Leveraging multiple audio channels for authentication
First Claim
1. A computer-implemented method comprising:
- receiving, by a server, a first request to authenticate a user from a second server, the first request being generated by the second server in response to receiving a voice command at a second electronic device;
generating and transmitting, by the server, a second request to a first electronic device in proximity to the second electronic device causing the first electronic device to execute an authentication function;
transmitting, by the server, a third request to the second server to cause the second electronic device to play an acoustic signal;
receiving, by the server, an audio file from the first electronic device in proximity to the second electronic device, wherein the audio file contains the acoustic signal played by the second electronic device and captured by the authentication function in the first electronic device;
comparing, by the server, the acoustic signal and the audio file to generate a similarity score; and
authenticating, by the server, the user in response to the server determining that the similarity score is above a threshold.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein are embodiments of systems, methods, and products comprises an authentication server for authentication leveraging multiple audio channels. The server receives an authentication request regarding a user upon the user interacting with a first electronic device. The server requests the first device to transmit a first audio file of an audio sample to the server. The audio sample may be the user'"'"'s audio command or a machine-generated audio signal. The server requests a second electronic device to transmit a second audio file that is the recording of the same audio sample to the server. The second electronic device is a trusted device in proximity of the first device and executes an authentication function to enable the recording and transmitting of the audio sample. The server determines a similarity score between the first audio file and the second audio file and authenticates the user based on the similarity score.
58 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, by a server, a first request to authenticate a user from a second server, the first request being generated by the second server in response to receiving a voice command at a second electronic device; generating and transmitting, by the server, a second request to a first electronic device in proximity to the second electronic device causing the first electronic device to execute an authentication function; transmitting, by the server, a third request to the second server to cause the second electronic device to play an acoustic signal; receiving, by the server, an audio file from the first electronic device in proximity to the second electronic device, wherein the audio file contains the acoustic signal played by the second electronic device and captured by the authentication function in the first electronic device; comparing, by the server, the acoustic signal and the audio file to generate a similarity score; and authenticating, by the server, the user in response to the server determining that the similarity score is above a threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a non-transitory storage medium storing a plurality of computer program instructions; and a processor electrically coupled to the non-transitory storage medium and configured to execute the plurality of computer program instructions to; receive a first request to authenticate a user from a server associated with a second electronic device, the first request to authenticate the user being generated by the server in response to the second electronic device receiving a voice command from the user; transmit a second request to a first electronic device in proximity to the second electronic device causing the first electronic device to execute an authentication function; transmit a third request to the server to cause the second electronic device to play an acoustic signal; receive an audio file from the first electronic device in proximity to the second electronic device, wherein the audio file contains the acoustic signal played by the second electronic device and captured by the authentication function in the first electronic device; compare the acoustic signal and the audio file to generate a similarity score; and authenticate the user in response to the processor determining that the similarity score is above a threshold. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer implemented method comprising:
-
receiving, by a server, a first request to enroll a user to a service from a second server, the ft request being generated by the second server in response to receiving a voice command at a second electronic device; transmitting, by the server, a second request to a first electronic device in proximity to the second electronic device causing the first electronic device to execute an enrollment function; transmitting, by the server, a third request to the second server to cause the second electronic device to play an acoustic signal; receiving, by the server, an audio file from the first electronic device in proximity to the second electronic device, wherein the audio file contains the acoustic signal played by the second electronic device and captured by the enrollment function in the first electronic device; comparing, by the server, the acoustic signal and the audio file to generate a similarity score; and enrolling, by the server, the user to the service in response to the server determining that the similarity score is above a threshold. - View Dependent Claims (18, 19, 20)
-
Specification