SYSTEM AND METHOD FOR AUTHENTICATION USING SPEAKER VERIFICATION TECHNIQUES AND FRAUD MODEL
First Claim
1. A method for authenticating a user for a transaction, comprising:
- providing, by a device, a word string that comprises a random element;
transmitting an audio segment, to a server computer, wherein the audio segment originated from the user;
authenticating the user for the transaction based at least in part on a response, from the server computer, to the transmitted audio segment; and
receiving, from the server computer, an indication that the user is authenticated for the transaction, wherein the indication is received after a delay in updating the fraud model for the user is updated with the audio segment upon the audio segment being held in a queue for a predetermined period of time, and when no fraud has been reported for the predetermined period of time.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide for speaker verification on a communication device without requiring a user to go through a formal registration process with the issuer or network. Certain embodiments allow the use of a captured voice sample attempting to reproduce a word string having a random element to authenticate the user. Authentication of the user is based on both a match score indicating how closely the captured voice samples match to previously stored voice samples of the user and a pass or fail response indicating whether the voice sample is an accurate reproduction of the word string. The processing network maintains a history of the authenticated transactions and voice samples.
-
Citations
20 Claims
-
1. A method for authenticating a user for a transaction, comprising:
-
providing, by a device, a word string that comprises a random element; transmitting an audio segment, to a server computer, wherein the audio segment originated from the user; authenticating the user for the transaction based at least in part on a response, from the server computer, to the transmitted audio segment; and receiving, from the server computer, an indication that the user is authenticated for the transaction, wherein the indication is received after a delay in updating the fraud model for the user is updated with the audio segment upon the audio segment being held in a queue for a predetermined period of time, and when no fraud has been reported for the predetermined period of time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A device, comprising:
-
a processor; and a non-transitory computer-readable storage medium, comprising code executable by the processor for implementing a method for authenticating a user for a transaction, the method comprising; providing, by the device, a word string that comprises a random element; transmitting an audio segment, to a server computer, wherein the audio segment originated from the user; authenticating the user for the transaction based at least in part on a response, from the server computer, to the transmitted audio segment; and receiving, from the server computer, an indication that the user is authenticated for the transaction, wherein the indication is received after a delay in updating the fraud model for the user is updated with the audio segment upon the audio segment being held in a queue for a predetermined period of time, and when no fraud has been reported for the predetermined period of time. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification