US 11,671,826 B2
Voice control and telecommunications service integration
James Ellison, Issaquah, WA (US); Joel Werdell, Seattle, WA (US); and Robert Stamm, Sammamish, WA (US)
Assigned to T-Mobile USA, Inc., Bellevue, WA (US)
Filed by T-Mobile, USA, Inc., Bellevue, WA (US)
Filed on Jul. 17, 2020, as Appl. No. 16/932,534.
Application 16/932,534 is a continuation of application No. 15/645,458, filed on Jul. 10, 2017, granted, now 10,771,969.
Claims priority of provisional application 62/360,845, filed on Jul. 11, 2016.
Prior Publication US 2020/0351659 A1, Nov. 5, 2020
This patent is subject to a terminal disclaimer.
Int. Cl. H04W 12/06 (2021.01); G06F 21/32 (2013.01); G10L 15/22 (2006.01); G10L 17/22 (2013.01); H04L 9/40 (2022.01); H04W 12/63 (2021.01)
CPC H04W 12/06 (2013.01) [G06F 21/32 (2013.01); G10L 15/22 (2013.01); G10L 17/22 (2013.01); H04L 63/083 (2013.01); H04L 63/0861 (2013.01); G10L 2015/223 (2013.01); H04L 63/0853 (2013.01); H04L 63/102 (2013.01); H04W 12/63 (2021.01)] 18 Claims
OG exemplary drawing
 
1. One or more non-transitory computer-readable media storing computer-executable instructions, that when executed on one or more processors, causes the one or more processors to perform acts comprising:
detecting, via a voice interaction device, an incoming voice communication from a client, the incoming voice communication including an implied request to perform at least one action that is associated with a computing resource;
parsing content of the incoming voice communication to identify the implied request to perform the at least one action;
identifying a client profile associated with the client based at least in part on the incoming voice communication, the client profile including a two-factor authentication protocol associated with the computing resource;
detecting a client device different from the voice interaction device;
determining a first authentication score based at least in part on an execution of a first factor of the two-factor authentication protocol at the client device;
transmitting, via the voice interaction device, a request for execution of a second factor of the two-factor authentication protocol;
determining a second authentication score based at least in part on the requested execution of the second factor of the two-factor authentication protocol at the voice interaction device; and
performing the at least one action that is associated with the incoming voice communication based at least in part on a combination of at least: (i) the first authentication score associated with the client device and (ii) the second authentication score associated with the voice interaction device, wherein:
the two-factor authentication protocol varies based on a particular type of access to a particular computing resources;
the second authentication score associated with the voice interaction device is based at least in part on a voice biometric; and
the first authentication score associated with the client device is independent of a voice biometric.