Receiving operation 505 receives a voice interaction from the user. The voice interaction could be received from a mobile device, a landline, etc. Identifying operation 510 identifies the user. The user may be identified from information gathered from the user or the user device (e.g., username, member number, device fingerprint, phone number, secure browsing solution, etc.). Analyzing voice interaction operation 515 analyzes the voice interaction. In some embodiments, analyzing the voice interaction includes determining the characteristics of the user's voice (e.g., intonation, pitch, tone, cadence, etc.). After identifying the user, verifying operation 520 verifies the identity of the user by comparing the characteristics of the user's voice to characteristics of the user's voice derived from previous samples of the user's voice. In some embodiments, the user is verified if the comparison meets or exceeds a certain threshold.
Determining confidence operation 525 determines a confidence in the verification of the identity of the user. In some embodiments, the confidence is determined based on many factors, including the analysis of the voice interactions. For example, the voice comparison may not yield favorable results for a match, but a positive fingerprint read could boost the confidence level. Determining user access level operation 530 determines the access level of the user based on the confidence level of the verification. Thus, an access level of the user is determined based on how certain the organization is that the user is who the user claims to be.