Sign In to Follow Application
View All Documents & Correspondence

"User Authentication By Combining Speaker Verification And Reverse Turing Test"

Abstract: Methods and system for authenticating a user ere disclosed The present invention includes accessing a collection of personal information related to the user The present invention also includes performing an authentication operation that is based on uhe collection of pergonal information The authentication operation, incorporates at least one dynamic component and prompts the aser to give an audible utterance The audible utterance is compared to a stored voiceprint

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
07 October 2005
Publication Number
40/2009
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

MICROSOFT CORPORATION
ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052, USA.

Inventors

1. KUANSAN WANG
ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052, USA.

Specification

USER AUTHENTICATION BY COMBINING SPEAKER VERIFICATION AND REVERSE TURING TEST
BACKGROUND OF THE INVENTION The present invention generally pertains to systems and methods for user authentication More specifically, the present invention is related to a machine-based system for authenticating a human user
With the popularity of highly technological communication systems, providers of services have begun to provide automated programs for client access. For example, a qlienL can access, a banking account from various communication systems, such as telephone systems and network systems, to perform a variety of tasks For example, the Internet can be accessed through cellular phones, personal data assistants (PDAs), desktops and kiosks Such tasks include transferring money, depositing money, withdrawing money and accessing account balances These service providers could potentially reveal valuable information about clients that is attractive to a hacker (a person who illegally gains access to secured information)
Attacks by hackers include using computer programs that attempt to exploit automated service programs designed to accommodate human users In many instances, automated service programs are not configured to consistently differentiate between human access and machine access Currently, many service providers rely on a client's knowledge of

certain secrets For example, such secrets can include PINs (personal identification numbers), passwords, social security numbers and information not readily known to cne punlic, sucn as a user's mother's maiden name However, not only can these secrets be easily forgotten by a client, then-overuse can lead to easy discovery
To heighten security, biometric-based approaches, such as fingerprint and voiceprint technologies, are becoming popular For example, when a user accesses an automated service program over the telephone, the user is asked to supply a voice sample to a speech verification system to verify that the voice sample matches the voiceprint of the user they claim to be However, biometric-based security samples can be copied or recorded for later use by a hacker It is relatively easy to record a voice sample and replay the recording over the telephone Speech verification systems are not always configured to differentiate between a live voice and a recording
A Reverse Turing Test (RTT) has been utilized to determine whether a human or machine is requesting access to automated service programs Such tests are based on the assumption that certain pattern l-ecognition tasks are significantly harder for machines to perform than humans For example, it is easier for a human to recognise patterns in distorted speech or a distorted image than a machine A telephony application can, in one instance, play a

noisy prompt, tnac asks the user to spell a word and recite a digit sequence A Web application can, in another instance, ask its user to type the alpnanumeric string emcedded in a distorted image Problems with these types of solutions include issues arising from the fact that similar sounding words can have different spellings, many people are poor spellers, and it can be a challenge to commit a sequence of digits to memory Also, over time, machines are likely to develop the capacity to hack these types of simple authentication testo.
In" addition to protecting" clients ~ from unauthorized access to automated services, there is a need to heighten security to police interactions with personal computing devices and mobile devices There is also a need to enhance the security associated with digital signature use when sending email Currently, these technologies commonly require only a password or PIN input to access information As discassed above, passwords and PINs are easily forgotten by a user and are easily discoverable by hackers Those liated herein are only a few of many specific applications that will benefit from enhanced security
SUMMARY OF THE INVENTION
Embodiments of the present invention pertain to
a method for authenticating a user The method
includes accessing a collection of personal
information related to the user The method also

includes performing an authentication operation cnat is based on the collection of personal information and incorporates at least one dynamic component The authentication operation is configured co prompt che user to give an audible utterance The audible utterance is compared to a stored voiceprint
Embodiments of the present invention also pertain to a system that includes an information retriever configured to access a collection of personal information related to a user The system also includes an authentication module configured to perform an authentication operation based on the collection of personal information The authentication operation is configured to incorporate at least one dynamic component, and configured to prompt the user to give an audible utterance A voice verification module processes the audible utterance to determine whether it at least substantially corresponds to a voiceprint of a user
BRIEF DESCRIPTION OF THE DRAWINGS FIG 1 illustrates a block diagram of a general
computing environment in which the present invention
can be practiced
FIG 2 illustrates a block diagram of a mobile
device with which the present invention can be
practiced
FIG 3 is a flowchart that illustrates a method
for authenticating a user

FIG 4 llluscraces a machine-cased system for
authenticating a user
FIG 5 illustrates a machine-based system for
autnenticating a user
PIG 5 illustrates a machine-based system for
authenticating a user
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS The present invention is described in the context of a machine-based system configured for communication with a human Some machine-based systems, such as those tnat implement set vice-programs, can be accessed by way of a communication system or network, such as the Internet, a cell phone network or a telephone network For example, an automated service program, such as an automated customer service call center, can be accessed over a communication system by a client or customer It should be noted, however, that machine-based systems can also or alternatively include personal computing devices, such as personal computers (PCs), or mobile computing devices, such as personal data assistants (PDAs) and cell phones, with which a user interacts to access or transmit secure information Regardless of the type of machine-based system, the present invention is directed towards utilizing such a system to authenticate the identity of a user Prior to describing the present invention in decail, embodiments of illustrative computing environments

witin wnicn the presenr invention can be applied will be described
FIG 1 illustrates an example of a suitable computing sysrem environment 100 on which tne invention may be implemented The computing system environment 100 is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention Neither should the computing environment 100 be interpreted as having any dependency or requirement relating to any one or combination of components - illustiated in the exemplary operating environment 100
The invention is operational with numerous other general purpose or special purpose computing system environments or configurations Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, telephony systems, distributed computing environments that include any of the above systems or devices, and the like
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer Generally, program modules include routines,

programs, objects, components, aaca structures, etc that perform particular tasks or implement particular abstract data types The invention is designed primarily, but without limitation, to be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network In a distributed computing environment, program modules are located in both local and remote computer storage media including memory storage devices
With reference to FIG 1, an exemplary system for implementing the invention includes a general- ' purpose computing device in the form of a computer 110 Components of computer 110 may include, but are not limited to, a processing unit 120, a system memory 13 0, and a system bus 121 that couples various system components including the system memory to the processing unit System bus 121 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus
Computer 110 typically includes a variety of computer readable media Computer readable media can be any available media that can be accessed by

computer 110 and includes both volatile and nonvolatile media, removable and non-removable media By way of example, and not limitation, computer reaaaDle media may comprise computer storage media and communication medis. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other date Computer storage media includes, but is not limited to, RAM, BPM, EEPROM, flash -memory or other memory technology ,CD ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk 3torage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computer 110 Communication media typically embodies computer readable instructions, data structures, program modales or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media Combinations of anv of the

above snoula also be included within the scope of computer readable media
The system memory 13 0 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132 A basic input/output system 133 (BIOS), containing the basic routines that help to transfer information oetween elements within computer 110, such as during start-up, is typically stored in ROM 131 RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presenLly being operated on by processing unit 120 By way of example, and not limitation, FIG 1 illustrates operating system 134, application programs 135, other program modules 136, and program data 137
The computer 110 may also include other removable/non-removable volatile/nonvolatile computer storage media By way of example only, FIG 1 illustrates a hard disk drive 141 that reads from or writes to non-removable, nonvolatile magnetic media, a magnetic disk drive 151 that reads from or writes to a removable, nonvolatile magnetic disk 152, and an optical disk drive 155 that reads from or writes to a removable, nonvolatile optical disk 156 such as a CD ROM or other optical media Other removable/nonremovable, volatile/nonvolatile computer storage media chat can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile

disks, digital video tape, solid state RAM, solid state ROM, and the like The hard disk drive 141 is typically connected to the system bus 121 through a non-removable memory interface such as interface 140, and magnetic disk drive 131 and optical disk drive 155 are typically connected to the system bus 121 by a removable memory interface, such as interface 150
The drives and their associated computer storage media discussed above and illustrated in FIG 1, provide stoi-age of computer readable instructions, data structures, program modules and other data., for che computer 110 In FIG 1, for example, hard disk drive 141 is illustrated as storing operating system 144, application programs 145, other program modules 14 6, and program data 147 Note that these components can either be the same as or different from operating system 134, application programs 135, other program modules 136, and program data 137 Operating system 144, application programs 145, other program modules 14 6, and program data 147 are given different numbers here to illustrate that, at a minimum, they are different copies
A U3er may enter commands and information into the computer 110 through input devices such as a keyboard 162, a microphone 163, and a pointing device 161, such as a mouse, trackball or touch pad Other input devices (not shown) may include a joystick, game pad, satellite dish, scanner, or the like These and other input devices are often connected to the processing unit 120 through a user input interface

160 tnat is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB) A monitor 191 or otner type of display device is also connected to the system bus 121 via an interface, such as a video interface 190 In addition to the monitor, computers may also include other peripheral output devices such as speakers 197 and printer 196, which may be connected through an output peripheral interface 195
The computer 110 is operated in a networked environment usrng logical" connections' to one or more remote computers, such as a remote computer 180 The remote computer 180 may be a personal computer, a hand-held device, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 110 The logical connections depicted in FIG 1 include a local area network (LAN) 171 and a wide area network (WAN) 173, but may also include other networks Such networking environments are commonplace in offices, enterprise-wide computer networks, Intranets and the Internet
When used in a LAN networking environment, the computer 110 is connected to the LAN 171 through a network interface or adapter 170 When used in a WAN networking environment, the computer 110 typically includes a modem 172 or other means for establishing communications over the WAN 173, such as the

Internet The modem 172, which may be internal or external, may be connected to the syscem bus 121 via the user input interface 160, or other appropriate mechanism In a networked environment, program nodules depicted relative to the computer 110, or portions thereof, may be stored in the remote memory storage device By way of example, and not limitation, FIG 1 illustrates remote application programs 185 as residing on remote computer 180 It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used
FIG 2 is a block diagram of a mobile device 200, which is another applicable computing environment Mobile device 200 includes a microprocessor 202, memory 204, input/output (I/O) components 206, and a communication interface 208 for communicating with remote computers or other mobile devices In one embodiment, the aforementioned components are coupled for communication with one another over a suitable bus 210
Memory 204 is implemented as non-volatile electronic memory such as random access memory (RAM) with a battery back-up module (not shown) such tnat information stored in memory 204 is not lost when the general power to mobile device 20 0 is shut down A portion of memory 204 is preferably allocated as addressable memory for program execution, while

another portion of memory 204 is preferably used for storage, such as to simulate storage on a disk drive
Memory 204 includes an operating system 212, application programs 214 as well as an object store 215 During operation, operating system 212 12 preferably executed by processor 202 from memory 204 Operating system 212, in one preferred embodiment, is a WINDOWS* CE brand operating system commercially available from Microsoft Corporation Operating system 212 13 preferably designed for mobile devices, and implements database features that can be utilized by applications 214 through a set of -exposed application programming interfaces and methods The objects in object store 216 are maintained by applications 214 and operating system 212, at least partially in response to calls to the exposed application programming interfaces and methods
Communication interface 208 represents numerous devices and technologies that allow mobile device 2 00 to send and receive information The devices include wired and wireless modems, satellite receivers and broadcast tuners to name a few Mobile device 200 can also be directly connected to a computer to exchange data therewith In such cases, communication interface 208 can be an infrared transceiver or a serial or parallel communication connection, all of which are capable of transmitting streaming information
Input/output components 206 include a variety of input devices such as a touch-sensitive screen,

buttons, rollers, and a micropnone as well as a variety of output devices including an audio generator, a vibrating device, and a display The devices listed above are by way of example and need not all be present on mobile device 200 In addition, other input/output devices may be attached to or found with mobile device 200 within the scope of the present invention
FIG 3 is a flowchart 300 that illustrates a method for authenticating a user in accordance with system embodiments.schematically illustrated in PIGS 4-6 FIG 4 illustrates a machine-based system 400 for authenticating a user 404 in accordance with an embodiment of the present invention System 400 includes a service program 4 02 accessible by way of a communication system 406 by user 404 Communication system 406 can be, but is not limited to, a telephone network FIG 5 illustrates a machine-based system 500 for authenticating a user 504 in accordance with an embodiment of the present invention System 500 includes a service program 502 accessible by way of a communication system 506 by user 505 via a user device 505 Communication system 506 can be, but is not limited to, a computer network, such as the Internet User device 505 can be any type of computing device, sucn as a personal computing device, a mobile device (as illustrated FIG 2) or a publicly located customer kiosk FIG 6 illustrates a machine-based system 600 for authenticating a user 604 in accordance with an embodiment of present

invention System 600 includes a user device 605 tnat user 604 can interact with to access or transmit secured data U3er device 505 can be any type of computing device, such as a personal computing device, a mobile device or a publicly located customer kiosk
In FIG 4, service program 402 can be any type of service application accessible by way of a communication system that requires an authentication of user 404 By way of example, but not by limitation, service program 402 can be an automated "banking call center where user" or customer 404 can access account information and perform financial transactions In this example, service program 4 02 is configured to authenticate a caller such that personal account information is only shared with an authenticated user that is qualified for such access Other example service programs include automated credit card services, automated cellular phone services and automated airline services
In FIG 5, service program 502 can be any type of service application accessible over a communication system In this case, user 504 interacts with service program 502 through a user device 505, wherein the interaction includes an authentication process to restrict access to program 502 to authorized users By way of example, but not by limitation, service program 502 can be an internet banking service where a customer or user can access account information and make business transactions

In this example, service program 502 autnencicates or logs in user 504 such that personal account information is only shared with an authenticated user that is qualified for such access Other examples of network-based service programs include automated credit card services, automated cellular phone services and automated airline services
In FIG 6, user device 605 can be any type of computing device with which user 604 can interact For example, user device 605 can be a personal computing device or a mobile device (as illustrated in "FIG 2) In this embodiment,' user device 605 authenticates and verifies that user 604 is whom they claim to be Authentication can be used for a variety of operations For example, user device 605 can authenticate user 604 at log in In another example, user device 605 can authenticate user 604 to access a digital signature when transmitting an email or transmitting data over a network These are only a few examples that are within the scope of the present invention
In accordance with one aspect of the present invention, the following is a descripcion of an authentication process as illustrated in flowchart 3 00 (FIG 3), and as implemented in the various system embodiments illustrated in FIGS 4-6 At block 3 02, a collection of personal information is accessed
With reference to the FIG 4 embodiment, a collection of personal information 403 is stored m

service program 402 ana is accessed ny information retriever 410 In one embodiment, personal information 408 includes information related to user 4 04 that is obtained during user enrollment for services provided by program 402 For example, personal information 4 08 can include a social security number, a birth date or any other type of information supplied by user 404 In another aspect, personal information 408 includes information obtained during service-oriented user interaction with program 402 For example, personal information 408 can include the user's prior transaction details, prior traveling specifics (in the case of an airline service program), or other types of transactional information that might change over time In contrast to static information, such as a social security number or birth date, the time varying data manifests itself as better choices for authentication purposes as addressed in the present invention Nevertheless, the present invention is applicable to either static or dynamic personal information
With reference to the FIG 5 embodiment, a collection of personal information 50 8 is stored in user device 505 and is accessed by information retriever 510 by way of communication system 506 Although FIG 5 illustrates that personal information 503 is stored in user device 505, the present invention is not limited to such a configuration Personal information 508 can be stored in service program 502 like the configuration shown in FIG 4,

or personal information 508 can be scored in both user device 505 and service program 502
Information retriever 510 is configured to retrieve personal information that is stored on either user device 505 and/or service program 502 When personal information 508 is stored in service program 502, then personal information 508 can include information related to user 504 that is obtained during user enrollment for services provided by program 502 as discussed with reference to FIG 4 When personal information is stored in service program 502, then personal information 508 can also or alternatively include information obtained during interaction with service program 502 as discussed with reference to PIG 4
When personal information SOB is stored in user device 505, then personal information 508 can include information related to interaction with user device 505 For example, personal information 508 can include information extracted from a user's contacts that are stored in a personal contacts application In another example, information can be extracted from documents the user has created, sent or received Still other examples include specific operations or tasks completed by the user on user device 505 This type of information can include the identity of whom the user last received an email from or sent an email to, or whom the user last received an instant message from or sent an instant message to In addition, this type of information can include the last MP3 file

downloaded or the last MP3 file burned to a disc These examples of personal information can be easily extracted by an operating system and made available to an information retriever
In one embodiment, data related to interaction with user device 505 is harvested or mined by annotating such data with semantic types For example, some data is tagged as "numeral" type data, other data is tagged as "date" type data, still other data, such as contact names, is tagged as "string" type data Information retriever 510 illustratively retrieves data based or these semantic types
With reference to the FIG 6 embodiment, a collection of personal information 608 is stored in user device 6 05 and is accessed by information retriever 610 In one embodiment, personal information 608 includes information related to user 504 that is obtained during user initiation of user device 605 For example, personal information 608 can include a social security number, a birth date or other types of information that is supplied by user 604 In another embodiment, personal information 603 also includes information obtained based on interaction with user device 605 For example, personal information 608 can include information extracted from documents the user has created, sent or received Personal information 608 can include information extracted from a user's contacts that are stored in a personal contacts application Such information can include the identity of whom the user

last received an email from or sent an email to, or the identity of whom the user last received an instant message from or sent an instant message to Such information can also include specific operations or casks completed by the user on user device 605, such as the last MP3 file downloaded or the last MPS file burned to a storage disc This type of personal information can be easily extracted by an operating system and made available to the information retriever
In one embodiment, the operating system harvests or mines data already stored on user device 605 by annotating such data with semantic types For example, some data is tagged as "numeral" type data, other data is tagged as "date" type data, still other data, such as contact names, is tagged as "string" type data In formation is then illustratively retrieved based on the annotations
In FIG 3, blocks 304 and 306 are directed towards performing an authentication operation To incorporate aspects of the Reverse Turing Test (RTT) (L e synthesized challenges) , the authentication operation performed in blocks 304 and 3 06 incorporates at least one dynamic component In one embodiment, the authentication operation incorporates a dynamic component in the form of a dynamic question that asks about static information from the collection of personal information The question is dynamic in that it requires a manipulation of the static information For example, "what is the sum of

the last three digits of your social security number?" The question need not be the same from one authentication attempt to the next For example, "what is the sum of the first three digits of your social security number"
In another embodiment, the authentication operation incorporates a dynamic component in the form of a static question that ssk3 about continuously changing or dynamic information from the collection of personal information The question is static in that it does not require manipulation of information, however, the question need not be the same from one authentication attempt to the next For example, "who is the last person that you emailed?" or "what is the approximate balance of your checking account?"
At block 3 04, a question or authentication information is generated based on the collection of personal information As discussed above, in one embodiment, the question incorporates a dynamic component Although not specifically illustrated in FIG 3, the question or authentication information is transmitted to the user
In the system embodiment illustrated in FIG 4, an authentication module 411 includes a question generator 412 In one embodiment, question generator 412 is configured to generate a dynamic question based on static information stored in personal information 408 and retrieved by information retriever 410 In one embodiment, question generator

412 is also or alternatively configured co generate a static question that asks about continuously cnanging or dynamic information from the collection of personal information 4 08 The question is presented through communication system 406 to user 404
In one embodiment, question generator 412 generates a dynamic question prompting an operation or function to be performed or manipulated on static information The operation can be an arithmetic operation related to numerical information, such as numerical data supplied by user 404 during enrollment," or an operation related to alphabetical information Example questions include "What is the sum of the last two digits of your social security number?", "What is the date exactly one week prior to your birthday in the month, date and year format?" or What are the last three letters of your mother's maiden name in reverse order?" Question generator 412 illustratively changes the nature of the questions unpredictably or at random from one authentication attempt to the next For example, question generator 412 will randomly choose to take the sum, difference or product of different types of numerals from one authentication attempt to the next
As has been discussed, personal information 408 can also include information related to the specific interactions with service program 4 02 Therefore, in one embodiment, a static question asks about dynamic information Examples include "How many checking

accounts do you have? , What day was your last transaction?" or "When did you last travel with us?"
In the embodiment illustrated in FIG 5, service program 502 includes an authentication module 511 Authentication module 511 includes a question generator 512 In one embodiment, question generator 512 is configured to generate a dynamic question based on static information stored in personal information 508 and retrieved by information retriever 510 in another embodiment, question generator 512 is configured to also or alternatively generate a static question based 'on ' dynamic" information stored in personal information 50 8 The question is presented through communication system 506 to user device 505
In accordance with another embodiment, question generator 512 is configured to generate a question based on either dynamic or static information that is retrieved from either user device 505 or service program 502 The nature of generated questions can be similar to any of those discussed in the context of the FIG 4 embodiment The scope of available questions is, however, broader in that it could include questions that pertain to interactions with the user device For example, questions can relate to dynamic operations or information native to user device 505 Example questions include "When was the last time you contacted John Doe?'", "What did you do to a Stevie Wonder MP3 file last night?" or Who did you instant message today?"

In the embodiment illustrated in FIG 6, user device 605 includes an authorization module 611 Authorization module 611 includes a question generator 612 In one embodiment, question generator 612 is configured to generate a dynamic question based on static information stored in personal information 608 and retrieved by information retriever 610 In another embodiment, question generator 612 is also or alternatively configured to generate a static question based on dynamic information stored in personal information 608 The question is communicated to user 604 through output 616 Example outputs include, but are not limited to, a display or an audible speaker
Personal information 603 can include information obtained during initiation of user device 605 or obtained during interactions with user device 605 Examples of the nature of potential questions include any of the question types discussed in relation to the system embodiments of FIGS 4 and 5
It should be noted that in the system embodiments schematically illustrated in FIGS 4-6 the question generator 412, 512 and 612 do not necessarily generate the same questions every time service program 402, 502 and 602 authenticate a user It is conceivable that question generator 412, 512 and 612 randomly generate different questions each time service program 4 02, 502 and 602 authenticate a user

At block 306 (FIG 2), cue answer to cne question received from the user is evaluated for correctness If the answer is incorrect, then flowchart 300 passes to block 308 and the user is denied access If however, the answer is correct, then flowchart 300 passes to a 3et of blocks (310, 312, 314) that are indicated with dashed lines These blocks are steps that are optionally taken to further authenticate a user and will be described in detail below It should be noted that these optional blocks inquire that the answer be received as an audible signal or utterance Even if the answer is in the form of an audible signal, these blocks are still optional steps to further authenticate a user When furthei" authentication under the optional steps is not elected, then flowchart 300 passes to block 316 and access is granted
In the embodiment illustrated in FIG 4, authentication module 411 includes an answer evaluator 414 Answer evaluator 414 receives an answer to the question from user 4 04 by way of communication system 406 In PIG 4, the answer is received by service program 402 in the form of an input signal Example signals include, but are not limited to, an audible answer or a touch-tone input available on a telephone receiver Answer evaluator 414 decodes the input signal and compares the answer to personal information 408 to determine if the answer is correct If the answer is received in the form of an audible answer, then answer evaluator 414

lllustratively is functionally engaged to an appropriate speech recognition system
In the embodiment illustrated in FIG 5, authorization module 511 includes an answer evaluator 514 Answer evaluator 514 .receives an answer to the question from user devica 505 by way of communication system 506 In FIG 5, the answer received by answer evaluator 514 is in the form of an input signal Example signals include, but are not limited to, a keypad input, a moise selecting input or other type of selecting input that in configured to select a choice from a list of answers In one embodiment, the answer can be transmitted as an audible answer Answer evaluator 514 decodes the input signal and compares the answer to personal information 503 to determine if the answer is correct If the answer is received in the form of an audible answer, then answer evaluator 514 illustratively is functionally engaged to an appropriate speech recognition system
In the embodiment illustrated in FIG 6, authorization module 611 includes an answer evaluator 614 Answer evaluator 614 receives an answer to the question from user 604 through input 618 In FIG 6, the answer received by answer evaluator 614 through input 618 is in the form of an input signal Example inputs include, but are not limited to, a keypad or a mouse If input 618 is a mouse, then the answer can be selected from a choice of answers In addition, the answer can be trarsmitted as an audible answer Answer evaluator 614 decodes the input signal and

compares one answer to personal information 605 to determine if the answer is correct If the answer is an audible answer then answer evaluator 614 illustratively is functionally engaged no an appropriate speech recognition system
The following is a description of the optional steps employed in FIG 3 and system embodiments schematically illustrated in FIGS 4-6 for electing to further authenticate a user As previously noted, the answer evaluated in block 306 must be an audible answer to optionally elect to further authenticate a user Ir should also be noted that any known speech recognition system such as those known for transcribing voice into test using a pronunciation dictionary can be implemented in support of step 306 when the answer is an audible answer
If the audible answer is correct in block 305 and the audible signal is to be further authenticated, flowchart 300 proceeds to block 310 At block 310, the audible signal is analyzed and compared to the accessed voiceprint to verify that the user's voice signal at least substantially corresponds or matches the user's voiceprmt If the user's voiceprint does not correspond to the user's voice signal, then access is denied at block 314 If, however, the user's voiceprmt corresponds to che user's voice signal, then access is granted at block 315 In some embodiments, the challenge-answer process may repeat more than once in accordance with certain prescribed security policies until the user

access is granted or denied. Tne answer validation and voice print verification process can also be performed either sequentially or simultaneously
In FIG 4, service program 402 optionally includes a voice verification module 419 Voice verification module 419 includes a speech venfier 420 and a voiceprint database 422 After answer evaluator 414 determines that the answer is a correct answer, the answer is supplied to speech verifier 420 Speech verifier 420 accesses a stored voiceprint from voiceprint database 422 that corresponds to the user's voiceprint Speech verifier 420-determines. if the audible signal of the answer at least substantially corresponds to the user's voiceprint
In FIG 5, service program 502 optionally includes a voice verification module 519 Voice verification module 519 includes a speech verifier 52 0 and a voiceprint database 522 After answer evaluator 514 determines that the answer is a correct answer, the answer is supplied to speech verif.er 520 Speech verifier 520 accesses a stored voiceprint from voiceprint database 522 that corresponds to the user's voiceprint Speech verifier 920 determines if the audible signal of the answer at least substantially corresponds or matches the user's voiceprint
In FIG 6, user device 605 optionally includes a voice verification module 619 Voice verification module 619 includes a speech verifier 520 and a voiceprint database 622 After answer evaluator 614

determines that cne answer is a correct answer, the answer is supplied to speech verifier 620 Speech verifier 620 accesses a stored voicsprint from voicsprint database 622 that corresponds to the user's voicsprint Speech verifier 620 determines if the audible signal of the answer at least substantially matches the user's voiceprint
Although the present invention has been described with reference to particular embodiments, workers skilled in the art will recognize that changes may be made in form and detail without departing from the-spirit and scope of the invention

Claims
1 A method of authenticating a user, the method
comprising
(a)accessing a collection of personal information related to the user,
(b)performing an authentication operation that is based on the collection of personal information and incorporates at least one dynamic component, the authentication operation configured to prompt the user to give an audible utterance,
(c)receiving the audible utterance, and-
(d)comparing the audible utterance to a stored voiceprint
2 The method of claim 1, wherein step (a) comprises accessing the collection of personal information associated with a service program
3 The method of claim l, wherein step (a) comprises accessing the collection of personal information from a remote user device
4 The method of claim 3, wherein the collection of personal information stored in the user device is annotated with semantic types

5 Tne metnoa of claim 1, wnerein performing an authentication operation that incorporates at least one dynamic component comprises generating a dynamic question tnar. asks about static information from the collection of personal information
6 The method of claim 1, wherein performing an authentication operation that incorporates at least one dynamic component comprises generating a question that requires manipulation of static information
7 The method of claim "1, " wherein performing an -authentication operation that incorporates at least one dynamic component comprises generating a static question that asks about dynamic information from the collection of personal information
8 The method of claim 1, wherein performing an authentication operation that incorporates at least one dynamic component comprises generating a question that requires identifying an item of information that changes over time
9 The method of claim l, wherein receiving an audible utterance comprises receiving an audible answer to a question
10 The method of claim 9, further comprising denying access to the user if the audible answer is incorrect before comparing to the stored voiceprint

11 The method of claim 9, furtner comprising
granting access to the user if the audible answer is
correct and the audible answer substantially
corresponds co the stcred voxceprint
12 The method of claim 1, wherein step (c)
comprises receiving over a telephone network an
audible utterance
13 The method of claim 1, wherein step (c) comprises receiving over a computer network an audible utterance
14 machine-based system for authenticating a user, the system comprising
an information retriever configured to access a collection of personal information related to a user,
an authentication module configured to perform an authentication operation by generating an inquiry based on the collection of personal information and incorporating at least one dynamic component, and
a voice verification module configured to process an audible utterance received in response to the inquiry

15 Tne machine based system of claim 14, wherein the information reciever is further configured to access the collection of personal information associated with a service program
16 The machine-based 3y3tem of claim 14, wherein the information retriever is further configured to access the collection of personal information associated with a remote user device
17 The machine-baaed system of claim 14, wherein the collection of personal information comprises a plurality of data entities
18 The machine-based system of claim 17, wherein each data entity is annotated with a plurality of semantic types
19 The machine-based system of claim 18, wherein the authentication module performs an authentication operation based on at least one of the plurality of semantic types
20 The machine-based system of claim 14, wherein the authentication module comprises a question generator configured to generate a dynamic question that asks about static information from the collection of personal information

21 The machine based system of claim 14, wherein the authentication module comprises a question generator configured to generate a question that requires manipulation of static information
22 The machine based system of claim 14, wherein the authentication module comprises a question generator configured to generate a static question that asks about dynamic information from the collection of personal informetion
23 The machine based system of claim 14, wherein the authentication module comprises a question generator configured to generate a question that requires identifying an item of information that changes over time
24 The machine-based system of claim 14, wherein the authentication module further comprises an answer evaluator configured to receive an audible answer from a user
25 The machine-based system of claim 24, wherein the answer evaluator is further configured to evaluate the correctness of the audible answer
26 The machine-based system of claim 14, wherein the voice verification module comprises a speech verifier configured to compare the audible utterance to a stored voiceprint

27 The machine-based system of claim 26, wherein the scored voicepnnt is the user's voiceprint
23 The machine-based system of claim 26, wherein the voice verification module further comprises a voiceprint database, the speech verifier configured to access the voiceprint from the voiceprint database
28. The machine-based system of claim 14, further comprising a speech recognition system for recognising the audible utterance
30 A computer implemented method for authenticating
a user, the method comprising
(a) accessing a collection. of personal
information related to a user, (b)generating a question that incorporates at
least one dynamic component, (c)capturing an audible answer to the question,
and (c)comparing the audible answer to a stored
voiceprint
31 The computer-implemented method of claim 24,
therein step (a) comprises accessing the collection
of personal information by way of an computer
network

32 Tne computer-implemented method of claim 30, wherein che collection of personal information is annotated with a plurality of semantic types
33 The computer-implemented method of claim 30, wherein step (b) comprises generating a question that requires manipulation of static information from the collection of personal information
34 The computer-implemented method of claim 30, wherein step (b) comprises generating a question that requires identifying an item of information that changes over time
35 The computer-implemented method of claim 30, further comprising recognizing the audible answer with a speech recognizing system after tne audible answer is captured
36 The computer-implemented method of claim 30, further comprising evaluating the audible answer for correctness after the audible answer is recognized
3 7 The computer-implemented method of claim 36, further comprising denying access to the user before comparing the audible answer to the stored voiceprint if the audible answer is incorrect

3S The computer-implemented method of claim 36, further comprising granting access to the user if the audible answer is correct and the audible answer at lease substantially corresponds to tne stored voiceprint
33 A method of authenticating a user, the method comprising
transmitting a request for authentication
information to the user, the request
prompts the user to functionally manipulate
an element of personal information,
receiving the authentication information from
the user, and evaluating the authentication information against the personal information
40 The method of claim 39, wherein functionally manipulating an element of personal information comprises arithmetically manipulating an element of personal information, the personal information corresponding to numerical information
41 The method of claim 39, wherein functionally manipulating an element of personal information comprises manipulating an element of personal information that corresponds to alphabetical information

42 The metnoa of claim 39, furtner comprising receiving an audible utterance, and
comparing the audible utterance to a stored
voiceprint
4 3 A mechod of authenticating a user, the method comprising
transmitting a request for authentication information to the user, the request prompts the user to relate personal information corresponding to che user's interaction with a user device, receiving the authentication information from
the user, and evaluating the authentication information against the personal information
44 The method of claim 41, wherein the of personal
information is stored in the user device and
annotated with semantic types
45 The method of claim 44, further comprising
receiving an audible utterance, and
comparing the audible utterance to a stored voiceprint

Documents

Orders

Section Controller Decision Date
15 saroj kumar singh 2019-03-31
15, 2(1)(ja) and 3(k) saroj kumar singh 2019-03-31

Application Documents

# Name Date
1 2694-DEL-2005-GPA-(15-06-2010).pdf 2010-06-15
2 2694-DEL-2005-Correspondence-Others-(15-06-2010).pdf 2010-06-15
3 2694-DEL-2005-Form-1-(13-12-2010).pdf 2010-12-13
4 2694-DEL-2005-Correspondence-Others-(13-12-2010).pdf 2010-12-13
5 2694-del-2005-gpa.pdf 2011-08-21
6 2694-del-2005-form-5.pdf 2011-08-21
7 2694-del-2005-form-3.pdf 2011-08-21
8 2694-del-2005-form-2.pdf 2011-08-21
9 2694-del-2005-form-18.pdf 2011-08-21
10 2694-del-2005-form-1.pdf 2011-08-21
11 2694-del-2005-drawings.pdf 2011-08-21
12 2694-del-2005-description (complete).pdf 2011-08-21
13 2694-del-2005-correspondence-others.pdf 2011-08-21
14 2694-del-2005-claims.pdf 2011-08-21
15 2694-del-2005-abstract.pdf 2011-08-21
16 MTL-GPOA - PRS.pdf 2015-03-13
17 MS to MTL Assignment.pdf 2015-03-13
18 FORM-6-601-700(PRS).80.pdf 2015-03-13
19 CBR-PRS2-23-04-2015-FER.pdf_47.pdf 2015-04-23
20 CBR-PRS2-23-04-2015-FER.pdf 2015-04-23
21 new covering letter.pdf_66.pdf 2015-04-27
22 new covering letter.pdf 2015-04-27
23 Details under section 8.pdf 2015-04-27
24 Cover Letter and Petition for condonation of delay in filing Proof of Right.pdf_34.pdf 2015-05-12
25 Cover Letter and Petition for condonation of delay in filing Proof of Right.pdf 2015-05-12
26 2694-del-2005-Correspondence Others-(29-05-2015).pdf 2015-05-29
27 2694-del-2005-Assignment-(29-05-2015).pdf 2015-05-29
28 MS_ResponsetoFER_PD000861IN-SC-CBR_support chart_.pdf 2015-06-04
29 FORM 2_CS_form 5.pdf 2015-06-04
30 Amended-claims -mark up-abstarct.pdf 2015-06-04
31 MS_ResponsetoFER_PD000861IN-SC-CBR_support chart_.pdf_57.pdf 2015-06-24
32 FORM 2_CS_form 5.pdf_56.pdf 2015-06-24
33 Amended-claims -mark up-abstarct.pdf_58.pdf 2015-06-24
34 2694-DEL-2005_EXAMREPORT.pdf 2016-06-30
35 Other Patent Document [01-11-2016(online)].pdf 2016-11-01
36 2694-DEL-2005-HearingNoticeLetter.pdf 2019-01-23
37 2694-del-2005-form-18.pdf 2011-08-21
37 2694-DEL-2005-Correspondence to notify the Controller (Mandatory) [07-02-2019(online)].pdf 2019-02-07
38 2694-DEL-2005-FORM-26 [26-02-2019(online)].pdf 2019-02-26
38 2694-del-2005-form-2.pdf 2011-08-21
39 2694-DEL-2005-Power of Attorney-010319.pdf 2019-03-06
40 2694-DEL-2005-Correspondence-010319.pdf 2019-03-06
41 2694-DEL-2005-Written submissions and relevant documents (MANDATORY) [13-03-2019(online)].pdf 2019-03-13
42 2694-DEL-2005-PETITION UNDER RULE 137 [13-03-2019(online)].pdf 2019-03-13
43 2694-DEL-2005-Response to office action (Mandatory) [19-03-2019(online)].pdf 2019-03-19
44 2694-DEL-2005-CERTIFIED COPIES-CERTIFICATE U-S 72 147 & UR 133-2 [20-05-2019(online)].pdf 2019-05-20
45 2694-DEL-2005-CERTIFIED COPIES-CERTIFICATE U-S 72 147 & UR 133-2 [20-05-2019(online)]-1.pdf 2019-05-20