Patent Issued for Systems and methods for authentication program enrollment (USPTO 11817105): United Services Automobile Association
2023 DEC 05 (NewsRx) -- By a
Patent number 11817105 is assigned to
The following quote was obtained by the news editors from the background information supplied by the inventors: “The protection and security of customer information is critical from an organization’s perspective, not only to comply with applicable laws, but to earn and foster customers’ trust. Enhanced security often comes at the cost of convenience for the user. For example, customers may be required to provide additional information simply to be enrolled in an authentication program (e.g., select and answer security questions). Additionally, the authentication process may become more of an inconvenience as the user is asked to provide additional information to verify his or her identity.
“The drawings have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be expanded or reduced to help improve the understanding of the embodiments of the present disclosure. Similarly, some components and/or operations may be separated into different blocks or combined into a single block for the purposes of discussion of some of the embodiments of the present disclosure. Moreover, while embodiments of the present disclosure are amenable to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and are described in detail below. The intention, however, is not to limit the disclosure to the particular embodiments described. On the contrary, the disclosure is intended to cover all modifications, equivalents, and alternatives falling within the scope of the disclosure.”
In addition to the background information obtained for this patent, NewsRx journalists also obtained the inventors’ summary information for this patent: “Various embodiments of the present disclosure generally relate to authentication. More specifically, various embodiments of the present disclosure relate to systems and methods for authentication program enrollment.
“Traditional methods of authentication on a voiceline (e.g., telecommunications network, internet connection, etc.) may identify and verify the user based on knowledge factors. For example, the user may call and provide a name to identify the user and an address to verify the user’s identity. More sophisticated methods of authentication may identify the user using an ownership factor such as a device or token associated with the device of the user. Thereafter, the user’s identity may be verified with a knowledge factor such as additional personal information. For example, the user may be asked to provide a PIN, birthdate, address, phone number, account number, and/or other information. The constant repeating and revealing of personal information may be cumbersome and less secure for the user.
“In some embodiments of the present disclosure, an inherence factor (i.e., biometric information) may be used to identify the user and/or to verify the user’s identity. For example, the user may be identified by collecting information from the device being used to call the organization (e.g., via a device fingerprint, token, phone number, etc.). This information may be used to create a biometric profile containing characteristics that may be used to verify future biometric samples. Once the biometric profile is created, the user’s identity may be verified by comparing the caller’s biometrics (e.g., voice biometrics) with previously generated or collected biometrics associated with the user. For example, if the voice biometrics match to a certain threshold, then the user may be authenticated. Thus, in some systems, a user may simply speak a command and be authenticated without actively providing additional information.
“To enroll a user in an authentication system or program that allows authentication based on voice biometrics, samples of the user’s voice must be collected and analyzed. If the user is passively enrolled in the authentication program, the user is enrolled without actively responding to a request for information (e.g., device information or voice biometrics are gathered in the background without requiring the user to actively provide any information). In contrast, if the user is actively enrolled in the authentication program, the user actively responds to requests for information (e.g., setting up a username/password, providing personal information such as a date of birth, provide biometric samples, etc.).
“Once the samples are obtained, the samples may be analyzed to derive characteristics of the user’s voice and speech. In some embodiments, a voice profile and/or voice print (i.e., a stored template used to identify a person via their voice) may be created. The characteristics, voice profile, and/or voice print may be associated with the user. During authentication, the caller’s voice and speech may be analyzed and compared with previously collected and analyzed samples of the user’s voice to ensure the caller is in fact the user.”
The claims supplied by the inventors are:
“1. A non-transitory, computer-readable medium containing instructions that, when executed by one or more processors, cause a machine to perform operations comprising: receiving non-voice biometric authentication information from a user; authenticating the user via a first authentication method using the non-voice biometric authentication information; and after authenticating the user via the first authentication method: enhancing or creating, based on a verbal request or a verbal command received from the user, a voice profile associated with the user; and after enhancing or creating the voice profile, enrolling the user into a voice biometric authentication program in response to the voice profile being sufficient for enrollment into the voice biometric authentication program.
“2. The non-transitory, computer-readable medium of claim 1, wherein the operations further comprise determining an intent of the verbal request or the verbal command, wherein the enhancing or the creating of the voice profile associated with the user is further based on the intent.
“3. The non-transitory, computer-readable medium of claim 1, wherein the enhancing or the creating of the voice profile associated with the user is further based on at least two similar requests or commands.
“4. The non-transitory, computer-readable medium of claim 1, wherein the operations further comprise: enrolling the user into the voice biometric authentication program for other verbal requests or other verbal commands that include at least one portion of the verbal request or the verbal command and at least one portion of a second verbal request or a second verbal command for which the user has been enrolled into the voice biometric authentication program.
“5. The non-transitory, computer-readable medium of claim 1, wherein the voice biometric authentication program authenticates the user via a voice biometric authentication method, wherein the voice biometric authentication method includes: receiving a subsequent voice interaction including the verbal request or the verbal command; deriving characteristics of a voice from the subsequent voice interaction; comparing the characteristics of the voice in the subsequent voice interaction with characteristics previously derived from one or more previously received voice interactions from the user including the verbal request or the verbal command; and authenticating the user when a match of the characteristics of the voice in the subsequent voice interaction and the characteristics previously derived from the one or more previously received voice interactions meet or exceed a threshold.
“6. The non-transitory, computer-readable medium of claim 1, wherein the voice biometric authentication program uses text-dependent speech recognition to authenticate the user.
“7. The non-transitory, computer-readable medium of claim 1, wherein the operations further comprise: enrolling the user into the voice biometric authentication program for other requests or commands that include at least one portion of the verbal request or the verbal command and at least one portion of a second verbal request or a second verbal command for which the user has been enrolled into the voice biometric authentication program.
“8. A system comprising: at least one processor; and a memory communicatively coupled to the at least one processor, the memory storing instructions which, when executed by the at least one processor, cause the system to perform operations comprising: receiving non-voice biometric authentication information from a user; authenticating the user via a first authentication method using the non-voice biometric authentication information; and after authenticating the user via the first authentication method: enhancing or creating, based on a verbal request or a verbal command received from the user, a voice profile associated with the user; and after enhancing or creating the voice profile, enrolling the user into a voice biometric authentication program in response to the voice profile being sufficient for enrollment into the voice biometric authentication program.
“9. The system of claim 8, wherein the operations further comprise determining an intent of the verbal request or the verbal command, wherein the enhancing or the creating of the voice profile associated with the user is further based on the intent.
“10. The system of claim 8, wherein the enhancing or the creating of the voice profile associated with the user is further based on at least two similar requests or commands.
“11. The system of claim 8, wherein the operations further comprise enrolling the user into the voice biometric authentication program for other verbal requests or other verbal commands that include at least one portion of the verbal request or the verbal command and at least one portion of a second verbal request or a second verbal command for which the user has been enrolled into the voice biometric authentication program.
“12. The system of claim 8, wherein the voice biometric authentication program authenticates the user via a voice biometric authentication method, wherein the voice biometric authentication method includes: receiving a subsequent voice interaction including the verbal request or the verbal command; deriving characteristics of a voice from the subsequent voice interaction; comparing the characteristics of the voice in the subsequent voice interaction with characteristics previously derived from one or more previously received voice interactions from the user including the verbal request or the verbal command; and authenticating the user when a match of the characteristics of the voice in the subsequent voice interaction and the characteristics previously derived from the one or more previously received voice interactions meet or exceed a threshold.
“13. The system of claim 8, wherein the voice biometric authentication program uses text-dependent speech recognition to authenticate the user.
“14. The system of claim 8, wherein the operations further comprise enrolling the user into the voice biometric authentication program for other requests or commands that include at least one portion of the verbal request or the verbal command and at least one portion of a second verbal request or a second verbal command for which the user has been enrolled into the voice biometric authentication program.
“15. A computerized method comprising: receiving non-voice biometric authentication information from a user; authenticating the user via a first authentication method using the non-voice biometric authentication information; and after authenticating the user via the first authentication method: enhancing or creating, based on a verbal request or a verbal command received from the user, a voice profile associated with the user; and after enhancing or creating the voice profile, enrolling the user into a voice biometric authentication program in response to the voice profile being sufficient for enrollment into the voice biometric authentication program.
“16. The computerized method of claim 15, the method further comprising determining an intent of the verbal request or the verbal command, wherein the enhancing or the creating of the voice profile associated with the user is further based on the intent.
“17. The computerized method of claim 15, wherein the enhancing or the creating of the voice profile associated with the user is further based on at least two similar requests or commands.
“18. The computerized method of claim 15, the method further comprising enrolling the user into the voice biometric authentication program for other verbal requests or other verbal commands that include at least one portion of the verbal request or the verbal command and at least one portion of a second verbal request or a second verbal command for which the user has been enrolled into the voice biometric authentication program.
“19. The computerized method of claim 15, wherein the voice biometric authentication program authenticates the user via a voice biometric authentication method, wherein the voice biometric authentication method includes: receiving a subsequent voice interaction including the verbal request or the verbal command; deriving characteristics of a voice from the subsequent voice interaction; comparing the characteristics of the voice in the subsequent voice interaction with characteristics previously derived from one or more previously received voice interactions from the user including the verbal request or the verbal command; and authenticating the user when a match of the characteristics of the voice in the subsequent voice interaction and the characteristics previously derived from the one or more previously received voice interactions meet or exceed a threshold.
“20. The computerized method of claim 15, the method further comprising: enrolling the user into the voice biometric authentication program for other requests or commands that include at least one portion of the verbal request or the verbal command and at least one portion of a second verbal request or a second verbal command for which the user has been enrolled into the voice biometric authentication program.”
URL and more information on this patent, see:
(Our reports deliver fact-based news of research and discoveries from around the world.)



Patent Issued for Test conflict guard for parallel software testing (USPTO 11816023): State Farm Mutual Automobile Insurance Company
Study Findings from National Research Institute Provide New Insights into Tick-Borne Diseases and Conditions (A Social-ecological Systems Approach To Tick Bite and Tick-borne Disease Risk Management: Exploring Collective Action In the Occitanie …): Tick-Borne Diseases and Conditions
Advisor News
- The McEwen Group Merges with Prairie Wealth Advisors to Form Billion Dollar RIA
- Guaranteed income streams help preserve assets later in retirement
- Economic pressures make boomerang living the new normal
- Pay or Die: The scare tactics behind LA County’s Measure ER tax increase
- How to listen to what your client isn’t saying
More Advisor NewsAnnuity News
- Guaranteed income streams help preserve assets later in retirement
- MassMutual turns 175, Marking Generations of Delivering on its Commitments
- ALIRT Insurance Research: U.S. Life Insurance Industry In Transition
- My Annuity Store Launches a Free AI Annuity Research Assistant Trained on 146 Carrier Brochures and Live Annuity Rates
- Ameritas settles with Navy vet in lawsuit over disputed annuity sale
More Annuity NewsHealth/Employee Benefits News
- You are paying for the health care of low-wage Walmart employees. Here is why | Opinion
- Samsung Bioepis Launches Ustekinumab Biosimilar, Marking Its First Product Launch in Japan
- Brown University School of Public Health Reports Findings in Managed Care (Exposure to the new Medicare Advantage risk adjustment model varies across insurers): Managed Care
- State lowers cap on some patient health care cost increases
- Increases in Idaho’s death rate expected
More Health/Employee Benefits NewsLife Insurance News
- AM Best Upgrades Issuer Credit Rating of Southern Farm Bureau Life Insurance Company
- Industry Innovator Scores New High-Water Mark: Reliance Matrix Logs 8 Millionth Employee Benefit/Absence Claim
- $150M+ asset sale payout distributed to Greg Lindberg policyholders
- Best’s Market Segment Report: AM Best Revises Outlook on France’s Non-Life Insurance Segment to Stable from Negative, Reflecting Top-line Growth, Technical Profitability
- Pacific Life Launches New Flagship Variable Universal Life Insurance Product
More Life Insurance News