Configuring Identification Rules for IAFD

If you are configuring the system to perform either identity verification Feature in voice biometrics where the speaker’s voice is compared to a collection of employee or customer voiceprints that should match the call. If a match occurs, the speaker is said to be verified. or automatic enrollment Process in the IAFD product where an employee, customer, or target is registered and the system is then able to assist with identity verification and watch list detection when that speaker is on a call., you must create at least one Identification Rule.

You do not need to create Identification Rules to use the watch list List that contains one of more voiceprints of people who are of particular interest to an enterprise. detection Function of the IAFD product that compares a caller’s voice to one or more voiceprints in a watch list to detect if a target is participating in a call. capability of Risk Management Component of the Real-Time Analytics (RTA) Framework that provides interaction search and replay functionality, combined with integration of the Real-Time Analytics (RTA) Framework..

In a multi-tenant environment, only a service provider can create Identification Rules.

Identification Rule basics