Multi-user authentication on a device
First Claim
Patent Images
1. A non-transitory computer-readable medium storing instructions executable by one or more computers which, upon such execution, cause the one or more computers to perform operations comprising:
- receiving, from a device, a query that includes authentication tokens that correspond to known users of the device and a representation of an utterance;
determining that the query does not indicate a known user as a speaker;
in response to determining that the query does not indicate a known user as a speaker, determining whether the query is non-personal based on the representation of the utterance;
in response to determining that the query is non-personal based on the representation of the utterance, determining a response to the query based on the authentication tokens included in the query; and
providing the response to the device.
2 Assignments
0 Petitions
Accused Products
Abstract
In some implementations, authentication tokens corresponding to known users of a device are stored on the device. An utterance from a speaker is received. The utterance is classified as spoken by a particular known user of the known users. A query that includes a representation of the utterance and an indication of the particular known user as the speaker is provided using the authentication token of the particular known user.
-
Citations
18 Claims
-
1. A non-transitory computer-readable medium storing instructions executable by one or more computers which, upon such execution, cause the one or more computers to perform operations comprising:
-
receiving, from a device, a query that includes authentication tokens that correspond to known users of the device and a representation of an utterance; determining that the query does not indicate a known user as a speaker; in response to determining that the query does not indicate a known user as a speaker, determining whether the query is non-personal based on the representation of the utterance; in response to determining that the query is non-personal based on the representation of the utterance, determining a response to the query based on the authentication tokens included in the query; and providing the response to the device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method comprising:
-
receiving, from a device, a query that includes authentication tokens that correspond to known users of the device and a representation of an utterance; determining that the query does not indicate a known user as a speaker; in response to determining that the query does not indicate a known user as a speaker, determining whether the query is non-personal based on the representation of the utterance; in response to determining that the query is non-personal based on the representation of the utterance, determining a response to the query based on the authentication tokens included in the query; and providing the response to the device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
one or more computers and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; receiving, from a device, a query that includes authentication tokens that correspond to known users of the device and a representation of an utterance; determining that the query does not indicate a known user as a speaker; in response to determining that the query does not indicate a known user as a speaker, determining whether the query is non-personal based on the representation of the utterance; in response to determining that the query is non-personal based on the representation of the utterance, determining a response to the query based on the authentication tokens included in the query; and providing the response to the device. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification