白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Systems and methods for continuous biometric authentication

專利號
US10867021B1
公開日期
2020-12-15
申請人
United Services Automobile Association (USAA)(US TX San Antonio)
發(fā)明人
John Shelton; Michael Wayne Lester; Debra Randall Casillas; Sudarshan Rangarajan; Maland Keith Mortensen
IPC分類
G06F7/04; G06F15/16; H04L29/06; G06F21/32; G10L17/24
技術(shù)領(lǐng)域
user,confidence,biometric,module,may,or,level,user's,voice,be
地域: TX TX San Antonio

摘要

Methods and systems for authenticating a user are described. In some embodiments, a series of voice interactions are received from a user during a voiceline session. Each of the voice interactions in the series of voice interaction may be analyzed as each of the voice interactions are received. A confidence level in a verification of an identity of the user may be determined based on the analysis of each of the voice interactions. An access level for the user may be automatically updated based on the confidence level of the verification of the identity of the user after each of the voice interactions is received.

說明書

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation application of and claims priority to U.S. application Ser. No. 15/993,835, filed May 31, 2018, which is a continuation of and claims priority to U.S. application Ser. No. 14/489,206, filed on Sep. 17, 2014, now U.S. Pat. No. 10,019,561, which is a non-provisional of and claims priority to U.S. Provisional Application No. 61/911,773, filed on Dec. 4, 2013, entitled “SYSTEMS AND METHODS FOR AUTHENTICATION USING VOICE BIOMETRICS AND DEVICE VERIFICATION,” which are hereby incorporated by reference in their entirety for all purposes.

TECHNICAL FIELD

Various embodiments of the present disclosure generally relate to authentication. More specifically, various embodiments of the present disclosure relate to methods and systems for continuous biometric authentication.

BACKGROUND

The protection and security of customer information is vital from an organization's perspective, not only to comply with applicable laws, but to earn and keep customer's trust. Enhanced security often comes at the cost of convenience for the user. For example, authentication generally requires two steps: first, identifying the customer, and second, verifying the customer's identity. To identify the user, the organization may recognize a device being used to contact the organization or the user may provide a username, a member number, or other identifying information. To verify the customer's identity, the customer may be required to answer additional security questions, provide a PIN, secret code, or other information.

BRIEF DESCRIPTION OF THE DRAWINGS

權(quán)利要求

1
What is claimed is:1. A computer-implemented method of authenticating a user interacting with an interactive voice response system, comprising:receiving biometric information of the user, the received biometric information comprising a spoken request from the user to perform a first activity from among a plurality of activities;generating a voice sample of the user based on the spoken request;verifying an identity of the user based on the received biometric information and the voice sample of the user, wherein said verifying the identity of the user comprises:determining that the identity of the user was previously compromised, andresponsive to the determination that the identity of the user was previously compromised, modifying a value of a confidence metric associated with the verification relative to a value of the confidence metric prior to the verification, modifying an access level required by the user for the first activity, and maintaining an access level required by the user for a second activity from among the plurality of activities;determining an access level of the user based on the modified confidence metric; andperforming the first activity when the access level based on the modified confidence metric of the user meets or exceeds the modified access level required by the user for the first activity.2. The method of claim 1, wherein the voice sample of the user is generated further based on spoken information different than the spoken request, and wherein the spoken information that is different than the spoken request comprises a spoken identifier of an account associated with the user.3. The method of claim 1, wherein said verifying the identity of the user comprises performing a statistical analysis of the voice sample of the user.4. The method of claim 1, wherein the confidence metric corresponds to an averaging of interactions with the interactive voice response system.5. The method of claim 1, wherein the received biometric information further comprises at least one non-voice biometric factor.6. The method of claim 5, wherein the at least one non-voice biometric factor comprises information regarding an eye movement of the user.7. The method of claim 6, further comprising:prompting the user to look at a display element presented on a display device associated with the user, anddetermining the eye movement of the user in response to the prompt of the user to look at the display element.8. One or more non-transitory computer-readable media including one or more sequences of instructions which, when executed by one or more processors, causes:receiving biometric information of a user, the received biometric information comprising a spoken request from the user to perform a first activity from among a plurality of activities;generating a voice sample of the user based on the spoken request;verifying an identity of the user based on the received biometric information and the voice sample of the user, wherein said verifying the identity of the user comprises:determining that the identity of the user was previously compromised, andresponsive to the determination that the identity of the user was previously compromised, modifying a value of a confidence metric associated with said verifying relative to a value of the confidence metric prior to said verifying, modifying an access level required by the user for the first activity, and maintaining access level required by the user for a second activity from among the plurality of activities;determining an access level of the user based on the modified confidence metric; andperforming the first activity when the access level based on the modified confidence metric of the user meets or exceeds the modified access level required by the user for the first activity.9. The one or more non-transitory computer-readable media of claim 8, wherein the voice sample of the user is generated further based on spoken information different than the spoken request, and wherein the spoken information that is different than the spoken request comprises a spoken identifier of an account associated with the user.10. The one or more non-transitory computer-readable media of claim 8, wherein said verifying the identity of the user comprises performing a statistical analysis of the voice sample of the user.11. The one or more non-transitory computer-readable media of claim 8, wherein the confidence metric corresponds to an averaging of interactions with an interactive voice response system.12. The one or more non-transitory computer-readable media of claim 8, wherein the received biometric information further comprises at least one non-voice biometric factor.13. The one or more non-transitory computer-readable media of claim 12, wherein the at least one non-voice biometric factor comprises information regarding an eye movement of the user.14. The one or more non-transitory computer-readable media of claim 13, further comprising:prompting the user to look at a display element presented on a display device associated with the user, anddetermining the eye movement of the user in response to the prompt of the user to look at the display element.15. A system comprising:one or more processors;one or more non-transitory computer-readable media including one or more sequences of instructions which, when executed by the one or more processors, causes:receiving biometric information of a user, the received biometric information comprising a spoken request from the user to perform a first activity from among a plurality of activities;generating a voice sample of the user based on the spoken request;verifying an identity of the user based on the received biometric information and the voice sample of the user, wherein said verifying the identity of the user comprises:determining that the identity of the user was previously compromised, andresponsive to the determination that the identity of the user was previously compromised, modifying a value of a confidence metric associated with said verifying relative to a value of the confidence metric prior to said verifying, modifying an access level required by the user for the first activity, and maintaining an access level required by the user for a second activity from among the plurality of activities;determining an access level of the user based on the modified confidence metric; andperforming the first activity when the access level based on the modified confidence metric of the user meets or exceeds the modified access level required by the user for the first activity.16. The system of claim 15, wherein the voice sample of the user is generated further based on spoken information different than the spoken request, and wherein the spoken information that is different than the spoken request comprises a spoken identifier of an account associated with the user.17. The system of claim 15, wherein said verifying the identity of the user comprises performing a statistical analysis of the voice sample of the user.18. The system of claim 15, wherein the confidence metric corresponds to an averaging of interactions with an interactive voice response system.19. The system of claim 15, wherein the received biometric information further comprises at least one non-voice biometric factor.20. The system of claim 19, wherein the at least one non-voice biometric factor comprises information regarding an eye movement of the user.21. The system of claim 20, further comprising:prompting the user to look at a display element presented on a display device associated with the user, anddetermining the eye movement of the user in response to the prompt of the user to look at the display element.
微信群二維碼
意見反饋