Home Patent Forecast® Sectors Log In   Contact  
How it works Patent Forecast® Sectors Insights
Menu
Enjoy your FREE PREVIEW which shows only 2022 data and 25 documents. Contact Patent Forecast for full access.        

Z-ARCHIVE-Cybersecurity: Identity and Access Verification

Search All Patents in Z-ARCHIVE-Cybersecurity: Identity and Access Verification


Patent US10102359


Issued 2018-10-16

Device Access Using Voice Authentication

A device can be configured to receive speech input from a user. The speech input can include a command for accessing a restricted feature of the device. The speech input can be compared to a voiceprint (e.g., text-independent voiceprint) of the user's voice to authenticate the user to the device. Responsive to successful authentication of the user to the device, the user is allowed access to the restricted feature without the user having to perform additional authentication steps or speaking the command again. If the user is not successfully authenticated to the device, additional authentication steps can be request by the device (e.g., request a password).



Much More than Average Length Specification


View the Patent Matrix® Diagram to Explore the Claim Relationships

USPTO Full Text Publication >

6 Independent Claims

  • 1. A non-transitory computer-readable medium including instructions which, when executed by an electronic device, cause the device to: while the device is in a locked state at a first time, receive non-voice authentication information from a user; responsive to receiving valid authentication information, transition the device to an unlocked state; while in the unlocked state, receive a first speech input from the user; generate a voiceprint based on a voice sample of the first speech input; while the device is in the locked state at a second time, receive a second speech input, the second speech input including a command associated with a restricted feature of the device; determine a degree of match between the generated voiceprint and the second speech input; and upon determining that the degree of match is above a predetermined threshold, execute the command including invoking the restricted feature of the device, wherein the command is executed while the device is in the locked state, and wherein the command is a request to perform an action other than unlocking the device.

  • 6. A non-transitory computer-readable medium including instructions which, when executed by an electronic device, cause the device to: while the device is in a locked state: receive a voice command associated with a restricted feature of the device; determine a degree of match between a previously generated voiceprint and the voice command; responsive to determining that the degree of match is above a predetermined threshold, execute the voice command including invoking the restricted feature of the device; and responsive to determining that the degree of match is not above a predetermined threshold, forgo executing the voice command, wherein the voice command is a request to perform an action other than unlocking the device.

  • 9. A method comprising: at an electronic device: while the device is in a locked state at a first time, receiving non-voice authentication information from a user; in response to receiving valid authentication information, transitioning the device to an unlocked state; while in the unlocked state, receiving a first speech input from the user; generating a voiceprint based on a voice sample of the first speech input; while the device is in a locked state at a second time, receiving a second speech input, the second speech input including a command associated with a restricted feature of the device; determining a degree of match between the generated voiceprint and the second speech input; and upon determining that the degree of match is above a predetermined threshold, executing the command including invoking the restricted feature of the device, wherein the command is executed while the device is in the locked state, and wherein the command is a request to perform an actin other than unlocking the device.

  • 12. A method comprising: at an electronic device: while the device is in a locked state: receiving a voice command associated with a restricted feature of the device; determining a degree of match between a previously generated voiceprint and the voice command; in response to determining that the degree of match is above a predetermined threshold, execute the voice command including invoking the restricted feature of the device; and in response to determining that the degree of match is not above a predetermined threshold, forgo executing the voice command, wherein the voice command is a request to perform an action other than unlocking the device.

  • 15. An electronic device comprising: one or more processors; and memory storing instructions which, when executed by the one or more processors, cause the device to: while the device is in a locked state at a first time, receive non-voice authentication information from a user; responsive to receiving valid authentication information, transition the device to an unlocked state; while in the unlocked state, receive a first speech input from the user; generate a voiceprint based on a voice sample of the first speech input; while the device is in the locked state at a second time, receiving a second speech input, the second speech input including a command associated with a restricted feature of the device; determine a degree of match between the generated voiceprint and the second speech input; and upon determining that the degree of match is above a predetermined threshold, execute the command including invoking the restricted feature of the device, wherein the command is executed while the device is in the locked state, and wherein the command is a request to perform an action other than unlocking the device.

  • 18. An electronic device comprising: one or more processors; and memory storing instructions which, when executed by the one or more processors, cause the device to: while the device is in a locked state: receive a voice command associated with a restricted feature of the device; determine a degree of match between a previously generated voiceprint and the voice command; responsive to determining that the degree of match is above a predetermined threshold, execute the voice command including invoking the restricted feature of the device; and responsive to determining that the degree of match is not above a predetermined threshold, forgo executing the voice command, wherein the voice command is a request to perform an action other than unlocking the device.