Authenticating a caller before providing the caller with access to one or more secured resources
First Claim
1. A system for authenticating a caller before providing the caller with access to one or more secured resources, comprising:
- stored voiceprint identification data that was stored during system enrollment of a plurality of known persons;
stored verification data that was stored during the system enrollment of the plurality of known persons; and
a processing system configured toreceive spoken identification information spoken in a current call initiated by a currently unidentified caller,receive verification information from the current call that is independent of the spoken identification information,generate a voiceprint associated with the currently unidentified caller from the spoken identification information,automatically compare the voiceprint associated with the currently unidentified caller with the stored voiceprint identification data to identify the currently unidentified caller as at least one of the plurality of known persons, the currently unidentified caller a now identified caller,automatically compare the verification information with the stored verification data for the at least one of the plurality of known persons to verify the identity of the now identified caller as a particular one of the plurality of known persons, the now identified caller a now identified and verified caller, andauthenticate the now identified and verified caller for access to the one or more secured resources in response to identifying and verifying the identity of the now identified and verified caller.
5 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a system authenticates a caller before providing the caller with access to one or more secured resources. Identification and verification data is stored during system enrollment of known persons. A processing system, in a current call initiated by a caller and prior to identification of the caller, receives voice-based information for the caller including a digital representation of a telephone number spoken by the caller in the current call, the received information including voice-based identification information and voice-based verification information for the caller. The processing system automatically compares the received identification information and the received verification information for the caller with the stored identification and verification data for known persons, respectively, to uniquely identify and verify the identity of the caller as a particular known person. The processing system authenticates the caller for access to the one or more secured resources in response.
249 Citations
32 Claims
-
1. A system for authenticating a caller before providing the caller with access to one or more secured resources, comprising:
-
stored voiceprint identification data that was stored during system enrollment of a plurality of known persons; stored verification data that was stored during the system enrollment of the plurality of known persons; and a processing system configured to receive spoken identification information spoken in a current call initiated by a currently unidentified caller, receive verification information from the current call that is independent of the spoken identification information, generate a voiceprint associated with the currently unidentified caller from the spoken identification information, automatically compare the voiceprint associated with the currently unidentified caller with the stored voiceprint identification data to identify the currently unidentified caller as at least one of the plurality of known persons, the currently unidentified caller a now identified caller, automatically compare the verification information with the stored verification data for the at least one of the plurality of known persons to verify the identity of the now identified caller as a particular one of the plurality of known persons, the now identified caller a now identified and verified caller, and authenticate the now identified and verified caller for access to the one or more secured resources in response to identifying and verifying the identity of the now identified and verified caller. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for authenticating a caller before providing the caller with access to one or more secured resources, comprising:
-
receiving spoken identification information spoken in a current call initiated by a currently unidentified caller; receiving verification information from the current call that is independent of the spoken identification information; generating a voiceprint associated with the currently unidentified caller from the spoken identification information; receiving stored voiceprint identification data that was stored during system enrollment of a plurality of known persons; automatically comparing the voiceprint associated with the currently unidentified caller with the stored voiceprint identification data to identify the currently unidentified caller as at least one of the plurality of known persons, the currently unidentified caller a now identified caller; receiving stored verification data that was stored during the system enrollment of the plurality of known persons; automatically comparing the verification information with the stored verification data for the at least one of the plurality of known persons to verify the identity of the now identified caller as a particular one of the plurality of known persons, the now identified caller a now identified and verified caller; and authenticating the now identified and verified caller for access to the one or more secured resources in response to identifying and verifying the identity of the now identified and verified caller. - View Dependent Claims (13, 14, 15, 16)
-
-
17. Software for authenticating a caller before providing the caller with access to one or more secured resources, the software being embodied in computer-readable media and operable to:
-
receive spoken identification information spoken by a currently unidentified caller; receive verification information that is independent of the spoken identification information; generate a voiceprint associated with the currently unidentified caller from the spoken identification information; receive stored voiceprint identification data that was stored during system enrollment of a plurality of known persons; automatically compare the voiceprint associated with the currently unidentified caller with the stored voiceprint identification data to identify the currently unidentified caller as at least one of the plurality of known persons, the currently unidentified caller a now identified caller; receive stored verification data that was stored during the system enrollment of the plurality of known persons; automatically compare the verification information with the stored verification data for the at least one of the plurality of known persons to verify the identity of the now identified caller as a particular one of the plurality of known persons, the now identified caller a now identified and verified caller; and authenticate the now identified and verified caller for access to the one or more secured resources in response to identifying and verifying the identity of the now identified and verified caller. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A system for authenticating a caller before providing the caller with access to one or more secured resources, the system comprising a processor configured to:
-
receive spoken identification information spoken in a current call initiated by a currently unidentified caller; receive verification information from the current call that is independent of the spoken identification information; generate a voiceprint associated with the currently unidentified caller from the spoken identification information; automatically compare the voiceprint associated with the currently unidentified caller with stored voiceprint identification data for a plurality of known persons to identify the currently unidentified caller as at least one of the plurality of known persons, the currently unidentified caller a now identified caller; automatically compare the verification information with stored verification data for the at least one of the plurality of known persons to verify the identity of the now identified caller as a particular one of the plurality of known persons, the now identified caller a now identified and verified caller; and authenticate the now identified and verified caller for access to the one or more secured resources in response to identifying and verifying the identity of the now identified and verified caller. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification