprints in a watch list to detect if a target is participating in a call..

To ensure that the voice biometrics components are able to retrieve data required for verification and detection to function, use of end-to-end encryption requires the KMS utilizing high availability System design approach and associated service implementation that ensures a pre-arranged level of operational performance will be met during a contractual measurement period..

To learn more about using KMS, see the related information section of this topic.

System components of the Real-Time Analytics (RTA) Framework

Deploy and configure dual KMS application servers (Key Manager Server Installation and Configuration Guide)