SECURITY WITH SPEAKER VERIFICATION
First Claim
1. A method for improving detection and denial of unauthorized access to a user account containing private information, comprising the steps of:
- storing a voice print of an authorized user in a first database on a first computer;
storing answers to predetermined security questions provided by said authorized user in a second database on a second computer;
authenticating all requests for access from a requester prior to granting access to the private information;
said step of authenticating further comprising a step of comparing a voice print obtained from said requester with said stored voice print of said authorized user;
said step of authenticating further comprising a step of comparing responses to said predetermined security questions provided by said requester with said stored answers provided by said authorized user;
if said voice print from said requester and said responses do not provide a satisfactory match based on predetermined criteria, denying access and storing said voice print obtained from said requester in a possibly fraudulent voice print data base on a third computer;
comparing voice prints of future requesters to both said voice print of said authorized user in said second data base and to said voice print in said possibly fraudulent voice print data base;
upon occurrence of a match between said future requester'"'"'s voice print to one in said possibly fraudulent voice print data base, reclassifying said possibly fraudulent voice print as a likely fraudulent voice print; and
locking said user account to said requester.
1 Assignment
0 Petitions
Accused Products
Abstract
A data base is created for storage of voice prints of requesters that are believed to be fraudulently attempting to access information for which they are not authorized to obtain. When a user opens an account a voice print is obtained and stored. The user also provides answers to security related questions. When a requester tries to access the information, they must be authenticated by providing a voice print and answers to the security questions. If the voice print and answers do not result in a satisfactory match based on predetermined criteria, access is denied and the voice print is stored as a possibly fraudulent voice print. Subsequent access attempts are compared to the stored possibly fraudulent voice print which is reclassified as a likely fraudulent voice print if matched. Thus, unauthorized access is less likely.
-
Citations
20 Claims
-
1. A method for improving detection and denial of unauthorized access to a user account containing private information, comprising the steps of:
-
storing a voice print of an authorized user in a first database on a first computer; storing answers to predetermined security questions provided by said authorized user in a second database on a second computer; authenticating all requests for access from a requester prior to granting access to the private information; said step of authenticating further comprising a step of comparing a voice print obtained from said requester with said stored voice print of said authorized user; said step of authenticating further comprising a step of comparing responses to said predetermined security questions provided by said requester with said stored answers provided by said authorized user; if said voice print from said requester and said responses do not provide a satisfactory match based on predetermined criteria, denying access and storing said voice print obtained from said requester in a possibly fraudulent voice print data base on a third computer; comparing voice prints of future requesters to both said voice print of said authorized user in said second data base and to said voice print in said possibly fraudulent voice print data base; upon occurrence of a match between said future requester'"'"'s voice print to one in said possibly fraudulent voice print data base, reclassifying said possibly fraudulent voice print as a likely fraudulent voice print; and locking said user account to said requester. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for improved detection and denial of unauthorized access to a user account containing private information, said system comprising:
-
a first database on a first computer for storing a voice print of an authorized user; a second database on a second computer for storing answers to predetermined security questions provided by said authorized user; means for authenticating all requests for access from a requester prior to granting access to the private information; said means for authenticating further comprises a comparison of a voice print obtained from said requester with said stored voice print of said authorized user; said means for authenticating further comprises a comparison of responses to said predetermined security questions provided by said requester with said stored answers provided by said authorized user; a possibly fraudulent voice print data base on a third computer for storing said voice print obtained from said requester if said voice print from said requester and said responses do not provide a satisfactory match, based on predetermined criteria, and means for denying access to the user account by said requester; means for comparing voice prints of future requesters to both said voice print of said authorized user in said second data base and to said voice print in said possibly fraudulent voice print data base; upon occurrence of a match between said future requester'"'"'s voice print to one in said possibly fraudulent voice print data base, means for reclassifying said possibly fraudulent voice print as a likely fraudulent voice print; and means for locking said user account to said requester. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product embodied in a computer readable medium for improved detection and denial of unauthorized access to a user account containing private information, said computer program product comprising:
-
a first database on a first computer for storing a voice print of an authorized user; a second database on a second computer for storing answers to predetermined security questions provided by said authorized user; means for authenticating all requests for access from a requester prior to granting access to the private information; said means for authenticating further comprises a comparison of a voice print obtained from said requester with said stored voice print of said authorized user; said means for authenticating further comprises a comparison of responses to said predetermined security questions provided by said requester with said stored answers provided by said authorized user; a possibly fraudulent voice print data base on a third computer for storing said voice print obtained from said requester if said voice print from said requester and said responses do not provide a satisfactory match, based on predetermined criteria, and means for denying access to the user account by said requester; means for comparing voice prints of future requesters to both said voice print of said authorized user in said second data base and to said voice print in said possibly fraudulent voice print data base; upon occurrence of a match between said future requester'"'"'s voice print to one in said possibly fraudulent voice print data base, means for reclassifying said possibly fraudulent voice print as a likely fraudulent voice print; and means for locking said user account to said requester. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification