Systems and methods for providing network-based voice authentication
First Claim
1. A method comprising:
- receiving, by a network device, a request to perform a transaction,the request being received from a device of a user,the transaction corresponding to a particular type of transaction;
determining, by the network device, an authentication level, of a plurality of authentication levels, associated with the request,the authentication level being determined based on the transaction corresponding to the particular type of transaction;
selecting, by the network device, an access telephone number,the access telephone number being selected, from a plurality of access numbers, based on the authentication level,each of the plurality of access numbers being associated with a different authentication level of the plurality of authentication levels;
transferring, by the network device, the request and information regarding the authentication level to a different network device to perform speaker verification of the user for the transaction,the request being transferred using the selected access telephone number,the information regarding the authentication level being transferred after determining the authentication level,the different network device performing, based on the authentication level, the speaker verification of the user to generate a verification score associated with the transaction;
receiving, by the network device, the verification score from the different network device; and
performing, by the network device, the transaction based on the verification score.
5 Assignments
0 Petitions
Accused Products
Abstract
A system enables voice authentication via a network. The system may include an intelligent voice response engine operatively coupled to the network for receiving transaction or access requests from a plurality of telecommunications devices over the network. A speech recognition and verification services engine may be operatively coupled to the network and a database may be operatively coupled to the speech recognition and verification services engine for storing user voice print profiles. The speech recognition and verification services engine may receive a speaker verification call from the intelligent voice response engine and perform speaker verification on the received speaker verification call based on the stored user voice print profiles. The speech recognition and verification services engine may generate a verification score based upon results of the speaker verification.
15 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a network device, a request to perform a transaction, the request being received from a device of a user, the transaction corresponding to a particular type of transaction; determining, by the network device, an authentication level, of a plurality of authentication levels, associated with the request, the authentication level being determined based on the transaction corresponding to the particular type of transaction; selecting, by the network device, an access telephone number, the access telephone number being selected, from a plurality of access numbers, based on the authentication level, each of the plurality of access numbers being associated with a different authentication level of the plurality of authentication levels; transferring, by the network device, the request and information regarding the authentication level to a different network device to perform speaker verification of the user for the transaction, the request being transferred using the selected access telephone number, the information regarding the authentication level being transferred after determining the authentication level, the different network device performing, based on the authentication level, the speaker verification of the user to generate a verification score associated with the transaction; receiving, by the network device, the verification score from the different network device; and performing, by the network device, the transaction based on the verification score. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
a network device to; receive a request to perform a transaction, the request being received from a device of a user, determine, based on the request, a security level of a plurality of security levels for the request, select an access telephone number, the access telephone number being selected, from a plurality of access numbers, based on the security level, transmit, after determining the security level, to a different network device; a key, the request, and information identifying the security level, the key, the request, and the information identifying the security level being transmitted to the different network device to perform speaker verification of the user for the transaction, the request being transmitted to the different network device using the access telephone number, the different network device performing, based on the security level, the speaker verification of the user to generate a score associated with the transaction, receive the score and the key from the different network device based on transmitting the key, the request, and the information identifying the security level, identify, based on the key, the request after receiving the score and the key, and perform, based on the score, the transaction. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A network device comprising:
-
a memory to store one or more instructions; and a processor to execute the one or more instructions to; receive, via a first network connection, a key and information identifying a security level, of a plurality of security levels, from a different network device, the security level and the key being associated with a call transferred to the network device, by the different network device, via a second network connection that is different than the first network connection, the call being transferred using an access telephone number selected, from a plurality of access numbers, based on the security level, the security level being determined by the other network device prior to the security level being received by the network device, the security level and the key being received to perform speaker verification of a user associated with the call, associate the security level with the transferred call based on the key, perform, at a level corresponding to the security level and using a user profile that is associated with the user, the speaker verification of the user to generate a result, transfer, based on performing the speaker verification and via the second network connection, the call back to the different network device, and transmit, via the first network connection, the result and the key to the different network device, the different network device performing a transaction associated with the call based on the result. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification