System and method of retrieving and conveying sensitive information when using voice command devices
First Claim
Patent Images
1. A method, comprising:
- receiving, from a user, a request from a voice command device (VCD) to provide data to the user, the request including information that identifies the user;
locating the user in a database based on the information that identifies the user;
locating the requested data in a storage unit;
determining if the located data is private data based on one or more rules in a privacy policy database;
upon determining that the located data is private data, identifying a preferred device associated with the user;
performing authentication to determine if the user is authorized to gain access to the private data; and
upon determining that the user is authorized to gain access to the private data, transmitting the located private data to the preferred device associated with the user;
wherein;
the preferred device associated with the user is a device selected by the user for receiving private data requested from the VCD, andperforming authentication comprises;
sending a message to the preferred device to confirm that the user of the VCD requested the private data,receiving a response back from the preferred device, andverifying the response to determine if the user of the VCD device requested the private data.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system of providing private data privately when such data is requested from a VCD utilizes a communications network to communicate with a service containing the private data to determine if the data is private. Once the data is determined as being private, instead of being sent to the VCD to be broadcasted audibly, the data may be transmitted to a user'"'"'s preferred device to be presented privately to the user.
7 Citations
17 Claims
-
1. A method, comprising:
-
receiving, from a user, a request from a voice command device (VCD) to provide data to the user, the request including information that identifies the user; locating the user in a database based on the information that identifies the user; locating the requested data in a storage unit; determining if the located data is private data based on one or more rules in a privacy policy database; upon determining that the located data is private data, identifying a preferred device associated with the user; performing authentication to determine if the user is authorized to gain access to the private data; and upon determining that the user is authorized to gain access to the private data, transmitting the located private data to the preferred device associated with the user; wherein; the preferred device associated with the user is a device selected by the user for receiving private data requested from the VCD, and performing authentication comprises; sending a message to the preferred device to confirm that the user of the VCD requested the private data, receiving a response back from the preferred device, and verifying the response to determine if the user of the VCD device requested the private data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable medium on which are stored instructions that when executed cause a programmable device to:
-
receive a request from a voice command device (VCD) to provide data requested by a user of the VCD to the user, the request including information that identifies the user; locate the user in a database based on the information that identifies the user; locate the requested data in a storage unit; determine if the located data is private based on one or more rules in a privacy policy database; upon determining that the located data is private, identify a device associated with the user; perform authentication to determine if the user is authorized to gain access to the private data; and upon determining that the user is authorized to gain access to the private data, transmit the located private data to the device associated with the user, wherein; the device associated with the user has been selected by the user as a preferred device for receiving private data requested from the VCD, and performing authentication comprises; sending a message to the preferred device to confirm that the user of the VCD requested the private data, receiving a response back from the preferred device, and verifying the response to determine if the user of the VCD device requested the private data. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A system comprising:
-
a processor; and a memory, communicatively coupled to the processor on which are stored instructions that when executed configure the processor to; receive a request from a voice command device (VCD) over a communication network to provide data, requested by a user of the VCD, to the user, the request including information that identifies the user; locate the user in a database based on the information that identifies the user; locate the requested data; determine if the located data is private data based on one or more rules in a privacy policy database; upon determining that the located information is private data, identify a device associated with the user; perform authentication to determine if the user is authorized to gain access to the private data; and upon determining that the user is authorized to gain access to the private data, transmit the located private data to the device associated with the user via the communication network, wherein; the device associated with the user has been selected by the user as a preferred device for receiving private data requested from the VCD, and performing authentication comprises; sending a message to the preferred device to confirm that the user of the VCD requested the private data, receiving a response back from the preferred device, and verifying the response to determine if the user of the VCD device requested the private data. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification