Abstract:
A system and method for verifying user identity, in accordance with the present invention, includes a conversational system (114) for receiving inputs from a user (110) and transforming the inputs into formal commands. A behavior verifier (118) is coupled to the conversational system (114) for extracting features from the inputs. The features include behavior patterns of the user. The behavior verifier (118) is adapted to compare the input behavior to a behavior model (214) to determine if the user is authorized to interact with the system.
Abstract:
PROBLEM TO BE SOLVED: To provide a new authenticating process for mounting a conversation type system having elaborate dialog so as to provide the continuous and moderate authentication of a user during a process wherein the user converses with the conversation type system. SOLUTION: The system and method provide continuous reliability-based authentication. This system can be mounted on an increment access authentication system for controlling access to protected data having various security levels. In the process of a conversation type session between the user and a machine, this reliability-based authentication system periodically analyzes the input speech of the user who converses with the system so as to compute a 'reliability index' regarding the adequacy of a source discrimination request (i) that the user provides at the start of a dialog session. The computing process for the 'reliability index' is seamlessly integrated with the increment authentication system so as to adjust the dialog between the increment access authentication system and the user according to the reliability of the user of the source discrimination request.
Abstract:
A system and method for verifying user identity, in accordance with the present invention, includes a conversational system (114) for receiving inputs from a user (110) and transforming the inputs into formal commands. A behavior verifier (118) is coupled to the conversational system (114) for extracting features from the inputs. The features include behavior patterns of the user. The behavior verifier (118) is adapted to compare the input behavior to a behavior model (214) to determine if the user is authorized to interact with the system.
Abstract:
A system and method for verifying user identity, in accordance with the present invention, includes a conversational system (114) for receiving inputs from a user (110) and transforming the inputs into formal commands. A behavior verifier (118) is coupled to the conversational system (114) for extracting features from the inputs. The features include behavior patterns of the user. The behavior verifier (118) is adapted to compare the input behavior to a behavior model (214) to determine if the user is authorized to interact with the system.
Abstract:
A system and method for verifying user identity, in accordance with the present invention, includes a conversational system (114) for receiving inputs from a user (110) and transforming the inputs into formal commands. A behavior verifier (118) is coupled to the conversational system (114) for extracting features from the inputs. The features include behavior patterns of the user. The behavior verifier (118) is adapted to compare the input behavior to a behavior model (214) to determine if the user is authorized to interact with the system.