PERSONAL ASSISTANT AUTHENTICATION
First Claim
1. A mobile computing device comprising a computer memory and a computer processor that is configured to allow a personal digital assistant to perform tasks with an online service upon validating a user instruction, the mobile computing device comprising:
- the personal digital assistant that is a computer program stored on the computer memory having code configured to;
(1) receive an audible request for the personal digital assistant to perform a task through the online service, the online service accessible to the mobile computing device through a network connection;
(2) determine that a security-challenge authentication procedure required for the personal digital assistant to perform the task through the online service requires a user to respond to a user interrogation to authenticate the user;
(3) generate the user interrogation which comprises a question having a correct answer by retrieving a fact from a set of semantic knowledge associated with the user and forming the question where the fact is the correct answer to the question;
(4) provide the question to the user;
(5) receive a response to the question from the user;
(6) determine that the security-challenge authentication procedure is satisfied because the response is the correct answer; and
(7) instruct the online service to perform the task by communicating security credentials to the online service that confirm that the security-challenge authentication procedure has been satisfied and providing instructions about the task to the online service.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects of the technology described herein provide a mechanism to authenticate a task request received by a personal digital assistant. The authentication mechanism improves security for transactions facilitated by the personal digital assistant. The authentication mechanism can also improve machine and user efficiency by streamlining a transaction process. In one aspect, the request is a verbal request made by a person and received by the personal digital assistant through a microphone. The personal assistant can generate an authentication questions using data from a semantic knowledge base accessible to the personal digital assistant.
-
Citations
20 Claims
-
1. A mobile computing device comprising a computer memory and a computer processor that is configured to allow a personal digital assistant to perform tasks with an online service upon validating a user instruction, the mobile computing device comprising:
the personal digital assistant that is a computer program stored on the computer memory having code configured to; (1) receive an audible request for the personal digital assistant to perform a task through the online service, the online service accessible to the mobile computing device through a network connection; (2) determine that a security-challenge authentication procedure required for the personal digital assistant to perform the task through the online service requires a user to respond to a user interrogation to authenticate the user; (3) generate the user interrogation which comprises a question having a correct answer by retrieving a fact from a set of semantic knowledge associated with the user and forming the question where the fact is the correct answer to the question; (4) provide the question to the user; (5) receive a response to the question from the user; (6) determine that the security-challenge authentication procedure is satisfied because the response is the correct answer; and (7) instruct the online service to perform the task by communicating security credentials to the online service that confirm that the security-challenge authentication procedure has been satisfied and providing instructions about the task to the online service. - View Dependent Claims (2, 3, 4, 5)
-
6. One or more computer storage media storing computer-executable instructions that, when executed by a computing device having a processor, cause the computing device to perform a method of authenticating a request received by a personal digital assistant, the method comprising:
-
receiving from a user a verbal request for the personal digital assistant running on a user device to perform a task through an online service; determining that a security-challenge authentication procedure is required for the personal digital assistant to perform the task through the online service; determining that the security-challenge authentication procedure requires the user to respond to a user interrogation to authenticate the user; generating by the personal digital assistant the user interrogation by retrieving a fact from a set of semantic knowledge associated with the user and forming a question where the fact is a correct answer to the question; providing the user interrogation to the user audibly through a speaker in the user device; receiving an audible response to the user interrogation from the user through a microphone associated with the user device; determining that the security-challenge authentication procedure is satisfied by comparing the audible response to the fact; and upon determining that the security-challenge authentication procedure is satisfied, communicating an instruction to the online service to perform the task. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A method for authorizing a digital personal assistant to conduct a transaction with a third party comprising:
-
receiving from a user a request for a computing application running on a user device to perform a task through an online service that requires security credentials from the user to complete the task, the online service is accessible to the user device through a network connection;
determining that a security-challenge authentication procedure required for the computing application to perform the task through the online service requires the user to respond to a user interrogation to authenticate the user;generating the user interrogation by retrieving a fact from a set of semantic knowledge associated with the user and forming a question where the fact is a correct answer to the question; providing the question to the user; receiving a response to the question from the user; based on the response, determining that the security-challenge authentication procedure is satisfied because the response is the fact; and upon determining that the security-challenge authentication procedure is satisfied, instructing the online service to perform the task by communicating the security credentials to the online service and providing instructions about the task to the online service. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification