EP3465677A1 - System and method for voice authentication - Google Patents
System and method for voice authenticationInfo
- Publication number
- EP3465677A1 EP3465677A1 EP17807447.2A EP17807447A EP3465677A1 EP 3465677 A1 EP3465677 A1 EP 3465677A1 EP 17807447 A EP17807447 A EP 17807447A EP 3465677 A1 EP3465677 A1 EP 3465677A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- user device
- access
- authentication
- vocal
- voice
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 230000001755 vocal effect Effects 0.000 claims description 39
- 238000013473 artificial intelligence Methods 0.000 abstract description 10
- 238000004891 communication Methods 0.000 description 27
- 230000008569 process Effects 0.000 description 20
- 238000010586 diagram Methods 0.000 description 11
- 241000238558 Eucarida Species 0.000 description 3
- 238000012549 training Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- IRLPACMLTUPBCL-KQYNXXCUSA-N 5'-adenylyl sulfate Chemical compound C1=NC=2C(N)=NC=NC=2N1[C@@H]1O[C@H](COP(O)(=O)OS(O)(=O)=O)[C@@H](O)[C@H]1O IRLPACMLTUPBCL-KQYNXXCUSA-N 0.000 description 1
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000010606 normalization Methods 0.000 description 1
- 235000013550 pizza Nutrition 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/004—Artificial life, i.e. computing arrangements simulating life
- G06N3/006—Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/22—Procedures used during a speech recognition process, e.g. man-machine dialogue
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/28—Constructional details of speech recognition systems
- G10L15/30—Distributed recognition, e.g. in client-server systems, for mobile phones or network applications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/06—Decision making techniques; Pattern matching strategies
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
- G10L17/24—Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/16—Sound input; Sound output
- G06F3/167—Audio in a user interface, e.g. using voice commands for navigating, audio feedback
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/22—Procedures used during a speech recognition process, e.g. man-machine dialogue
- G10L2015/223—Execution procedure of a spoken command
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
Definitions
- the present invention relates to a system and a method for voice authentication and in particular to a system and a method for single sign-on voice authentication.
- Voice authentication is a biometric type authentication where a speaker's identity is authenticated or verified via a voice signal that is compared to a prerecorded voice print. Voice authentication is usually applied in order to provide access to secure systems, such as bank accounts, credit accounts, databases, web services and systems that contain proprietary and/or secret data, medical records, financial records, personal records, government records and business records, among others.
- speaker recognition systems include voice authentication systems and voice identification systems.
- voice authentication the identity of a user is authenticated based on a voice signal
- voice identification a user is identified based on a voice signal.
- Each speaker recognition system has three phases: Enrollment, training and authentication.
- Enrollment the speaker's information is registered into a database to identify who the user is and to establish an account. Then the speaker's voice is recorded and typically a number of features are extracted to form one or more recorded voice prints.
- the system is trained to recognize the voice of a speaker.
- a voice signal of a speaker is compared against one or more previously created voice prints of the speaker.
- a voice signal of a speaker is compared against multiple voice prints of multiple speakers in order to determine the best match while authentication systems compare a speaker's voice signal against one or more stored voice prints of the speaker.
- Voice based speaker recognition systems have the advantages that they are non-contact systems, non-intrusive, easy to use and can be used for remote authentication.
- the present invention relates to a system and a method for single sign-on voice authentication that provides access to multiple voice recognition and artificial intelligence platforms, to multiple devices and to multiple third party web service systems.
- FIG. 1A depicts a block diagram of a prior art single platform voice authentication system
- FIG. IB depicts a block diagram of a prior art multi-point voice authentication system for accessing a plurality or web-services
- FIG. 2 depicts a block diagram of a single -point voice authentication system for accessing a plurality or web-services, according to this invention
- FIG. 3A depicts a block diagram of a single-point voice authentication server, according to this invention.
- FIG. 3B depicts a block diagram of the single-point voice authentication server interface to a plurality of web services, according to this invention
- FIG. 4A depicts a process flow diagram for the single -point voice authentication according to this invention.
