Authenticating a caller before providing the caller with access to one or more secured resources
First Claim
1. A self-learning caller authentication system for building a database of known persons with access to one or more secured resources comprising:
- storage for voiceprint identification data;
storage for verification data; and
a processing system configured toreceive spoken identification information spoken in a current call initiated by a currently unidentified caller,receive verification information from the current call that is independent of the spoken identification information,generate a voiceprint associated with the currently unidentified caller from the spoken identification information,automatically compare the voiceprint associated with the currently unidentified caller with the voiceprint identification data stored in the voiceprint identification data storage to search for a voiceprint match with at least one of a plurality of known persons, one or more voiceprint matches, if found, signifying positive identification of the currently unidentified caller as at least one of the plurality of known persons, and a single voiceprint match, if found, signifying positive identification of the currently unidentified caller as a particular one of the plurality of known persons, with one or more voiceprint matches found identifying the currently unidentified caller as a now identified caller,if one or more voiceprint matches are found by automatically comparing the voiceprint with the voiceprint identification data, automatically compare the verification information with the verification data stored in the verification data storage for the at least one of the plurality of known persons to search for a verification data match with a particular one of the plurality of known persons, a single verification data match, if found, signifying positive verification of the now identified caller and verifying the now identified caller as a now identified and verified caller,if the currently unidentified caller is determined to be a now identified and verified caller by automatically comparing the verification information, authenticate the now identified and verified caller for access to the one or more secured resources, andif the currently unidentified caller is not determined to be a now identified and verified caller by automatically comparing the verification information, allow interaction with the currently unidentified caller to separately verify the identity of the currently unidentified caller, andif the currently unidentified caller is verified as a now identified and verified caller,automatically add the voiceprint and the verification information associated with the now identified and verified caller to the voiceprint identification data storage and the verification data storage, respectively, andauthenticate the now identified and verified caller for access to the one or more secured resources.
5 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a system authenticates a caller before providing the caller with access to one or more secured resources. Identification and verification data is stored during system enrollment of known persons. A processing system, in a current call initiated by a caller and prior to identification of the caller, receives voice-based information for the caller including a digital representation of a telephone number spoken by the caller in the current call, the received information including voice-based identification information and voice-based verification information for the caller. The processing system automatically compares the received identification information and the received verification information for the caller with the stored identification and verification data for known persons, respectively, to uniquely identify and verify the identity of the caller as a particular known person. The processing system authenticates the caller for access to the one or more secured resources in response.
82 Citations
24 Claims
-
1. A self-learning caller authentication system for building a database of known persons with access to one or more secured resources comprising:
-
storage for voiceprint identification data; storage for verification data; and a processing system configured to receive spoken identification information spoken in a current call initiated by a currently unidentified caller, receive verification information from the current call that is independent of the spoken identification information, generate a voiceprint associated with the currently unidentified caller from the spoken identification information, automatically compare the voiceprint associated with the currently unidentified caller with the voiceprint identification data stored in the voiceprint identification data storage to search for a voiceprint match with at least one of a plurality of known persons, one or more voiceprint matches, if found, signifying positive identification of the currently unidentified caller as at least one of the plurality of known persons, and a single voiceprint match, if found, signifying positive identification of the currently unidentified caller as a particular one of the plurality of known persons, with one or more voiceprint matches found identifying the currently unidentified caller as a now identified caller, if one or more voiceprint matches are found by automatically comparing the voiceprint with the voiceprint identification data, automatically compare the verification information with the verification data stored in the verification data storage for the at least one of the plurality of known persons to search for a verification data match with a particular one of the plurality of known persons, a single verification data match, if found, signifying positive verification of the now identified caller and verifying the now identified caller as a now identified and verified caller, if the currently unidentified caller is determined to be a now identified and verified caller by automatically comparing the verification information, authenticate the now identified and verified caller for access to the one or more secured resources, and if the currently unidentified caller is not determined to be a now identified and verified caller by automatically comparing the verification information, allow interaction with the currently unidentified caller to separately verify the identity of the currently unidentified caller, and if the currently unidentified caller is verified as a now identified and verified caller, automatically add the voiceprint and the verification information associated with the now identified and verified caller to the voiceprint identification data storage and the verification data storage, respectively, and authenticate the now identified and verified caller for access to the one or more secured resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for authenticating a caller and automatically building a database of known persons with access to one or more secured resources comprising:
