Method And Apparatus For Voice Signature Authentication
First Claim
Patent Images
1. A voice signature authenticator, comprising:
- one or more communication provider interfaces configured to receive communication content from a plurality of communication providers; and
a voice signature database configured to store the communication content.
10 Assignments
0 Petitions
Accused Products
Abstract
A scalable voice signature authentication capability is provided herein. The scalable voice signature authentication capability enables authentication of varied services such as speaker identification (e.g. private banking and access to healthcare account records), voice signature as a password (e.g. secure access for remote services and document retrieval) and the Internet and its various services (e.g., online shopping), and the like
-
Citations
20 Claims
-
1. A voice signature authenticator, comprising:
-
one or more communication provider interfaces configured to receive communication content from a plurality of communication providers; and a voice signature database configured to store the communication content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A biometric signature authenticator, comprising:
-
a service provider interface configured to receive a biometric signature directive; a biometric signature database configured to retrieve a meta biometric signature based on the biometric signature directive, the biometric signature database comprising a biometric processing plane and an identity tracking intelligence processing plane; a challenge biometric interface configured for receiving a challenged biometric signature; and a voice signature recognition server configured to compare the challenged biometric with the meta biometric signature. - View Dependent Claims (13, 14, 15)
-
-
16. A method of authenticating a biometric signature, the method comprising the steps of:
-
receiving a biometric signature authentication directive; parsing the biometric signature authentication directive; applying one or more authentication rules; scoring the results of the applied authentication rules; and providing a biometric signature authentication response. - View Dependent Claims (17, 18, 19, 20)
-
Specification