Device access using voice authentication
First Claim
Patent Images
1. A method comprising:
- at an electronic device;
while the device is in a locked state, receiving non-voice authentication information from a user to put the device into an unlocked state;
receiving a first speech input from the user;
in response to authenticating that the user is an authorized user of the device, transmitting the first speech input to a voiceprint service for generating a voiceprint based on the first speech input;
receiving a second speech input at the device while the device is in a locked state, the second speech input including a command associated with a restricted feature of the device;
determining whether the second speech input was spoken by an authorized user of the device, the determining including comparing the second speech input to the generated voiceprint;
while comparing the second speech input to the voiceprint, processing the second speech input to identify the command; and
upon determining that the second speech input was spoken by the authorized user, providing access to the restricted feature of the device according to the command included in the second speech input, where the method is performed by one or more processors of the device.
1 Assignment
0 Petitions
Accused Products
Abstract
A device can be configured to receive speech input from a user. The speech input can include a command for accessing a restricted feature of the device. The speech input can be compared to a voiceprint (e.g., text-independent voiceprint) of the user'"'"'s voice to authenticate the user to the device. Responsive to successful authentication of the user to the device, the user is allowed access to the restricted feature without the user having to perform additional authentication steps or speaking the command again. If the user is not successfully authenticated to the device, additional authentication steps can be request by the device (e.g., request a password).
3698 Citations
25 Claims
-
1. A method comprising:
at an electronic device; while the device is in a locked state, receiving non-voice authentication information from a user to put the device into an unlocked state; receiving a first speech input from the user; in response to authenticating that the user is an authorized user of the device, transmitting the first speech input to a voiceprint service for generating a voiceprint based on the first speech input; receiving a second speech input at the device while the device is in a locked state, the second speech input including a command associated with a restricted feature of the device; determining whether the second speech input was spoken by an authorized user of the device, the determining including comparing the second speech input to the generated voiceprint; while comparing the second speech input to the voiceprint, processing the second speech input to identify the command; and upon determining that the second speech input was spoken by the authorized user, providing access to the restricted feature of the device according to the command included in the second speech input, where the method is performed by one or more processors of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A method comprising:
while a device is in a locked state; receiving a speech input at the device, the speech input including a command associated with a restricted feature of the device; authenticating, using the speech input, whether the speech input is spoken by an authorized user of the device, wherein the authenticating includes comparing the speech input to a previously generated voiceprint; in response to authenticating that the speech input is spoken by an authorized user of the device, executing the command identified in the speech input to invoke the restricted feature of the device; and in response to not authenticating that the speech input is spoken by an authorized user of the device, forgo executing the command identified in the speech input to invoke the restricted feature of the device;
where the method is performed by one or more processors of the device.- View Dependent Claims (11, 12)
-
13. A method comprising:
-
receiving, at a device, a first speech input from a user; generating a voice sample based on the first speech input; in response to authenticating that the user is an authorized user of the device, transmitting the voice sample to a voiceprint service for generating a text-independent voiceprint based on the voice sample, wherein the text-independent voiceprint is configured to be compared to subsequent speech inputs received at the device; and while the device is in a locked state; receiving a second speech input at the device, the second speech input including a command associated with a restricted feature of the device; authenticating, using the second speech input, whether the second speech input is spoken by an authorized user of the device, wherein the authenticating includes comparing the second speech input to the text-independent voiceprint; in response to authenticating that the second speech input is spoken by an authorized user of the device, executing the command identified in the speech input to invoke the restricted feature of the device; and in response to not authenticating that the speech input is spoken by an authorized user of the device, forgo executing the command identified in the speech input to invoke the restricted feature of the device, where the method is performed by one or more processors of the device. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium including one or more sequences of instructions which, when executed by one or more processors, causes:
-
while a device is in a locked state, receiving non-voice authentication information from a user to put the device into an unlocked state; receiving, at the device, a first speech input from the user; in response to authenticating that the user is an authorized user of the device, transmitting the first speech input to a voiceprint service for generating a voiceprint based on the first speech input; receiving a second speech input at the device while the device is in a locked state, the second speech input including a command associated with a restricted feature of the device; determining whether the second speech input was spoken by an authorized user of the device, the determining including comparing the second speech input to the generated voiceprint; while comparing the second speech input to the voiceprint, processing the second speech input to identify the command; and upon determining that the second speech input was spoken by the authorized user, providing access to the restricted feature of the device according to the command included in the second speech input. - View Dependent Claims (19)
-
-
20. A system comprising:
-
at least one processor; memory storing a voiceprint; and a computer-readable medium including instructions which, when executed by the at least one processor, causes; while a device is in a locked state, receiving non-voice authentication information from a user to put the device into an unlocked state; receiving, at the device, a first speech input from the user; in response to authenticating that the user is an authorized user of the device, transmitting the first speech input to a voiceprint service for generating a voiceprint based on the first speech input; receiving a second speech input at the device while the device is in a locked state, the second speech input including a command associated with a restricted feature of the device; determining whether the second speech input was spoken by an authorized user of the device, the determining including comparing the second speech input to the generated voiceprint; while comparing the second speech input to the voiceprint, processing the second speech input to identify the command; and upon determining that the second speech input was spoken by the authorized user, providing access to the restricted feature of the device according to the command included in the second speech input. - View Dependent Claims (21)
-
-
22. A non-transitory computer-readable medium including one or more sequences of instructions which, when executed by one or more processors, causes:
while a device is in a locked state; receiving a speech input at the device, the speech input including a command associated with a restricted feature of the device; authenticating, using the speech input, whether the speech input is spoken by an authorized user of the device, wherein the authenticating includes comparing the speech input to a previously generated voiceprint; in response to authenticating that the speech input is spoken by an authorized user of the device, executing the command identified in the speech input to invoke the restricted feature of the device; and in response to not authenticating that the speech input is spoken by an authorized user of the device, forgo executing the command identified in the speech input to invoke the restricted feature of the device.
-
23. A method comprising:
at an electronic device; receiving a plurality of voice commands from a user; generating a plurality of voice samples of the user from the plurality of voice commands; while the device is in a locked state, receiving non-voice authentication information from the user to put the device into an unlocked state; in response to authenticating that the user is an authorized user of the device, transmitting the plurality of voice samples to a voiceprint service for generating a voiceprint based on the plurality of voice samples; receiving a speech input, the speech input including a command associated with a restricted feature of the device; determining whether the speech input was spoken by an authorized user of the device, the determining including comparing the speech input to the generated voiceprint; processing the speech input to identify the command; and upon determining that the second speech input was spoken by the authorized user, providing access to the restricted feature of the device according to the command, where the method is performed by one or more processors of the device. - View Dependent Claims (24, 25)
Specification