The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jan. 02, 2007
Filed:
Sep. 18, 2001
Robert S. Estes, Santa Clara, CA (US);
Wen-pai LU, San Jose, CA (US);
Michele Guel, San Jose, CA (US);
Craig Huegen, Bartelso, IL (US);
Albert Roethlisberger, San Jose, CA (US);
Robert Scarbrough, San Jose, CA (US);
Robert S. Estes, Santa Clara, CA (US);
Wen-Pai Lu, San Jose, CA (US);
Michele Guel, San Jose, CA (US);
Craig Huegen, Bartelso, IL (US);
Albert Roethlisberger, San Jose, CA (US);
Robert Scarbrough, San Jose, CA (US);
Cisco Technology, Inc., San Jose, CA (US);
Abstract
Techniques for granting access on a network having a network service to a user of a mobile device having a microphone includes determining a first identification uniquely associated with a registered user having a registered voiceprint that matches a voiceprint of the user of the mobile device. A second identification uniquely associated with the mobile device is also determined. It is then determined whether to grant access based on the first identification and the second identification. If it is determined to grant access, access is granted on the network to the user. Various aspects of the invention allow a user to be authenticated separately of the mobile device by the voice of the user, and granted access to a network service based on both the user's identity and the identity of the mobile device. Both the user's voice and the device identity are provided using the current capabilities of wireless telephones. Obtaining the first identification and second identification within a specified time interval makes confidently practical the technique of verifying that a certain user controls a certain mobile device, and then allowing access by that device to protected services.