User identification and authentication

ABSTRACT

One or more computing devices, systems, and/or methods for user identification and authorization are provided. In an example, a voice command to perform an action is detected. A voice profile associated with a user is identified based upon voice characteristics of the voice command. In response to determining that the voice profile is not linked to an account associated with the action, the user is prompted for an identifier associated with a device for creating the account through the device. In response to receiving the identifier from the user, the identifier is utilized to facilitate creation of the account through the device.

BACKGROUND

Many devices have speech recognition functionality, such as mobilephones, smart speakers, cameras, televisions, watches, vehiclecomputers, and a wide variety of other types of devices. A smart devicemay implement speech recognition functionality in order to process andunderstand voice commands from a user. For example, a digital assistanthosted by a smart watch may receive a voice command spoken by a userwearing the smart watch, such as where the user is asking for a weatherreport. The digital assistant may evaluate the voice command todetermine that the user is requesting the weather report. Accordingly,the digital assistance may provide the user with the weather reportthrough the smart watch.

BRIEF DESCRIPTION OF THE DRAWINGS

While the techniques presented herein may be embodied in alternativeforms, the particular embodiments illustrated in the drawings are only afew examples that are supplemental of the description provided herein.These embodiments are not to be interpreted in a limiting manner, suchas limiting the claims appended hereto.

FIG. 1 is a diagram illustrating an example system for useridentification and authentication.

FIG. 2 is a flow chart illustrating an example method for useridentification and authentication, where account creation isfacilitated.

FIG. 3 is a flow chart illustrating an example method for useridentification and authentication, where account creation isfacilitated.

FIG. 4 is a diagram illustrating an example scenario associated withuser identification and authentication, where account creation isfacilitated.

FIG. 5 is a flow chart illustrating an example method for useridentification and authentication, where performance of an action isfacilitated.

FIG. 6 is a diagram illustrating an example scenario associated withuser identification and authentication, where performance of an actionis facilitated.

FIG. 7 is an illustration of example networks that may utilize and/orimplement at least a portion of the techniques presented herein.

FIG. 8 is an illustration of a scenario involving an exampleconfiguration of a computer that may utilize and/or implement at least aportion of the techniques presented herein.

FIG. 9 is an illustration of a scenario involving an exampleconfiguration of a client that may utilize and/or implement at least aportion of the techniques presented herein.

FIG. 10 is an illustration of an example environment in which at least aportion of the techniques presented herein may be utilized and/orimplemented.

FIG. 11 is an illustration of an example network that may utilize and/orimplement at least a portion of the techniques presented herein.

FIG. 12 is an illustration of a scenario featuring an examplenon-transitory machine readable medium in accordance with one or more ofthe provisions set forth herein.

DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS

Subject matter will now be described more fully hereinafter withreference to the accompanying drawings, which form a part hereof, andwhich show, by way of illustration, specific example embodiments. Thisdescription is not intended as an extensive or detailed discussion ofknown concepts. Details that are well known may have been omitted, ormay be handled in summary fashion.

The following subject matter may be embodied in a variety of differentforms, such as methods, devices, components, and/or systems.Accordingly, this subject matter is not intended to be construed aslimited to any example embodiments set forth herein. Rather, exampleembodiments are provided merely to be illustrative. Such embodimentsmay, for example, take the form of hardware, software, firmware or anycombination thereof.

The following provides a discussion of some types of computing scenariosin which the disclosed subject matter may be utilized and/orimplemented.

One or more systems and/or techniques for user identification andauthentication are provided. A network may comprise various devicesand/or services configured to provide functionality to users and clientdevices. For example, an authentication service may authenticate usersconnecting to the network, a messaging service may provide notificationsand messages to client devices such as a push notification to a mobiledevice, an email service may provide users with access to emailaccounts, etc. In order to provide services and functionality to a largeand/or ever growing user base of client devices, the network would scaleout with additional computing resources and bandwidth in order to reducelatency otherwise experienced by client devices. However, scaling outthe network with additional computing resources and bandwidth can becostly and/or impractical for a service provider.

Accordingly, as provided herein, a user identification andauthentication framework is provided for offloading user identificationand authentication functionality to client devices connected to thenetwork in order to scale out the network in a secure and efficientmanner. The user identification and authentication framework may allowusers to choose what client devices to utilize for authentication, suchas a digital assistant, a camera, or any other type of client device,and to seamlessly switch between different client devices forauthentication. The user identification and authentication frameworkallows users to opt-in their client devices for performing useridentification and authentication functionality. Offloading suchprocessing from devices and/or services of the network to client devicesprovides the ability to scale out the network to support more users andclient devices. This is because computing and processing resources ofthe devices and/or services of the network are no longer being consumedfor performing user identification and authentication, and instead canbe used for providing other services and functionality to users. Havingadditional computing and processing resources for providing services andfunctionality to users will reduce latency and/or processing overhead.

Various types of client devices may be utilized by the identificationand authentication framework for providing user identificationfunctionality and/or authentication functionality. In some examples, avoice command device may be utilized by the identification andauthentication framework for providing user identificationfunctionality. The voice command device may comprise a device thatoperates on voice commands, and is capable of identifying users basedupon the voice commands. For example, the voice command device maycreate and maintain unique voice profiles for users based upon voicecharacteristics of the users, such as phonation, pitch, loudness,texture, tone, speech rate, etc. In some examples, the voice commanddevice may comprise a smart speaker, a watch, a mobile device, athermostat, a camera, a television, a videogame console, or any otherclient device capable of identifying users. In some examples, the voicecommand device may be incorporated into and/or is part of acommunication device capable of connecting to the network, or may be aseparate device from the communication device.

It may be appreciated that a wide variety of other client devices beyondvoice command devices may be utilized for user identification. Suchclient devices leveraged for user identification may include devicescapable of identifying users based upon biometric data (e.g., facialrecognition, fingerprinting, etc.), devices capable of identifying usersbased upon user authentication information (e.g., a username andpassword), videogame consoles, televisions, mobile devices, smart homedevices, enterprise devices, multi-access edge computing (MEC) clientdevices, a device capable of implementing multiple techniques forauthentication (e.g., a device that implements both voice printauthentication and fingerprint authentication), etc. In this way, anytype of device capable of identifying users (e.g., utilizing fingerprintprofiles of user fingerprints, facial recognition profiles of userfaces, a username/password repository of user accounts of users, etc.)may be utilized by the identification and authentication framework forproviding user identification functionality. These client devices maycommunicate with other devices and/or services of the network in orderto communicate user identification information, account information,authentication information, and/or service requests to perform actions.For example, once a user has been identified and has registered anaccount linked to a profile of the user, the user may issue commands tothe client device for routing to services within the network forperforming actions (e.g., pay a bill, schedule a service appointment,purchase a product, etc.).

In some examples, a device, such as a client device, may be utilized bythe identification and authentication framework for providing userauthentication functionality. The client device may comprise any type ofdevice capable of authenticating a user. For example, the client devicemay comprises a smartphone, a smart watch, a computer, a laptop, avideogame system, a tablet, a vehicle computer, or any other type ofclient device capable of authenticating a user. The client device mayutilize various types of authentication mechanisms for authenticatingthe user, which may be utilized in conjunction with an authenticationservice (e.g., an identity online server). For example, the clientdevice may utilize biometric verifications such as facial recognition, afingerprint, etc., a password or pin, or any other type ofauthentication mechanism in order to authenticate the user. The deviceclient may operate in conjunction with other devices and/or services ofthe network in order to facilitate the authentication of the user, suchas the authentication service for authentication and a messaging servicefor communication. In some examples, the client device may be adifferent client device than the client device used to identify the user(e.g., the voice command device, a camera device, a device withfingerprint recognition functionality, etc.) or the same client devicemay be utilized for both user identification and user authentication.

In some examples, a communication device may be utilized by theidentification and authentication framework for providing communicationbetween the client device used for user identification such as the voicecommand device, the client device used for user authentication, andother devices and/or services of the network such as the authenticationservice and the messaging service. It may be appreciated that in someinstances, the communication device refers to an identity service hostedon a device with communication capabilities and/or the client device mayrefer to an authentication service hosted on a client on-prem device,for example, and thus the communication device and/or client device maycorrespond to a service hosted by a device. The communication device maybe used to facilitate the communication of user identificationinformation, authentication information, account creation information,and/or service requests to perform actions. In some examples, thecommunication device may reside within a same network as the clientdevice used for user authentication (e.g., the communication device andthe voice command device may be connected to a same home network) inorder to enhance security. In some examples, the device used for userauthentication and the communication device may comprise the samedevice, such as where voice command functionality is integrated into thecommunication device. In some examples, the device used for userauthentication and the communication device are separate devices. Thecommunication device is configured to provide communicationfunctionality over the network to other devices and/or services hostedwithin the network. In some examples, the communication device comprisesa router, a server, a thin multi-access edge computing (MEC) device, orany other device capable of connecting to the network.

Because the device used for user identification (e.g., the voice commanddevice, a camera device, a device with fingerprint recognitionfunctionality, etc.), the device used for user authentication (e.g., asmartphone, a smart watch, etc.), and/or the communication device (e.g.,a router) may comprise client devices, computational processing can beoffloaded from other devices and/or services of the network to theseclient devices. In this way, resources of the network can be freed forother purposes such as providing services to users and client devices atlower latencies and/or for scaling out to provide services to a largeruser and client device base.

A user may utilize the identification and authentication framework inorder to register accounts with services that can perform actions onbehalf of the user, such as paying bills, purchasing products,scheduling service, etc. For example, the user may speak a voice command“schedule a service appointment to upgrade my internet connection,”which is detected by a voice command device. The voice command devicemay identify a voice profile associated with the user based upon voicecharacteristics of the voice command. If the voice command device doesnot have the capability to identify a voice profile associated with theuser, then the communication device may be capable of identifying thevoice profile associated with the user. If the voice profile is notlinked to an account associated with the action (e.g., the voice profileis not linked to an internet service provider account of the user withan internet service provider), then the user may be prompted for anidentifier of a device such as a phone number of a smart phone. Thevoice command device and/or the communication device may be utilized tocommunicate with other services, such as an authentication service and amessaging service, in order to provide a push notification to the smartphone using the phone number so that the user can authenticate andcreate the account with the internet service provider through the smartphone.

Once an account is created, the voice profile of the user is linked tothe account so that subsequent voice commands associated with theaccount can be processed without further registration or accountcreation. For example, the user may subsequently speak a voice command“pay my internet bill,” which is detected by the voice command device.The voice command device may identify the voice profile associated withthe user based upon voice characteristics of the voice command. Becausethe voice profile is linked to the account with the internet serviceprovider associated with bill the user wants to pay, the user isauthenticated with an authentication service and a perform actioncommand is transmitted by the communication device to the internetservice provider to perform an action to pay the internet bill of theuser.

FIG. 1 illustrates a system 100 for user identification andauthentication. The system 100 may employ a user identification andauthentication framework in order to utilize various client devices forperforming user identification and authentication functionality. A voicecommand device 102 may be capable of receiving, processing, and/orimplementing voice commands from users utilizing speech recognitionfunctionality. In some embodiments, the voice command device 102 may bea standalone device or may be part of another device (e.g., a smartspeaker, a smart watch, a smart phone, a smart television, a videogameconsole, a smart thermostat, etc.). The voice command device 102 mayhost a digital assistant configured to process voice commands utilizingthe speech recognition functionality.

The voice command device 102 may be configured to create and maintainvoice profiles for users, which can be used to identify a particularuser that spoke a voice command. A voice profile for a user may comprisevoice characteristics of the user, which can be compared to voicecharacteristics of a voice command to determine whether the user spokethe voice command or whether another user spoke the voice command.Accordingly, the voice command device 102 may be utilized by the useridentification and authentication framework for user identificationbased upon the voice profiles. It may be appreciated that other types ofdevices may be utilized by the user identification and authenticationframework for user identification, such as a camera capable ofidentifying users based upon facial recognition functionality, a devicecapable of identifying users based upon biometric data, a device capableof identifying users based upon user input (e.g., a password or pin), avideogame console, a smart television, a smart home device, anenterprise device, a multi-access edge computing (MEC) device, etc.

The user identification and authentication framework may utilize acommunication device 104 in order to communicate with the voice commanddevice 102. In some examples, the communication device 104 and the voicecommand device 102 are connected over a network 112, such as a homenetwork or an enterprise network. The communication device 104 may beutilized to facilitate communication between the voice command device102 and other devices and/or services, such as an authentication service106, a messaging service 108, services capable of performing actions onbehalf of users, etc. In some examples, the voice command device 102 maybe incorporated into the communication device 104 or may be a separatedevice. The communication device 104 may comprise any device capable ofconnecting to the other devices and services over a network such as aservice provider network. For example, the communication device 104 maycomprise a router, a server, or other client device. In this way, thecommunication device 104 provides a communication bridge between thevoice command device 102 and other devices and services, such as theauthentication service 106 and the messaging service 108.

The authentication service 106 may be configured to performauthentication and registration of a user, a client device of the user,and/or an account of the user. For example, the voice command device 102may identify a user that spoke a voice command to perform an action. Adetermination may be made that a voice profile of the user is not linkedto an account associated with the performance of the action.Accordingly, the authentication service 106 is invoked to authenticatethe user for creating and registering the account. The authenticationservice 106 may be provided with an identifier of a device 110 of theuser such as a phone number of a mobile device through which the usercan authenticate. The authentication service 106 may utilize themessaging service 108 to send a push notification to the device 110 toguide the user through authenticating through the device 110 using anauthentication user interface of the authentication service. In someexamples, the device 110 such as a smart phone may perform facialrecognition, voice recognition, request a password/pin, performbiometric authentication, verify a fingerprint, or perform otherauthentication for authenticating the user through the authenticationuser interface.

Once the user has performed authentication through the device 110, theauthentication service 106 may store authentication data (e.g., anauthentication key such as a private key and/or public key, a globalunique identifier such as a fast identity online global uniqueidentifier (e.g., a random Global Unique Identifier) generated as aresult of the device 110 authenticating the user in association with theauthentication service 106, the identifier of the device 110, accountinformation of the account being created, etc.) for subsequentlyauthenticating actions requested by the user to perform for the account.In this way, the authentication service 106 may perform an initialauthentication of the user through the device 110 for creating andregistering the account.

Once the authentication service 106 has authenticated the user andregistered the account, the communication device 104 or other device maylink the voice profile of the user to the account to create an accountlink. For example, an authentication service hosted by a client on-premdevice, such as the communication device 104 or other device, and/or aservice provider cloud may link the voice profile to create the accountlink. The voice profile may be linked to the account by storing theglobal unique identifier and the authentication key such as the publickey within the account link. When the voice command device 102 receivesa subsequent voice command from the user to perform an action associatedwith the account, the communication device 104 and/or the voice commanddevice 102 may identify and utilize the account link for facilitatingthe performance of the action by a service associated with the account,as opposed to initiating registration again. In this way, various clientdevices may be leveraged for providing user identification andauthentication.

An embodiment of a voice command device 402, of FIG. 4, performing useridentification using a voice profile is illustrated by an exemplarymethod 200 of FIG. 2 and an embodiment of a communication device 404facilitating communication with an authentication service 406 forcreating and registering an account in order to link the account to thevoice profile is illustrated by an exemplary method 300 of FIG. 3, whichare further described in conjunction with system 400 of FIG. 4.

During operation 202 of method 200, the voice command device 402 maydetect a first voice command 412 to perform an action. For example, asmart speaker within a home of a user may detect the first voice commandof “please pay my phone bill with Phone Company A” spoken by the user.The voice command device 402 may utilize speech recognitionfunctionality to determine that the user is requesting the performanceof an action to pay a phone bill associated with a bill payment servicefor Phone Company A. The voice command device 402 may also utilize thespeech recognition functionality to determine first voicecharacteristics of the first voice command. The first voicecharacteristics may correspond to phonation, pitch, loudness, texture,tone, speech rate, etc. The voice command device 402 may compare thefirst voice characteristics to voice profiles of users, which aremaintained by the voice command device 402. A voice profile of a usermay comprise voice characteristics of that user, which can be matchedwith voice characteristics of voice commands, such as the first voicecharacteristics of the first voice command. If the voice command device402 does not identify a voice profile matching the first voicecharacteristics of the first voice command, then the voice commanddevice 402 may generate a voice profile for the user.

During operation 204 of method 200, the voice command device 402identifies a voice profile associated with the user based upon the firstvoice characteristics of the first voice command. For example, the firstvoice characteristics are used to query voice profiles maintained by thevoice command device 402 to identify the voice profile as having voicecharacteristics that are similar to the first voice characteristics.Once the voice profile is identified by the voice command device 402,the voice command device 402 and/or the communication device 404determine 414 whether the voice profile is linked to an accountassociated with the action (e.g., an account with the bill paymentservice for the Phone Company A). In some examples, account links,linking voice profiles to accounts, are maintained by the voice commanddevice 402, and thus the voice command device 402 may determine whetherthe voice profile is linked to the account.

In some examples, the communication device 404 may maintain the accountlinks, and thus the voice command device 402 may coordinate with thecommunication device 404 to determine whether the voice profile islinked to the account associated with the action. Accordingly, duringoperation 302 of method 300, the communication device 404 receives voiceprofile information of the voice profile for the user and a descriptionof the first voice command to perform the action (e.g., a texttranslation or other descriptive information of the first voice commandas opposed to the actual audio of the voice command) from the voicecommand device 402. The communication device 404 may determine whetheran account link, linking the voice profile to the account, exists.During operation 304 of method 300, the communication device 404transmits a request to the voice command device 402 to obtain anidentifier associated with a device 410 of the user for userauthentication and for creating the account through the device 410. Thecommunication device 404 transmits the request to the voice commanddevice 402 in response to the communication device 404 determining thatthe voice profile is not linked to the account associated with theaction. Accordingly, account creation will be facilitated for creatingand registering the account in order for the action to be performed.

During operation 206 of method 200, the voice command device 402 promptsthe user to provide the identifier associated with device 410 forcreating the account through the device 410. In some examples, the voicecommand device 402 may provide an audible message to the user in orderto request an identifier of a device through which the user would becapable of authenticating and creating the account. Various types ofidentifiers may be requested, such as a phone number of a smart phonethrough which the user could authenticate using authenticationfunctionality of the smart phone, an email address, a social networkprofile, or a variety of other identifiers that could be used totransmit information to the device 410 for authenticating and creatingthe account.

During operation 208 of method 200, in response to the voice commanddevice 402 receiving the identifier from the user (e.g., the user mayprovide a new voice command with the phone number of the device 410),the identifier is utilized by the voice command device 402 to facilitatethe creation of the account through the device 410. For example, thevoice command device 402 transmits a registration request 416 to thecommunication device 404. The registration request 416 may comprise thevoice profile information of the voice profile and/or the identifier ofthe device 410. The voice command device 402 may transmit theregistration request 416 to the communication device 404 for routing toan authentication service 406 (e.g., an identity online server) forfacilitating the creation of the account through the device 410. In someexamples, the voice command device 402 may associate the identifier withthe voice profile of the user.

During operation 306 of method 300, the communication device 404utilizes the identifier from the registration request 416 to facilitatecreation of the account through the device 410. The communication device404 may transmit a registration request 418 to the authenticationservice 406 for facilitating the creation of the account through thedevice 410. In some examples, the registration request 418 may comprisethe identifier of the device 410. In some examples, the registrationrequest 418 may comprise a public key so that user authentication andaccount creation can be performed in a secure manner.

In response to receiving the registration request 418, theauthentication service 406 may transmit a trigger push notificationcommand 420 to a messaging service 408. The trigger push notificationcommand 420 may comprise the identifier of the device 410 and a messagefor the messaging service 408 to transmit to the device 410 as a pushnotification 422. For example, the identifier may comprise the phonenumber of the device 410. The messaging service 408 may utilize thephone number to transmit the message to the device 410 for display onthe device 410. The message may request that the user authenticatethrough an authentication service user interface utilizingauthentication functionality of the device 410. For example, the device410 may perform facial recognition, speech recognition, fingerprintrecognition, request a password or pin, or perform other types ofauthentication in order to authenticate the user through theauthentication service user interface associated with the authenticationservice 406. In this way, the user may authenticate for creation andregistration of the account (authentication/registration 424) throughthe device 410.

Various account registration information 426 may be generated based uponthe user performing the authentication/registration 424 through thedevice 410 to create the account with the bill payment service. In someexamples, a session identifier may be generated based upon a sessionassociated with the user interacting with the authentication serviceuser interface of the authentication service 406. The accountregistration information 426 may comprise the session identifier, anauthentication key (e.g., the public key), and/or a global uniqueidentifier generated or associated with the user successfullyauthenticating through the device 410 with the authentication serviceuser interface of the authentication service 406. The authenticationservice 406 may store the authentication key (e.g., the public key)within a repository for utilization by an authenticator for subsequentauthentication of attempts to access the account with the service.

The authentication service 406 may transmit a notification 428 to thecommunication device 404 that the user created the account through thedevice 410. In some examples, the notification 428 may comprise theaccount registration information 426, which may be stored by thecommunication device 404 within an account link that links the voiceprofile to the account. For example, the global unique identifier andone or more authentication keys (e.g., the public key and acorresponding private key for the authenticator for subsequentauthentication attempts to access the account with the service) may bestored within the account link.

The communication device 404 may transmit the notification 428 to thevoice command device 402. In some examples, if the voice command device402 (e.g., as opposed to the communication device 404) maintains accountlinks, then the voice command device 402 may create the account linkbased upon the account registration information 426 within thenotification 428. The voice command device 402 may provide anotification to the user that the account link has been created and thatthe user can now provide voice commands in order to perform actionsrelating to the account with the bill payment service for the PhoneCompany A.

In some examples, the communication device 404 may be configured togenerate rules and/or levels of trust that may be used for registrationand/or subsequently performing actions on behalf of users after accountshave been created and registered. For example, the communication device404 may be configured to determine constraints for the rules and levelsof trust regarding allowing the device 410 to be used as anauthenticator for authenticating the user and/or how much the device 410can be trusted. The rules and/or levels of trust may be generated basedupon machine learning and/or other components that take intoconsideration network information, device information, distanceinformation (e.g., a greater distances between the voice command device402 and the device 410 may indicate a lower level of trust than if bothdevices were located near one another), and/or network hop information.The rules, levels of trust, and/or other information (e.g., attestationinformation from third party devices, network information, opt-insignatures, device identifiers, etc.) may be utilized after registrationto create authenticator type and association policies. In some examples,the machine learning may be used to detect if the device 410 is a newdevice type, any known vulnerabilities associated with the device 410,to check a current software version of the device 410, prompt for analert to upgrade the current software version of the device 410, and/orperform other actions based upon the constraints within the rules and/orlevels of trust.

In some embodiments, a policy broker associated with the authenticationservice 406 (e.g., a policy broker) may link the voice profile of theuser to multiple identifying factors, such as the device 410 used as anauthenticator, GPS device/information, an eSIM, a device ID of thedevice 410, etc. The policy broker may allow access to particularresources of devices (e.g., a multi-access edge computing (MEC) clientsuch as the communication device 404, the device 410, the voice commanddevice 402, or any other device such as a videogame console, atelevision, a tablet, etc.). The policy broker may utilize variouspolices in order to provide the user with access to particular MECresources and/or may redirect users to a particular device. For example,the user may be redirected to a device with a threshold amount ofperformance capabilities (e.g., a device with better performance thanother available devices), a device with a particular MEC configuration,a device that can satisfy certain OEM requirements, a 5G slice, a devicewith latency below a threshold (e.g., a videogame console with lowlatency enable), a mobile device with a SIM that can utilize a higherbandwidth slice than other devices, etc.

An embodiment of a voice command device 602 and a communication device604 facilitating the performance of an action by a service 608 isillustrated by an exemplary method 500 of FIG. 5, which is furtherdescribed in conjunction with system 600 of FIG. 6. During operation 502of method 500, the voice command device 602 may detect 612 a secondvoice command to perform an action associated with an account. Forexample, a user may say “please upgrade my internet connection withPhone Company A to the next fastest speed,” which may be detected 612 bythe voice command device 602. The voice command device 602 may utilizespeech recognition functionality to evaluate the second voice command inorder to determine that the user is requesting the performance of anaction to upgrade an internet connection to a next fastest speed througha bill payment service for the Phone Company A. The voice command device602 may also utilize the speech recognition functionality to evaluatethe second voice command in order to determine second voicecharacteristics of the second voice command. The second voicecharacteristics may correspond to phonation, pitch, loudness, texture,tone, speech rate, etc. The voice command device 602 may compare thesecond voice characteristics to voice profiles of users that aremaintained by the voice command device 602. A voice profile of a usermay comprise voice characteristics that can be matched with voicecharacteristics of voice commands, such as the second voicecharacteristics of the second voice command.

During operation 504 of method 500, the voice command device 602identifies a voice profile associated with the user based upon thesecond voice characters of the second voice command. For example, thesecond voice characteristics are used to query voice profiles maintainedby the voice command device 602 to identify the voice profile as havingvoice characteristics that are similar to the second voicecharacteristics. Once the voice profile is identified by the voicecommand device 602, the voice command device 602 and/or thecommunication device 604 determine 614 whether the voice profile islinked to an account associated with the action (e.g., an account withthe bill payment service for the Phone Company A). In some examples,account links, linking voice profiles to accounts, are maintained by thevoice command device 602, and thus the voice command device 602 maydetermine whether the voice profile is linked to the account. If thevoice command device 602 identifies the account link, then the voicecommand device 602 may transmit an action command to the communicationdevice 604, which may be used to facilitate the performance of theaction. The action command may comprise voice profile informationassociated with the voice profile and/or a description of the secondvoice command.

In some examples, the communication device 604 may maintain the accountlinks, and thus the voice command device 602 may coordinate with thecommunication device 604 to determine whether the voice profile islinked to the account associated with the action. For example, thecommunication device 604 receives the voice profile information and/orthe description of the second voice command from the voice commanddevice 602, and utilizes the voice profile information to determinewhether the account link exists.

During operation 506 of method 500 of FIG. 5, the account link, linkingthe voice profile to an account with a service capable of performing theaction (e.g., the bill payment service capable of upgrading the user'sinternet, or any other type of service linked to a user account), isidentified and used to facilitate the performance of the action. In someembodiments, in response to identifying the account link, anauthentication request 616 is transmitted to the authentication service606 in order to authenticate the user for performing the action. Theauthentication request 616 may comprise a global unique identifierand/or an authentication key (e.g., a public key) associated with theaccount link. In response to the communication device 604 determiningthat the authentication service 606 successfully authenticated the user(e.g., authenticating the global unique identifier and/or the publickey), the communication device 604 may transmit a perform action command620 to the service 608, such as the bill payment service for the PhoneCompany A. The perform action command 620 may comprise the voice profileinformation and/or the description of the second voice command (e.g., amessage that the user wants to perform the action through the service608 to upgrade the internet to the next fastest speed). In response tothe communication device 604 and/or the voice command device 602receiving a success notification generated from the service 608 that theservice 608 upgraded the internet of the user to the next fastest speed,the success notification may be provided to the user, such as through anaudible message provided by the voice command device 602. Once theservice 608 completes the action (or attempts to complete the action,but there is a failure or additional information is required), an actionresult 622 is provided from the service 608 to the communication device604. The communication device 604 may forward the action result 622 tothe voice command device 602 that will provide a notification to theuser based upon the action result 622 (e.g., a success notification, afailure notification, a request for additional information or detailsrequired to perform the action, etc.).

According to some embodiments, a method is provided. The method includesdetecting a first voice command to perform an action; identifying avoice profile associated with a user based upon first voicecharacteristics of the first voice command; in response to determiningthat the voice profile is not linked to an account associated with theaction, prompting the user for an identifier associated with a devicefor creating the account through the device; and in response toreceiving the identifier from the user, utilizing the identifier tofacilitate creation of the account through the device.

According to some embodiments, the method includes transmitting aregistration request associated with the identifier to a communicationdevice for routing to an authentication service for facilitating thecreation of the account through the device.

According to some embodiments, the registration request comprises voiceprofile information associated with the voice profile and theidentifier.

According to some embodiments, the method includes receiving anotification that the account was created through the device in responseto a push notification provided to the device by a messaging interfaceutilized by the authentication service for facilitating the creation ofthe account through the device.

According to some embodiments, the method includes in response toreceiving account registration information associated with the accountcreated through the device, utilizing the account registrationinformation to create an account link linking the voice profile with theaccount.

According to some embodiments, the method includes storing a globalunique identifier and an authentication key comprised within the accountregistration information into the account link.

According to some embodiments, the method includes in response toreceiving the identifier from the user, associating the identifier withthe voice profile.

According to some embodiments, the method includes detecting a secondvoice command to perform the action associated with the account;identifying the voice profile associated with the user based upon secondvoice characteristics of the second voice command; and determiningwhether an account link, linking the voice profile to the account,exists.

According to some embodiments, the method includes in response todetermining that the account link exists, utilizing the account link tofacilitate performance of the action.

According to some embodiments, the method includes transmitting anaction command comprising voice profile information associated with thevoice profile and the second voice command to a communication device,wherein the action command triggers the communication device to utilizean authentication service to authenticate the user based upon a globalunique identifier and an authentication key associated with the accountlink.

According to some embodiments, the action command triggers thecommunication device to transmit a perform action command to a serviceto perform the action.

According to some embodiments, the perform action command comprises thevoice profile information and the second voice command.

According to some embodiments, a non-transitory computer-readable mediumstoring instructions that when executed facilitate performance ofoperations, is provided. The operations include receiving voice profileinformation of a voice profile associated with a user and a first voicecommand by the user to perform an action; in response to determiningthat the voice profile is not linked to an account associated with theaction, transmitting a request to obtain an identifier associated with adevice of the user for creating the account through the device; and inresponse to receiving the identifier, utilizing the identifier tofacilitate creation of the account through the device.

According to some embodiments, the operations include transmitting aregistration request to an authentication service for facilitating thecreation of the account through the device.

According to some embodiments, the operations include receiving anotification that the account was created through the device in responseto a push notification provided to the device by a messaging interfaceutilized by the authentication service for facilitating the creation ofthe account through the device.

According to some embodiments, the operations include in response toreceiving account registration information associated with the accountcreated through the device, utilizing the account registrationinformation to create an account link linking the voice profile with theaccount.

According to some embodiments, the operations include receiving thevoice profile information and a second voice command by the user toperform the action; and in response to determining that the account linkexists, utilizing the account link to facilitate the performance of theaction.

According to some embodiments, the operations include utilizing anauthentication service to authenticate the user based upon a globalunique identifier and an authentication key associated with the accountlink; and transmitting a perform action command to a service to performthe action in response to successful authentication of the user by theauthentication service.

According to some embodiments, a system is provided. The systemcomprises a processor coupled to memory, the processor configured toexecute instructions to perform operations. The operations includedetecting a voice command to perform an action associated with anaccount; identifying a voice profile associated with a user based uponvoice characteristics of the voice command; and in response todetermining that an account link, linking the voice profile to theaccount, exists, utilizing the account link to facilitate performance ofthe action.

According to some embodiments, the operations include utilizing anauthentication service to authenticate the user based upon a globalunique identifier and an authentication key associated with the accountlink; and transmitting a perform action command to a service to performthe action in response to successful authentication of the user by theauthentication service.

FIG. 7 is an interaction diagram of a scenario 700 illustrating aservice 702 provided by a set of computers 704 to a set of clientdevices 710 via various types of transmission mediums. The computers 704and/or client devices 710 may be capable of transmitting, receiving,processing, and/or storing many types of signals, such as in memory asphysical memory states.

The computers 704 of the service 702 may be communicatively coupledtogether, such as for exchange of communications using a transmissionmedium 706. The transmission medium 706 may be organized according toone or more network architectures, such as computer/client,peer-to-peer, and/or mesh architectures, and/or a variety of roles, suchas administrative computers, authentication computers, security monitorcomputers, data stores for objects such as files and databases, businesslogic computers, time synchronization computers, and/or front-endcomputers providing a user-facing interface for the service 702.

Likewise, the transmission medium 706 may comprise one or moresub-networks, such as may employ different architectures, may becompliant or compatible with differing protocols and/or may interoperatewithin the transmission medium 706. Additionally, various types oftransmission medium 706 may be interconnected (e.g., a router mayprovide a link between otherwise separate and independent transmissionmedium 706).

In scenario 700 of FIG. 7, the transmission medium 706 of the service702 is connected to a transmission medium 708 that allows the service702 to exchange data with other services 702 and/or client devices 710.The transmission medium 708 may encompass various combinations ofdevices with varying levels of distribution and exposure, such as apublic wide-area network and/or a private network (e.g., a virtualprivate network (VPN) of a distributed enterprise).

In the scenario 700 of FIG. 7, the service 702 may be accessed via thetransmission medium 708 by a user 712 of one or more client devices 710,such as a portable media player (e.g., an electronic text reader, anaudio device, or a portable gaming, exercise, or navigation device); aportable communication device (e.g., a camera, a phone, a wearable or atext chatting device); a workstation; and/or a laptop form factorcomputer. The respective client devices 710 may communicate with theservice 702 via various communicative couplings to the transmissionmedium 708. As a first such example, one or more client devices 710 maycomprise a cellular communicator and may communicate with the service702 by connecting to the transmission medium 708 via a transmissionmedium 707 provided by a cellular provider. As a second such example,one or more client devices 710 may communicate with the service 702 byconnecting to the transmission medium 708 via a transmission medium 709provided by a location such as the user's home or workplace (e.g., aWiFi (Institute of Electrical and Electronics Engineers (IEEE) Standard802.11) network or a Bluetooth (IEEE Standard 802.15.1) personal areanetwork). In this manner, the computers 704 and the client devices 710may communicate over various types of transmission mediums.

FIG. 8 presents a schematic architecture diagram 800 of a computer 704that may utilize at least a portion of the techniques provided herein.Such a computer 704 may vary widely in configuration or capabilities,alone or in conjunction with other computers, in order to provide aservice such as the service 702.

The computer 704 may comprise one or more processors 810 that processinstructions. The one or more processors 810 may optionally include aplurality of cores; one or more coprocessors, such as a mathematicscoprocessor or an integrated graphical processing unit (GPU); and/or oneor more layers of local cache memory. The computer 704 may comprisememory 802 storing various forms of applications, such as an operatingsystem 804; one or more computer applications 806; and/or various formsof data, such as a database 808 or a file system. The computer 704 maycomprise a variety of peripheral components, such as a wired and/orwireless network adapter 814 connectible to a local area network and/orwide area network; one or more storage components 816, such as a harddisk drive, a solid-state storage device (SSD), a flash memory device,and/or a magnetic and/or optical disk reader.

The computer 704 may comprise a mainboard featuring one or morecommunication buses 812 that interconnect the processor 810, the memory802, and various peripherals, using a variety of bus technologies, suchas a variant of a serial or parallel AT Attachment (ATA) bus protocol; aUniform Serial Bus (USB) protocol; and/or Small Computer SystemInterface (SCI) bus protocol. In a multi-bus scenario, a communicationbus 812 may interconnect the computer 704 with at least one othercomputer. Other components that may optionally be included with thecomputer 704 (though not shown in the schematic architecture diagram 800of FIG. 8) include a display; a display adapter, such as a graphicalprocessing unit (GPU); input peripherals, such as a keyboard and/ormouse; and a flash memory device that may store a basic input/outputsystem (BIOS) routine that facilitates booting the computer 704 to astate of readiness.

The computer 704 may operate in various physical enclosures, such as adesktop or tower, and/or may be integrated with a display as an“all-in-one” device. The computer 704 may be mounted horizontally and/orin a cabinet or rack, and/or may simply comprise an interconnected setof components. The computer 704 may comprise a dedicated and/or sharedpower supply 818 that supplies and/or regulates power for the othercomponents. The computer 704 may provide power to and/or receive powerfrom another computer and/or other devices. The computer 704 maycomprise a shared and/or dedicated climate control unit 820 thatregulates climate properties, such as temperature, humidity, and/orairflow. Many such computers 704 may be configured and/or adapted toutilize at least a portion of the techniques presented herein.

FIG. 9 presents a schematic architecture diagram 900 of a client device710 whereupon at least a portion of the techniques presented herein maybe implemented. Such a client device 710 may vary widely inconfiguration or capabilities, in order to provide a variety offunctionality to a user such as the user 712. The client device 710 maybe provided in a variety of form factors, such as a desktop or towerworkstation; an “all-in-one” device integrated with a display 908; alaptop, tablet, convertible tablet, or palmtop device; a wearable devicemountable in a headset, eyeglass, earpiece, and/or wristwatch, and/orintegrated with an article of clothing; and/or a component of a piece offurniture, such as a tabletop, and/or of another device, such as avehicle or residence. The client device 710 may serve the user in avariety of roles, such as a workstation, kiosk, media player, gamingdevice, and/or appliance.

The client device 710 may comprise one or more processors 910 thatprocess instructions. The one or more processors 910 may optionallyinclude a plurality of cores; one or more coprocessors, such as amathematics coprocessor or an integrated graphical processing unit(GPU); and/or one or more layers of local cache memory. The clientdevice 710 may comprise memory 901 storing various forms ofapplications, such as an operating system 903; one or more userapplications 902, such as document applications, media applications,file and/or data access applications, communication applications such asweb browsers and/or email clients, utilities, and/or games; and/ordrivers for various peripherals. The client device 710 may comprise avariety of peripheral components, such as a wired and/or wirelessnetwork adapter 906 connectible to a local area network and/or wide areanetwork; one or more output components, such as a display 908 coupledwith a display adapter (optionally including a graphical processing unit(GPU)), a sound adapter coupled with a speaker, and/or a printer; inputdevices for receiving input from the user, such as a keyboard 911, amouse, a microphone, a camera, and/or a touch-sensitive component of thedisplay 908; and/or environmental sensors, such as a global positioningsystem (GPS) receiver 919 that detects the location, velocity, and/oracceleration of the client device 710, a compass, accelerometer, and/orgyroscope that detects a physical orientation of the client device 710.Other components that may optionally be included with the client device710 (though not shown in the schematic architecture diagram 900 of FIG.9) include one or more storage components, such as a hard disk drive, asolid-state storage device (SSD), a flash memory device, and/or amagnetic and/or optical disk reader; and/or a flash memory device thatmay store a basic input/output system (BIOS) routine that facilitatesbooting the client device 710 to a state of readiness; and a climatecontrol unit that regulates climate properties, such as temperature,humidity, and airflow.

The client device 710 may comprise a mainboard featuring one or morecommunication buses 912 that interconnect the processor 910, the memory901, and various peripherals, using a variety of bus technologies, suchas a variant of a serial or parallel AT Attachment (ATA) bus protocol;the Uniform Serial Bus (USB) protocol; and/or the Small Computer SystemInterface (SCI) bus protocol. The client device 710 may comprise adedicated and/or shared power supply 918 that supplies and/or regulatespower for other components, and/or a battery 904 that stores power foruse while the client device 710 is not connected to a power source viathe power supply 918. The client device 710 may provide power to and/orreceive power from other client devices.

FIG. 10 illustrates an example environment 1000, in which one or moreembodiments may be implemented. In some embodiments, environment 1000may correspond to a Fifth Generation (“5G”) network, and/or may includeelements of a 5G network. In some embodiments, environment 1000 maycorrespond to a 5G Non-Standalone (“NSA”) architecture, in which a 5Gradio access technology (“RAT”) may be used in conjunction with one ormore other RATs (e.g., a Long-Term Evolution (“LTE”) RAT), and/or inwhich elements of a 5G core network may be implemented by, may becommunicatively coupled with, and/or may include elements of anothertype of core network (e.g., an evolved packet core (“EPC”)). As shown,environment 1000 may include UE 1003, RAN 1010 (which may include one ormore Next Generation Node Bs (“gNBs”) 1011), RAN 1012 (which may includeone or more one or more evolved Node Bs (“eNBs”) 1013), and variousnetwork functions such as Access and Mobility Management Function(“AMF”) 1015, Mobility Management Entity (“MME”) 1016, Serving Gateway(“SGW”) 1017, Session Management Function (“SMF”)/Packet Data Network(“PDN”) Gateway (“PGW”)-Control plane function (“PGW-C”) 1020, PolicyControl Function (“PCF”)/Policy Charging and Rules Function (“PCRF”)1025, Application Function (“AF”) 1030, User Plane Function(“UPF”)/PGW-User plane function (“PGW-U”) 1035, Home Subscriber Server(“HSS”)/Unified Data Management (“UDM”) 1040, and Authentication ServerFunction (“AUSF”) 1045. Environment 1000 may also include one or morenetworks, such as Data Network (“DN”) 1050. Environment 1000 may includeone or more additional devices or systems communicatively coupled to oneor more networks (e.g., DN 1050), such as device 1051 corresponding to avoice command device, a communication device, an authentication service,a messaging service, a service, a client device capable of identifyingusers, a client device capable of authenticating users, etc.

The example shown in FIG. 10 illustrates one instance of each networkcomponent or function (e.g., one instance of SMF/PGW-C 1020, PCF/PCRF1025, UPF/PGW-U 1035, HSS/UDM 1040, and/or 1045). In practice,environment 1000 may include multiple instances of such components orfunctions. For example, in some embodiments, environment 1000 mayinclude multiple “slices” of a core network, where each slice includes adiscrete set of network functions (e.g., one slice may include a firstinstance of SMF/PGW-C 1020, PCF/PCRF 1025, UPF/PGW-U 1035, HSS/UDM 1040,and/or 1045, while another slice may include a second instance ofSMF/PGW-C 1020, PCF/PCRF 1025, UPF/PGW-U 1035, HSS/UDM 1040, and/or1045). The different slices may provide differentiated levels ofservice, such as service in accordance with different Quality of Service(“QoS”) parameters.

The quantity of devices and/or networks, illustrated in FIG. 10, isprovided for explanatory purposes only. In practice, environment 1000may include additional devices and/or networks, fewer devices and/ornetworks, different devices and/or networks, or differently arrangeddevices and/or networks than illustrated in FIG. 10. For example, whilenot shown, environment 1000 may include devices that facilitate orenable communication between various components shown in environment1000, such as routers, modems, gateways, switches, hubs, etc.Alternatively and/or additionally, one or more of the devices ofenvironment 1000 may perform one or more network functions described asbeing performed by another one or more of the devices of environment1000. Devices of environment 1000 may interconnect with each otherand/or other devices via wired connections, wireless connections, or acombination of wired and wireless connections. In some implementations,one or more devices of environment 1000 may be physically integrated in,and/or may be physically attached to, one or more other devices ofenvironment 1000.

