US 12,451,144 B2
Authentication using words as a single-use passcode
Kent Arthur Spaulding, Portland, OR (US); and Kenneth Joseph Meltsner, Portland, OR (US)
Assigned to Oracle International Corporation, Redwood Shores, CA (US)
Filed by Oracle International Corporation, Redwood Shores, CA (US)
Filed on Jan. 25, 2023, as Appl. No. 18/159,514.
Prior Publication US 2024/0249730 A1, Jul. 25, 2024
Int. Cl. H04L 9/40 (2022.01); G10L 17/24 (2013.01)
CPC G10L 17/24 (2013.01) [H04L 63/0838 (2013.01); H04L 63/0861 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising:
receiving, from a user via a first communication channel corresponding to the user, authentication information for authenticating the user to access a resource;
verifying the authentication information to successfully complete a first step of an authentication process;
selecting a text passcode for the user from a plurality of dictionaries, wherein:
a first dictionary comprises a first set of words corresponding to a first part of speech;
a second dictionary comprises a second set of words corresponding to a second part of speech different than the first part of speech; and
selecting the text passcode comprises:
selecting a first word of the text passcode from the first set of words of the first dictionary;
selecting a second word of the text passcode from the second set of words of the second dictionary; and
generating the text passcode using the first word and the second word;
responsive to successfully completing the first step of the authentication process, initiating a second step of the authentication process by transmitting the text passcode to be spoken by the user;
receiving, from the user, voice input that vocalizes the text passcode transmitted to the user;
verifying the voice input to successfully complete the second step of the authentication process; and
responsive to successfully completing the second step of the authentication process, granting access to the resource.