System and Method for Radio Frequency Identifier Voice Signature
First Claim
1. A computer implemented method for ensuring authenticity of a user, comprising:
- translating a user'"'"'s first signature into a user'"'"'s second signature; and
deploying the user'"'"'s second signature to assure authenticity of the user.
3 Assignments
0 Petitions
Accused Products
Abstract
Conventional techniques for logging and using a user'"'"'s signature are insecure and inflexible. A system and method are provided which: i) translate a user'"'"'s first signature, such as a user'"'"'s voice signature, into a user'"'"'s second signature, such as a radio frequency identifier signature; and ii) deploy the user'"'"'s second signature. By translating the user'"'"'s first signature into the user'"'"'s second signature and deploying the user'"'"'s second signature, the provided technique assures the authenticity of the user. Furthermore, the provided system and method enable additional authentication factors, such as a user'"'"'s personal identification number, to be used with the user'"'"'s first and second signatures in multiple combinations and sequences to assure the authenticity of the user. As such, the invention provides a security layer offering added security and added flexibility previously unavailable, and which may be applied in a variety of contexts, such as a user device or a retail transaction.
-
Citations
25 Claims
-
1. A computer implemented method for ensuring authenticity of a user, comprising:
-
translating a user'"'"'s first signature into a user'"'"'s second signature; and deploying the user'"'"'s second signature to assure authenticity of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer system for ensuring authenticity of a user comprising:
-
a translating unit configured to translate a user'"'"'s first signature into a user'"'"'s second signature; and a deploying unit coupled to the translating unit configured to deploy the user'"'"'s second signature to assure authenticity of the user. - View Dependent Claims (21, 22, 23)
-
-
24. A computer system for ensuring authenticity of a user comprising:
-
means for translating a user'"'"'s first signature into a user'"'"'s second signature; and means for deploying the user'"'"'s second signature to assure authenticity of the user.
-
-
25. A computer program product comprising a computer usable medium embodying computer usable code for ensuring authenticity of a user, the computer program product including;
- computer usable program code for translating a user'"'"'s first signature into a user'"'"'s second signature, and deploying the user'"'"'s second signature to assure authenticity of the user.
Specification