Digital voice signature of transactions
First Claim
1. A computer-implemented method performed in a server comprising:
- receiving, by a server, an access request sent to a network address of a resource server from a user using a user device, the access request comprising a unique record identifier, wherein the unique record identifier is transmitted to the user device by a roaming device, is recognizable by the server, the unique record identifier being encrypted between the server and the roaming device to be opaque to the user device;
establishing a secure communication between the user device and the server when the unique record identifier is recognized by the server;
placing a call to the user device using the secure communication;
receiving from the user a voice response to a generic prompt associated with an implied security question for the user, wherein the implied security question is one of a plurality of security questions stored in a memory of the server;
verifying that the voice response of the user matches a selected voice biometrics record;
converting the voice response into a speech-to-text phrase; and
comparing the speech-to-text phrase against a stored secret text phrase to verify that the speech-to-text phrase matches an answer to the implied security question.
1 Assignment
0 Petitions
Accused Products
Abstract
A method that includes receiving, by a server, an access request sent to a network address of a resource server from a user using a user device, the access request comprising a unique record identifier is provided. The method includes placing a call to the user device, receiving from the user a voice response to a prompt associated with an implied security question for the user, comparing the voice response of the user with a selected voice biometrics record, converting the voice response into a speech-to-text phrase, and comparing the speech-to-text phrase against a stored secret text phrase to verify that the speech-to-text phrase matches an answer to the silent security question. A method for signing a transaction, including collecting a plurality of voice samples from a user during a transaction and concatenating the plurality of voice samples into a single sound file is also provided.
119 Citations
13 Claims
-
1. A computer-implemented method performed in a server comprising:
-
receiving, by a server, an access request sent to a network address of a resource server from a user using a user device, the access request comprising a unique record identifier, wherein the unique record identifier is transmitted to the user device by a roaming device, is recognizable by the server, the unique record identifier being encrypted between the server and the roaming device to be opaque to the user device; establishing a secure communication between the user device and the server when the unique record identifier is recognized by the server; placing a call to the user device using the secure communication; receiving from the user a voice response to a generic prompt associated with an implied security question for the user, wherein the implied security question is one of a plurality of security questions stored in a memory of the server; verifying that the voice response of the user matches a selected voice biometrics record; converting the voice response into a speech-to-text phrase; and comparing the speech-to-text phrase against a stored secret text phrase to verify that the speech-to-text phrase matches an answer to the implied security question. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
a network interface circuit configured to couple with a user device through a network; a memory configured to store data and a plurality of commands, the data comprising an implied security question to a user of the user device and a response to the implied security question, wherein the implied security question is one of a plurality of security questions stored in the memory; a processor configured to execute the plurality of commands and cause the system to; receive from the user device a request to access a service, the request comprising a unique record identifier that is transmitted to the user device by a roaming device that is recognizable by the processor, the unique record identifier being encrypted between the server and the roaming device to be opaque to the user device; establish a secure communication protocol with the user device when the unique record identifier is recognized by the system; place a call to the user device within the secure communication protocol; prompt the user to provide a voice response to the implied security question; verify that the voice response matches a selected voice biometric record; convert the voice response into a speech-to-text phrase; and compare the speech-to-text phrase against a stored secret text phrase to verify that the speech-to-text phrase matches the response to the implied security question.
-
-
13. A non-transitory, computer readable medium storing instructions which when executed by a processor in a server, cause the server to perform a method comprising:
-
receiving, by a server, an access request sent to a network address of a resource server from a user using a user device, the access request comprising a unique record identifier, wherein the unique record identifier is transmitted to the user device by a roaming device, is recognizable by the server, the unique record identifier being encrypted between the server and the roaming device to be opaque to the user device; establishing a secure communication protocol between the user device and the server when the unique record identifier is recognized by the server; placing a call to the user device using the secure communication protocol; receiving from the user a voice response to a generic prompt associated with an implied security question for the user, wherein the implied security question is one of a plurality of security questions stored in a memory of the server; verifying that the voice response of the user matches a selected voice biometrics record; converting the voice response into a speech-to-text phrase; and comparing the speech-to-text phrase against a stored secret text phrase to verify that the speech-to-text phrase matches an answer to the implied security question.
-
Specification