SYSTEM AND METHOD FOR VOICE AUTHENTICATION
First Claim
1. A computer-implemented method of voice authentication, the method comprising:
- receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource;
performing a comparison of the received speech sample to a previously established speech profile associated with the user;
transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold; and
transmitting a denial to the network client if the comparison is less than the certainty threshold.
3 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, performing a comparison of the received speech sample to a previously established speech profile associated with the user, transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold, and transmitting a denial to the network client if the comparison is less than the certainty threshold.
25 Citations
20 Claims
-
1. A computer-implemented method of voice authentication, the method comprising:
-
receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource; performing a comparison of the received speech sample to a previously established speech profile associated with the user; transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold; and transmitting a denial to the network client if the comparison is less than the certainty threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for voice authentication, the system comprising:
-
a module configured to receive a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource; a module configured to perform a comparison of the received speech sample to a previously established speech profile associated with the user; a module configured to transmit an authentication to the network client if the comparison is equal to or greater than a certainty threshold; and a module configured to transmit a denial to the network client if the comparison is less than the certainty threshold. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A tangible computer-readable medium storing a computer program having instructions for voice authentication, the instructions comprising:
-
receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource; performing a comparison of the received speech sample to a previously established speech profile associated with the user; transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold; and transmitting a denial to the network client if the comparison is less than the certainty threshold. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification