WO2014204855A1 - Speech transaction processing - Google Patents
Speech transaction processing Download PDFInfo
- Publication number
- WO2014204855A1 WO2014204855A1 PCT/US2014/042538 US2014042538W WO2014204855A1 WO 2014204855 A1 WO2014204855 A1 WO 2014204855A1 US 2014042538 W US2014042538 W US 2014042538W WO 2014204855 A1 WO2014204855 A1 WO 2014204855A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- voice
- user
- database
- communication device
- voice model
- Prior art date
Links
- 238000012545 processing Methods 0.000 title abstract description 34
- 238000000034 method Methods 0.000 claims abstract description 55
- 238000004891 communication Methods 0.000 claims description 105
- 230000004044 response Effects 0.000 claims description 14
- 238000013475 authorization Methods 0.000 description 39
- 230000015654 memory Effects 0.000 description 26
- 238000012795 verification Methods 0.000 description 18
- 238000010586 diagram Methods 0.000 description 11
- 230000003287 optical effect Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 5
- 238000013481 data capture Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 102000053602 DNA Human genes 0.000 description 2
- 108020004414 DNA Proteins 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000007423 decrease Effects 0.000 description 2
- 230000003292 diminished effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000001815 facial effect Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000002207 retinal effect Effects 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 230000003936 working memory Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 210000003484 anatomy Anatomy 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004900 laundering Methods 0.000 description 1
- 230000003278 mimic effect Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/10—Multimodal systems, i.e. based on the integration of multiple recognition engines or fusion of expert systems
Definitions
- Embodiments of the invention are directed to systems and methods that allow for user verification at point-of-sale (POS) terminals.
- POS point-of-sale
- PI personal identification number
- PINs are often comprised. As such, the effectiveness of PINs as a security safeguard and for user verification is greatly reduced. Additionally the user's trust and comfort with the verification system may be diminished as a result.
- Embodiments of the invention address this and other problems, both individually and collectively.
- Embodiments of the invention are directed to systems and methods for authenticating a user for a transaction. More specifically, embodiments of the invention relate to systems and methods for determining when a user is within a specified location and obtaining a reference for accessing a voice model associated with the user from a database. The reference to the voice model may then be used to authenticate the user by comparing a received voice segment to the voice model. Because a user's voice and speech patterns can be unique to the user, it would be difficult for a fraudster to mimic someone else's voice to fraudulently conduct a transaction. As such, utilizing a user's voice to authenticate the user for a transaction can provide better security than other authentication techniques such as PiNs that can easily be compromised.
- these databases may store voice models for a plurality of users that can be used for voice authentication during initiation of a transaction.
- These databases can include thousands or millions of entries, which may take a significant amount of time to search.
- an event e.g. a user entering a merchant location
- a reference to the voice model associated with the user that is stored within the database can be obtained.
- the reference can be a pointer to a location of the voice model within the database.
- the user can be identified based on attributes associated with his/her communication device (e.g., serial number, International Mobile Equipment Identity (!MEI) number, Subscriber Identity Module (SIM) card number, phone number, primary account number or token associated with a digital wallet application, etc.).
- the user may provide a voice segment (e.g., voice sample) at the time of initiating a transaction via the communication device.
- the provided voice segment may then be compared against the voice model associated with the user stored within the database, using the obtained reference.
- Some embodiments are directed to a method for authenticating a user for a transaction.
- the method includes receiving, at a server computer, a communication indicative of a location of a communication device associated with the user.
- the method also includes, in response to receiving the communication, retrieving, via the server computer, a reference for accessing a voice model associated with the user, wherein the voice model is stored in a database.
- the method further includes receiving, at the server computer, a voice segment from the user.
- the method additionally includes, using the reference to access the voice model stored in the database.
- the method also includes comparing the received voice segment to the voice model.
- the method further includes determining whether the user is authenticated for the transaction based at least in part on comparing the received voice segment to the voice model.
- Some embodiments of the invention are directed to a server computer comprising a processor, and a computer readable medium coupled to the processor.
- the computer readable medium comprises code, executable by the processor, for implementing the above-described method.
- FIG. 1 is a block diagram of a payment system, according to some embodiments.
- FIG. 2 is a block diagram of communication device, according to some embodiments.
- FIG. 3 is a block diagram of server computer, according to some embodiments.
- FIG. 4 illustrates an exemplary environment including a merchant location, according to some embodiments.
- FIG. 5 illustrates a block diagram of accessing voice model within a voice database using reference, according to some embodiments.
- FIG. 8 shows an exemplary voice database including a voice model, according to some embodiments.
- FIG. 7 illustrates a flow diagram of an exemplary method for authenticating a user for a transaction, according to some embodiments.
- FIG. 8 shows a block diagram of an exemplary computer apparatus, according to some embodiments.
- a "payment device” may include any suitable device capable of making a payment transaction.
- a payment device can include a card such as a credit card, debit card, charge card, gift card, or any combination thereof.
- a payment device can be a communication device that is used to conduct a payment transaction.
- a "payment processing network” may include data processing subsystems, networks, and operations used to support and deliver payment related services (e.g., authentication services, authorization services, exception file services, and clearing and settlement services, etc.).
- An exemplary payment processing network may include VisaNetTM.
- Payment processing networks such as VisaNetTM are able to process credit card transactions, debit card transactions, and other types of commercial transactions.
- VisaNetTM in particular, includes a VIP system (Visa Integrated Payments system) which processes authorization requests and a Base II system which performs clearing and settlement services.
- a "server computer” can be a powerful computer or a cluster of computers.
- the server computer can be a large mainframe, a minicomputer cluster, or a group of servers functioning as a unit.
- the server computer may be a database server coupled to a Web server, and may include or be coupled to a database.
- An "access device” can be any suitable device configured to process payment transactions.
- an access device e.g., a point-of-sale (POS) terminal, etc.
- POS point-of-sale
- An "acquirer” can be a business entity (e.g., a commercial bank) that typically has a business relationship with a merchant. An acquirer may receive some or all of the transactions from that merchant.
- An "issuer” can be a business entity which issues a payment account that can be used to conduct transactions.
- an issuer is a financial institution.
- An "account holder” can be a user who is authorized to conduct transactions with a payment account.
- the account holder can be, for example, the account owner of the account associated with a payment device, or an individual who is authorized to use the account on behalf of the account owner.
- the terms “account holder” and “user” may be used interchangeably in the following
- a "communication device,” as described herein, can be any electronic communication device that can execute and/or support electronic communications including, but not limited to, payment transactions.
- Some examples include a personal digital assistant (PDA), a smart phone, tablet computer, notebook computer, and the like.
- An "authorization request message” may be an electronic message that is sent to request authorization for a transaction.
- An authorization request message can be sent, for example, to a payment processing network and/or an issuer of a payment device.
- An authorization request message according to some embodiments may comply with (International Organization of Standardization) ISO 8583, which is a standard for systems that exchange electronic transaction information associated with a payment made by a consumer using a payment device or payment account.
- ISO 8583 International Organization of Standardization
- the authorization request message may include an issuer account identifier that may be associated with a payment device or payment account.
- An authorization request message may also comprise additional data elements corresponding to "identification information" including, by way of example only: a service code, a CW (card verification value), a dCW (dynamic card verification value), an expiration date, etc..
- An authorization request message may also comprise "transaction information," such as any information associated with a current transaction, such as the transaction amount, merchant identifier, merchant location, etc., as well as any other information that may be utilized in determining whether to identify and/or authorize a transaction.
- An "authorization response message” may be an electronic message reply to an authorization request message.
- An authorization response message can be generated by an issuing financial institution or a payment processing network.
- the authorization response message may include, by way of example only, one or more of the following status indicators: Approval— transaction was approved;
- the authorization response message may also include an authorization code, which may be a code that a issuer bank returns in response to an authorization request message in an electronic message (either directly or through the payment processing network) to the merchant's access device (e.g. POS equipment) that indicates approval of the transaction.
- the code may serve as proof of authorization.
- a payment processing network may generate or forward the authorization response message to the merchant.
- a "communications channel” may refer to any suitable path for communication between two or more entities. Suitable communications channels may be present directly between two entities such as a payment processing network and a merchant or issuer computer, or may include a number of different entities. Any suitable communications protocols may be used for generating a communications channel.
- a communication channel may in some instance comprise a "secure communication channel," which may be established in any known manner, including the use of mutual authentication and a session key and establishment of a secure socket layer (SSL) session. However, any method of creating a secure channel ma be used. By establishing a secure channel, sensitive information related to a payment device (such as account numbers, CW values, expiration dates, etc.) may be securely transmitted between the two or more entities to facilitate a transaction.
- SSL secure socket layer
- a "digital wallet provider” may include any suitable entity that provides a digital wallet service.
- a digital wallet provider may provide software applications that store account numbers, account numbers including unique identifiers, or representations of the account numbers (e.g., tokens), on behalf of an account
- D holder to facilitate payments at more than one unrelated merchant, perform person- to-person payments, or load financial value into the digital wallet.
- Biometric data includes data that can be used to uniquely identify an individual based upon one or more intrinsic physical or behavioral traits.
- biometric data may include fingerprint data and retinal scan data.
- Further examples of biometric data include digital photographic data (e.g., facial recognition data), deoxyribonucleic acid (DNA) data, palm print data, hand geometry data, and iris recognition data, in the context of the present disclosure, biometric data may include voice data.
- Speaker recognition is the identification of a user based on characteristics of their voice (voice biometrics). Speaker recognition uses the acoustic features of speech that have been found to differ between individuals. These acoustic patterns reflect both anatomy (e.g., size and shape of the throat and mouth) and learned behavioral patterns (e.g., voice pitch, speaking style).
- Speech recognition is the translation of spoken words into text understandable by a computer system. Speech recognition combined with speaker recognition may simplif the task of translating speech in systems that are used to authenticate or verify the identity of a speaker as part of a security process.
- a "voice model,” as described herein, can be a model of the user's voice constructed from prior voice samples received from the user.
- the voice model can be used to determine a risk factor associated with a user.
- the voice model may contain information about current and prior user authentications with a verification system.
- the voice model may contain the time, location, voice data, and match score associated with each particular voice authentication with the verification system by the user.
- the combination of information within the voice model about prior authentications may be used to determine the risk factor associated with the user.
- a "prompt,” as described herein, can be a combination of a number of words arranged in a particular order. A user may be requested to repeat a prompt for authentication purposes.
- the terms “prompt” and “word string” may be used interchangeably in the following description.
- a "voice sample,” as described herein, can be captured audio data of a user's voice.
- a voice sample may be a captured audio signal of a users voice who wishes to authenticate with a transaction system.
- the user may be requested to repeat a certain prompt.
- the microphone may capture the prompt repeated by the user and pass the audio data to another module for speaker verification.
- voice sample voice data
- voice segment voice segment
- audio segment may be used interchangeably in the following description.
- a "match score,” as described herein, can be a relationship between received input data and stored data.
- the received input data can be a captured voice sample.
- the stored data can be a previously captured and stored voice sample or the voice model.
- the match score may express the degree of confidence that the received input data and the stored data correlates with each other (e.g., originated from the same individual).
- the match score may be passed to other parts of a risk scoring mechanism, such that the match score contributes along with other risk parameters to an overall decision that may be used, for example, for approving or declining a transaction.
- An appropriate threshold can be set to ensure an acceptable level of accuracy. This concept can be applied to other biometric data apart from voice samples (e.g., retinal scans, facial recognition data, etc.).
- FIG. 1 is a block diagram of a payment system 100, according to some embodiments.
- the system 100 includes a communication device 1 10, an access device 120, a merchant 125, an acquirer 130, a payment processing network 140, an issuer 150, interconnected network 160, and a server computer 300.
- the acquirer 130 may further include an acquirer computer (not shown).
- the payment processing network 140 may include an authorization and settlement server and/or additional servers (not shown) to carry out the various transactions described herein.
- the server computer 300 may reside within the payment processing network 140 or issuer 150.
- the communication device 1 10 may be in eiectronic communication with the access device 120.
- the communication device 1 10 can be a personal digital assistant (PDA), a smart phone, tablet computer, notebook computer, or the like, that can execute and/or support payment transactions with a payment system 100.
- a communication device 1 10 can be used in conjunction with a payment device, such as a credit card, debit card, charge card, gift card, or other payment device and/or any combination thereof.
- a payment device e.g., credit card
- the communication device 1 10 e.g., smart phone
- the communication device 1 10 may be used in conjunction with transactions of currency or points (e.g., points accumulated in a particular software application).
- the communication device 1 10 may be a wireless device, a contactiess device, a magnetic device, or other type of payment device.
- the communication device 1 10 includes software (e.g., application) and/or hardware to perform the various payment transactions and capture user voice data as further described Anlagenow.
- the access device 120 may be configured to be in eiectronic communication with the acquirer 130 via a merchant 125.
- the access device 120 may be a point-of-service (POS) device.
- the access device 120 can be any suitable device configured to process payment transactions such as credit card or debit card transactions, or electronic settlement transactions, and may have optical, electrical, or magnetic readers for reading data from portable electronic communication devices such as smart cards, keychain device, cell phones, payment cards, security cards, access cards, and the like.
- the access device 120 may be located at and controlled by a merchant.
- the access device 120 can be a POS device at a grocery store checkout line, in some embodiments, the access device 120 can be a client computer or a mobile phone in the event that the user is conducting a remote transaction.
- the acquirer 130 may include an acquirer computer (not shown).
- the acquirer computer can be configured to transfer data (e.g., bank identification number (BIN), etc.) and financial information to the payment processing network 140.
- the acquirer 130 does not need to be present in the system 100 for the communication device 1 10 to transfer the financial and user data to the payment processing network 140, in one non-limiting example, the acquiring bank 130 can additionally check the credentials of the user against a watch list in order to prevent fraud and money laundering schemes.
- the payment processing network 140 is VisaNetTM, where Visa internal processing (VIP) performs the various payment processing network 140 or multi-lateral switch functions described herein.
- the payment processing network 140 can include an authorization and settlement server (not shown), The authorization and settlement server (“authorization server”) performs payment authorization functions.
- the authorization server is further configured to send and receive authorization data to the issuer 150.
- the payment processing network 140 can receive a voice sample by the user (e.g., from the payment device 1 10, access device 120, or acquirer 130) to determine a risk factor associated with a transaction, as further described below.
- the issuer 150 is a business entity which issues a card to a card holder.
- an issuer is a financial institution.
- the issuer 150 is configured to receive the authorization data from the payment processing network 140 (e.g., the authorization server).
- the issuer 150 receives authentication data from the authorization server and determines if the user is authorized to perform a given financial transaction (e.g., cash deposit/withdrawal, money transfer, balance inquiry) based on whether the user was authenticated by an identification system.
- a given financial transaction e.g., cash deposit/withdrawal, money transfer, balance inquiry
- the communication device 1 10 may be connected to and communicate with the payment processor network 140 via an interconnected network 160.
- an interconnected network 160 is the Internet.
- the payment processor network 140 may inform the communication device 1 10 when a payment has been successfully processed, in some embodiments, the payment processor network 140 may be connected to and communicate with the access device 120 via the interconnected network 160.
- the payment processor network 140 may inform the access device 120 when a payment has been successfully processed. In turn, the access device 120 may complete the transaction with the communication device 1 10.
- a server computer 300 is also shown in FIG. 1 , and is in operative communication with the interconnected network 180.
- the server computer 300 may include a voice database (described below) that includes stored voice rrsodel(s) of a user for authentication purposes.
- the voice model may be created for the user at the time of enrollment with the authentication system.
- the voice model may subsequently be updated over time as additional voice samples are captured during subsequent user authentications performed with the authentication system.
- the voice database within the server computer 300 may include voice models for a large number of users. That is, the voice database may include thousands or millions of voice models. Further details regarding the voice database are provided below.
- the interconnected network 160 may comprise one or more of a local area network, a wide area network, a metropolitan area network (MAN), an intranet, the Internet, a Public Land Mobile Network (PLMN), a telephone network, such as the Public Switched Telephone Network (PSTN) or a cellular telephone network (e.g., wireless Global System for Mobile Communications (GSM), wireless Code Division Multiple Access (CDMA), etc.), a VoIP network with mobile and/or fixed locations, a wireline network, or a combination of networks.
- PSTN Public Switched Telephone Network
- GSM Global System for Mobile Communications
- CDMA Code Division Multiple Access
- a user may interact with the access device 120 (e.g., with a payment device such as a payment card, communication device, or by entering payment information) to conduct a transaction with the merchant 125.
- the merchant 125 may operate a merchant computer, which may route an authorization request message to the acquirer 130, and eventually to the issuer 150 via the payment processing network 140.
- the issuer 140 will then determine if the transaction is authorized (e.g., by checking for fraud and/or sufficient funds or credit). The issuer will then transmit an authorization response message to the terminal 120 via the payment processing network 140 and the acquirer 130.
- the transaction is cleared and settled between the acquirer 130 and the issuer 150 by the payment processing network 140, for example, at the end of the day.
- the description below provides descriptions of other components in the system as well as authentication methods using authenticating a user for a transaction based on a received voice sample.
- the authentication methods can be performed at any suitable point during the above-described transaction flow.
- FIG. 2 is a block diagram of a communication device 1 10, according to some embodiments.
- Communication device 1 10 includes a processor 210, a location sensor 220, a display 230, an input device 240, a speaker 250, a memory 280, and a computer-readable medium 270.
- Processor 210 may be any suitable processor operable to carry out instructions on the communication device 1 10.
- the processor 210 is coupled to other units of the communication device 1 10 including location sensor 220, display 230, input device 240, speaker 250, memory 260, and computer-readable medium 270.
- Location sensor 220 may be any sensor capable of obtaining location data associated with the communication device 1 10.
- the location sensor 220 may communicate with a mobile network associated with the communication device 1 10 or a Global Positioning System (GPS) (or other similar system) to obtain location data for the communication device 1 10.
- GPS Global Positioning System
- location sensor 220 can be a GPS receiver, or a wireless communication antenna (e.g., cellular, WiFi, etc.) that can be used to triangulate the location of communication device 1 10.
- the location sensor may also be compatible with location-based services that make use of the obtained location data to control features and information services.
- Display 230 may be any device that displays information to a user. Examples may include an LCD screen, CRT monitor, or seven-segment display.
- Input device 240 may be any device that accepts input from a user. Examples may include a keyboard, keypad, mouse, or microphone. In the case of a microphone, the microphone may be any device that converts sound to an electric signal, in some embodiments, the microphone may be used to capture voice data from a user.
- Speaker 250 may be any device that outputs sound to a user.
- Examples may include a built-in speaker or any other device that produces sound in response to an electrical audio signal.
- speaker 250 may be used to request the user for a voice sample for purposes of authentication.
- Memory 260 may be any magnetic, electronic, or optical memory. Memory 260 includes two memory modules, module 1 262 and module 2 264, it can be appreciated that memory 260 may include any number of memory modules. An example of memory 260 may be dynamic random access memory (DRAM).
- DRAM dynamic random access memory
- Computer-readable medium 270 may be any magnetic, electronic, optical, or other computer-readable storage medium.
- Computer-readable storage medium 270 includes voice data capture module 272 and voice data transmission module 274.
- Computer-readable storage medium 270 may comprise any
- volatile and/or non-voiatile memory such as, for example, buffer memory, RAM, DRAM, ROM, flash, or any other suitable memory device, alone or in combination with other data storage devices.
- Voice data capture module 272 is configured to capture voice data, via input device 240, from a user for voice authentication purposes.
- voice data capture module 272 may capture voice data by the user for purposes of initiai!y registering a user for the first time for subsequent voice authentication, in some embodiments, voice data capture module 272 may capture voice data, via input device 240, for purposes of authenticating a user in order to complete a transaction.
- communication device 1 10 may request a user to register or authenticate his/her voice data by displaying a prompt, on display 230, to repeat (by speaking into the microphone) a specific prompt.
- the prompt can also be outputted on speaker 250.
- the voice data corresponding to the prompted prompt may be transmitted to a server computer via voice data
- the transmission module 274 for purposes of storing the voice data for future user authentication or for authenticating the user based on a stored voice model, described below.
- the captured voice data can be digitized.
- Voice data transmission module 274 is configured to transmit captured voice data to a server computer.
- the captured voice data may be voice data captured during user registration and/or authentication by voice data capture module 272, described above, in some embodiments, the captured voice data may be voice data captured during subsequent authentications using voice data received from the user, described in further detail below.
- FIG. 3 is a block diagram of a server computer 300, according to some embodiments of the present invention.
- Server computer 300 includes an
- the server computer 300 may reside within the interconnected network 160 (FIG. 1 ). In some embodiments,
- the server computer 300 may reside within the payment processor network 140 (FIG. 1 ).
- the input/output (I/O) interface 310 is configured to receive and transmit data.
- the I/O interface 310 may receive an authorization request message from the acquirer 130 (FIG. 1 ).
- the I/O interface 310 may also be used for direct interaction with the server computer 300.
- the I/O interface 210 may accept input from an input device such as, but not limited to, a keyboard, keypad, or mouse. Further, the I/O interface 310 may display output on a display device.
- the I/O interface 310 may also receive communications from the communication device 1 10 (FIG. 1 ), such as a voice sample from the user.
- Memory 320 may be any magnetic, electronic, or optical memory. It can be appreciated that memory 320 may include any number of memory modules, that may comprise any suitable volatile or non-volatile memory devices. An example of memory 320 may be dynamic random access memory (DRAM).
- DRAM dynamic random access memory
- Processor 330 may be any suitable processor operable to carry out instructions on the server computer 300.
- the processor 330 is coupled to other units of the server computer 300 including input/output interface 310, memory 320, voice database 350, and computer-readable medium 380.
- the voice database 350 is configured to store voice modei(s) of users.
- the voice model(s) of the users may be constructed from one or more prior voice samples received from the corresponding user. As subsequent voice samples are received from the user, the voice model may improve over time and the voice model data may more accurately represent the user's voice.
- the voice model(s) may also include attributes such as, but not limited to, time of the authentication / payment transaction, the user or payment cardholder's name, the voice data associated with the payment transaction, the outcome of payment cardholder
- Computer-readable medium 380 may be any magnetic, electronic, optical, or other computer-readable storage medium.
- Computer-readable storage medium 380 includes address pointer generation module 362, voice model retrieval module 364, and match score module 366.
- Computer-readable storage medium 380 may comprise any combination of volatile and/or non-volatile memory such as, for example, buffer memory, RAM, DRAM, ROM, flash, or any other suitable memory device, alone or in combination with other data storage devices.
- Address pointer generation module 382 may be configured to generate a reference to a voice model stored within the voice database 350 upon an indication that the communication device 1 10 is within a certain location, in some
- the location may be a merchant location.
- a virtual perimeter e.g., geofence
- the server computer 300 may receive an indication and the address pointer generation module 362 may generate a reference to the voice modei(s) associated with the user of the communication device 1 10 that is stored within the voice database 350.
- the reference may be a pointer to the memory location where the voice model is stored within the voice database 350.
- the reference may be a user id associated with the user, etc.
- Voice model retrieval module 364 may be configured to use the reference generated by the address pointer generation module 362 to retrieve the voice model from the voice database 350.
- retrieval of the voice model may include accessing the voice database 350 using the reference.
- retrieval of the voice model may further include of copying the voice model from the voice database 350 to another location (described in further detail below).
- Match score module 366 is configured to calculate a match score associated with captured voice data for each user voice authentication attempt using a provided voice sample.
- the match score may be based on a numeric score (e.g., between 0 and 100), where the score expresses a degree of confidence that the captured voice sample matches with previously captured and stored voice samples from the user, and ultimately that the user being authenticated is the genuine user, This score can be passed on to other pails of a risk scoring mechanism, such that the score, along with other risk parameters, contributes to the overall decision of approving or declining the transaction.
- the server computer 200 may reside within the payment processing network 140 (FIG. 1 ) or issuer 150 (FIG. 1 ).
- FIG. 4 illustrates an examplary environment 400 including a plurality of users and a merchant location, according to some embodiments.
- the environment also includes a merchant store 430.
- the merchant store 430 may be any physical location of a merchant.
- merchant store 430 may be a grocery store, shoe store, flower store, restaurant, coffee shop, etc.
- the plurality of users may include users 420 within the boundaries of merchant store 230 and users 410 outside the boundaries of merchant store 430.
- Each user 410, 420 may be carrying a communication device.
- the boundaries of the merchant store 430 may defined by a virtual perimeter 440, such as a geofence.
- the virtual perimeter 440 may be established with the use of location-based hardware installed at merchant store 430.
- the virtual perimeter 440 may be established via server-side implementation, e.g. by monitoring locations of the various communication devices and sensing when the communication device is within the virtual perimeter 440.
- the techniques described herein provide speaker verification for authentication purposes through the communication device. More specifically, embodiments of the present invention pertain to transactions conducted with the use of a communication device, such as a mobile phone or personal computer, for in- person transactions at the merchant store 430.
- the speaker verification may be accomplished using any voice biometric techniques, for example, prompted text independent speaker verification.
- the systems and methods described herein allow for location- awareness of the communication devices, and in turn the users 420, within merchant store 430.
- the location-awareness may be accomplished using techniques such as geofencing, where a virtual perimeter is created around the merchant store 430.
- LBS location-based service
- the communication device can receive a location notification (also referred to herein as a "geo-fence notice").
- This location notification may contain information about the location of the device.
- the geo-fence notice can be sent to the payment processor network 140 (FIG. 1 ) or issuer 150 (FIG. 1 ).
- the communication device may take an active role in the location-awareness and send a notification to the payment processor network 140 (FIG. 1 ) or issuer 150 (FIG. 1 ) when the communication device senses that it has entered or exited the virtual perimeter 440 around the merchant store 430.
- a reference to a voice model associated with the user within the boundaries of merchant store 430 may be retrieved.
- the voice model may be stored within voice database 350 (FIG. 3).
- the reference may be a reference pointer to the location of the user's voice model within the voice database 350 (FIG. 3).
- searching through a large database of thousands or millions of voice models for the user's particular voice model may be time consuming, process intensive, and inefficient.
- the user's experience with the authentication system may be diminished as a result.
- the geo-fencing techniques can greatly reduce the set of voice models that need to be searched to only users 420 that are within the virtual perimieter of the merchant store 430.
- the voice model of the user can be retrived while the user is still shopping to improve the checkout time at the POS.
- the reference to the voice model may be obtained when the user enters the merchant store 430 and the geo-fence notice is sent to the payment processor network 140 (FIG. 1 ) or the issuer 150 (FIG. 1 ).
- the reference may be obtained on-the-fiy at the time when the transaction is initiated by the user, or when the user enters the checkout area indicating the user is about to initate the transaction.
- a geo-fence notice may be sent to the payment processor network 140 (FIG. 1 ) or issuer 150 (FIG. 1 ).
- the payment processor network 140 (FIG. 1 ) or issuer 150 (FIG. 1 ) verifies that John Doe is a user set up for voice authentication
- a reference to John Doe's voice model within the voice database 350 (FIG. 3) may be retrieved.
- John Doe is ready to initiate a transaction, he may interact with his communication device and respond to speaker verification prompts provided by the communication device. For example, John Doe may speak "My name is John," in response to a prompt dispalyed by the communication device.
- a reference to John Doe's voice model and the other users 420 within the merchant store 430 voice models may already be retrieved.
- comparisons of John Doe's received voice input to the voice model in the voice database 350 (FIG. 3) may be completed effecientiy as there may not be a large amount of voice models to search for and compare against.
- the reference may be pointer to storage address within the voice database 350 (FIG. 3) where the voice model(s) are stored.
- the voice model may be copied from the voice database 350 (FIG. 3) to a second database, as described in further detail below.
- FIG. 5 illustrates a block diagram of accessing voice model within a voice database 350 using a reference, according to some embodiments.
- the illustration in FIG. 5 depicts a communication device 1 10, server computer 200, and merchant 125.
- the communication device 1 10, server computer 200, and merchant 125 are interconnected via interconnected network 160.
- the interconnected network 160 may be the internet.
- the communication device 1 10 may be associated with a user and include location awareness functionalities.
- a notification may be sent to the server computer 350.
- the notification may be include user identifying data that may allow the server computer 200 to identify the user of the communication device 1 10.
- the user identifying data may be sent via a digital wallet application associated with a digital wallet provider that runs on the communication device 1 10.
- the server computer 200 may retrieve a reference to the voice model for the user stored within the voice database 350.
- the reference may be a pointer to the storage location of the voice model within the voice database 350.
- the voice model may be stored at address 2F8A within the voice database 350, and the reference may be a pointer to address 2F6A
- identification associated with the user e.g., serial number, international Mobile Equipment Identity (!MEI) number, Subscriber Identity Module (SIM) card number, phone number, primary account number or token associated with a digital wallet application, etc.
- the identification can then be used to retrieve the reference that points to the memory location (e.g., address 2F6A) within the voice database 350.
- the pointer may point to address 2F6A, which contains the voice model for the user within the voice database 350.
- the server computer 200 may have already retrieved the reference to the users voice model stored within the voice database 350 (e.g., at the time the user entered the virtual perimeter 440 (FIG. 4)). Once the user provides a voice sample via the communication device 1 10, the communication device 1 10 may transmit the voice sample to the server computer 200 via the interconnected network 180. The server computer 200 may then authorize the user by comparing the received voice sample to the retrieved voice model of the user. Since the reference to the voice model may have already been retrieved, the server computer 200 may be able to quickly access the voice model and compare the received voice sample from the user.
- These techniques may result in increased authentication efficiency and improved user experience (e.g., reduce transaction processing at the POS).
- the server computer 200 may copy the user's voice model from the voice database 350 to a second database or queue.
- the second database or queue may be reside locally within or be associated with the merchant 125.
- the temporary voice model queue 340 resides within the location of merchant 125.
- the server computer 200 may copy the voice model (using the retrieved reference) to the temporary voice model queue 340. This process may be done for each user's communication device 1 10 that is within the virtual perimeter 440 (FIG.
- the temporary voice model queue 340 may contain copies of voice models for each user within the merchant store 430 (FIG. 4) at a given time.
- the voice model for the user may already be available within the temporary voice model queue 340 local to the merchant 125.
- the access device 120 (FIG. 1 ) may have faster access to the voice model for the user within the temporary voice model queue 340. This may provide an efficient method to the authenticate the user at the time of the transaction.
- the voice database 350 may be associated with an entity outside of the payment processing network.
- the voice database 350 may be associated with a mobile network operator.
- the voice model associated with the user can be copied from the voice database 350 residing within the mobile network operator to a temporary voice model queue 340 residing within the payment processing network. This may allow for faster transaction authentication and authorization by copying the voice model to a database within the payment processor network.
- FIG. 6 shows an exemplary voice database 350 including a voice model 520 created from a plurality of voice samples, according to some
- the voice database 350 may include a voice model 520 with voice samples for each user.
- the voice samples may be stored previous voice inputs from the user during the course of a transaction authentication.
- the voice model 520 may include attributes such as, but not limited to, date of the payment transaction, time of the payment transaction, the payment user's name, the captured voice data used for verification and associated with the payment transaction, the outcome of payment user verification/authentication, and a variable match score for the user.
- the voice model 520 may represent a "signature" of the user's voice made up from prior received (and authenticated) voice samples. As more voice samples are received from the user, the voice model 520 may improve in accuracy.
- the voice model 520 shows data sets relating to nine different payment authorization requests for a user named "John Doe.” Each of the nine payment authorization request data sets includes the attribute information mentioned above. The combination of the nine data sets forms the voice model for John Doe.
- the date attribute of the voice mode! 520 indicates the date at which a user initiated a payment transaction using the communication device.
- the first recorded date (1/4/2012) indicates the first payment transaction initiated by the user after enrollment with the system.
- Each subsequent date represents a subsequent payment transaction initiated by the user.
- the time attribute of the voice model 520 indicates the time of day on the date at which the user initiated the particular payment transaction.
- the user attribute of the voice mode! 520 indicates the registered name for the genuine user.
- the registered name, "John Doe" is the same for every payment authorization request.
- the voice model 520 stores the recorded payment authorization requests for each user in a unique storage location within the database. Other storage locations within the voice model 520, not shown in this example, may contain fraud profiles.
- the voice sample data of the voice model 520 can be the captured digital representation of the voice signal by the communication device upon voice authentication of the user that is then sent to the voice biometric matching server.
- the voice data for each individual payment transaction request initiated by the user may be unique as well as the requested prompt (e.g., the sequence of words used in a particular authentication).
- one or more specific prompt can be used more than once for authentication.
- the voice model 520 shows nine different captured voice data representations for each of the nine payment transactions initiated by the user "John Doe.” As shown, each of the voice data representations is unique. Since it may be unlikely that each received voice data representation from the user will be identical every time, the voice data representations may be unique for each transaction. For example, it may be unlikely that a user speaks in the same tone for the voice biometric every time or that the requested voice prompt is the same every time.
- a first voice data representation (stored on 1/4/2012) is generated upon a user performing their first payment authorization request after registering with the communication device.
- a second voice data representation is generated on a subsequent payment authorization request. If a received voice data representation is significantly different than previously received and stored voice data representations in the voice model 520, the received voice data representation may be assigned a relatively low match score and the payment transaction request may be denied for the possibility of a fraudster wishing to initiate the payment transaction request.
- the ninth received voice data representation (12/24/2012) may be compared against the previous eight stored voice data representations (or against a model generated from the collection of those eight voice data recordings) in order to determine its match score.
- the voice data representations are used to create a voice model for the user. Each subsequent voice data representation received improves the user's voice model.
- the risk score attribute of the voice model 520 indicates a risk score associated with the particular authentication request by the user.
- the risk score may be on a scale from 0-100, with 100 being the highest (most risk).
- the match scores may decrease over time as the user authenticates with the authentication system more and becomes more "trusted" over time.
- the risk score varies for each subsequent payment transaction request initiated by user "John Doe.”
- a first transaction request may not have a risk score because it is the first received voice data representation used for initial enrollment by the user.
- Each subsequent received and validated voice data representation results may result in a lower risk score, as described above.
- the determination of the risk score may be determined based on a predetermined formula.
- the risk score may be an indication of how risky approving the payment transaction may be.
- FIG. 7 is a flow diagram 700 of an exemplary method authenticating a user for a transaction, according to some embodiments of the present invention.
- a communication indicative of a location of a communicative associated with the user is received.
- the location of the communication device may have been determined using location based services in combination with geo-fencing, as described above.
- a reference for accessing a voice model associated with the user is retrieved.
- the voice model may be stored in a database (e.g., a remote database). For example, if a user is determined to be within a store, based on the geo-fencing, a reference to the user's voice model stored within the voice database may be retrieved.
- a voice segment is received from the user.
- the voice segment may be received by the users communication device via an internal or external microphone input.
- the voice segment may be in response to a prompted text speaker verification prompt.
- the reference is used to access the voice model stored in the database.
- the reference may be a pointer to the voice model.
- the received voice segment is compared to the voice model.
- the received voice segment may be compared to the user's voice model within voice database by using the reference pointer to the location of the voice model within the database. This may allow for more efficient comparisons to be made.
- the user may be authenticated to complete the transaction.
- the system 800 may be used to implement any of the computer systems described above (e.g., client computer, a server computer at the card association, a server computer at the issuer, a computer apparatus at the merchant, etc.).
- the computer system 800 is shown comprising hardware elements that may be electrically coupled via a bus 824.
- the hardware elements may include one or more central processing units (CPUs) 802, one or more input devices 804 (e.g., a mouse, a keyboard, etc.), and one or more output devices 806 (e.g., a display device, a printer, etc.).
- the computer system 800 may also include one or more storage devices 808.
- the storage device(s) 808 can include devices such as disk drives, optical storage devices, solid-state storage device such as a random access memory (“RAM”) and/or a read-only memory (“ROM”), which can be programmable, flash-updateab!e and/or the like.
- RAM random access memory
- ROM read-only memory
- the computer system 800 may additionally include a computer- readable storage media reader 812, a communications system 814 and working memory 818, which may include RAM and ROM devices as described above.
- the communications systems can include, for example, a modem, a network card (wireless or wired), an infra-red communication device, etc.
- the computer system 800 can also include a processing acceleration unit 816, such as a digital signal processor (DSP), a special-purpose processor, and/or the like.
- DSP digital signal processor
- the computer-readable storage media reader 812 can further be connected to a computer-readable storage medium 810, together (and, optionally, in combination with storage device(s) 808) comprehensively representing remote, local, fixed, and/or removable storage devices plus storage media for temporarily and/or more permanently containing, storing, transmitting, and retrieving computer-readable information.
- the communications system 814 can permit data to be exchanged with the network and/or any other computer described above with respect to the system 800.
- the computer system 800 may also comprise software elements, shown to be located within a working memory 818, including an operating system 820 and/or application programs 822 comprising code, such as a client application, Web browser, mid-tier application, RDBMS, etc.
- an operating system 820 and/or application programs 822 comprising code, such as a client application, Web browser, mid-tier application, RDBMS, etc.
- application programs 822 comprising code, such as a client application, Web browser, mid-tier application, RDBMS, etc.
- alternate embodiments of a computer system 800 can have numerous variations from that described above. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, software (including portable software, such as applets), or both. Further, connection to other computing devices such as network input/output devices may be employed.
- Storage media and computer-readable media for containing code, or portions of code can include any appropriate media known or used in the art, including storage media and communication media, such as but not limited to volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage and/or transmission of information such as computer- readable instructions, data structures, program modules, or other data, including RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digita versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, data signals, data transmissions, or any other medium which can be used to store or transmit the desired information and which can be accessed by the computer.
- RAM random access memory
- ROM read only memory
- EEPROM electrically erasable programmable read-only memory
- flash memory electrically erasable programmable read-only memory
- CD-ROM compact disc read-only memory
- DVD digita versatile disk
- magnetic cassettes magnetic tape
- magnetic disk storage magnetic disk storage
- Any of the software components or functions described in this application may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques.
- the software code may be stored as a series of instructions, or commands on a computer readable medium, such as a random access memory (RAM), a read only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.
- RAM random access memory
- ROM read only memory
- Any such computer readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.
- Suitable speaker verification techniques that can be used in embodiments of the invention can also be found in U.S. Patent Application No. 13/899,496, filed on May 21 , 2013 and 13/899,470, filed on May 21 , 2013, which are incorporated by reference in their entirety for all purposes.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG11201510186RA SG11201510186RA (en) | 2013-06-17 | 2014-06-16 | Speech transaction processing |
CN201480034614.XA CN105324784B (en) | 2013-06-17 | 2014-06-16 | Voice transaction processing |
EP19163087.0A EP3564887A1 (en) | 2013-06-17 | 2014-06-16 | Biometric data transaction processing |
AU2014281770A AU2014281770B2 (en) | 2013-06-17 | 2014-06-16 | Speech transaction processing |
KR1020167000469A KR20160019924A (en) | 2013-06-17 | 2014-06-16 | Speech transaction processing |
EP14813144.4A EP3011515B1 (en) | 2013-06-17 | 2014-06-16 | Speech transaction processing |
HK16103572.2A HK1215614A1 (en) | 2013-06-17 | 2016-03-29 | Speech transaction processing |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361835992P | 2013-06-17 | 2013-06-17 | |
US61/835,992 | 2013-06-17 | ||
US14/304,681 | 2014-06-13 | ||
US14/304,681 US9754258B2 (en) | 2013-06-17 | 2014-06-13 | Speech transaction processing |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014204855A1 true WO2014204855A1 (en) | 2014-12-24 |
Family
ID=52019979
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2014/042538 WO2014204855A1 (en) | 2013-06-17 | 2014-06-16 | Speech transaction processing |
Country Status (8)
Country | Link |
---|---|
US (4) | US9754258B2 (en) |
EP (2) | EP3011515B1 (en) |
KR (1) | KR20160019924A (en) |
CN (1) | CN105324784B (en) |
AU (1) | AU2014281770B2 (en) |
HK (1) | HK1215614A1 (en) |
SG (2) | SG10201900178WA (en) |
WO (1) | WO2014204855A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019137631A1 (en) * | 2018-01-09 | 2019-07-18 | Veridas Digital Authentication Solutions, S.L. | Methods and devices for biometric authorisation |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10846699B2 (en) | 2013-06-17 | 2020-11-24 | Visa International Service Association | Biometrics transaction processing |
SG11201707861UA (en) * | 2014-03-25 | 2017-10-30 | Botanic Tech Inc | Systems and methods for executing cryptographically secure transactions using voice and natural language processing |
US10956907B2 (en) * | 2014-07-10 | 2021-03-23 | Datalogic Usa, Inc. | Authorization of transactions based on automated validation of customer speech |
US20160012421A1 (en) | 2014-07-11 | 2016-01-14 | Google Inc. | Hands-free transactions using beacon identifiers |
US20160012423A1 (en) * | 2014-07-11 | 2016-01-14 | Google Inc. | Hands-free transactions with voice recognition |
US10032011B2 (en) * | 2014-08-12 | 2018-07-24 | At&T Intellectual Property I, L.P. | Method and device for managing authentication using an identity avatar |
US10733587B2 (en) | 2015-04-30 | 2020-08-04 | Google Llc | Identifying consumers via facial recognition to provide services |
US10397220B2 (en) * | 2015-04-30 | 2019-08-27 | Google Llc | Facial profile password to modify user account data for hands-free transactions |
US9619803B2 (en) | 2015-04-30 | 2017-04-11 | Google Inc. | Identifying consumers in a transaction via facial recognition |
US20160335649A1 (en) | 2015-05-15 | 2016-11-17 | Mastercard International Incorporated | Systems and methods for determining an impact event on a sector location |
AU2016298372B2 (en) * | 2015-07-30 | 2022-01-06 | Visa International Service Association | System and method for conducting transactions using biometric verification |
US11348124B2 (en) * | 2015-09-08 | 2022-05-31 | Mastercard International Incorporated | Generating aggregated merchant analytics using origination location of online transactions |
JP6771564B2 (en) * | 2016-03-01 | 2020-10-21 | グーグル エルエルシー | Prefetching face templates and tokens in hands-free service requests |
WO2017151825A1 (en) * | 2016-03-01 | 2017-09-08 | Google Inc. | Facial profile modification for hands free transactions |
US10127926B2 (en) * | 2016-06-10 | 2018-11-13 | Google Llc | Securely executing voice actions with speaker identification and authentication input types |
US10474879B2 (en) | 2016-07-31 | 2019-11-12 | Google Llc | Automatic hands free service requests |
SG10201607450XA (en) * | 2016-09-07 | 2018-04-27 | Mastercard Asia Pacific Pte Ltd | An apparatus, system, server and methods for carrying out a transaction |
US11062304B2 (en) * | 2016-10-20 | 2021-07-13 | Google Llc | Offline user identification |
CN106952652B (en) * | 2017-02-21 | 2020-06-26 | 深圳市冠旭电子股份有限公司 | Noise reduction control method and system |
CN108810891B (en) * | 2017-04-27 | 2021-05-18 | 华为技术有限公司 | Authentication method, authentication equipment and user equipment for realizing network access |
CN110998626B (en) | 2017-05-31 | 2023-12-01 | 谷歌有限责任公司 | Providing hands-free data for interaction |
WO2019022698A1 (en) * | 2017-07-24 | 2019-01-31 | Visa International Service Association | System, method, and computer program product for authenticating a transaction |
US11216801B2 (en) * | 2017-11-01 | 2022-01-04 | Mastercard International Incorporated | Voice controlled systems and methods for onboarding users and exchanging data |
US11368457B2 (en) | 2018-02-20 | 2022-06-21 | Visa International Service Association | Dynamic learning system for intelligent authentication |
US10965662B2 (en) * | 2018-06-27 | 2021-03-30 | Bank Of America Corporation | Method and system for data communication and frictionless authentication |
US11135131B2 (en) | 2018-09-14 | 2021-10-05 | Board Of Trustees Of Michigan State University | Medication bottle with anti-tampering features |
US11176543B2 (en) * | 2018-09-22 | 2021-11-16 | Mastercard International Incorporated | Voice currency token based electronic payment transactions |
WO2020102188A1 (en) * | 2018-11-13 | 2020-05-22 | Mastercard International Incorporated | Systems and methods for facilitating network voice authentication |
US11948582B2 (en) * | 2019-03-25 | 2024-04-02 | Omilia Natural Language Solutions Ltd. | Systems and methods for speaker verification |
US11496466B2 (en) | 2019-11-15 | 2022-11-08 | Visa International Service Association | Using an enrolled biometric dataset to detect adversarial examples in biometrics-based authentication system |
EP4252126A1 (en) * | 2020-02-07 | 2023-10-04 | Veridas Digital Authentication Solutions, S.L. | Financial operation authorizations |
US20240020677A1 (en) * | 2022-07-13 | 2024-01-18 | Rovi Guides, Inc. | Systems and methods for completing payment transactions initiated through a first device using a second device |
US20240176857A1 (en) * | 2022-11-28 | 2024-05-30 | Mastercard International Incorporated | Authentication for biometric checkout using rba modeling |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020190124A1 (en) * | 2001-06-15 | 2002-12-19 | Koninklijke Philips Electronics N.V. | Point-of-sale (POS) voice authentication transaction system |
US20060248019A1 (en) * | 2005-04-21 | 2006-11-02 | Anthony Rajakumar | Method and system to detect fraud using voice data |
US7698566B1 (en) | 2004-07-12 | 2010-04-13 | Sprint Spectrum L.P. | Location-based voice-print authentication method and system |
US20110071831A1 (en) | 2008-05-09 | 2011-03-24 | Agnitio, S.L. | Method and System for Localizing and Authenticating a Person |
US20110276478A1 (en) * | 2010-05-06 | 2011-11-10 | Boku, Inc. | Systems and Methods to Manage Information |
EP2437477A1 (en) * | 2010-09-30 | 2012-04-04 | British Telecommunications public limited company | Fraud detection |
US20130066749A1 (en) * | 2010-11-19 | 2013-03-14 | Mastercard International Incorporated | Method and system for consumer transactions using voice or human based gesture actions |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6868381B1 (en) * | 1999-12-21 | 2005-03-15 | Nortel Networks Limited | Method and apparatus providing hypothesis driven speech modelling for use in speech recognition |
US20030046237A1 (en) * | 2000-05-09 | 2003-03-06 | James Uberti | Method and system for enabling the issuance of biometrically secured online credit or other online payment transactions without tokens |
US7240007B2 (en) | 2001-12-13 | 2007-07-03 | Matsushita Electric Industrial Co., Ltd. | Speaker authentication by fusion of voiceprint match attempt results with additional information |
US20030125947A1 (en) * | 2002-01-03 | 2003-07-03 | Yudkowsky Michael Allen | Network-accessible speaker-dependent voice models of multiple persons |
US7783563B2 (en) * | 2003-12-09 | 2010-08-24 | First Data Corporation | Systems and methods for identifying payor location based on transaction data |
US20050125296A1 (en) * | 2003-12-09 | 2005-06-09 | Tidwell Lisa C. | Systems and methods for obtaining biometric information at a point of sale |
WO2006087799A1 (en) * | 2005-02-18 | 2006-08-24 | Fujitsu Limited | Audio authentication system |
US20120253805A1 (en) * | 2005-04-21 | 2012-10-04 | Anthony Rajakumar | Systems, methods, and media for determining fraud risk from audio signals |
US7340042B2 (en) | 2005-10-21 | 2008-03-04 | Voiceverified, Inc. | System and method of subscription identity authentication utilizing multiple factors |
US20080253577A1 (en) * | 2007-04-13 | 2008-10-16 | Apple Inc. | Multi-channel sound panner |
TWI349266B (en) * | 2007-04-13 | 2011-09-21 | Qisda Corp | Voice recognition system and method |
US8050919B2 (en) | 2007-06-29 | 2011-11-01 | Microsoft Corporation | Speaker recognition via voice sample based on multiple nearest neighbor classifiers |
US8243902B2 (en) * | 2007-09-27 | 2012-08-14 | Siemens Enterprise Communications, Inc. | Method and apparatus for mapping of conference call participants using positional presence |
US20090119762A1 (en) * | 2007-11-06 | 2009-05-07 | Cisco Technology, Inc. | WLAN Access Integration with Physical Access Control System |
JP5530118B2 (en) * | 2009-04-08 | 2014-06-25 | 東京エレクトロン株式会社 | Method for forming manganese oxide film, method for manufacturing semiconductor device, and semiconductor device |
US8805737B1 (en) * | 2009-11-02 | 2014-08-12 | Sas Institute Inc. | Computer-implemented multiple entity dynamic summarization systems and methods |
US9286733B2 (en) | 2010-04-13 | 2016-03-15 | Locomobi Inc. | Location based systems for entry and exit |
US8611570B2 (en) * | 2010-05-25 | 2013-12-17 | Audiotoniq, Inc. | Data storage system, hearing aid, and method of selectively applying sound filters |
GB2493413B (en) * | 2011-07-25 | 2013-12-25 | Ibm | Maintaining and supplying speech models |
DE202012100620U1 (en) | 2011-11-22 | 2012-06-13 | Square, Inc. | System for processing cardless payment transactions |
US8438066B1 (en) | 2012-06-28 | 2013-05-07 | Intuit Inc. | Secure geo-fencing with multi-form authentication |
US8831957B2 (en) * | 2012-08-01 | 2014-09-09 | Google Inc. | Speech recognition models based on location indicia |
US8694315B1 (en) | 2013-02-05 | 2014-04-08 | Visa International Service Association | System and method for authentication using speaker verification techniques and fraud model |
-
2014
- 2014-06-13 US US14/304,681 patent/US9754258B2/en active Active
- 2014-06-16 WO PCT/US2014/042538 patent/WO2014204855A1/en active Application Filing
- 2014-06-16 SG SG10201900178WA patent/SG10201900178WA/en unknown
- 2014-06-16 EP EP14813144.4A patent/EP3011515B1/en active Active
- 2014-06-16 KR KR1020167000469A patent/KR20160019924A/en not_active Application Discontinuation
- 2014-06-16 EP EP19163087.0A patent/EP3564887A1/en active Pending
- 2014-06-16 AU AU2014281770A patent/AU2014281770B2/en active Active
- 2014-06-16 SG SG11201510186RA patent/SG11201510186RA/en unknown
- 2014-06-16 CN CN201480034614.XA patent/CN105324784B/en not_active Expired - Fee Related
-
2016
- 2016-03-29 HK HK16103572.2A patent/HK1215614A1/en unknown
-
2017
- 2017-06-06 US US15/615,558 patent/US10134039B2/en active Active
-
2018
- 2018-10-05 US US16/152,938 patent/US10402827B2/en active Active
-
2019
- 2019-07-16 US US16/513,492 patent/US20190340620A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020190124A1 (en) * | 2001-06-15 | 2002-12-19 | Koninklijke Philips Electronics N.V. | Point-of-sale (POS) voice authentication transaction system |
US7698566B1 (en) | 2004-07-12 | 2010-04-13 | Sprint Spectrum L.P. | Location-based voice-print authentication method and system |
US20060248019A1 (en) * | 2005-04-21 | 2006-11-02 | Anthony Rajakumar | Method and system to detect fraud using voice data |
US20110071831A1 (en) | 2008-05-09 | 2011-03-24 | Agnitio, S.L. | Method and System for Localizing and Authenticating a Person |
US20110276478A1 (en) * | 2010-05-06 | 2011-11-10 | Boku, Inc. | Systems and Methods to Manage Information |
EP2437477A1 (en) * | 2010-09-30 | 2012-04-04 | British Telecommunications public limited company | Fraud detection |
US20130066749A1 (en) * | 2010-11-19 | 2013-03-14 | Mastercard International Incorporated | Method and system for consumer transactions using voice or human based gesture actions |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019137631A1 (en) * | 2018-01-09 | 2019-07-18 | Veridas Digital Authentication Solutions, S.L. | Methods and devices for biometric authorisation |
Also Published As
Publication number | Publication date |
---|---|
EP3011515A1 (en) | 2016-04-27 |
EP3011515A4 (en) | 2016-07-27 |
US10134039B2 (en) | 2018-11-20 |
US20190340620A1 (en) | 2019-11-07 |
SG11201510186RA (en) | 2016-01-28 |
US20140372128A1 (en) | 2014-12-18 |
HK1215614A1 (en) | 2016-09-02 |
EP3011515B1 (en) | 2019-04-03 |
US9754258B2 (en) | 2017-09-05 |
SG10201900178WA (en) | 2019-02-27 |
US20190050864A1 (en) | 2019-02-14 |
US10402827B2 (en) | 2019-09-03 |
US20170270530A1 (en) | 2017-09-21 |
AU2014281770A1 (en) | 2015-12-24 |
AU2014281770B2 (en) | 2019-09-19 |
CN105324784A (en) | 2016-02-10 |
EP3564887A1 (en) | 2019-11-06 |
KR20160019924A (en) | 2016-02-22 |
CN105324784B (en) | 2019-12-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10402827B2 (en) | Biometrics transaction processing | |
AU2018200898B2 (en) | Authentication using biometric technology through a consumer device | |
US9390445B2 (en) | Authentication using biometric technology through a consumer device | |
US10846699B2 (en) | Biometrics transaction processing | |
US8694315B1 (en) | System and method for authentication using speaker verification techniques and fraud model | |
US10607225B2 (en) | Voice filter system | |
US11875313B2 (en) | Selective authorization method and system | |
US10489565B2 (en) | Compromise alert and reissuance | |
EP3616111B1 (en) | System and method for generating access credentials | |
US10672002B2 (en) | Systems and methods for using nonvisual communication to obtain permission for authorizing a transaction | |
US20220318803A1 (en) | Identity authentication systems and methods | |
JP2022044496A (en) | Control apparatus, portable device, program, approval system, control method, and approval method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201480034614.X Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14813144 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014813144 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2014281770 Country of ref document: AU Date of ref document: 20140616 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20167000469 Country of ref document: KR Kind code of ref document: A |