Patent Issued for Systems and methods for authentication program enrollment (USPTO 11817105): United Services Automobile Association - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
December 5, 2023 Newswires
Share
Share
Post
Email

Patent Issued for Systems and methods for authentication program enrollment (USPTO 11817105): United Services Automobile Association

Insurance Daily News

2023 DEC 05 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- A patent by the inventors Buckingham, Thomas Bret (Fair Oaks, TX, US), Casillas, Debra Randall (Helotes, TX, US), Fernandez, Gabriel Carlos (San Antonio, TX, US), Johnson, Zakery Layne (Santa Clara, UT, US), Mortensen, Maland Keith (San Antonio, TX, US), Rangarajan, Sudarshan (San Antonio, TX, US), filed on January 27, 2022, was published online on November 14, 2023, according to news reporting originating from Alexandria, Virginia, by NewsRx correspondents.

Patent number 11817105 is assigned to United Services Automobile Association (San Antonio, Texas, United States).

The following quote was obtained by the news editors from the background information supplied by the inventors: “The protection and security of customer information is critical from an organization’s perspective, not only to comply with applicable laws, but to earn and foster customers’ trust. Enhanced security often comes at the cost of convenience for the user. For example, customers may be required to provide additional information simply to be enrolled in an authentication program (e.g., select and answer security questions). Additionally, the authentication process may become more of an inconvenience as the user is asked to provide additional information to verify his or her identity.

“The drawings have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be expanded or reduced to help improve the understanding of the embodiments of the present disclosure. Similarly, some components and/or operations may be separated into different blocks or combined into a single block for the purposes of discussion of some of the embodiments of the present disclosure. Moreover, while embodiments of the present disclosure are amenable to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and are described in detail below. The intention, however, is not to limit the disclosure to the particular embodiments described. On the contrary, the disclosure is intended to cover all modifications, equivalents, and alternatives falling within the scope of the disclosure.”

In addition to the background information obtained for this patent, NewsRx journalists also obtained the inventors’ summary information for this patent: “Various embodiments of the present disclosure generally relate to authentication. More specifically, various embodiments of the present disclosure relate to systems and methods for authentication program enrollment.

“Traditional methods of authentication on a voiceline (e.g., telecommunications network, internet connection, etc.) may identify and verify the user based on knowledge factors. For example, the user may call and provide a name to identify the user and an address to verify the user’s identity. More sophisticated methods of authentication may identify the user using an ownership factor such as a device or token associated with the device of the user. Thereafter, the user’s identity may be verified with a knowledge factor such as additional personal information. For example, the user may be asked to provide a PIN, birthdate, address, phone number, account number, and/or other information. The constant repeating and revealing of personal information may be cumbersome and less secure for the user.

“In some embodiments of the present disclosure, an inherence factor (i.e., biometric information) may be used to identify the user and/or to verify the user’s identity. For example, the user may be identified by collecting information from the device being used to call the organization (e.g., via a device fingerprint, token, phone number, etc.). This information may be used to create a biometric profile containing characteristics that may be used to verify future biometric samples. Once the biometric profile is created, the user’s identity may be verified by comparing the caller’s biometrics (e.g., voice biometrics) with previously generated or collected biometrics associated with the user. For example, if the voice biometrics match to a certain threshold, then the user may be authenticated. Thus, in some systems, a user may simply speak a command and be authenticated without actively providing additional information.

“To enroll a user in an authentication system or program that allows authentication based on voice biometrics, samples of the user’s voice must be collected and analyzed. If the user is passively enrolled in the authentication program, the user is enrolled without actively responding to a request for information (e.g., device information or voice biometrics are gathered in the background without requiring the user to actively provide any information). In contrast, if the user is actively enrolled in the authentication program, the user actively responds to requests for information (e.g., setting up a username/password, providing personal information such as a date of birth, provide biometric samples, etc.).

“Once the samples are obtained, the samples may be analyzed to derive characteristics of the user’s voice and speech. In some embodiments, a voice profile and/or voice print (i.e., a stored template used to identify a person via their voice) may be created. The characteristics, voice profile, and/or voice print may be associated with the user. During authentication, the caller’s voice and speech may be analyzed and compared with previously collected and analyzed samples of the user’s voice to ensure the caller is in fact the user.”

The claims supplied by the inventors are:

“1. A non-transitory, computer-readable medium containing instructions that, when executed by one or more processors, cause a machine to perform operations comprising: receiving non-voice biometric authentication information from a user; authenticating the user via a first authentication method using the non-voice biometric authentication information; and after authenticating the user via the first authentication method: enhancing or creating, based on a verbal request or a verbal command received from the user, a voice profile associated with the user; and after enhancing or creating the voice profile, enrolling the user into a voice biometric authentication program in response to the voice profile being sufficient for enrollment into the voice biometric authentication program.

“2. The non-transitory, computer-readable medium of claim 1, wherein the operations further comprise determining an intent of the verbal request or the verbal command, wherein the enhancing or the creating of the voice profile associated with the user is further based on the intent.

“3. The non-transitory, computer-readable medium of claim 1, wherein the enhancing or the creating of the voice profile associated with the user is further based on at least two similar requests or commands.

“4. The non-transitory, computer-readable medium of claim 1, wherein the operations further comprise: enrolling the user into the voice biometric authentication program for other verbal requests or other verbal commands that include at least one portion of the verbal request or the verbal command and at least one portion of a second verbal request or a second verbal command for which the user has been enrolled into the voice biometric authentication program.

“5. The non-transitory, computer-readable medium of claim 1, wherein the voice biometric authentication program authenticates the user via a voice biometric authentication method, wherein the voice biometric authentication method includes: receiving a subsequent voice interaction including the verbal request or the verbal command; deriving characteristics of a voice from the subsequent voice interaction; comparing the characteristics of the voice in the subsequent voice interaction with characteristics previously derived from one or more previously received voice interactions from the user including the verbal request or the verbal command; and authenticating the user when a match of the characteristics of the voice in the subsequent voice interaction and the characteristics previously derived from the one or more previously received voice interactions meet or exceed a threshold.

“6. The non-transitory, computer-readable medium of claim 1, wherein the voice biometric authentication program uses text-dependent speech recognition to authenticate the user.

“7. The non-transitory, computer-readable medium of claim 1, wherein the operations further comprise: enrolling the user into the voice biometric authentication program for other requests or commands that include at least one portion of the verbal request or the verbal command and at least one portion of a second verbal request or a second verbal command for which the user has been enrolled into the voice biometric authentication program.

“8. A system comprising: at least one processor; and a memory communicatively coupled to the at least one processor, the memory storing instructions which, when executed by the at least one processor, cause the system to perform operations comprising: receiving non-voice biometric authentication information from a user; authenticating the user via a first authentication method using the non-voice biometric authentication information; and after authenticating the user via the first authentication method: enhancing or creating, based on a verbal request or a verbal command received from the user, a voice profile associated with the user; and after enhancing or creating the voice profile, enrolling the user into a voice biometric authentication program in response to the voice profile being sufficient for enrollment into the voice biometric authentication program.

“9. The system of claim 8, wherein the operations further comprise determining an intent of the verbal request or the verbal command, wherein the enhancing or the creating of the voice profile associated with the user is further based on the intent.

“10. The system of claim 8, wherein the enhancing or the creating of the voice profile associated with the user is further based on at least two similar requests or commands.

“11. The system of claim 8, wherein the operations further comprise enrolling the user into the voice biometric authentication program for other verbal requests or other verbal commands that include at least one portion of the verbal request or the verbal command and at least one portion of a second verbal request or a second verbal command for which the user has been enrolled into the voice biometric authentication program.

“12. The system of claim 8, wherein the voice biometric authentication program authenticates the user via a voice biometric authentication method, wherein the voice biometric authentication method includes: receiving a subsequent voice interaction including the verbal request or the verbal command; deriving characteristics of a voice from the subsequent voice interaction; comparing the characteristics of the voice in the subsequent voice interaction with characteristics previously derived from one or more previously received voice interactions from the user including the verbal request or the verbal command; and authenticating the user when a match of the characteristics of the voice in the subsequent voice interaction and the characteristics previously derived from the one or more previously received voice interactions meet or exceed a threshold.

“13. The system of claim 8, wherein the voice biometric authentication program uses text-dependent speech recognition to authenticate the user.

“14. The system of claim 8, wherein the operations further comprise enrolling the user into the voice biometric authentication program for other requests or commands that include at least one portion of the verbal request or the verbal command and at least one portion of a second verbal request or a second verbal command for which the user has been enrolled into the voice biometric authentication program.

“15. A computerized method comprising: receiving non-voice biometric authentication information from a user; authenticating the user via a first authentication method using the non-voice biometric authentication information; and after authenticating the user via the first authentication method: enhancing or creating, based on a verbal request or a verbal command received from the user, a voice profile associated with the user; and after enhancing or creating the voice profile, enrolling the user into a voice biometric authentication program in response to the voice profile being sufficient for enrollment into the voice biometric authentication program.

“16. The computerized method of claim 15, the method further comprising determining an intent of the verbal request or the verbal command, wherein the enhancing or the creating of the voice profile associated with the user is further based on the intent.

“17. The computerized method of claim 15, wherein the enhancing or the creating of the voice profile associated with the user is further based on at least two similar requests or commands.

“18. The computerized method of claim 15, the method further comprising enrolling the user into the voice biometric authentication program for other verbal requests or other verbal commands that include at least one portion of the verbal request or the verbal command and at least one portion of a second verbal request or a second verbal command for which the user has been enrolled into the voice biometric authentication program.

“19. The computerized method of claim 15, wherein the voice biometric authentication program authenticates the user via a voice biometric authentication method, wherein the voice biometric authentication method includes: receiving a subsequent voice interaction including the verbal request or the verbal command; deriving characteristics of a voice from the subsequent voice interaction; comparing the characteristics of the voice in the subsequent voice interaction with characteristics previously derived from one or more previously received voice interactions from the user including the verbal request or the verbal command; and authenticating the user when a match of the characteristics of the voice in the subsequent voice interaction and the characteristics previously derived from the one or more previously received voice interactions meet or exceed a threshold.

“20. The computerized method of claim 15, the method further comprising: enrolling the user into the voice biometric authentication program for other requests or commands that include at least one portion of the verbal request or the verbal command and at least one portion of a second verbal request or a second verbal command for which the user has been enrolled into the voice biometric authentication program.”

URL and more information on this patent, see: Buckingham, Thomas Bret. Systems and methods for authentication program enrollment. U.S. Patent Number 11817105, filed January 27, 2022, and published online on November 14, 2023. Patent URL (for desktop use only): https://ppubs.uspto.gov/pubwebapp/external.html?q=(11817105)&db=USPAT&type=ids

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Patent Issued for Test conflict guard for parallel software testing (USPTO 11816023): State Farm Mutual Automobile Insurance Company

Newer

Study Findings from National Research Institute Provide New Insights into Tick-Borne Diseases and Conditions (A Social-ecological Systems Approach To Tick Bite and Tick-borne Disease Risk Management: Exploring Collective Action In the Occitanie …): Tick-Borne Diseases and Conditions

Advisor News

  • The McEwen Group Merges with Prairie Wealth Advisors to Form Billion Dollar RIA
  • Guaranteed income streams help preserve assets later in retirement
  • Economic pressures make boomerang living the new normal
  • Pay or Die: The scare tactics behind LA County’s Measure ER tax increase
  • How to listen to what your client isn’t saying
More Advisor News

Annuity News

  • Guaranteed income streams help preserve assets later in retirement
  • MassMutual turns 175, Marking Generations of Delivering on its Commitments
  • ALIRT Insurance Research: U.S. Life Insurance Industry In Transition
  • My Annuity Store Launches a Free AI Annuity Research Assistant Trained on 146 Carrier Brochures and Live Annuity Rates
  • Ameritas settles with Navy vet in lawsuit over disputed annuity sale
More Annuity News

Health/Employee Benefits News

  • You are paying for the health care of low-wage Walmart employees. Here is why | Opinion
  • Samsung Bioepis Launches Ustekinumab Biosimilar, Marking Its First Product Launch in Japan
  • Brown University School of Public Health Reports Findings in Managed Care (Exposure to the new Medicare Advantage risk adjustment model varies across insurers): Managed Care
  • State lowers cap on some patient health care cost increases
  • Increases in Idaho’s death rate expected
More Health/Employee Benefits News

Life Insurance News

  • AM Best Upgrades Issuer Credit Rating of Southern Farm Bureau Life Insurance Company
  • Industry Innovator Scores New High-Water Mark: Reliance Matrix Logs 8 Millionth Employee Benefit/Absence Claim
  • $150M+ asset sale payout distributed to Greg Lindberg policyholders
  • Best’s Market Segment Report: AM Best Revises Outlook on France’s Non-Life Insurance Segment to Stable from Negative, Reflecting Top-line Growth, Technical Profitability
  • Pacific Life Launches New Flagship Variable Universal Life Insurance Product
More Life Insurance News

- Presented By -

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Why Blend in When You Can Make a Splash?
Pacific Life’s registered index-linked annuity offers what many love about RILAs—plus more!

Life moves fast. Your BGA should, too.
Stay ahead with Modern Life's AI-powered tech and expert support.

Bring a Real FIA Case. Leave Ready to Close.
A practical working session for agents who want a clearer, repeatable sales process.

Discipline Over Headline Rates
Discover a disciplined strategy built for consistency, transparency, and long-term value.

Press Releases

  • JP Insurance Group Launches Commercial Property & Casualty Division; Appoints Joe Webster as Managing Director
  • Sequent Planning Recognized on USA TODAY’s Best Financial Advisory Firms 2026 List
  • Highland Capital Brokerage Acquires Premier Financial, Inc.
  • ePIC Services Company Joins wealth.com on Featured Panel at PEAK Brokerage Services’ SPARK! Event, Signaling a Shift in How Advisors Deliver Estate and Legacy Planning
  • Hexure Offers Real-Time Case Status Visibility and Enhanced Post-Issue Servicing in FireLight Through Expanded DTCC Partnership
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet