Dynamic user authentication
First Claim
1. A computer-implemented method, comprising:
- receiving, from a first device, first input audio data corresponding to a first spoken utterance;
performing speech recognition processing on the first input audio data to generate first input text data;
performing natural language processing on the first input text data to determine a first request to receive first content;
determining a first content source associated with the first content;
sending, to the first content source, first data requesting the first content;
receiving, from the first content source, a first threshold representing a first user authentication confidence threshold associated with the first content;
determining, based at least in part on the first threshold, at least one user authentication technique;
determining user profile data associated with the first input audio data, the user profile data representing a first plurality of devices;
determining, in the user profile data, first location data associated with the first device;
sending, to the first device based at least in part on the first location data and the at least one user authentication technique, second data requesting first user authentication data;
receiving, from the first device, second input audio data corresponding to a second spoken utterance;
determining, using the second input audio data, a first value representing a first user authentication confidence;
determining a first reliability weight associated with the first device;
determining, using the first value and the first reliability weight, a first weighted value representing a first weighted user authentication confidence; and
sending, to the first content source, first weighted value.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and devices for dynamically authenticating a user are disclosed. A speech-controlled device captures a spoken command, and sends audio data corresponding thereto to a server. The server determines the audio data includes a spoken command to receive content, and therefrom determines a source storing the content. The server also determines threshold user authentication confidence score data associated with the content source. Based at least in part on the threshold user authentication confidence score data, the server determines a user authentication technique, and a device configured to capture user authentication data. The server determines user authentication confidence score data using user authentication data received from the device, and determines weighted user authentication confidence score data therefrom. If the weighted user authentication confidence score data satisfies the threshold user authentication confidence score data, the server receives the requested content from the content source.
158 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving, from a first device, first input audio data corresponding to a first spoken utterance; performing speech recognition processing on the first input audio data to generate first input text data; performing natural language processing on the first input text data to determine a first request to receive first content; determining a first content source associated with the first content; sending, to the first content source, first data requesting the first content; receiving, from the first content source, a first threshold representing a first user authentication confidence threshold associated with the first content; determining, based at least in part on the first threshold, at least one user authentication technique; determining user profile data associated with the first input audio data, the user profile data representing a first plurality of devices; determining, in the user profile data, first location data associated with the first device; sending, to the first device based at least in part on the first location data and the at least one user authentication technique, second data requesting first user authentication data; receiving, from the first device, second input audio data corresponding to a second spoken utterance; determining, using the second input audio data, a first value representing a first user authentication confidence; determining a first reliability weight associated with the first device; determining, using the first value and the first reliability weight, a first weighted value representing a first weighted user authentication confidence; and sending, to the first content source, first weighted value. - View Dependent Claims (2, 3, 4)
-
-
5. A system, comprising:
-
at least one processor; and at least one memory including instructions that, when executed by the at least one processor, cause the system to; receive first user input requesting first content be output; determine a first threshold representing a first user authentication confidence threshold; based at least in part on the first threshold, determine at least a first user authentication technique; determine user profile data associated with the first user input, the user profile data representing a plurality of devices; determine, in the user profile data, first location data associated with a first device; receive, from the first device based at least in part on the first location data and the at least one first user authentication technique, first user authentication data; determine, based at least in part on the first user authentication data, a first value representing a first user authentication confidence; determine the first value satisfies the first threshold; and after determining the first value satisfies the first threshold, cause the first content to be output. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method, comprising:
-
receive first user input requesting first content be output; determining a first threshold representing a first user authentication confidence threshold; based at least in part on the first threshold, determine at least a first user authentication technique; determining user profile data associated with the first user input, the user profile data representing a plurality of devices; determining, in the user profile data, first location data associated with a first device; receiving, from the first device based at least in part on the first location data and the first user authentication technique, first user authentication data; determining, based at least in part on the first user authentication data, a first value representing a first user authentication confidence; determining the first value satisfies the first threshold; and after determining the first value satisfies the first threshold, causing the first content to be output. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification