Digital communication biometric authentication
First Claim
Patent Images
1. A method for authenticating a digital communication, the method comprising:
- responsive to detecting a second end user system receiving a first instant message from a first end user system, transmitting, by an authenticating apparatus, a challenge to the first end user system, wherein the challenge requests a user of the first end user system to speak a phrase including a predetermined portion of a second instant message previously exchanged between the first end user system and the second end user system, the predetermined portion of the second instant message including N integer words of the second instant message;
responsive to receiving a challenge response including response data indicative of the user of the first end user system speaking the phrase, sending the response data to a third party service provider for authentication;
after receiving the challenge response, saving the predetermined portion of the second instant message as an entry in a used phrase database; and
receiving an authentication from the third party service provider that the response data matches a template.
3 Assignments
0 Petitions
Accused Products
Abstract
A biometric authentication system is disclosed that provides authentication capability using biometric data in connection with a challenge for parties engaging in digital communications such as digital text-oriented, interactive digital communications. End-user systems may be coupled to devices that include biometric data capture devices such as retina scanners, fingerprint recorders, cameras, microphones, ear scanners, DNA profilers, etc., so that biometric data of a communicating party may be captured and used for authentication purposes.
-
Citations
13 Claims
-
1. A method for authenticating a digital communication, the method comprising:
-
responsive to detecting a second end user system receiving a first instant message from a first end user system, transmitting, by an authenticating apparatus, a challenge to the first end user system, wherein the challenge requests a user of the first end user system to speak a phrase including a predetermined portion of a second instant message previously exchanged between the first end user system and the second end user system, the predetermined portion of the second instant message including N integer words of the second instant message; responsive to receiving a challenge response including response data indicative of the user of the first end user system speaking the phrase, sending the response data to a third party service provider for authentication; after receiving the challenge response, saving the predetermined portion of the second instant message as an entry in a used phrase database; and receiving an authentication from the third party service provider that the response data matches a template. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A memory storing program instructions, wherein the program instructions, when executed by a processor, perform operations for authenticating an instant messaging session, the operations comprising:
-
responsive to detecting a second end user system receiving a first instant message from a first end user system, transmitting, by an authenticating apparatus, a challenge to the first end user system, wherein the challenge requests a user of the first end user system to speak a phrase comprising a predetermined portion of a second instant message previously exchanged between the first end user system and the second end user system, the predetermined portion of the second instant message comprising N integer words of the second instant message; receiving a challenge response including response data indicative of the user of the first end user system speaking the phrase; after receiving the challenge response, saving the predetermined portion of the second instant message as an entry in a used phrase database; and sending the response data to a third party service provider for authentication; and
receiving an authentication from the third party service provider that the response data matches a template. - View Dependent Claims (9, 10, 11)
-
-
12. A system, comprising:
-
a processor; and memory storing instructions that when executed cause the processor to perform operations, the operations comprising; in response to receiving a first instant message from a communicating party, enabling a biometric authentication system to transmit a challenge to the communicating party, wherein the challenge requests the communicating party to speak a phrase including a predetermined portion of a second instant message previously exchanged between the end user system and the communicating party, the predetermined portion of the second instant message comprising N integer words of the second instant message; receiving a response from the communicating party, wherein the response includes data indicative of the communicating party speaking the phrase including a predetermined portion of the second instant message; after receiving the response, saving the predetermined portion of the second instant message as an entry in a used phrase database; sending the response to a third party service provider for authentication; and receiving an authentication from the third party service provider that the response data matches a template. - View Dependent Claims (13)
-
Specification