System and method for radio frequency identifier voice signature
First Claim
1. A computer implemented method, comprising:
- recording, by a portable communication device, a user'"'"'s voice as a user'"'"'s first signature;
receiving, by the portable communication device, a personal identification number (PIN) of a user;
identifying, by the portable communication device, a master copy of the user'"'"'s voice associated with the PIN;
verifying, by the portable communication device, the user'"'"'s first signature against the master copy;
determining, by the portable communication device, a computer-generated radio frequency identification (RFID) code associated with the master copy in response to verifying the user'"'"'s first signature;
creating, by the portable communication device, a user'"'"'s second signature comprising the RFID code and the user'"'"'s first signature, wherein the RFID code and the user'"'"'s first signature are each separately used to authenticate the user in a sequence comprising the user'"'"'s first signature followed by the RFID code, or the RFID code followed by the user'"'"'s first signature; and
wirelessly transmitting, by the portable communication device, the user'"'"'s second signature in an authentication transaction.
3 Assignments
0 Petitions
Accused Products
Abstract
Conventional techniques for logging and using a user'"'"'s signature are insecure and inflexible. A system and method are provided which: i) translate a user'"'"'s first signature, such as a user'"'"'s voice signature, into a user'"'"'s second signature, such as a radio frequency identifier signature; and ii) deploy the user'"'"'s second signature. By translating the user'"'"'s first signature into the user'"'"'s second signature and deploying the user'"'"'s second signature, the provided technique assures the authenticity of the user. Furthermore, the provided system and method enable additional authentication factors, such as a user'"'"'s personal identification number, to be used with the user'"'"'s first and second signatures in multiple combinations and sequences to assure the authenticity of the user. As such, the invention provides a security layer offering added security and added flexibility previously unavailable, and which may be applied in a variety of contexts, such as a user device or a retail transaction.
-
Citations
25 Claims
-
1. A computer implemented method, comprising:
-
recording, by a portable communication device, a user'"'"'s voice as a user'"'"'s first signature; receiving, by the portable communication device, a personal identification number (PIN) of a user; identifying, by the portable communication device, a master copy of the user'"'"'s voice associated with the PIN; verifying, by the portable communication device, the user'"'"'s first signature against the master copy; determining, by the portable communication device, a computer-generated radio frequency identification (RFID) code associated with the master copy in response to verifying the user'"'"'s first signature; creating, by the portable communication device, a user'"'"'s second signature comprising the RFID code and the user'"'"'s first signature, wherein the RFID code and the user'"'"'s first signature are each separately used to authenticate the user in a sequence comprising the user'"'"'s first signature followed by the RFID code, or the RFID code followed by the user'"'"'s first signature; and wirelessly transmitting, by the portable communication device, the user'"'"'s second signature in an authentication transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A portable communication device comprising:
-
a recording device configured to record a user'"'"'s original voice as a user'"'"'s voice signature; an input device configured to receive a personal identification number (PIN); a database configured to store a master copy of the user'"'"'s original voice, wherein the master copy is associated with the PIN; and a processing device configured to; compare the user'"'"'s voice signature against the master copy to verify the user'"'"'s voice signature; identify a computer-generated radio frequency identification (RFID) code that is associated with a user in the database in response to the user'"'"'s voice signature being verified, wherein the RFID code is periodically changed; create a user'"'"'s second signature comprising the computer-generated identification code and the user'"'"'s voice signature, wherein the RFID code and the user'"'"'s voice signature are each separately used to authenticate the user in a sequence comprising the user'"'"'s voice signature followed by the RFID code, or the RFID code followed by the user'"'"'s voice signature; and wirelessly transmit the user'"'"'s second signature. - View Dependent Claims (15, 16, 21, 24)
-
-
17. A portable communication device comprising:
-
means for recording a user'"'"'s voice as a user'"'"'s first signature; means for identifying a master copy of the user'"'"'s voice associated with the user'"'"'s first signature; means for comparing the user'"'"'s first signature against the master copy to identify the user'"'"'s first signature; means for determining a computer-generated radio frequency identification (RFID) code associated with the master copy, wherein the RFID code is periodically changed; means for creating a user'"'"'s second signature comprising the RFID code and the user'"'"'s first signature, wherein the user'"'"'s second signature is created in response to the user'"'"'s first signature being identified, and wherein each of the RFID code and the user'"'"'s first signature are used to individually authenticate the user in a sequence comprising the user'"'"'s first signature followed by the RFID code, or the RFID code followed by the user'"'"'s first signature; and means for wirelessly transmitting the user'"'"'s second signature. - View Dependent Claims (18, 19, 20)
-
-
22. A non-transitory computer-readable medium having stored thereon computer-executable instructions that, in response to execution by a portable communication device, cause the portable communication device to perform operations comprising:
-
recording a user'"'"'s voice as a user'"'"'s first signature; comparing the user'"'"'s first signature against a master copy of the user'"'"'s voice to authenticate the user'"'"'s first signature; identifying a computer-generated Electronic Product Code (EPC) associated with the master copy; creating a user'"'"'s second signature comprising the EPC and the user'"'"'s first signature in response to the user'"'"'s first signature being authenticated, wherein each of the EPC and the user'"'"'s first signature are used to individually authenticate the user in a sequence comprising the first signature followed by the EPC, or the EPC followed by the user'"'"'s first signature; and transmitting the user'"'"'s second signature in an authentication transaction. - View Dependent Claims (23, 25)
-
Specification