System and method for authentication using speaker verification techniques and fraud model
First Claim
1. A method for authenticating a user for a transaction, comprising:
- providing, by a device, a word string that comprises a random element;
transmitting an audio segment, to a server computer, wherein the audio segment originated from the user and wherein the server computer authenticates the user for the transaction based at least in part on the transmitted audio segment; and
receiving, from the server computer, an indication that the user is authenticated for the transaction, wherein the server computer holds the audio segment in a queue for a predetermined period of time, and delays updating of a fraud model with the audio segment being held in the queue until after the predetermined period of time has elapsed and when no fraud has been reported for the predetermined period of time.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide for speaker verification on a communication device without requiring a user to go through a formal registration process with the issuer or network. Certain embodiments allow the use of a captured voice sample attempting to reproduce a word string having a random element to authenticate the user. Authentication of the user is based on both a match score indicating how closely the captured voice samples match to previously stored voice samples of the user and a pass or fail response indicating whether the voice sample is an accurate reproduction of the word string. The processing network maintains a history of the authenticated transactions and voice samples.
88 Citations
20 Claims
-
1. A method for authenticating a user for a transaction, comprising:
-
providing, by a device, a word string that comprises a random element; transmitting an audio segment, to a server computer, wherein the audio segment originated from the user and wherein the server computer authenticates the user for the transaction based at least in part on the transmitted audio segment; and receiving, from the server computer, an indication that the user is authenticated for the transaction, wherein the server computer holds the audio segment in a queue for a predetermined period of time, and delays updating of a fraud model with the audio segment being held in the queue until after the predetermined period of time has elapsed and when no fraud has been reported for the predetermined period of time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A device, comprising:
-
a processor; and a non-transitory computer-readable storage medium, comprising code executable by the processor for implementing a method for authenticating a user for a transaction, the method comprising; providing, by the device, a word string that comprises a random element; transmitting an audio segment, to a server computer, wherein the audio segment originated from the user and wherein the server computer authenticates the user for the transaction based at least in part on the transmitted audio segment; and receiving, from the server computer, an indication that the user is authenticated for the transaction, wherein the server computer holds the audio segment in a queue for a predetermined period of time, and delays updating of a fraud model with the audio segment being held in the queue until after the predetermined period of time has elapsed and when no fraud has been reported for the predetermined period of time. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification