VOICE ACTIVATED APPLICATION FOR MOBILE DEVICES
First Claim
1. A system for performing authentication to enable a user to access a site monitoring system via a user interface, the authentication including voice authentication having at least one threshold that is dynamically adjustable between false-rejection and false-acceptance, the system comprising:
- a memory configured to store the at least one threshold;
a processor in communication with the memory, the processor configured to;
adjust the at least one threshold for the voice authentication, the adjustment to the at least one threshold being based on at least one factor associated with the site monitoring system; and
perform voice authentication based on the adjusted at least one threshold to authenticate the user.
9 Assignments
0 Petitions
Accused Products
Abstract
A system and methods for performing authentication to enable a user to access a site monitoring system are provided. The authentication includes voice authentication having at least one threshold that may be dynamically adjustable between false-rejection and false-acceptance. The system includes a processor configured to adjust the at least one threshold for the voice authentication based on at least one factor associated with the site monitoring system. The processor may be configured to perform voice authentication based on the adjusted at least one threshold to authenticate the user.
314 Citations
25 Claims
-
1. A system for performing authentication to enable a user to access a site monitoring system via a user interface, the authentication including voice authentication having at least one threshold that is dynamically adjustable between false-rejection and false-acceptance, the system comprising:
-
a memory configured to store the at least one threshold; a processor in communication with the memory, the processor configured to; adjust the at least one threshold for the voice authentication, the adjustment to the at least one threshold being based on at least one factor associated with the site monitoring system; and perform voice authentication based on the adjusted at least one threshold to authenticate the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for performing authentication to enable a user to access a site monitoring system via a user interface, the authentication including voice authentication having at least one threshold that is dynamically adjustable between false-rejection and false-acceptance, the method comprising:
-
adjusting the at least one threshold for the voice authentication, the adjustment of the at least one threshold being based on at least one factor associated with the site monitoring system; and performing voice authentication based on the adjusted at least one threshold to authenticate the user. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification