SYSTEM, DEVICE, AND METHOD FOR SECURING VOICE AUTHENTICATION AND END-TO-END SPEECH INTERACTION
First Claim
1. A computing device for securely transferring audio, the computing device comprising:
- a central processing unit;
a system memory that is accessible by the central processing unit;
a secure memory that is inaccessible by the central processing unit;
a speaker to output audio based on received audio data;
an audio co-processor to receive encrypted audio data from an application executed on the computing device; and
a security co-processor to (i) decrypt the encrypted audio data and (ii) store the decrypted audio data in the secure memory;
wherein the audio co-processor is further to retrieve the decrypted audio data from the secure memory and (ii) provide the decrypted audio data to the speaker for output.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, device, and system for secure end-to-end audio recognition is disclosed. A client device launches an application that connects with a server. The client device and server exchange cryptographic keys and establish a secure connection and a shared cryptographic key. The server transmits an encrypted audio prompt to the client device. The client device decrypts the encrypted audio prompt and stores the decrypted audio prompt in secure memory inaccessible to the operating system using an audio engine of the client device. The audio engine then retrieves the audio and renders it for the user through the speakers of the client device. The client device captures the user'"'"'s audio response with a microphone and stores the audio response in the secure memory. The stored audio response is encrypted and transmitted to the server.
-
Citations
20 Claims
-
1. A computing device for securely transferring audio, the computing device comprising:
-
a central processing unit; a system memory that is accessible by the central processing unit; a secure memory that is inaccessible by the central processing unit; a speaker to output audio based on received audio data; an audio co-processor to receive encrypted audio data from an application executed on the computing device; and a security co-processor to (i) decrypt the encrypted audio data and (ii) store the decrypted audio data in the secure memory; wherein the audio co-processor is further to retrieve the decrypted audio data from the secure memory and (ii) provide the decrypted audio data to the speaker for output. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for securely transferring audio on a computing device, the method comprising:
-
receiving, with an audio co-processor different from a central processing unit of the computing device, encrypted audio data from an application executed on the computing device; decrypting, by a security co-processor different from the central processing unit, the encrypted audio data; storing, by the security co-processor, the decrypted audio data in a secure memory inaccessible by the central processing unit; retrieving, with the audio co-processor of the computing device, the decrypted audio data from the secure memory; and providing, by the audio co-processor, the decrypted audio data to a speaker of the computing device for output. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computing device for securely capturing audio, the computing device comprising:
-
a central processing unit; a system memory that is accessible by the central processing unit; a secure memory that is inaccessible by the central processing unit; a microphone to generate audio data based on captured audio; an audio co-processor to (i) receive the audio data generated by the microphone and (ii) store the received audio data in the secure memory; and a security co-processor to (i) retrieve the captured audio data from the secure memory, (ii) encrypt the retrieved audio data, and (iii) store the encrypted audio data in the system memory. - View Dependent Claims (14, 15, 16)
-
-
17. A method for securely capturing audio on a computing device, the method comprising:
-
capturing, with an audio co-processor different from a central processing unit of the computing device, audio data generated by a microphone; storing, by the audio co-processor, the captured audio data in a secure memory inaccessible by the central processing unit; retrieving, with a security co-processor different from the central processing unit, the captured audio data from the secure memory; encrypting, by the security co-processor, the retrieved audio data; and storing the encrypted audio data in a system memory that is accessible by the central processing unit. - View Dependent Claims (18, 19, 20)
-
Specification