Selective passive voice authentication
First Claim
1. A computer-implemented method executed by at least one processor, the method comprising:
- receiving, by the at least one processor, first voice data from a user device, the first voice data comprising audio data of a user speaking a first voice command; and
determining, by the at least one processor, that the first voice command comprises a voice command for which voice recognition can be performed and, in response, initiating a passive authentication scheme for selectively enabling access to secure data in response to the first voice command, the passive authentication scheme comprising;
providing, by the at least one processor, the first voice data for voice recognition, andreceiving, by the at least one processor, an indication that the user is authenticated based on the voice recognition and, in response, allowing access to a back-end system.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for authenticating a user using a voice biometric program are described. In some embodiments, first voice data from a user device is received. The first voice data can include audio data of a user speaking a first voice command, and the system can determine that the first voice command includes a voice command for which voice recognition can be performed. In response, the system can initiate a passive authentication scheme for selectively enabling access to secure data in response to the first voice command. The passive authentication scheme can provide the first voice data for voice recognition and receive an indication that the user is authenticated based on the voice recognition and, in response, allow access to a back-end system.
-
Citations
20 Claims
-
1. A computer-implemented method executed by at least one processor, the method comprising:
-
receiving, by the at least one processor, first voice data from a user device, the first voice data comprising audio data of a user speaking a first voice command; and determining, by the at least one processor, that the first voice command comprises a voice command for which voice recognition can be performed and, in response, initiating a passive authentication scheme for selectively enabling access to secure data in response to the first voice command, the passive authentication scheme comprising; providing, by the at least one processor, the first voice data for voice recognition, and receiving, by the at least one processor, an indication that the user is authenticated based on the voice recognition and, in response, allowing access to a back-end system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a data store for storing data; and at least one processor configured to interact with the data store, the at least one processor being further configured to execute computer-readable instructions to perform operations comprising; receiving first voice data from a user device, the first voice data comprising audio data of a user speaking a first voice command; and determining that the first voice command comprises a voice command for which voice recognition can be performed and, in response, initiating a passive authentication scheme for selectively enabling access to secure data in response to the first voice command, the passive authentication scheme comprising; providing the first voice data for voice recognition, and receiving an indication that the user is authenticated based on the voice recognition and, in response, allowing access to a back-end system. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium storing instructions that, when executed by at least one processor, cause the at least one processor to perform operations comprising:
-
receiving first voice data from a user device, the first voice data comprising audio data of a user speaking a first voice command; and determining that the first voice command comprises a voice command for which voice recognition can be performed and, in response, initiating a passive authentication scheme for selectively enabling access to secure data in response to the first voice command, the passive authentication scheme comprising; providing the first voice data for voice recognition; and receiving an indication that the user is authenticated based on the voice recognition and, in response, allowing access to a back-end system. - View Dependent Claims (19, 20)
-
Specification