The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 08, 2020

Filed:

Jul. 10, 2017
Applicant:

T-mobile, Usa, Inc., Bellevue, WA (US);

Inventors:

James Ellison, Issaquah, WA (US);

Joel Werdell, Seattle, WA (US);

Robert Stamm, Sammamish, WA (US);

Assignee:

T-Mobile USA, Inc., Bellevue, WA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04W 12/06 (2009.01); G10L 15/22 (2006.01); G10L 17/22 (2013.01); H04L 29/06 (2006.01); G06F 21/32 (2013.01); H04W 12/00 (2009.01);
U.S. Cl.
CPC ...
H04W 12/06 (2013.01); G06F 21/32 (2013.01); G10L 15/22 (2013.01); G10L 17/22 (2013.01); H04L 63/083 (2013.01); H04L 63/0861 (2013.01); G10L 2015/223 (2013.01); H04L 63/0853 (2013.01); H04L 63/102 (2013.01); H04W 12/00503 (2019.01);
Abstract

This disclosure describes techniques that facilitate selectively interacting with a computing resource based on receipt of an incoming voice command. Particularly, a voice control integration system may parse content of an incoming voice command to authenticate an identity of the client, and further determine an intended meaning of the incoming voice command. In doing so, the voice control integration system may interact with a computing resource to perform an action that fulfills a client request. Computing resources may be associated with service providers or client devices of a client. Further, the voice control integration system may authenticate a client identity based on a one or two-factor authentication protocol, of which one may correspond to a biometric analysis of the incoming voice command. Further, a second-factor of the two-factor authentication protocol may be implemented via a voice interaction device, another client device accessible to the client, or a combination of both.


Find Patent Forward Citations

Loading…