Multi-factor biometric authentication
First Claim
1. A method for authenticating a requesting user as a recognized user, the method comprising:
- receiving a request to authenticate the requesting user as the recognized user;
generating a disposable pass phrase in response to the request;
sending the disposable pass phrase to the requesting user;
receiving an audio signal in response to the disposable pass phrase;
determining whether the audio signal represents a voice of the recognized user by comparing the audio signal to a control audio signal that represents the disposable pass phrase spoken by the recognized user; and
authenticating the requesting user as the recognized user upon a condition in which determining determines that the audio signal represents a voice of the recognized user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for verifying a person'"'"'s identity in order to gain access to electronic data, a data network, a physical location, or enable a commercial transaction. A request for identity verification is processed over a data network and the system is initiated which (i) transmits a disposable pass phrase over a data network to the user, (ii) prompts the user to vocalize the disposable pass phrase, a pass phrase, and user id, (iii) compares the recited speech of the user to the stored voiceprint of the user, the stored pass phrase and id of the user, and the generated disposable pass phrase, then (iv) issues a token or signal that represents whether the user was verified or not.
170 Citations
57 Claims
-
1. A method for authenticating a requesting user as a recognized user, the method comprising:
-
receiving a request to authenticate the requesting user as the recognized user;
generating a disposable pass phrase in response to the request;
sending the disposable pass phrase to the requesting user;
receiving an audio signal in response to the disposable pass phrase;
determining whether the audio signal represents a voice of the recognized user by comparing the audio signal to a control audio signal that represents the disposable pass phrase spoken by the recognized user; and
authenticating the requesting user as the recognized user upon a condition in which determining determines that the audio signal represents a voice of the recognized user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer readable medium useful in association with a computer which includes a processor and a memory, the computer readable medium including computer instructions which are configured to cause the computer to authenticate a requesting user as a recognized user by:
-
receiving a request to authenticate the requesting user as the recognized user;
generating a disposable pass phrase in response to the request;
sending the disposable pass phrase to the requesting user;
receiving an audio signal in response to the disposable pass phrase;
determining whether the audio signal represents a voice of the recognized user by comparing the audio signal to a control audio signal that represents the disposable pass phrase spoken by the recognized user; and
authenticating the requesting user as the recognized user upon a condition in which determining determines that the audio signal represents a voice of the recognized user. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A computer system comprising:
-
a processor;
a memory operatively coupled to the processor; and
an authentication module (i) which executes in the processor from the memory and (ii) which, when executed by the processor, causes the computer to authenticate a requesting user as a recognized user by;
receiving a request to authenticate the requesting user as the recognized user;
generating a disposable pass phrase in response to the request;
sending the disposable pass phrase to the requesting user;
receiving an audio signal in response to the disposable pass phrase;
determining whether the audio signal represents a voice of the recognized user by comparing the audio signal to a control audio signal that represents the disposable pass phrase spoken by the recognized user; and
authenticating the requesting user as the recognized user upon a condition in which determining determines that the audio signal represents a voice of the recognized user. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57)
-
Specification