System and method for portable authentication
First Claim
1. A system for performing authentication to a secure system comprising:
- a portable device having a communication module capable of communicating with at least one secure system;
a speech processing module adapted to process a user authentication utterance;
an authentication logic module that communicates with said speech processing module and operates to analyze said authentication utterance processed by said speech processing module;
said authentication logic module cooperating with said communication module to send authorization indicia to said secure system based on the results analyzing said authentication utterance.
1 Assignment
0 Petitions
Accused Products
Abstract
A portable device, such as a cellular telephone, engages the user in a challenge-response sequence that is based on recognition of the user'"'"'s utterance and also upon verification of the user'"'"'s speech patterns or voiceprint. The challenge-response protocol presents the user with an unexpected challenge word, which the user is then requested to respond to. The system maintains a secure data store of challenge words which it adapts and augments as the user makes use of the portable device. The portable device provides the user with a convenient, single access point through which he or she can authenticate with a variety of disparate secure devices ranging from door locks, ATM machines, financial institutions and third-party business associates.
-
Citations
40 Claims
-
1. A system for performing authentication to a secure system comprising:
-
a portable device having a communication module capable of communicating with at least one secure system;
a speech processing module adapted to process a user authentication utterance;
an authentication logic module that communicates with said speech processing module and operates to analyze said authentication utterance processed by said speech processing module;
said authentication logic module cooperating with said communication module to send authorization indicia to said secure system based on the results analyzing said authentication utterance. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of performing authentication to a secure system comprising:
-
receiving a speech utterance from a user into a portable device;
processing said speech utterance in said portable device to authentication indicia;
using said authentication indicia to generate authentication indicia, and communicating said authentication indicia to said secure system. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A system for performing authentication to a secure system comprising:
-
a portable device having a communication module capable of communicating information in a secure manner;
a speech authentication module adapted to process a user authentication utterance;
said speech authentication module cooperating with said communication module to provide authorization indicia based on the results analyzing said authentication utterance. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A system for performing authentication to a secure system comprising:
-
a portable device having a communication module capable of communicating information in a secure manner;
a biometric authentication module adapted to process a user authentication utterance;
said biometric authentication module cooperating with said communication module to provide authorization indicia based on the results analyzing said authentication utterance. - View Dependent Claims (38, 39, 40)
-
Specification