-
receiving spoken identification information spoken in a current call initiated by a currently unidentified caller; receiving verification information from the current call that is independent of the spoken identification information; generating a voiceprint associated with the currently unidentified caller from the spoken identification information; receiving stored voiceprint identification data that was stored during system enrollment of a plurality of known persons; automatically comparing the voiceprint associated with the currently unidentified caller with the stored voiceprint identification data to search for a voiceprint match with at least one of the plurality of known persons, one or more voiceprint matches, if found, signifying positive identification of the currently unidentified caller as at least one of the plurality of known persons, and a single voiceprint match, if found, signifying positive identification of the currently unidentified caller as a particular one of the plurality of known persons, with one or more voiceprint matches found identifying the currently unidentified caller as a now identified caller; receiving stored verification data that was stored during the system enrollment of the plurality of known persons; if one or more voiceprint matches are found by automatically comparing the voiceprint with the stored voiceprint identification data, automatically comparing the verification information with the stored verification data for the at least one of the plurality of known persons to search for a verification data match with a particular one of the plurality of known persons, a single verification data match, if found, signifying positive verification of the now identified caller and verifying the now identified caller as a now identified and verified caller; if the currently unidentified caller is determined to be a now identified and verified caller by automatically comparing the verification information, authenticating the now identified and verified caller for access to the one or more secured resources; and if the currently unidentified caller is not determined to be a now identified and verified caller by automatically comparing the verification information, interacting with the currently unidentified caller to identify and verify the currently unidentified caller as a now identified and verified caller, and if the currently unidentified caller is identified and verified as a now identified and verified caller by interacting, automatically adding the voiceprint and the verification information associated with the now identified and verified caller to the stored voiceprint identification data and the stored verification data, respectively, and authenticating the now identified and verified caller for access to the one or more secured resources. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. Software for authenticating a caller and automatically building a database of known persons with access to one or more secured resources, the software being embodied in tangible computer-readable media and operable to:
-
receive spoken identification information spoken in a current call initiated by a currently unidentified caller; receive verification information from the current call that is independent of the spoken identification information; generate a voiceprint associated with the currently unidentified caller from the spoken identification information; receive stored voiceprint identification data that was stored during system enrollment of a plurality of known persons; automatically compare the voiceprint associated with the currently unidentified caller with the stored voiceprint identification data to search for a voiceprint match with at least one of the plurality of known persons, one or more voiceprint matches, if found, signifying positive identification of the currently unidentified caller as at least one of the plurality of known persons, and a single voiceprint match, if found, signifying positive identification of the currently unidentified caller as a particular one of the plurality of known persons, with one or more voiceprint matches found identifying the currently unidentified caller as a now identified caller; receive stored verification data that was stored during the system enrollment of the plurality of known persons; if one or more voiceprint matches are found by automatically comparing the voiceprint with the stored voiceprint identification data, automatically compare the verification information with the stored verification data for the at least one of the plurality of known persons to search for a verification data match with a particular one of the plurality of known persons, a single verification data match, if found, signifying positive verification of the now identified caller and verifying the now identified caller as a now identified and verified caller; if the currently unidentified caller is determined to be a now identified and verified caller by automatically comparing the verification information, authenticate the now identified and verified caller for access to the one or more secured resources; and if the currently unidentified caller is not determined to be a now identified and verified caller by automatically comparing the verification information, interact with the currently unidentified caller to identify and verify the currently unidentified caller as a now identified and verified caller, and if the currently unidentified caller is identified and verified as a now identified and verified caller by the interaction, automatically add the voiceprint and the verification information associated with the now identified and verified caller to the stored voiceprint identification data and the stored verification data, respectively, and authenticate the now identified and verified caller for access to the one or more secured resources.
-
Specification