Systems and methods for authentication program enrollment
First Claim
1. A non-transitory, computer-readable medium containing instructions that, when executed by one or more processors, cause a machine to:
- receive, via a network, a voice interaction from a user, wherein the voice interaction includes a request or a command identifiable from a voice of the user, wherein the request or the command requests information or commands an action;
request non-voice biometric authentication information from the user to fulfill the request or the command made during the voice interaction, wherein the authentication information is used to authenticate the user;
after the user is authenticated to or above an authentication threshold, use the non-voice biometric authentication information to;
fulfill the request or the command;
enroll the user into an authentication program that uses a voice biometric authentication method by deriving characteristics of the voice of the user received during the request or the command and associating the voice characteristics with an account of the user; and
after enrollment into the authentication program, authenticate the user via the voice biometric authentication method prior to fulfilling requests or commands made during a voice navigation.
1 Assignment
0 Petitions
Accused Products
Abstract
Various embodiments of the technology described herein alleviate the need to specifically request enrollment information from a user to enroll the user in a voice biometric authentication program. For example, after receiving a call from a user, the system can identify the user and analyze the user'"'"'s biometric information when the user speaks a command or request. The system can use the user'"'"'s spoken command or request as enrollment information for the particular command or request or for all spoken requests. After enrollment into the voice biometric authentication program, the system can authenticate the user using biometric information before fulfilling requests or commands.
19 Citations
20 Claims
-
1. A non-transitory, computer-readable medium containing instructions that, when executed by one or more processors, cause a machine to:
-
receive, via a network, a voice interaction from a user, wherein the voice interaction includes a request or a command identifiable from a voice of the user, wherein the request or the command requests information or commands an action; request non-voice biometric authentication information from the user to fulfill the request or the command made during the voice interaction, wherein the authentication information is used to authenticate the user; after the user is authenticated to or above an authentication threshold, use the non-voice biometric authentication information to; fulfill the request or the command; enroll the user into an authentication program that uses a voice biometric authentication method by deriving characteristics of the voice of the user received during the request or the command and associating the voice characteristics with an account of the user; and after enrollment into the authentication program, authenticate the user via the voice biometric authentication method prior to fulfilling requests or commands made during a voice navigation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory, computer-readable medium containing instructions that, when executed by one or more processors, cause a machine to:
-
receive a spoken command from a user, wherein the spoken command commands an action; request authentication information from the user to fulfill the spoken command; after receiving the authentication information, authenticate the user via a first authentication method using the authentication information, wherein the first authentication method uses non-voice biometric credentials to authenticate the user; and after authenticating the user via the first authentication method; fulfill the spoken command, and enroll, without requesting enrollment information, the user into an authentication program for the spoken command, wherein the authentication program uses a second authentication method, wherein enrolling the user into the authentication program comprises determining voice characteristics from the spoken command, wherein the second authentication method includes authenticating the user by comparing characteristics of a voice of the user speaking the spoken command during subsequent requests with the determined characteristics of the voice of the user speaking the spoken command. - View Dependent Claims (14, 15, 16)
-
-
17. A computerized method comprising:
-
receiving a spoken request and authentication information from a user, wherein the spoken request includes biometric information about the user, wherein the biometric information includes voice, wherein the spoken request requests information or commands an action; authenticating the user via a first authentication method using the authentication information, wherein the first authentication method uses non-voice biometric credentials to authenticate the user; after authenticating the user via the first authentication method; fulfilling the spoken request, and determining a number and a quality of voice samples; and enrolling, without requesting enrollment information, the request into a biometric authentication program that uses a second authentication method when the number and the quality of the voice samples exceed a threshold, and wherein enrolling the user into the biometric authentication program comprises creating a biometric profile of the user from the biometric information included in the spoken request. - View Dependent Claims (18, 19, 20)
-
Specification