Leveraging multiple audio channels for authentication
First Claim
1. A computer implemented method comprising:
- receiving, by a server and from a first electronic device, a first audio file of a user'"'"'s voice captured by the first electronic device in response to receiving a voice command from the user;
transmitting, by the server to a second electronic device, a command to trigger the second electronic device to capture the user'"'"'s voice in response to the first electronic device receiving the voice command;
receiving, by the server and from the second electronic device, a second audio file of the user'"'"'s voice captured by the second electronic device in proximity to the first electronic device in response to the second electronic device receiving the command;
comparing, by the server, the first and second audio files to generate a similarity score that determines a likelihood that the first electronic device and the second electronic device captured the user'"'"'s voice at the same time; and
authenticating the user, by the server, in response to the server determining that the similarity score is above a threshold.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein are embodiments of systems, methods, and products comprises an authentication server for authentication leveraging multiple audio channels. The server receives an authentication request regarding a user upon the user interacting with a first electronic device. The server requests the first device to transmit a first audio file of an audio sample to the server. The audio sample may be the user'"'"'s audio command or a machine-generated audio signal. The server requests a second electronic device to transmit a second audio file that is the recording of the same audio sample to the server. The second electronic device is a trusted device in proximity of the first device and executes an authentication function to enable the recording and transmitting of the audio sample. The server determines a similarity score between the first audio file and the second audio file and authenticates the user based on the similarity score.
77 Citations
21 Claims
-
1. A computer implemented method comprising:
-
receiving, by a server and from a first electronic device, a first audio file of a user'"'"'s voice captured by the first electronic device in response to receiving a voice command from the user; transmitting, by the server to a second electronic device, a command to trigger the second electronic device to capture the user'"'"'s voice in response to the first electronic device receiving the voice command; receiving, by the server and from the second electronic device, a second audio file of the user'"'"'s voice captured by the second electronic device in proximity to the first electronic device in response to the second electronic device receiving the command; comparing, by the server, the first and second audio files to generate a similarity score that determines a likelihood that the first electronic device and the second electronic device captured the user'"'"'s voice at the same time; and authenticating the user, by the server, in response to the server determining that the similarity score is above a threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer implemented method comprising:
-
receiving, by a server from a first application in an electronic device, a first audio file of a user'"'"'s voice captured by the first application in response to receiving a voice command from the user; transmitting, by the server to a second application, a command to trigger the second application to capture the user'"'"'s voice in response to the first application receiving the voice command; receiving, by the server from the second application in the electronic device, a second audio file of the user'"'"'s voice captured by the second application in response to the second application receiving the command; comparing, by the server, the first and second audio files to generate a similarity score that determines a likelihood that the first application and the second application captured the user'"'"'s voice at the same time; and authenticating the user, by the server, in response to the server determining that the similarity score is above a threshold. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a non-transitory storage medium storing a plurality of computer program instructions; and a processor of a third electronic device electrically coupled to the non-transitory storage medium and configured to execute the plurality of computer program instructions to; receive from a first electronic device a first audio file of a user'"'"'s voice captured by the first electronic device in response to receiving a voice command from the user; transmit, by the processor of the third electronic device, to a second electronic device a command to trigger the second electronic device to capture the user'"'"'s voice in response to the first electronic device receiving the voice command; receive from the second electronic device a second audio file of the user'"'"'s voice captured by the second electronic device in proximity to the first electronic device in response to the second electronic device receiving the command; compare the first and second audio files to generate a similarity score that determines a likelihood that the first electronic device and the second electronic device captured the user'"'"'s voice at the same time; and enroll the user to a service in response to the processor determining that the similarity score is above a threshold. - View Dependent Claims (18, 19, 20)
-
-
21. A computer-implemented method comprising:
-
receiving, by a second electronic device in proximity to a first electronic device, from a third electronic device a command to trigger the second electronic device to record a user'"'"'s voice, the command being generated in response to the first electronic device receiving a voice command from the user; recording, by the second electronic device, the user'"'"'s voice to generate a second audio file in response to the second electronic device receiving the command from the third electronic device; receiving, by the second electronic device, a first audio file of the user'"'"'s voice recorded by the first electronic device in response to receiving the voice command from the user; comparing, by the second electronic device, the first and second audio files to generate a similarity score that determines a likelihood that the first electronic device and the second electronic device captured the user'"'"'s voice at the same time; and transmitting, by the second electronic device, the similarity score to an authentication server such that the authentication server authenticates the user based upon the similarity score.
-
Specification