A new form of payment using smart glasses has hit the market! Transactions can be completed using QR code scans and voice commands. Alipay’s smart glasses, created in collaboration with Chinese smartphone manufacturer Meizu, are powered by voice authentication and intent recognition technology. Meizu, for its part, offers an optical waveguide display, voice noise reduction, and camera-based code capture technology.


Firma przeprowadziła właśnie swoją pierwszą transakcję płatniczą z wykorzystaniem portfela elektronicznego z wbudowanymi inteligentnymi okularami za pośrednictwem AlipayHK w Hongkongu.

The company has just completed its first payment transaction using an e-wallet with built-in smart glasses via AlipayHK in Hong Kong.

Ant Group plans to roll out the new feature to Alipay+’s global partners in 2025. Alipay+ is the company’s cross-border mobile payment solution that allows businesses to accept payments from mobile wallets across multiple countries, including Line Pay and GrabPay. The service currently connects over 1.7 billion user accounts across 36 mobile wallets.

more https://www.biometricupdate.com/202506/alipay-introduces-smart-glasses-payment-with-voice-authentication

What do you think about this form of payment? Could this service revolutionize the market? Do you see its applications in everyday life?

Can a bot be sincere? Can it express remorse when it apologizes? These are the questions researchers are asking themselves in the context of the possible use of AI in handling complaints.

This is about automating the entire process. While its operation seems to be easy, the most difficult challenge may be showing emotion by the bot, in this case an apology.

Research suggests that when people expect an apology, they expect sincere contrition and authenticity. Spontaneity is also important, and these are typical human traits that a machine can’t always handle perfectly. So how reliable can an apologetic AI be?

more on biometric update https://www.biometricupdate.com/202505/apologetic-intelligence-should-bots-handle-complaints

Voice stream augmentation is a technique that amplifies or modifies a voice stream in real time to improve its quality. In short, it involves using electronic devices such as microphones, loudspeakers, amplifiers, or software algorithms to change the characteristics of the sound, e.g. voice tone.

It is not difficult to guess that augmentation is used in speech recognition systems, games, and even in artificial intelligence, where it allows the generation of artificial voices and improving their naturalness.

Currently, in one of the projects we are creating our own voice stream augmentation engine. Its purpose is to support detection of unauthorized use of voice in the communicator for further synthesis/conversion without causing degradation of the sound heard at the level of the human ear. All this to prevent voice theft and ensure the most effective operation of the service.

It turns out that deepfake audio can be more dangerous than video! According to the Pindrop report, in the two years 2023-2024 there was a 760% increase in the number of such deepfakes (audio).


In an era of increasing attacks, self-awareness seems to be a key barrier protecting humans from these types of threats. It is about:

●  limited trust in voice assistants,
● knowledge of social techniques used by fraudsters,
● control over the content you publish on the Internet.

In system solutions, it is obvious to use advanced biometric technologies and methodologies to detect deepfakes in real time.

For example, Pindrop uses a technique called acoustic fingerprinting as one of its capabilities. This involves creating a digital signature for each voice based on its acoustic properties, such as pitch, tone, and cadence. These signatures are then used to compare and match voices across calls and interactions. For more on deepfakes, check out this podcast with Vijay Balasubramaniyan, CEO of Pindrop. Link below
https://www.biometricupdate.com/202504/biometric-update-podcast-digs-into-deepfakes-with-pindrop-ceo

As a reminder, Pindrop is a company based in Atlanta, USA.  Their solutions are leading the way for the future of voice communications, setting the standard for identity, security, and trust in every voice interaction.  More at pindrop.com

The exhibition was marked by the ubiquitous AI. Many companies presented their latest achievements in constructing systems that communicate autonomously with people. The humanoid robot Ameca (Etisalat) interacting with its interlocutors aroused great interest. The stands with interactive agents (Amdocs) offered an almost unbelievable quality of image and speech generated by the systems.

Google has unveiled Gemini Live, its response to ChatGPT’s voice mode.  Gemini Live has function Share Screen With Live, that allows Gemini to interact with the image displayed on the phone’s screen. Deutsche Telekom has indicated a possible direction for the development of phones by turning the entire phone into a chatbot. The phone has no applications and is a personal assistant that communicates with the user by voice. The basis of the solution is a digital assistant from AI Perplexity, but it is also to be open to, among others, Google Cloud AI, ElevenLabs, and Picsart. South Korean startup Newnal has presented a new operating system for mobile phones that uses historical and current user data to create a personalized AI assistant that is to eventually become an AI avatar behaving just like the user.

All of the above solutions, as well as many others, are connected by the use of voice technologies for two-way communication. The direction indicated at MWC 2025 is clear – our actions will be supported by avatars and bots communicating with us autonomously. The possibility of quick, machine confirmation of who we are talking to is therefore becoming even more important than ever before, because the quality of autonomous voice communication systems does not guarantee correct verification of the speaker by a human.

Photos by Andrzej Tymecki

 


How to effectively detect voice-based fraud? How to distinguish a real voice from a fake one, e.g. one generated on the basis of AI? The answer is simple. This requires advanced voice biometrics tools and a number of analyses. We publish here two examples that we analyzed some time ago in our laboratory and, thanks to our proprietary algorithm, we assessed with a very high probability whether the voice is real or fake and to what extent it is consistent with the voice of a given person.

The analyzes concern:

● recognizing the voice of one of President Duda’s Russian pranksters pretending to be President Macron

● assessment of the similarity of the voices of actors Piotr Fronczewski and Filip Pławiak in the film Rojst. In the play, men play the role of the same person (Kociołek) in adulthood and youth, respectively.

We share with you the conclusions from these experiments.

Biometric comparison of the voices of Fronczewski and Pławiak.

For this purpose, we used 25 seconds of total speeches by both characters, composed of several fragments of their original speech, based on the original film soundtrack. What compliance did we achieve?
The results of the analysis showed that the actors’ biometric voices are NOT consistent. Pławiak statement vs. Fronczewski VP – only 15% agreement, Fronczewski statement vs. Pławiak VP – 11%, but interestingly, these differences are not noticed at the level of the ear. In our opinion, the voices of Pławiak and Fronczewski are almost identical. And that is ultimately what this is all about.



For both characters, gender and nationality were recognized with minimal uncertainty (score of almost 100%). An age difference between the characters was also detected, estimated at 20 years.

Analysis of the voices of Russian pranksters Vladimir Kuznetsov (Vovan) and Alexei Stolyarov (Lexus) impersonating President Macron.


In this case, we biometrically analyzed the recordings of the pranksters’ voices and compared them with the voice of the real Macron (in both Polish and English versions). We downloaded all voice samples in the form of individual recordings from the public domain on YouTube. Our goal was to confirm the effectiveness of biometric systems for this specific situation – identifying fraud.

It turned out that the voice of one of the “Lexus” pranksters was just over 50% consistent with the voice of the President of France and as much as 97% consistent with the voice of the false president. The voice of the second one – “Vovana” – showed no similarities (0%) to the fake president.

 This clearly proves that thanks to biometric analysis we managed to:

●detect the fact, only after 1 minute, that a fake president was involved in the conversation
● identify the identity of the fictional president (Lexus)
● confirm that the public domain is a very good source of voice samples, which may not always be used for noble purposes
● strengthen the thesis that the most effective attacks are those using social engineering, and in this case it was the choice of the right time when the President was faced with increased stress (rocket fall).

These are just selected examples of the use of specialized biometric tools to confirm the identity of people. If implemented in the future, they may help detect voice-based abuse.

As many as 230 million stolen traditional passwords were registered despite meeting the standard requirements regarding their complexity (min. 8 characters, 1 capital letter, 1 digit, and a special character), according to Specops Breached Password Report z 2025 r. This means that the level of traditional security is insufficient and more effective protection tools are needed. Can a biometric password prove to be a more secure password? Absolutely yes!


Biometrics is one of the safer ways of logging in because it is based on biometric features of people such as face, eye pupil or voice. Biometric identifiers are unique to a given person and distinguish them from others.

The advantage of biometrics lies in its unrivaled accuracy and convenience. Unlike traditional methods such as passwords or PINs, which can be easily forgotten or stolen, biometric identifiers are inextricably linked to people. This inherent link between individuals and their biometric characteristics makes it much more difficult for unauthorized individuals to impersonate another person.


An example of secure login using biometrics is VoiceToken from BiometrIQ, a voice authentication tool that provides very strong, two-step authentication. We remind you how it is done.


When speaking words, the compliance of the read words (first level) with the pattern is verified as well as the biometric compliance of the speaker’s voice with his VoicePrint (second level).


Extremely high security is ensured by an algorithm for selecting words to be read, which reduces the possibility of guessing the sequence of words that will be displayed on the screen to almost zero. The Speech To Text (STT) mechanism combined with an innovative biometric engine guarantee high effectiveness, even in the case of attacks based on speech synthesis.

 More about VoiceToken

Are you ready for changes?


We start the New Year with something interesting for fans of football and other live events. The typical, traditional ticket may soon be replaced by biometric identity verification. Research shows that nearly 50% of sports facilities have such a plan.

MLB’s ticketless “Go-Ahead Entry” system with biometric verification can reduce waiting times to enter the facility by almost 70%.

That’s why biometric authentication at sporting events could become a hit. The challenge, as always with large projects, is the financial aspect related to the costs of system implementation and investments in specialized equipment, training and tool integration. It is this aspect, according to the PYMNTS report, that may determine the implementation of biometric solutions by smaller facilities.

Go-Ahead Entry is MLB’s patented ticketless entry system using biometrics provided by NEC. The statistics come from a 2023 pilot at Citizens Bank Ballpark in Philadelphia, which showed biometric lanes move 68% faster and allow 2.5 times more people to pass than the fastest lane using physical or smartphone tickets.

We are curious how this situation will develop. Do you think this is a good idea?

More you find out here article


At the end of the year, Radio Lublin hosted an interesting program on network security. It covered, among others, issues related to digital identity, privacy and its protection, as well as the phenomenon of the rapidly growing amount of data on the Internet and the impact of this phenomenon on the development of tools, AI and the life of society. The conversation took place as part of the series “XX/XXI – a garden with forking paths”, and the participant of this inspiring conversation was Andrzej Tymecki, Managing Director of BiometrIQ. Below we share some selected statements that constitute a short summary of this meeting.

👉 The amount of data is growing incredibly fast. To illustrate the point, if we recorded the data produced in the world in one day onto DVDs and arranged them one by one, they would cover 106,000 km, which means their length would be enough to circle the Earth more than twice.

👉 The concept of privacy is constantly evolving as technology advances and new opportunities emerge. It is no longer just traditional personal data such as name, PESEL or address, but also photos and biometric features such as voice, finger touch, iris. This makes protecting privacy more and more difficult.

👉Nowadays, it is very easy to commit identity theft due to the advancement of technology and the development of AI. Protection against loss of privacy and identity theft forces caution when posting any content online.

👉The right to be forgotten, introduced into the GDPR Act in 2014, allows us to delete our data from the database.

👉Using advanced methods to protect recordings, e.g. using watermarks. may not be enough to protect against identity theft. What is needed is the good will of people on the other side (platform managers) who will verify the recordings in terms of their authenticity.

👉Procedures are a very important issue in ensuring safety. Procedures cannot be replaced by technology. Technology is supposed to support and facilitate their implementation.


👉 Data centers play a key role in terms of security, of which there are as many as 144 in Poland. The United States is undoubtedly a power in this respect, with approximately 5,300 facilities.

you can read about the program itself, as well as the entire series here

Voice payments? Why not! Nearly 50% of Poles would like to use innovative payment methods based on biometrics. Authorizing expenses by voice was indicated by 7% of Poles, by face by 8% and by iris of the eye by 9%. Payments using fingers and palms turned out to be the most popular, indicated by 20% of the respondents.

T This is according to the report “Payment references of Poles 2024” conducted this year (2024) by PolCard from Fiserv. You can read more about this study here

In our opinion, the use of biometric authorization will increase year by year, mainly due to its high effectiveness. Biometric security is simply safer than traditional ones such as passwords and is much more difficult to bypass. The main factors determining the development of biometric technologies will be:


👉 security
👉 privacy protection
👉 trust in technology and
👉 implementation costs

And You? Which method would you most like to use?