Dialogue-driven user security levels
First Claim
Patent Images
1. A computing system comprising:
- one or more processors;
at least one microphone to receive a plurality of audio inputs from a user, the plurality of audio inputs comprising a first audio input, a second audio input, and a third audio input;
one or more computer-readable storage media storing computer-executable instructions;
a speech processing module maintained in the one or more computer-readable storage media and executed by the one or more processors to;
obtain first speech recognition results from a first signal representing the first audio input;
obtain second speech recognition results from a second signal representing the second audio input;
obtain third speech recognition results from a third signal representing the third audio input;
determine a first requested functionality associated with the first speech recognition results;
determine a second requested functionality associated with the second speech recognition results; and
determine a third requested functionality associated with the third speech recognition results;
a security requirements module maintained in the one or more computer-readable storage media and executed by the one or more processors to;
determine that there are no security requirements for the first requested functionality;
determine an identification security requirement for the second requested functionality;
determine an authentication security requirement for the third requested functionality;
determine that the identification security requirement is satisfied using identification information received from the user; and
determine that the authentication security requirement is satisfied using authentication information received from the user; and
an application module maintained in the one or more computer-readable storage media and executed by the one or more processors to execute the first requested functionality, the second requested functionality, and the third requested functionality.
2 Assignments
0 Petitions
Accused Products
Abstract
Natural language controlled devices may be implemented in an environment where the devices are configured to operate with multiple different users. The techniques described herein implement security requirements for a device configured to operate in an environment where the multiple different users may request functionality. The security requirements may be implemented based on the whether the functionality requested is personal and/or secured.
84 Citations
28 Claims
-
1. A computing system comprising:
-
one or more processors; at least one microphone to receive a plurality of audio inputs from a user, the plurality of audio inputs comprising a first audio input, a second audio input, and a third audio input; one or more computer-readable storage media storing computer-executable instructions; a speech processing module maintained in the one or more computer-readable storage media and executed by the one or more processors to; obtain first speech recognition results from a first signal representing the first audio input; obtain second speech recognition results from a second signal representing the second audio input; obtain third speech recognition results from a third signal representing the third audio input; determine a first requested functionality associated with the first speech recognition results; determine a second requested functionality associated with the second speech recognition results; and determine a third requested functionality associated with the third speech recognition results; a security requirements module maintained in the one or more computer-readable storage media and executed by the one or more processors to; determine that there are no security requirements for the first requested functionality; determine an identification security requirement for the second requested functionality; determine an authentication security requirement for the third requested functionality; determine that the identification security requirement is satisfied using identification information received from the user; and determine that the authentication security requirement is satisfied using authentication information received from the user; and an application module maintained in the one or more computer-readable storage media and executed by the one or more processors to execute the first requested functionality, the second requested functionality, and the third requested functionality. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving, at a computing device, a signal comprising speech input of a user; determining a requested functionality from the speech input using at least one of speech recognition and natural language understanding; determining a security requirement associated with the requested functionality; determining that the security requirement is satisfied; and performing the requested functionality. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. One or more non-transitory computer-readable media having computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
receiving a signal comprising speech input of a user, the user being one of a plurality of users registered at a device; determining a requested functionality from the speech input using at least one of speech recognition and natural language understanding; determining that the requested functionality involves a security requirement; determining that the user has satisfied the security requirement; and executing the requested functionality after the user has satisfied the security requirement. - View Dependent Claims (19, 20, 21)
-
-
22. One or more non-transitory computer-readable media having computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
receiving a first signal comprising speech input from a user; determining a requested functionality from the speech input using at least one of speech recognition and natural language understanding; determining that the requested functionality requires user authentication as a security requirement before execution; requesting that the user provide one or more authentication credentials; receiving a second signal corresponding to the one or more authentication credentials; determining that the one or more authentication credential satisfy the security requirement; and executing the requested functionality. - View Dependent Claims (23, 24)
-
-
25. A method comprising:
-
operating a voice-controlled device in a first mode that executes a first function independent of user identification and user authentication; receiving a request to perform a second function; determining that the second function requires user identification or user authentication; switching operation of the voice-controlled device from a first mode to a second mode that involves user identification or user authentication as a security requirement; accessing information that identifies or authenticates a user that provides the request; creating a session for the user, wherein the second function is executed during the session; terminating the session after a pre-determined period of time; and switching operation of the voice-controlled device from the second mode to the first mode after the session is terminated. - View Dependent Claims (26, 27, 28)
-
Specification