Systems and methods for authentication program enrollment
First Claim
1. A computer-implemented method comprising:
- receiving, via a network, a voice interaction from a user, wherein the voice interaction includes a request or a command identifiable from a voice of the user, wherein the request or the command includes one or more portions;
in response to receiving non-voice biometric authentication information, authenticating the user to fulfill the request or the command made during the voice interaction;
after the user is authenticated to or above an authentication threshold, enrolling the user into a voice biometric authentication program for at least one portion of the request or the command; and
enrolling the user into the voice biometric authentication program for other requests or commands that include the at least one portion of the request or the command and at least one portion of a second request or command for which the user has been enrolled into the voice biometric authentication program.
1 Assignment
0 Petitions
Accused Products
Abstract
Various embodiments of the technology described herein alleviate the need to specifically request enrollment information from a user to enroll the user in a voice biometric authentication program. For example, the system can receive a voice interaction from a user where the voice interaction includes a request or a command having one or more portions. After the user is authenticated using non-voice biometric authentication information, the system enrolls the user into a voice biometric authentication program for at least one portion of the request or the command. The system also enrolls the user into the voice biometric authentication program for other requests or commands that include one of the at least one portion of the request or the command and portions of one or more second requests or commands for which the user has been enrolled into the voice biometric authentication program.
23 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, via a network, a voice interaction from a user, wherein the voice interaction includes a request or a command identifiable from a voice of the user, wherein the request or the command includes one or more portions; in response to receiving non-voice biometric authentication information, authenticating the user to fulfill the request or the command made during the voice interaction; after the user is authenticated to or above an authentication threshold, enrolling the user into a voice biometric authentication program for at least one portion of the request or the command; and enrolling the user into the voice biometric authentication program for other requests or commands that include the at least one portion of the request or the command and at least one portion of a second request or command for which the user has been enrolled into the voice biometric authentication program. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory, computer-readable medium containing instructions that, when executed by one or more processors, cause a machine to:
-
receive a voice interaction from a user, wherein the voice interaction includes a request or a command identifiable from a voice of the user, wherein the request or the command includes one or more portions; in response to receiving non-voice biometric authentication information, authenticate the user to fulfill the request or the command made during the voice interaction; after the user is authenticated to or above an authentication threshold, enroll the user into a voice biometric authentication program for at least one portion of the request or the command; and enroll the user into the voice biometric authentication program for other requests or commands that include the at least one portion of the request or the command and at least one portion of a second request or command for which the user has been enrolled into the voice biometric authentication program. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An enrollment and authentication system comprising:
-
one or more processors; and a computer readable storage medium having instructions stored thereon, which when executed by the one or more processors, cause the enrollment and authentication system to; receive a voice interaction from a user, wherein the voice interaction includes a request or a command identifiable from a voice of the user, wherein the request or the command includes one or more portions; in response to receiving non-voice biometric authentication information, authenticate the user to fulfill the request or the command made during the voice interaction; after the user is authenticated to or above an authentication threshold, enroll the user into a voice biometric authentication program for at least one portion of the request or the command; and enroll the user into the voice biometric authentication program for other requests or commands that include the at least one portion of the request or the command and at least one portion of one or more second requests or commands for which the user has been enrolled into the voice biometric authentication program. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification