Voice-capable system and method for authentication using prior entity user interaction
First Claim
Patent Images
1. A method for use with a voice-capable system, the method comprising:
- accessing by the voice-capable system of one or more entities computationally networked to the voice-capable system, wherein each of the one or more entities are an institution or business with an internet presence, wherein the internet presence has had a prior interaction with a user, each of the one or more entities requiring the user to provide authentication to access the internet presence, and the voice-capable system accessing one or more user interactions with the one or more entities from one or more internet sites;
obtaining evidence of one or more user interactions with the one or more entities from one or more internet sites known to have been visited by the user within a predetermined period of time, the predetermined period of time being a function of a security level; and
generating an authentication session using data from the one or more entities, wherein the authentication session includes verifying the user access to the voice-capable system using the data from the authentication to access the internet presence.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for use with a voice-capable system, includes but is not limited to a method including accessing by the voice-capable system of one or more entities computationally networked to the voice-capable system, obtaining one or more user interactions with the one or more entities and generating an authentication session using the one or more user interactions with the one or more entities.
11 Citations
43 Claims
-
1. A method for use with a voice-capable system, the method comprising:
-
accessing by the voice-capable system of one or more entities computationally networked to the voice-capable system, wherein each of the one or more entities are an institution or business with an internet presence, wherein the internet presence has had a prior interaction with a user, each of the one or more entities requiring the user to provide authentication to access the internet presence, and the voice-capable system accessing one or more user interactions with the one or more entities from one or more internet sites; obtaining evidence of one or more user interactions with the one or more entities from one or more internet sites known to have been visited by the user within a predetermined period of time, the predetermined period of time being a function of a security level; and generating an authentication session using data from the one or more entities, wherein the authentication session includes verifying the user access to the voice-capable system using the data from the authentication to access the internet presence. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 41, 42, 43)
-
-
18. One or more non-transitory computer readable media comprising one or more computer-readable instructions for executing a process comprising:
-
accessing by the voice-capable system of one or more entities computationally networked to the voice-capable system, wherein each of the one or more entities are an institution or business with an internet presence, wherein the internet presence has had a prior interaction with the user, each of the one or more entities requiring the user to provide authentication to access the internet presence, and obtaining one or more user interactions with the one or more entities from one or more internet sites known to have been visited by a user within a predetermined period of time, the predetermined period of time being a function of a security level; and generating an authentication session using data from the one or more entities, wherein the authentication session includes verifying the user access to the voice-capable system using the data from the authentication to access the internet presence. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A voice-capable system comprising:
-
a processor; audio input and/or output circuitry coupled to the processor; a memory coupled to the processor; and a security module coupled to the processor, the security module configured to implement a secure protocol, the secure protocol configured to implement an automated system with one or more questions related to security/authentication, the security module configured to include; an access module for accessing by the voice-capable system of one or more entities computationally networked to the voice-capable system, wherein each of the one or more entities are an institution or business with an internet presence, wherein the internet presence has had a prior interaction with the user, each of the one or more entities requiring the user to provide authentication to access the internet presence; a logging module for obtaining one or more user interactions with the one or more entities from one or more internet sites known to have been visited by a user within a predetermined period of time the predetermined period of time being a function of a security level; and an authentication generation module for generating an authentication session using data from the one or more entities, wherein the authentication session includes verifying the user access to the voice-capable system using the data from the authentication to access the internet presence. - View Dependent Claims (37, 38, 39, 40)
-
Specification