Systems and methods for authentication program enrollment
First Claim
1. A computer-implemented method comprising:
- receiving, via a network, a voice interaction from a user, wherein the voice interaction includes a request or a command identifiable from a voice of the user, wherein the request or the command requests information or commands an action;
requesting non-voice biometric authentication information from the user to fulfill the request or the command made during the voice interaction, wherein the authentication information is used to authenticate the user;
after the user is authenticated to or above an authentication threshold using the non-voice biometric authentication information;
fulfilling the request or the command;
passively enrolling the user into an authentication program that uses a voice biometric authentication method, wherein passively enrolling the user includes deriving characteristics of the voice of the user received during the request or the command and associating the voice characteristics with an account of the user; and
after enrollment into the authentication program, authenticating the user via the voice biometric authentication method prior to fulfilling requests or commands made during a voice navigation.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for enrolling a user in an authentication program. In some embodiments, voice interaction that includes a request or command is received from a user. The user may be requested to provide authentication information to fulfill the request or command made during the voice interaction. The user may be authenticated using a first authentication method. The user may be passively enrolled into an authentication program that uses a second authentication method. Enrolling may include deriving characteristics of the user'"'"'s voice from the voice interaction. After the user is enrolled in the authentication program, the second authentication method may be used to authenticate the user prior to fulfilling requests or commands made during voice navigation.
134 Citations
18 Claims
-
1. A computer-implemented method comprising:
-
receiving, via a network, a voice interaction from a user, wherein the voice interaction includes a request or a command identifiable from a voice of the user, wherein the request or the command requests information or commands an action; requesting non-voice biometric authentication information from the user to fulfill the request or the command made during the voice interaction, wherein the authentication information is used to authenticate the user; after the user is authenticated to or above an authentication threshold using the non-voice biometric authentication information; fulfilling the request or the command; passively enrolling the user into an authentication program that uses a voice biometric authentication method, wherein passively enrolling the user includes deriving characteristics of the voice of the user received during the request or the command and associating the voice characteristics with an account of the user; and after enrollment into the authentication program, authenticating the user via the voice biometric authentication method prior to fulfilling requests or commands made during a voice navigation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method comprising:
-
receiving a spoken command from a user, wherein the spoken command commands an action; requesting authentication information from the user to fulfill the spoken command; authenticating the user via a first authentication method using the authentication information, wherein the first authentication method uses non-voice biometric credentials to authenticate the user; and after authenticating the user via the first authentication method; fulfilling the spoken command, and enrolling, without requesting enrollment information, the user into an authentication program for the spoken command, wherein the authentication program uses a second authentication method, wherein enrolling the user into the authentication program comprises determining voice characteristics from the spoken command, wherein the second authentication method includes authenticating the user by comparing characteristics of a voice of the user speaking the spoken command during subsequent requests with the determined characteristics of the voice of the user speaking the spoken command. - View Dependent Claims (14, 15)
-
-
16. A non-transitory, computer-readable medium containing instructions that, when executed by one or more processors, cause a machine to:
-
receive a spoken request and authentication information from a user, wherein the spoken request includes biometric information about the user, wherein the biometric information includes voice, wherein the spoken request requests information or commands an action; authenticate the user via a first authentication method using the authentication information, wherein the first authentication method uses non-voice biometric credentials to authenticate the user; after authenticating the user via the first authentication method; fulfilling the spoken command, and; determine a number and a quality of voice samples; and enroll, without requesting enrollment information, the request into a biometric authentication program that uses a second authentication method when the number and the quality of the voice samples exceed a threshold, and wherein enrolling the user into the biometric authentication program comprises creating a biometric profile of the user from the biometric information included in the request. - View Dependent Claims (17, 18)
-
Specification