Location-based voice-print authentication method and system
First Claim
1. A method of authenticating a user seeking access to a computer network resource, comprising the steps of:
- a) obtaining credential information from the user;
b) initiating voice communication between the user and an authentication system for the network resource and obtaining a voice print of the user;
c) determining the current geographic location of the user;
d) receiving a list of one or more registered permissible geographic locations at which the user may be present to access the network resource;
e) determining if
1) the credential information from the user matches credential information in a user profile database;
2) the voice print of the user matches a voice print sample of a person authorized to access said network resource, and
3) the geographic location of the user determined in step c) matches a geographic location in the list of one or more registered permissible geographic locations for the user; and
f) if
1) the credential information and
2) the voice print match information in the user profile database and
3) the geographic location of the user matches a location in the list of one or more registered permissible geographic locations for the user, then sending an authorization signal to the computer network resource indicating that the user is authorized to access the computer network resource.
6 Assignments
0 Petitions
Accused Products
Abstract
An authentication system is described for controlling a person'"'"'s access to a resource, which may be a physical resource or a network resource. The authentication system obtains credential information for the person (e.g., using a coded card or keypad for username and password), a voice print from the person, and the current geographical location of the user. The voice print and geographic location are preferably obtained from a telephone call that occurs between the person and the authentication system. The call can take the form of a cell phone call placed by the person to the authentication system. The authentication system includes a user profile database. If the credential information and voice print match those of persons authorized to access the resource, and the user is at a registered permissible location to access the resource, the authentication system sends a signal to the resource indicating that the authentication was successful.
121 Citations
21 Claims
-
1. A method of authenticating a user seeking access to a computer network resource, comprising the steps of:
-
a) obtaining credential information from the user; b) initiating voice communication between the user and an authentication system for the network resource and obtaining a voice print of the user; c) determining the current geographic location of the user; d) receiving a list of one or more registered permissible geographic locations at which the user may be present to access the network resource; e) determining if
1) the credential information from the user matches credential information in a user profile database;
2) the voice print of the user matches a voice print sample of a person authorized to access said network resource, and
3) the geographic location of the user determined in step c) matches a geographic location in the list of one or more registered permissible geographic locations for the user; andf) if
1) the credential information and
2) the voice print match information in the user profile database and
3) the geographic location of the user matches a location in the list of one or more registered permissible geographic locations for the user, then sending an authorization signal to the computer network resource indicating that the user is authorized to access the computer network resource. - View Dependent Claims (5, 6, 7, 8, 9, 20, 21)
-
- 2. The method of step 1, wherein step b) comprises the step of initiating a cellular telephone call to the user and where the location of the user is obtained, either directly or indirectly, from said cellular telephone call.
-
10. A method of accessing a network resource from a remotely-located computer, comprising the steps of:
-
a) receiving credential information at said computer and sending said credential information to an authentication system; b) the authentication system initiating a telephone call to a user of said remotely-located computer; c) obtaining a voiceprint of said user during said telephone call; d) obtaining current location information of said user from said telephone call; e) receiving a profile database for a plurality of users including said user; f) generating an authorization signal indicating that the user is authorized to access the network resource if
1) the credential information from the user matches credential information for the user in the profile database;
2) the voiceprint of the user matches a voiceprint sample of a person authorized to access said network resource, and
3) the location of the user determined in step d) matches a list of one or more registered permissible locations for the resource and/or the user;g) sending the authorization signal to the network resource indicating that the user is authorized to access the network resource. - View Dependent Claims (11, 12)
-
-
13. An authentication system for authenticating a user seeking to access a network resource, comprising:
-
a network interface receiving data from a network, said data containing credential information from the user, a voice print of the user, telephone call information for the user, and a list of one or more registered permissible geographic locations at which the user may be present to access the network resource; at least one central processing unit; a user profile database; machine-readable memory storing a set of instruction for execution by said at least one central processing unit, said instructions including instructions for transmitting said telephone call information to a call location server to determine the geographic location of the user; said instructions further including instructions comparing the credential information supplied by the user to with credential information obtained from the user profile database; instructions comparing the voice print of the user with a voiceprint sample; and instructions for sending an authorization signal indicating that the user is authorized to access the network resource if
1) the credential information from the person matches credential information in a user profile database in said authentication system;
2) the voiceprint of the user matches a voice print sample of a person authorized to access said resource, and
3) the user is located at one or more registered permissible geographic locations for the user. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification