会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Techniques for voice-based user authentication for mobile access to network services
    • 用于基于语音的用户认证用于移动接入网络服务的技术
    • US07158776B1
    • 2007-01-02
    • US09956204
    • 2001-09-18
    • Robert S. EstesWen-Pai LuMichele GuelCraig HuegenAlbert RoethlisbergerRobert Scarbrough
    • Robert S. EstesWen-Pai LuMichele GuelCraig HuegenAlbert RoethlisbergerRobert Scarbrough
    • H04Q7/20
    • H04W12/08H04L63/02H04L63/0861H04L63/0892
    • Techniques for granting access on a network having a network service to a user of a mobile device having a microphone includes determining a first identification uniquely associated with a registered user having a registered voiceprint that matches a voiceprint of the user of the mobile device. A second identification uniquely associated with the mobile device is also determined. It is then determined whether to grant access based on the first identification and the second identification. If it is determined to grant access, access is granted on the network to the user. Various aspects of the invention allow a user to be authenticated separately of the mobile device by the voice of the user, and granted access to a network service based on both the user's identity and the identity of the mobile device. Both the user's voice and the device identity are provided using the current capabilities of wireless telephones. Obtaining the first identification and second identification within a specified time interval makes confidently practical the technique of verifying that a certain user controls a certain mobile device, and then allowing access by that device to protected services.
    • 用于向具有麦克风的移动设备的用户授予在具有网络服务的网络上的接入的技术包括确定与具有与移动设备的用户的声纹匹配的注册声纹的注册用户唯一相关联的第一标识。 还确定与移动设备唯一相关联的第二标识。 然后确定是否基于第一标识和第二标识来准许访问。 如果确定授予访问权限,则在网络上向用户授予访问权限。 本发明的各个方面允许用户通过用户的语音分别对移动设备进行认证,并且基于用户的身份和移动设备的身份来授权对网络服务的访问。 使用无线电话的当前功能来提供用户的语音和设备身份。 在指定的时间间隔内获取第一个标识和第二个标识使得确认特定用户控制某个移动设备,然后允许该设备访问受保护的服务的技术令人信服地实用。