Method for Authenticating a User, and Artificial Intelligence System Operating According to the Method

Information

  • Patent Application
  • 20230032549
  • Publication Number
    20230032549
  • Date Filed
    December 23, 2020
    3 years ago
  • Date Published
    February 02, 2023
    a year ago
Abstract
Method for authenticating a user is provided. The method is carried out by an Artificial Intelligence (AI) system. The AI system is configured to provide voice assistant functionalities. The method comprises receiving from a user a vocal request for using a service, the service being provided by a service provider associated with a service provider platform; vocally receiving a telephone number; cooperating with the service provider platform to verify that the telephone number corresponds to an active subscription to the service; sending to the telephone number an authentication message including a pronounceable code; vocally receiving a pronounced code by the user; verifying that the pronounced code corresponds to the pronounceable code; and sending a confirmation message to the service provider platform.
Description

The present invention refers to a method for authenticating a user, and an artificial intelligence platform operating according to the method.


Voice interaction based assistants (often referred to simply as “voice assistants”), based on artificial intelligence platforms (“AI platforms”) for natural language understanding (“NLU”), are commonly used for allowing users to interact with electronic devices, service provider platforms, etc. in order to command operations (e.g. in a home automation environment, for turning a TV set on, changing the target temperature of an air conditioning system, locking/unlocking doors, etc.) or activate/use services both digital and physical (e.g. audio/video contents on demand, order of home delivery food, taxi, etc.).


In this context, the Applicant has noticed that voice assistants can usually receive and execute commands without any selection of the individual/user pronouncing the instructions. In other terms, basically anybody can cause a voice assistant to perform any action.


Accordingly, operations which have a security-related impact (e.g. unlocking a door) or a money-related impact (access to services already purchased by the user or online purchase of goods/services) may become unfeasible or critical and potentially dangerous.


The above scenario is already established in a private environment (e.g. at home), but becomes even more relevant in a possible future massive use within public environment, according to a diffused ambient computing scenario, where voice assistants may become ubiquitous for a variety of uses (e.g. voice assistant on a train, on toll gates machines, etc.).


Moreover, in a foreseeable future, a multiplicity of ambient vocal assistants may become available both on the same device and in different devices/environments, so that the same user may interact with them at different times and locations according to the user needs. For example, a user may use vocal assistant A at home, vocal assistant B on transportation, vocal assistant C at shopping or leisure locations (e.g. hotel services, cineplex access control, parking, etc.).


Document U.S. Pat. No. 9,286,899 B1 discloses techniques for authenticating users at devices that interact with the users via voice input. For instance, the described techniques may allow a voice-input device to safely verify the identity of a user by engaging in a back-and-forth conversation. The device or another device coupled thereto may then verify the accuracy of the responses from the user during the conversation, as well as compare an audio signature associated with the user's responses to a pre-stored audio signature associated with the user.


Document US 2015/0087265 A1 discloses establishment of a service call between a service user and a call center for a service provider when the service user is contacted or calls into the call center of the service provider. The service provider may request basic account information for verification of the identity of the service user. If the service provider determines that a further verification of the user's identity is necessary, the service provider may send a verification code to the service user via the user communication device. The verification code is relayed back to the service provider. The transmitted verification code and the relayed verification code are compared and if the codes match, the user is authenticated.


Document WO 2018/197343 A1 discloses techniques for authenticating a personal voice assistant using an out-of-band speakable credential. A user of a mobile application executing on a first client device may be authenticated with a service that executes on server(s) and is configured to interact with personal voice assistant(s). Based on the authenticating, a speakable credential may be provided to the first client device. The providing may trigger the first client device to provide, as output using output device(s) of the first client device, the speakable credential. Data generated in response to an utterance of the speakable credential received at a second client device may be received, from a personal voice assistant associated with the second client device. The data may be matched to the speakable credential to authenticate the personal voice assistant with the service.


Document WO 2019/165332 A1 discloses methods for authenticating a user utilizing a smart speaker system. The methods include: requesting a user authentication by issuing a voice command to a smart speaker; playing a sonic one-time password (OTP) on the smart speaker received from an authentication server in response to the requesting a user authentication; receiving the sonic OTP by a mobile device of the user; transmitting an OTP decoded from the sonic OTP to the authentication server; and authorizing the user by the authentication server to execute a secure transaction using the smart speaker system.


The Applicant observes that the known techniques, although providing authentication features, still have limits and drawbacks which render them unsatisfactory, especially when considering the multiple vocal assistant and massive adoption scenarios described above.


In greater detail, the system disclosed in U.S. Pat. No. 9,286,899 B1 is based on secret information shared in advance by the user and the AI platform (e.g. a vocal fingerprint) and substantially uses only one authentication criterion or “factor”, which relies on the secret information. As a consequence, this system appears to be unsuitable for real-time authentication of a user, or in a public environment, where the vocal assistant is re-used by a multiplicity of unknown users, or when a user uses a vocal assistant available at another private location such as a hotel or a friend's home, and does not reach a satisfactory level of flexibility and reliability for enabling ecommerce user scenarios, as it is not vocal assistant independent.


The system disclosed in US 2015/0087265 A1 is limited to applications to call centers and does not provide any teachings concerning activation/use of services in association with the authentication technique. Furthermore, US 2015/0087265 requires that the user, when interacting with the call center in order to be authenticated, provides his/her account details, which is undesirable for both security and user-friendliness reasons.


The system disclosed in WO 2018/197343 A1 is based on one criterion or “factor” only, namely the speakable credential. This technique is felt not to be reliable enough, and does not appear to allow an easy and immediate identification of the user.


The system disclosed in WO 2019/165332 A1 appears to be very complex and hardly reliable, since the authentication technique is based not simply on voice recognition, but on a rather complex sound detection and recognition method. In fact, sounds can be altered by the specific hardware features of the devices and the operational conditions in which the same are used. For example, simply playing a sound at a volume level that is too high causes sound distortion and may compromise the whole authentication procedure. Furthermore, if sounds other than the human voice have to be detected and processed, the hardware structure (i.e. microphones) of the apparatus must be different, and more sophisticated, than the usual hardware structure of mobile devices and voice assistants. Furthermore, its use appears very limited in public spaces where background noise can reduce the effectiveness of the non-user speakable sound-based authentication, as no AI NLU technique can be used to reliably detect user speech. In addition to the above, this authentication technique is potentially prone to easy detection and un-authorized sound replication and is based on one criterion or “factor” only, namely the sonic OTP. This is felt to be an important limit in terms of security and reliability.


In view of the above, the Applicant has identified the need to provide an authentication method, to be performed by an artificial intelligence system implementing voice assistant functionalities, which provides the necessary cross-vocal assistant, cross-service, scalability, security and reliability features.


In the Applicant's view, a cross-vocal assistant authentication system is desirable to enable scalable, efficient, secure and user-friendly scenarios allowing at the same time re-use by a multiplicity of service providers for both digital and physical goods and services. Under such conditions the market adoption and value may be greatly enhanced.


Furthermore, it is desirable that the vocal assistant may not belong to a specific user but may allow to multiple users access to a multiplicity of available services; in such cases the services may be not known to the vocal assistant as “active” for a specific user until the user is properly authenticated.


According to one aspect, the invention refers to a method for authenticating a user, the method being carried out by an Artificial Intelligence, AI, system, the AI system being configured to provide voice assistant functionalities, the method comprising:


receiving from a user a vocal request for using a service, the service being provided by a service provider, the service provider being associated with a service provider platform;


vocally receiving from the user a main code representative of a telephone number;


cooperating with the service provider platform to verify that the telephone number associated to the main code corresponds to an active subscription to the service;


sending to the telephone number an authentication message including a pronounceable code;


vocally receiving from the user a pronounced code;


verifying that the pronounced code corresponds to the pronounceable code;


sending a confirmation message to the service provider platform.


Preferably, the method comprises, before the main code is vocally provided, vocally prompting the provision of the main code.


Preferably, cooperating with the service provider platform to verify that the telephone number corresponds to an active subscription comprises:


sending the main code to the service provider platform;


receiving from the service provider platform a response representative of a comparison between the main code and data included in a subscription database of the service provider platform.


Preferably, the main code coincides with the telephone number or is a single pronounceable code correlated to the telephone number.


Preferably, the method comprises, before the pronounced code is vocally provided, vocally prompting the provision of the pronounced code.


Preferably, the method comprises vocally receiving details associated to the service to be provided.


Preferably, the method comprises vocally prompting the provision of the details.


Preferably, the details are prompted and received after verifying that the pronounced code corresponds to the pronounceable code.


Preferably, the confirmation message comprises the details.


Preferably, the method comprises performing a fallback procedure in case the pronounced code is not provided.


Preferably, the fallback procedure comprises:


vocally prompting the provision of a fallback code;


receiving a vocal code;


cooperating with the service provider platform to verify that the vocal code corresponds to the fallback code.


Preferably, the fallback code is a unique code associated to the telephone number, in particular associated to the telephone number upon activation of a service subscription with the service provider based on the telephone number.


Preferably, the fallback code is a one-time activation code sent from the service provider platform to the telephone number.


According to a second aspect, the invention refers to a software program product including instructions that, when executed by one or more processors of an Artificial Intelligence, AI, system, cause the execution of the method discloses hereabove.


According to a further aspect, the invention refers to an Artificial Intelligence, AI, system, the AI system being configured to provide voice assistant functionalities, the AI system comprising a processing unit, a sound detecting module associated to the processing unit and a sound generating module associated to the processing unit, the processing unit being configured to:


receive from a user, through the sound detecting module, a vocal request for using a service, the service being provided by a service provider, the service provider being associated with a service provider platform;


vocally receiving from the user, through the sound detecting module, a main code representative of a telephone number;


cooperating with the service provider platform to verify that the telephone number associated to the main code corresponds to an active subscription to the service;


sending to the telephone number an authentication message including a pronounceable code;


vocally receiving from the user, through the sound detecting module, a pronounced code;


verifying that the pronounced code corresponds to the pronounceable code;


sending a confirmation message to the service provider platform.





Further features and advantages will appear more clearly from the detailed description of a preferred and non-exclusive embodiment of the invention. This description is given hereinafter with reference to the accompanying figures, also provided only for illustrative and, therefore, non-limiting purposes, in which:



FIG. 1 is a block diagram of a system in which the AI platform according to the invention can be used;



FIG. 2 is a diagram showing the steps carried out in a method according to the invention;



FIG. 3 is a diagram showing a first embodiment of a fallback procedure that can be carried out in the method of FIG. 2;



FIG. 4 is a diagram showing a second embodiment of a fallback procedure that can be carried out in the method of FIG. 2;



FIGS. 5-5′ are block diagrams schematically representing a scenario in which the invention can be used;



FIG. 6 is a block diagram representing a functional environment in which the steps of FIG. 3 can be carried out;



FIG. 7 is a block diagram representing a functional environment in which the steps of FIG. 4 can be carried out.





With reference to the accompanying figures, reference numeral 100 identifies an AI system according to the present invention.


AI system 100 (FIG. 1) comprises an AI device 140 (also called a smart speaker or a device including a smart speaker) and an AI platform 150. The AI platform 150 is preferably cloud based. The subdivision of functionalities between the AI platform 150 and the AI device 140 may vary based on the AI system 100 itself. Preferably, the AI device 140 has a reduced set of functions in order to reduce its cost while the majority of NLU and AI service-related functions are carried out by the AI platform 150.


The AI system 100 comprises a processing unit 110. The processing unit 110 is suitably programmed in order to carry out the operations herewith disclosed and claimed.


Preferably, the processing unit 110 comprises one or more processors 111, 112. Processors 111, 112 can be arranged according to a distributed architecture. In one embodiment, a first processor 111 is included in the AI device 140, and a second processor 112 is included in the AI platform 150.


As mentioned above, functionalities of the AI system 100 can be split between the AI device 140 and the AI platform 150; the respective processors 111, 112 are configured to carry out the respective functions.


For example, the first processor 111 can be configured to manage audio processing, wakeword detection (i.e. detection of the word/expression that the user has to pronounce in order to activate the AI device 140), connection to the AI platform 150, etc.


For example, the second processor 112 can be configured to manage artificial intelligence functions, in particular related to the authentication method herein disclosed (e.g. cooperation with the service provider platform 200 disclosed in the following, comparison between codes, etc.).


Preferably, the processing unit 110 is associated to one or more respective memory areas M1, M2, wherein data/information useful for the activity of the same processing unit 110 are stored. In one embodiment, a first memory area M1 can be associated with the first processor 111, and a second memory area M2 can be associated with the second processor 112. Each of the two memory areas can be co-located with the corresponding processor and/or can be cloud based. The second memory area M2, in particular, is preferably cloud based.


The AI system 100, and in particular the AI device 140, comprises a sound detecting module 120.


Preferably, the sound detecting module 120 is formed by or comprises one or more microphones. In particular, the sound detecting module 120 may comprise a plurality of microphones and additional functional audio processing modules comprising, for example, an audio front end subsystem. The microphone(s) included in the sound detecting module 120 can be realized with the MEMS (Micro Electrical Mechanical System) technology.


In general terms, the sound detecting module 120 detects sounds and is capable, in particular, of detecting and extracting human voice from noisy environments (wherein noise can be caused, for example, by the sound generating module 130 that will be disclosed hereinafter); the extracted voice is transduced into electrical signals, that can be provided to and processed by the first processor 111.


The AI system 100, and in particular the AI device 140, comprises a sound generating module 130.


Preferably, the sound generating module 130 is formed by or comprises one or more loudspeakers.


In general terms, the sound generating module 130 receives electrical signals from the first processor 111 and transduces them into audible sounds.


The AI system 100 is configured to provide voice assistant functionalities.


In other terms, the AI system 100 is configured to receive and interpret human speech, and to respond via a synthesized voice. The AI system 100 can also generate communications/command signals, intended for external devices, based on the vocal instructions received from the user.


The AI system 100 is configured to cooperate with a service provider platform 200.


As mentioned above, the present invention also encompasses scenarios in which more than one AI system is provided and/or more than one service provider platform is provided.


The service provider platform 200 is an IT platform which a service provider employs in order to communicate with the AI system 100 and preferably to activate and/or provide services that can be requested by a user via the AI device 140 of the AI system 100.


For example, the service provided by the service provider can be a digital service (e.g. an audio/vocal press review, music pieces provided in streaming, etc.) and/or a physical service (e.g. possibility to order home delivered food, ticket reservation and sales services, etc.). Preferably, the service is a paid service, i.e. a service that is provided upon payment of a determined amount of money. The service can be a single-event service (i.e. is typically used only once), a service that is provided with a determined periodicity, or an on-demand service. The payment method can include cash (e.g. at a physical point of sale, upon subscription to the service), credit card, debit card (details of which are provided from the user to the service provider upon subscription to the service, online or at a physical point of sale), virtual wallet (typically created upon online subscription), etc.


A user 300 is subscribed to a service provided by the service provider or has an account with the service provider (managed by the service provider platform 200) allowing purchase of added-value digital and/or physical services.


Typically, a plurality of users is subscribed to such service. For the sake of simplicity, the operations regarding only one user will be considered hereinafter. However, it should be noted that the following description can be applied to any users subscribed to the service.


Upon subscription or activation of the service, the user provides the service provider with identifying information, comprising at least a telephone number TN—preferably, a mobile telephone number. The identifying information preferably also include information regarding payment (according to one or more of the aforementioned payment methods).


In a preferred embodiment, the identifying information further comprises a user selected pronounceable password PP such as, for example, one of the words present in a language dictionary.


The identifying information, consisting of or comprising the telephone number TN, are stored in a database DB included in or associated to the service provider platform 200.


Accordingly, the service provider platform 200 can access to the telephone numbers of subscribed users. In this embodiment, if a certain telephone number is not stored in the database DB, then the respective user does not result to be subscribed to the service.


The AI system 100 communicates and cooperates with the service provider platform 200 in order to manage the activation and possibly the provision of the service, exploiting the voice assistant functionalities implemented by the AI system 100.


According to the invention, when a user (schematically represented by block 300 in FIG. 2) wishes to activate and/or use the service exploiting the AI system 100 functionalities, he/she activates the voice assistant and makes a general request (e.g., by uttering a wakeword followed by a request, such as: “Voice Assistant, I'd like to listen to some music from Music Provider!”).


The Applicant notes that the expression “user” is meant to indicate one or more persons vocally interacting with the AI system 100 and specifically with the AI device 140—thus, not necessarily one single person. In case multiple persons are involved, each vocal interaction with the AI platform can be handled by one or more of the persons.


The AI system 100, thanks to the cooperation between the first processor 111 and the sound detecting module 120, receives and processes such vocal request for the provision of a service—namely, provision of music from Music Provider which, in the present example, is the service provider.


The AI system 100, and in particular the processing unit 110, then performs an authentication procedure in order to verify the identity of the user 300, and make sure, for example, that such individual has access to the premium service requested or that possible payments/expenses due to the provision of the service are actually charged to the correct individual (i.e. to the wallet/account actually associated with the person requesting the service). Such authentication procedure is schematically represented in FIGS. 2, 5.


Preferably, the AI system 100 (and in particular the AI device 140 with the first processor 111, in cooperation with the sound generating module 130) vocally prompts the user 300 to vocally provide a telephone number TN, preferably a mobile telephone number.


Optionally, the AI system may also prompt the user 300 to pronounce a pronounceable password PP.


Then the AI system, and in particular the AI device 140, waits for the user 300 to vocally provide the telephone number TN, and the optional pronounceable password PP.


When the user 300 pronounces the telephone number TN, and optionally the pronounceable password PP, the AI system 100 (in particular the AI device 140) detects and processes such vocal signal, thus obtaining digital data representing the pronounced telephone number and optionally the pronounceable password PP.


In case the AI system 100 does not acquire the telephone number TN and/or the optional pronounceable password PP with sufficient confidence and reliability, it is envisaged that it can prompt the user 300 to repeat the telephone number and/or the optional pronounceable password PP, for a predetermined number of times. Preferably, once a maximum number of attempts have been made, and still the telephone number TN and/or the optional pronounceable password PP is not properly acquired, the AI system 100, and in particular the AI device 140, vocally informs the user 300 (through the sound generating module 130) that the telephone number (and/or the optional pronounceable password PP) has not been understood and the session is terminated.


Once the telephone number TN and the optional pronounceable password PP (if used) are properly detected (according to AI system 100 internal indicators), the AI system 100—and in particular the processing unit 110—cooperates with the service provider platform 200 to verify that the telephone number TN pronounced by the user 300 and the optional pronounceable password PP associated thereto correspond to an active subscription to the service.


In more details, the processing unit 110, and in particular the second processor 112, preferably sends the telephone number TN and, preferably, the optional pronounceable password PP to the service provider platform 200. The service provider platform 200 compares the telephone number TN and, preferably, the optional pronounceable password PP with the identifying information associated with active subscriptions, included in its database DB.


If the telephone number TN does not match any active subscription, or if the corresponding pronounceable password PP (if used) does not match the user selected PP, then a problem arises. The service provider platform 200 provides the AI platform 100 with a negative feedback, and the AI system 100 can either give the user 300 a further chance, or simply vocally inform the user 300 that no active service with the service provider appears to be associated with the user and, as a consequence, the service cannot be provided.


If the telephone number TN matches an active subscription, then the service can be provided—after the two-factor authentication procedure continues and terminates with a positive outcome.


Thus, the service provider platform 200 sends the AI system 100, in particular the AI platform 150, a positive feedback (“OK” in the diagram of FIG. 2).


Then the AI system 100 continues the authentication procedure.


The processing unit 110, in particular the second processor 112, selects a pronounceable code PC1. The pronounceable code PC1 can be a word, a sequence of words in the language used for interaction based on natural language between the user 300 and the AI device 140, a phrase, etc. that the user 300 can read and pronounce.


The processing unit 110, and in particular the second processor 112, sends an authentication message AM, including the pronounceable code PC1, to the telephone number TN.


The Applicant observes that the expression “sending a message to a telephone number” is meant to indicate that the message is sent to a certain device, that at the time of the message transmission is connected to a telecommunications network (i.e. the telecommunications network used for the message transmission) based on a subscription profile associated to the telephone number. Such device will be indicated as the user device 400. The user device 400 is preferably a mobile device, such as for example a smart phone. Preferably the user device 400 houses and cooperates with a SIM card or Universal Integrated Circuit Card, UICC, which allows the user device 400 to connect to the telecommunications network based on the aforesaid user profile and, in practical terms, to use the user's telephone number.


In case the user 300 comprises only one person, the user device 400 is preferably a device using such person's telephone number.


In case the user 300 comprises more than one person, the user device 400 is preferably a device using the telephone number of one of the persons.


Preferably, the authentication message AM is at least one of the following: an SMS message; an Unstructured Supplementary Service Data, USSD, message; a push notification of a dedicated application software installed on the user device 400, etc.


Preferably, the AI system 100, and in particular the AI platform 150, in cooperation with the AI device 140, vocally prompts the user 300 to pronounce the pronounceable code PC1 included in the authentication message AM.


Then the AI system 100 waits for a feedback from the user 300; when the latter vocally provides a pronounced code PC2, the AI system 100, and in particular the AI device 140, in cooperation with the AI platform 150, receives and interprets such feedback.


In more details, the processing unit 110, and in particular the second processor 112, compares the pronounceable code PC1 with the pronounced code PC2.


If the pronounced code PC2 matches the pronounceable code PC1, then the authentication is terminated with a positive outcome.


The Applicant notes that the authentication technique according to the invention is advantageously based on a double factor verification:

    • first factor: the telephone number and/or the optional pronounceable password PP are associated to an active subscription at the service provider platform, and
    • second factor: the telephone using the telephone number is actually available to the user.


Accordingly, the processing unit 110, and in particular the second processor 112, sends a confirmation message CM to the service provider platform 200.


In some applications, such as home environments, the two-factor voice authentication process may be used to support only security or purchase related scenarios as the AI devices 140 are normally registered to a specific and known user and the sharing of the AI device 140 is limited within the household environment. In multi user and public applications, such as public service environments, the two factor authentication procedure allows an AI system to be correctly and safely used by a multiplicity of unknown users, and a service provider to correctly and safely provide services via multiple AI systems simultaneously to the same user or to different users.


In an embodiment, the AI system 100, and in particular AI platform 150, in cooperation with the AI device 140, is configured to vocally receive details D associated to the service to be provided.


In other words, the processing unit 110 is adapted to vocally receive further information which better specifies the possibly generic request initially provided by the user 300.


For example, in case the user 300 has initially requested to listen to some music from a certain music platform, it is then possible to specifically indicate an artist, one or more songs, etc.


In an embodiment, the details D are provided together with the initial request.


In an embodiment, the details D are provided at a later stage, for example after verification of the correspondence between the pronounced code PC2 and the pronounceable code PC1.


Preferably, the AI system 100, and in particular the AI platform 150, in cooperation with the AI device 140, is configured to vocally prompt the user 300 to provide the details D. This operation can be carried out either at the beginning, immediately after the initial service request, or at a later stage, after verifying that the pronounced code PC2 corresponds to the pronounceable code PC1.


Preferably, the details D further specifying the service to be provided are included in the confirmation message CM.


From a practical point of view, the AI system 100 preferably performs the authentication operations in a substantially autonomous way—apart from exchange of data with the service provider platform 200 aimed to verify that the telephone number TN provided by the user 300 is actually associated with an active subscription—and, at the end of the authentication process, it sends the confirmation message CM to the service provider platform 200, providing all the necessary information for an order to be fulfilled, namely the already verified user identity and the information describing what the user 300 has to be provided with (e.g. a certain song). In FIG. 2, the confirmation message CM is sent to the service provider platform 200 after the details D are provided by the user. It is envisaged that the confirmation message CM can be sent to the service provider platforms also after the pronounced code PC2 is provided by the user 300 to the AI system 100, and before the details D are requested by the AI system 100 to the user.


In case the pronounced code PC2 is not provided (or cannot be provided) by the user 300, a fallback procedure can be carried out (FIGS. 3-4, 6-7).


For example, the fallback procedure can be necessary if, due to a failure in the code delivery process by the telecommunications network, due to some communication problem/miscommunication occurred between the user 300 and the AI system 100, or after a predetermined number of attempts, the pronounced code PC2 still does not match the pronounceable code PC1.


Preferably, the fallback procedure comprises vocally prompting the provision of a fallback code FC, receiving a vocal code VC, and cooperating with the service provider platform 200 to verify that the vocal code VC corresponds to the fallback code FC.


In an embodiment (FIGS. 4, 7), the fallback code FC is a unique code associated to the telephone number TN in the user account activated in the service provider platform 200. The unique code can be a “Single Use Unique Pronounceable Code” (SUUPC). In particular, this unique code SUUPC can be associated to the telephone number TN upon activation of the service subscription with the service provider based on the telephone number TN. In other terms, when the user 300 subscribes to the service(s) provided by the service provider associated to the service provider platform 200, he/she is given a certain pronounceable code, that is the aforesaid unique code SUUPC. The user must keep the unique code SUUPC in mind and/or stored in a secure place—preferably independent from his/her user device 400, so that the unique code SUUPC can be used also when the mobile phone or the mobile network associated with the mobile phone does not work (e.g. due to lack of network coverage, run out battery, etc.). Preferably, the database DB associated to or included in the service provider platform 200 also contains the unique code SUUPC of each user/subscription. Thus, once the user 300 has vocally provided the vocal code VC, the AI system 100 cooperates with the service provider platform 200 to verify whether such vocal code VC matches the feedback code FC, i.e. the unique code SUUPC. In case the two codes match, the authentication procedure is positively terminated and, preferably, the user 300 is prompted to provide the service's further details D as explained above. A SUUPC provides adequate security also when used in public environments as its single use property provides protection against any audio eavesdropping which may occur in public spaces.


In an embodiment (FIGS. 3, 6), the fallback code FC is a one-time activation code AC sent from the service provider platform 200 directly to the telephone number TN in device 400.


The one-time activation code AC is not, in principle, specifically associated to any user/subscription. It can be generated upon request, in real time, and associated to a validity limited in time. Thus, the one-time activation code AC is provided to the user device 400. As in the previous scenario, the AI platform 100, in cooperation with the service provider platform 200, verifies whether the vocal code VC pronounced by the user 300 corresponds to the one-time activation code AC. In the affirmative, the authentication procedure is positively terminated and, preferably, the user 300 is prompted to provide the service's further details D as explained above.


It has to be noted that the method disclosed above is based on the telephone number TN provided by the user 300 to the AI system 100.


The Applicant notes that in specific usage cases, for example when in the conversation between the user 300 and the AI device 140, the user may wish to avoid pronouncing his/her telephone number TN, the latter may be substituted with a single pronounceable word. When the AI system 100 detects that the telephone number TN has been substituted with a word and detects such word, it can query the service provider platform 200 for the telephone number TN corresponding to such word and therefore complete the two-factor authentication process based on such telephone number TN according the method presented above.


Thus, in general terms, the user 300 vocally provides the AI system 100 with a main code Z. The main code Z is representative of a telephone number TN.


In one embodiment, the main code Z coincides with the telephone number TN, i.e. the telephone number TN is directly vocally provided to the AI system 100 by the user 300.


In one embodiment, the main code Z is different from the telephone number TN but directly correlated thereto (in practice, the user vocally provides the AI system 100 with the aforementioned single pronounceable word); accordingly, the service provider platform 200 can verify whether the main code Z is associated, in its database DB, to a telephone number TN and thus to an active subscription; once a positive feedback is provided to the AI system 100, the authentication procedure can continue as disclosed above.


The Applicant observes that the present invention can be used by the service provider platform 200 across different AI systems without any substantial changes being necessary.


In other terms, once a certain service provider platform is generally adapted to cooperate with a certain AI systems, it is sufficient that the AI system be suitably configured to carry out the authentication method according to the invention, and the service provider platform will have the opportunity to exploit such authentication method.


If the service provider platform is adapted to cooperate also with a further AI system, once the further AI system is configured to carry out the authentication method according to the invention, the service provider platform will have the opportunity to exploit such authentication method also when services are requested through the further AI system.



FIGS. 5-5′ schematically depict a scenario wherein the service provider platform 200 cooperates with a first AI system 100′ (which can coincide with the AI system 100 described above), and with a second AI system 100″, different from the first AI system 100′, but equally implementing the authentication method according to the invention.


In this scenario, the user can vocally request/activate a service through the service provider platform 200 choosing either the first AI system 100′ or the second AI system 100″. In any event, the chosen AI system will perform an authentication procedure according to the invention.


The invention achieves important advantages.


Firstly, the Applicant notes that the authentication technique according to the present invention is based on two distinct and independent factors, namely the user's telephone number and corresponding (optional) pronounceable password, and the pronounceable code. This significantly improves security and reliability of the system with respect to the methods made available by the state of the art.


Furthermore, being the user telephone number a global coordinated identifier, the invention can be easily implemented by multiple AI systems, thus giving the service provider and the final users a wide range of possibilities to interact with the same (high) level of security and reliability.


Furthermore, the invention can be applied depending on the requirements of the specific service in both private and public scenarios, independently from the vocal assistant device being previously registered to a specific user or not, and therefore independently from any specific AI system authentication system, for example based on proprietary biometric data provided by the user. The invention thus allows avoiding usage of such biometric data, the provision of which in public environment can be quite critical and difficult to control, due to a number of practical and legal matters.


In addition to the above, the Applicant notes that using the telephone number as one of the two authentication factors allows the service provider to easily identify the user, thereby giving the service provider platform/the AI platform the possibility to avoid requesting further identifying information (e.g. account details) to the user.

Claims
  • 1. Method for authenticating a user, the method being carried out by an Artificial Intelligence (AI) system, the AI system being configured to provide voice assistant functionalities, the method comprising: receiving from a user a vocal request for using a service, the service being provided by a service provider, the service provider being associated with a service provider platform;vocally receiving from the user a main code representative of a telephone number;cooperating with the service provider platform to verify that the telephone number associated to the main code corresponds to an active subscription to the service;sending to the telephone number an authentication message (AM) including a pronounceable code;vocally receiving from the user a pronounced code;verifying that the pronounced code corresponds to the pronounceable code; andsending a confirmation message to the service provider platform.
  • 2. Method according to claim 1 comprising, before the main code is vocally provided, vocally prompting provision of the main code.
  • 3. Method according to claim 1, wherein cooperating with the service provider platform to verify that the telephone number corresponds to an active subscription comprises: sending the main code to the service provider platform; andreceiving from the service provider platform a response representative of a comparison between the main code and data included in a subscription database of the service provider platform.
  • 4. Method according to claim 1, wherein the main code coincides with the telephone number or is a single pronounceable code correlated to the telephone number.
  • 5. Method according to claim 1 comprising, before the pronounced code is vocally provided, vocally prompting provision of the pronounced code.
  • 6. Method according claim 1 comprising vocally receiving details associated with the service to be provided.
  • 7. Method according to claim 6 comprising vocally prompting provision of the details.
  • 8. Method according to claim 7 wherein the details are prompted and received after verifying that the pronounced code corresponds to the pronounceable code.
  • 9. Method according to claim 6, wherein the confirmation message comprises the details.
  • 10. Method according to claim 1 comprising performing a fallback procedure in case the pronounced code is not provided.
  • 11. Method according to claim 10 wherein the fallback procedure comprises: vocally prompting provision of a fallback code;receiving a vocal code; andcooperating with the service provider platform to verify that the vocal code corresponds to the fallback code.
  • 12. Method according to claim 11 wherein the fallback code is a unique code associated to the telephone number, preferably associated with the telephone number upon activation of a service subscription with the service provider based on the telephone number.
  • 13. Method according to claim 11 wherein the fallback code is a one-time activation code sent from the service provider platform to the telephone number.
  • 14. A computer readable storage medium storing instructions that, when executed by one or more processors of the AI system, cause execution of the method of claim 1.
  • 15. Artificial Intelligence (AI) system, the AI system being configured to provide voice assistant functionalities, the AI system comprising a processing unit, a sound detecting module associated with the processing unit and a sound generating module associated with the processing unit, the processing unit being configured to: receive from a user, through the sound detecting module, a vocal request for using a service, the service being provided by a service provider, the service provider being associated with a service provider platform;vocally receiving from the user, through the sound detecting module, a main code representative of a telephone number;cooperating with the service provider platform to verify that the telephone number associated with the main code corresponds to an active subscription to the service;sending to the telephone number an authentication message (AM) including a pronounceable code;vocally receiving from the user, through the sound detecting module, a pronounced code;verifying that the pronounced code corresponds to the pronounceable code; andsending a confirmation message to the service provider platform.
Priority Claims (1)
Number Date Country Kind
102019000025672 Dec 2019 IT national
PCT Information
Filing Document Filing Date Country Kind
PCT/IB2020/062390 12/23/2020 WO