- FIG. 4B depicts a signal flow diagram for the single-point voice authentication service interface to a plurality of web services according to this invention
- FIG. 5 depicts a process flow diagram of another embodiment of the single-point voice authentication according to this invention.
- FIG. 6 depicts a process flow diagram for user registration into the single-point voice authentication system of the present invention
- FIG. 7 depicts a process flow diagram of another embodiment of the single-point voice authentication according to this invention.
- FIG. 8 depicts a process flow diagram of yet another embodiment of the single -point voice authentication according to this invention.
- the voice of a user to be authenticated is captured by a microphone 53 and a voice user interface 52 that is associated with a communication device 54 and the captured voice signal is transmitted to an individual web service 58a, where it is authenticated prior to providing access to the web service.
- the communication device 54 may be a personal or public communication device such as a telephone, cell-phone, smart phone, a tablet, a laptop computer, a desktop computer, a television, a personal assistant device, a point of sale device, or any other mobile or non- mobile communication device that provides access to a service via a network connection.
- device 54 is a dedicated artificial intelligence (AI) device that is associated with a specific web service.
- AI artificial intelligence
- An example of a dedicated AI device is Amazon's Echo speaker associated with the Alexa voice web service. Other examples include Apple's phones or tablets that utilize the Siri voice service.
- the voice user interface 52 may be integrated within the communication device 54 or may be an external interface. Similarly, the microphone 53 may be integrated together with the communication device 54 in one communication system 51. The voice user interface 52 enables human interaction with the communication device 54 though a voice recognition platform in order to initiate a service or a process.
- Communication device 54 accesses the service 58a via a network connection 90.
- Network connection 90 may be any wired or wireless network.
- Service 58a may a bank account, an online wallet service, a credit account, an investment account, a health record account, or other accounts that contain proprietary and/or secret data, medical records, financial records, personal records, government records or business records, among others.
- voice authentication is provided by the web service 58a.
- communication system 5 1 transmits a user's voice signal to separate web-services 58a, 58b, 58c, to 58n via the network connection 90.
- Each web-service provides its own voice authentication service via a locally stored voice biometric signal.
- These voice authentication systems require that the user registers with each individual platform/system and goes through the process of establishing individual voice based authentication accounts and credentials. This is a time consuming process and deters the users from using these voice based authentication systems for accessing individual bank accounts, web services or devices.
- a voice authentication system 100 includes a communication system 101 and a central voice authentication server 1 10.
- the communication system 101 communicates with the central voice authentication server 1 10 via a network connection 90.
- the central voice authentication server 1 10 connects to web services 58a, 58b, 58c to 58 n via the same network connection 90 or a dedicated network 91.
- Examples of network connections 90, 91 include the following: Internet, Ethernet, X.21, ISDN, Frame Relay, and cellular network connections such as GSM, CDMA, AMPS, GPRS, EDGE, UMTS, DECT, iDEN, among others.
- Communication system 101 includes a voice user interface 102, a communication device 104 and a smart headphone/microphone device 150.
- the communication device 104 may be a personal or public communication device such as a telephone, cell-phone, smart phone, a tablet, a laptop computer, a desktop computer, a television, a personal assistant device, a point of sale device, or any other mobile or non-mobile communication device that provides access to a service via a network connection.
- device 104 is a dedicated artificial intelligence (AI) platform that is associated with a specific device.
- An example of a dedicated AI platform is the Alexa voice service that is associated with Amazon's Echo speaker.
- the smart headphone/ microphone device 150 may be a smart headphone/ microphone device.
- smart headphone/ microphone device 150 is the ONvocal Mix360 headphone, described in patent US 8,498,425 B2, the entire contents of which are incorporated herein by reference.
- the voice user interface 102 may be integrated within the communication device 104 or may be an external interface.
- the voice user interface (VUI) 102 is the VUI provided by the AI platform, i.e., the Alexa VUI, Siri VUI, Cortana VUI, among others.
- the smart headphone/microphone device may be integrated together with the communication device 104 in one communication system 101.
- the VUI 102 may be an application sitting in communication device 104, and can interact with either the native microphone and speaker with device 104, or headsets and headphones attached to device 104 via wire or wireless connectivity.
- the central voice authentication server 1 10 includes a computing processor 11 1, a voice recognition application 1 12, a voice authentication algorithm 1 18, a first database 1 14 storing the voice biometric patterns of the registered users, and the second database 1 16 containing the accessible web-services and the corresponding access credentials for each registered user.
- the first database 1 14 also includes additional authentication credentials, such as challenge questions and answers, and passwords.
- the central voice authentication server 1 10 also includes a memory 113 and a communication interface 1 15.
- Voice recognition application 1 12 is any speech recognition application that translates speech into text representing the words contained in the spoken voice signal or extracts voice pattern information from the user's spoken vocal signal.
- the spoken vocal signal is analyzed with the speech recognition application 1 12 using methodologies such as Hidden Markov Modeling (HMM), dynamic time warping (DTW), neural networks, vocal tract length normalization (VTLN), among others.
- HMM Hidden Markov Modeling
- DTW dynamic time warping
- VTLN vocal tract length normalization
- a user has made a voice authentication request to the voice authentication server or service according to the disclosure. This has been successful request, and the user account has been correctly identified.
- a cloud service has a secure "wallet" of connected web services such as Bank Of America, Citi, and/or Chase credentials for the requesting user which are securely stored in a user credential vault. This vault is only accessible by a secure token service which encrypts/decrypts each access and generates a random access code each time it is requested. Once authenticated the service is open and connection to the Citi service is then provided.
- an authentication process 300 includes the following steps. First a user utters a verbal authentication phrase in the presence of the communication system 101 (302).
- the authentication phrase includes a vocal authentication command which is comprised of the user's name followed by the command authenticating, i.e., "John Smith authenticating".
- Other examples of authentication commands include "Authenticate Me", a segment of a song, or any other specific phrase that the user chooses during the registration process, or a one -time-use PIN that is generated by the voice authentication server and repeated by the user.
- the authentication command is captured by the communication device 104 and is transmitted to the voice authentication server (304).
- the voice authentication server analyzes the authentication command by comparing it to the stored voice biometric pattern in the user's account in the first database 1 14 (306). If there is a match, the voice authentication is successful and the user is asked to select a specific web-service (308) and then access to the web-service is provided (320). If there is not a match the voice authentication is not successful and the user is asked a challenge question (310). The challenge questions and answers are also stored in the user's account in the first database 1 14 and are chosen during the registration process. If the answer to the challenge question is correct, the authentication is successful and the user is asked to select a specific web-service (312) and access to the web-service is provided (320). If the answer to the challenge question is not correct, the authentication fails (314).
- a user may be required to interact directly with the service provider, such as Bank of America.
- the Service Provider may communicate with the centralized authentication server to inquire whether the user is actively/fully authenticated for the service (e.g. are any further credentials or authorizations required). If no further authentication is required, then the user has already been authenticated for the service and access is allowed. If not, then the centralized authentication server will perform an out-of-band request to the user to provide voice print authentication. For example, further authentication may be required through an identity application running or downloaded to the user device or a communication may be sent from the authentication server to the user device. Once the user has authenticated, then the service provider can continue the transaction.
- an authentication process 400 includes the following steps. First a user utters a verbal authentication phrase for a specific web service in the presence of the communication system 101 (402).
- the authentication phrase further includes a vocal selection command which may be a request for access to a specific web service following the user's name, i.e., "John Smith authenticating for Bank of America account”.
- the authentication phrase is captured by the communication device 104 and is transmitted to the voice authentication server (404).
- the central voice authentication server 1 10 analyzes the authentication command by comparing a voice pattern extracted from the authentication command to the stored voice pattern in the user's account in the first database 114 (406).
- the voice authentication is successful and the user provided password for the specific web-service is used to gain access to the web service (408). If the provided password is correct (410) access to the specific web-service is provided (420). If the voice authentication is not successful the user is asked a challenge question (412). The challenge questions and answers are also stored in the user's account in the first database 1 14 and are chosen during the registration process. If the answer to the challenge question is correct, the voice authentication is successful and the user is directed to step (408) and the password for the specific web-service (408) is used for access. If the password is correct (410), access to the specific web service is provided (420). If the answer to the challenge question is not correct, the authentication fails (416) and user is notified their password must be updated in the voice authentication app.
- the user registration and enrollment process 500 includes the following steps. First the user registers with the authentication server and sets up an account (502). Registration data may include name, address, telephone number, e-mail, and other physical and online contact information. Registration data may also include a list of the web- services and the corresponding passwords that the user chooses to access via a single -point authentication. Examples of the selected web-services include commercial websites, bank accounts, investment accounts, medical record accounts, and business accounts, among others. Next, the user trains the system to recognize his/her voice and selects and records a voice and authentication voice signal, including numbers 0 to 9 to be used later for dynamic PIN authentication. (504).
- the training protocol for recognizing the voice of the user includes instructions to repeat specific words, phrases, numbers, and sing a song, among others.
- the user may select any type of phrase, utterance, number or segment of a song as their authentication voice biometric pattern and the selected voice pattern is recorded and stored in the server's first database 1 14.
- the user may also select the time to remain logged into the server, after being authenticated and to log out automatically after the selected time.
- additional passwords are selected and stored in the database.
- the user selects which web-services require a password for access and which do not.
- the administrator of the web-services elects to use the password requirement for accessing the web-service or not.
- an authentication process 600 includes the following steps. First a user utters a verbal request phrase for a specific web service in the presence of the communication system 101 (602).
- the authentication phrase includes the request for sensitive information for a specific web service, i.e., "What is the balance to my Bank of America account”.
- the phrase is captured by the communication device 104 and is transmitted to the server, which detects that the request is for access to a web service that requires authentication.
- the voice authentication server (604) challenges the user by asking the user to repeat a one-time-use PIN generated by the authentication system such as "this request requires authentication please repeat PIN 7354".
- the central voice authentication server 1 10 analyzes the authentication phrase by comparing the voice pattern in the authentication phrase to the stored voice pattern in the user's account in the first database 1 14 (606). If there is a match with the stored voice pattern, the voice authentication is successful and the user's stored password for the specific web-service is used (608). If the provided password is correct (610) access to the specific web-service is provided (620). If the voice authentication is not successful the user is asked to try again with another PIN or a challenge question (612). The numbers used for PIN combination from 0 to 9, or challenge questions and answers are also stored in the user's account in the first database 1 14 and are chosen during the registration process.
- the voice authentication is successful and the user is directed to step (608) and uses the stored password for the specific web-service (608). If the password is correct (610), access to the specific web service is provided (620). If the answer to the challenge question is not correct, the authentication fails (616). As was mentioned above, the user must first set up their username and password ahead of time in the single point authentication mobile application, for a specific web service like Bank of America account if password for such web-service is required. Even if no password is required for such a web service, the user can choose to require Voice Authentication for such a web service. The user may also set a timer so that no additional voice authentication is required after 5 minutes or 10 minutes of a proper authentication.
- a user 702 interacts directly with the web service provider 720, such as PeoplePower or BoA. This interaction may be through an Alexa skill, an App, or a web page, among others.
- the web service provider 720 asks the authentication server 704 if the user is actively authenticated for the service (722). If this is the case, then the user has already proven their identity for the service and access is allowed. If this is not the case, then the authentication server 704 performs an out-of-band request to the user to provide voice print authentication (730).
- the out-of-band request may be performed through an identity application running on a smartphone or by making a phone call, among others.
- the out-of-band request includes asking the user to say their password (731).
- the user responds by saying their password and the authentication server compares the voice biometric pattern to the stored voiceprints of the user (732). Once the authentication server 704 has performed the authentication service and the user has been authenticated (734), then the service provider can continue the transaction (740).
- the invention provides a single -point access and voice authentication for login into a plurality of web-services.
- the detailed description herein refers to providing access to selected one(s) of a plurality of web services, it should be appreciated by those skilled in the art that the single points access and voice authentication according to the disclosure could similarly provide access to a selected web server, and that selected web server(s) may provide access to one or a number of web services in a manner as described.
- the single point voice authentication system of the present invention interfaces with a plurality of voice based artificial intelligence systems and platforms.
- voice based artificial intelligence systems and platforms like Siri, or Google Now, or Cortana are tied to specific devices or device Operating Systems (OS), and not compatible across devices or OS, this invention enables access to services exposed by the APIs from these platforms across devices and OS's.
- OS Operating Systems
- the voice authentication system of the present invention provides "hands-free" secure access to web-services and accounts. Also if the user wants to add a level of authentication to their voice interface for access of sensitive data like bank account info, or ordering products or pizza, etc. this single point authentication system can help reduce the chance of fraudulent use and give peace of mind to the user in case their mobile device and/or headset is stolen or lost.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computational Linguistics (AREA)
- Biomedical Technology (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Game Theory and Decision Science (AREA)
- Accounting & Taxation (AREA)
- Software Systems (AREA)
- Biophysics (AREA)
- Artificial Intelligence (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Molecular Biology (AREA)
- Mathematical Physics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662344373P | 2016-06-01 | 2016-06-01 | |
PCT/US2017/035318 WO2017210368A1 (en) | 2016-06-01 | 2017-05-31 | System and method for voice authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3465677A1 true EP3465677A1 (en) | 2019-04-10 |
EP3465677A4 EP3465677A4 (en) | 2020-01-29 |
Family
ID=65563040
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP17807447.2A Ceased EP3465677A4 (en) | 2016-06-01 | 2017-05-31 | System and method for voice authentication |
Country Status (1)
Country | Link |
---|---|
EP (1) | EP3465677A4 (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8914851B2 (en) * | 2010-12-06 | 2014-12-16 | Golba Llc | Method and system for improved security |
US20140214676A1 (en) * | 2013-01-29 | 2014-07-31 | Dror Bukai | Automatic Learning Fraud Prevention (LFP) System |
US10438204B2 (en) * | 2014-05-19 | 2019-10-08 | American Express Travel Related Services Copmany, Inc. | Authentication via biometric passphrase |
-
2017
- 2017-05-31 EP EP17807447.2A patent/EP3465677A4/en not_active Ceased
Also Published As
Publication number | Publication date |
---|---|
EP3465677A4 (en) | 2020-01-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10681032B2 (en) | System and method for voice authentication | |
US12052363B2 (en) | Maintaining data confidentiality in communications involving voice-enabled devices in a distributed computing environment | |
US10063542B1 (en) | Systems and methods for simultaneous voice and sound multifactor authentication | |
US10650824B1 (en) | Computer systems and methods for securing access to content provided by virtual assistants | |
US20220075880A1 (en) | Homomorphic encryption of communications involving voice-enabled devices in a distributed computing environment | |
US8812319B2 (en) | Dynamic pass phrase security system (DPSS) | |
US9692758B2 (en) | Authentication techniques utilizing a computing device | |
US20190188366A1 (en) | Authentication device, authentication system, and authentication method | |
US8082448B2 (en) | System and method for user authentication using non-language words | |
US12010108B2 (en) | Techniques to provide sensitive information over a voice connection | |
US20130006626A1 (en) | Voice-based telecommunication login | |
US10972458B1 (en) | Methods and systems for authentication assistant | |
US10331867B2 (en) | Enhanced biometric user authentication | |
WO2014011131A2 (en) | A method enabling verification of the user id by means of an interactive voice response system | |
KR101424962B1 (en) | Authentication system and method based by voice | |
KR101876262B1 (en) | Multi-factor user authentication system | |
KR20200027688A (en) | Server and method for authenticating speaker during call to counselor | |
KR101703942B1 (en) | Financial security system and method using speaker verification | |
JP7215563B2 (en) | Voice authentication device, voice authentication method, and recording medium | |
EP3465677A1 (en) | System and method for voice authentication | |
EP3502938B1 (en) | A conversational registration method for client devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20190102 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20200108 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G10L 17/24 20130101ALI20191220BHEP Ipc: G06Q 20/40 20120101ALI20191220BHEP Ipc: G10L 17/00 20130101AFI20191220BHEP Ipc: H04L 29/06 20060101ALI20191220BHEP |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20211007 |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230526 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20231008 |