User authentication by combining speaker verification and reverse turing test
First Claim
Patent Images
1. A method of authenticating a user, the method comprising:
- (a) accessing a collection of personal information related to the user;
(b) performing an authentication operation that is based on the collection of personal information and incorporates at least one dynamic component, the authentication operation configured to prompt the user to give an audible utterance;
(c) receiving the audible utterance; and
(d) comparing the audible utterance to a stored voiceprint.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and system for authenticating a user are disclosed. The present invention includes accessing a collection of personal information related to the user. The present invention also includes performing an authentication operation that is based on the collection of personal information. The authentication operation incorporates at least one dynamic component and prompts the user to give an audible utterance. The audible utterance is compared to a stored voiceprint.
-
Citations
45 Claims
-
1. A method of authenticating a user, the method comprising:
-
(a) accessing a collection of personal information related to the user;
(b) performing an authentication operation that is based on the collection of personal information and incorporates at least one dynamic component, the authentication operation configured to prompt the user to give an audible utterance;
(c) receiving the audible utterance; and
(d) comparing the audible utterance to a stored voiceprint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A machine-based system for authenticating a user, the system comprising:
-
an information retriever configured to access a collection of personal information related to a user;
an authentication module configured to perform an authentication operation by generating an inquiry based on the collection of personal information and incorporating at least one dynamic component; and
a voice verification module configured to process an audible utterance received in response to the inquiry. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer implemented method for authenticating a user, the method comprising:
-
(a) accessing a collection of personal information related to a user;
(b) generating a question that incorporates at least one dynamic component;
(c) capturing an audible answer to the question; and
(d) comparing the audible answer to a stored voiceprint. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A method of authenticating a user, the method comprising:
-
transmitting a request for authentication information to the user, the request prompts the user to functionally manipulate an element of personal information;
receiving the authentication information from the user; and
evaluating the authentication information against the personal information. - View Dependent Claims (40, 41, 42, 44, 45)
-
-
43. A method of authenticating a user, the method comprising:
-
transmitting a request for authentication information to the user, the request prompts the user to relate personal information corresponding to the user'"'"'s interaction with a user device;
receiving the authentication information from the user; and
evaluating the authentication information against the personal information.
-
Specification