Selective passive voice authentication
First Claim
1. A computer-implemented method executed by at least one processor, the method comprising:
- receiving, by the at least one processor, voice data from a user device, the voice data comprising audio data of a user speaking a word or phrase;
determining, by the at least one processor, the word or phrase from the voice data to determine whether the word or phrase is in a set of available words or phrases and whether the word or phrase is usable for voice authentication of the user,wherein the set of available words or phrases is a sub-set of words or phrases; and
in response to the word or phrase being in the set of available words or phrases and being usable for the voice authentication of the user, performing authentication based on the voice data without requiring further interaction from the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Various embodiments of the technology described herein alleviate the need to specifically request enrollment information from a user to enroll the user in a voice biometric authentication program. The system can receive voice data from a user device including audio data of a user speaking a word or phrase. The system can determine the word or phrase from the voice data to determine whether the word or phrase is in a set of available words or phrases and whether the word or phrase is usable for voice authentication of the user. In response to the word or phrase being in the set of available words or phrases and being usable for the voice authentication of the user, the system can perform authentication based on the voice data without requiring further interaction from the user.
22 Citations
20 Claims
-
1. A computer-implemented method executed by at least one processor, the method comprising:
-
receiving, by the at least one processor, voice data from a user device, the voice data comprising audio data of a user speaking a word or phrase; determining, by the at least one processor, the word or phrase from the voice data to determine whether the word or phrase is in a set of available words or phrases and whether the word or phrase is usable for voice authentication of the user, wherein the set of available words or phrases is a sub-set of words or phrases; and in response to the word or phrase being in the set of available words or phrases and being usable for the voice authentication of the user, performing authentication based on the voice data without requiring further interaction from the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a data store for storing data; and at least one processor configured to interact with the data store, the at least one processor being further configured to execute computer-readable instructions to perform operations comprising; receiving, by the at least one processor, voice data from a user device, the voice data comprising audio data of a user speaking a word or phrase; determining, by the at least one processor, the word or phrase from the voice data to determine whether the word or phrase is in a set of available words or phrases and whether the word or phrase is usable for voice authentication of the user, wherein the set of available words or phrases is a sub-set of words or phrases; and in response to the word or phrase being in the set of available words or phrases and being usable for the voice authentication of the user, performing authentication based on the voice data without requiring further interaction from the user. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium storing instructions that, when executed by at least one processor, cause the at least one processor to perform operations comprising:
-
receiving, by the at least one processor, voice data from a user device, the voice data comprising audio data of a user speaking a word or phrase; determining, by the at least one processor, the word or phrase from the voice data to determine whether the word or phrase is in a set of available words or phrases and whether the word or phrase is usable for voice authentication of the user, wherein the set of available words or phrases is a sub-set of words or phrases; and in response to the word or phrase being in the set of available words or phrases and being usable for the voice authentication of the user, performing authentication based on the voice data without requiring further interaction from the user. - View Dependent Claims (18, 19, 20)
-
Specification