UE 1003 may include a computation and communication device, such as awireless mobile communication device that is capable of communicatingwith RAN 1010, RAN 1012, and/or DN 1050. UE 1003 may be, or may include,a radiotelephone, a personal communications system (“PCS”) terminal(e.g., a device that combines a cellular radiotelephone with dataprocessing and data communications capabilities), a personal digitalassistant (“PDA”) (e.g., a device that may include a radiotelephone, apager, Internet/intranet access, etc.), a smart phone, a laptopcomputer, a tablet computer, a camera, a personal gaming system, an IoTdevice (e.g., a sensor, a smart home appliance, or the like), a wearabledevice, an Internet of Things (“IoT”) device, a Mobile-to-Mobile (“M2M”)device, or another type of mobile computation and communication device.UE 1003 may send traffic to and/or receive traffic (e.g., user planetraffic) from DN 1050 via RAN 1010, RAN 1012, and/or UPF/PGW-U 1035.

RAN 1010 may be, or may include, a 5G RAN that includes one or more basestations (e.g., one or more gNBs 1011), via which UE 1003 maycommunicate with one or more other elements of environment 1000. UE 1003may communicate with RAN 1010 via an air interface (e.g., as provided bygNB 1011). For instance, RAN 1010 may receive traffic (e.g., voice calltraffic, data traffic, messaging traffic, signaling traffic, etc.) fromUE 1003 via the air interface, and may communicate the traffic toUPF/PGW-U 1035, and/or one or more other devices or networks. Similarly,RAN 1010 may receive traffic intended for UE 1003 (e.g., from UPF/PGW-U1035, AMF 1015, and/or one or more other devices or networks) and maycommunicate the traffic to UE 1003 via the air interface.

RAN 1012 may be, or may include, a LTE RAN that includes one or morebase stations (e.g., one or more eNBs 1013), via which UE 1003 maycommunicate with one or more other elements of environment 1000. UE 1003may communicate with RAN 1012 via an air interface (e.g., as provided byeNB 1013). For instance, RAN 1010 may receive traffic (e.g., voice calltraffic, data traffic, messaging traffic, signaling traffic, etc.) fromUE 1003 via the air interface, and may communicate the traffic toUPF/PGW-U 1035, and/or one or more other devices or networks. Similarly,RAN 1010 may receive traffic intended for UE 1003 (e.g., from UPF/PGW-U1035, SGW 1017, and/or one or more other devices or networks) and maycommunicate the traffic to UE 1003 via the air interface.

AMF 1015 may include one or more devices, systems, Virtualized NetworkFunctions (“VNFs”), etc., that perform operations to register UE 1003with the 5G network, to establish bearer channels associated with asession with UE 1003, to hand off UE 1003 from the 5G network to anothernetwork, to hand off UE 1003 from the other network to the 5G network,manage mobility of UE 1003 between RANs 1010 and/or gNBs 1011, and/or toperform other operations. In some embodiments, the 5G network mayinclude multiple AMFs 1015, which communicate with each other via theN14 interface (denoted in FIG. 10 by the line marked “N14” originatingand terminating at AMF 1015).

MME 1016 may include one or more devices, systems, VNFs, etc., thatperform operations to register UE 1003 with the EPC, to establish bearerchannels associated with a session with UE 1003, to hand off UE 1003from the EPC to another network, to hand off UE 1003 from anothernetwork to the EPC, manage mobility of UE 1003 between RANs 1012 and/oreNBs 1013, and/or to perform other operations.

SGW 1017 may include one or more devices, systems, VNFs, etc., thataggregate traffic received from one or more eNBs 1013 and send theaggregated traffic to an external network or device via UPF/PGW-U 1035.Additionally, SGW 1017 may aggregate traffic received from one or moreUPF/PGW-Us 1035 and may send the aggregated traffic to one or more eNBs1013. SGW 1017 may operate as an anchor for the user plane duringinter-eNB handovers and as an anchor for mobility between differenttelecommunication networks or RANs (e.g., RANs 1010 and 1012).

SMF/PGW-C 1020 may include one or more devices, systems, VNFs, etc.,that gather, process, store, and/or provide information in a mannerdescribed herein. SMF/PGW-C 1020 may, for example, facilitate in theestablishment of communication sessions on behalf of UE 1003. In someembodiments, the establishment of communications sessions may beperformed in accordance with one or more policies provided by PCF/PCRF1025.

PCF/PCRF 1025 may include one or more devices, systems, VNFs, etc., thataggregate information to and from the 5G network and/or other sources.PCF/PCRF 1025 may receive information regarding policies and/orsubscriptions from one or more sources, such as subscriber databasesand/or from one or more users (such as, for example, an administratorassociated with PCF/PCRF 1025).

AF 1030 may include one or more devices, systems, VNFs, etc., thatreceive, store, and/or provide information that may be used indetermining parameters (e.g., quality of service parameters, chargingparameters, or the like) for certain applications.

UPF/PGW-U 1035 may include one or more devices, systems, VNFs, etc.,that receive, store, and/or provide data (e.g., user plane data). Forexample, UPF/PGW-U 1035 may receive user plane data (e.g., voice calltraffic, data traffic, etc.), destined for UE 1003, from DN 1050, andmay forward the user plane data toward UE 1003 (e.g., via RAN 1010,SMF/PGW-C 1020, and/or one or more other devices). In some embodiments,multiple UPFs 1035 may be deployed (e.g., in different geographicallocations), and the delivery of content to UE 1003 may be coordinatedvia the N9 interface (e.g., as denoted in FIG. 10 by the line marked“N9” originating and terminating at UPF/PGW-U 1035). Similarly,UPF/PGW-U 1035 may receive traffic from UE 1003 (e.g., via RAN 1010,SMF/PGW-C 1020, and/or one or more other devices), and may forward thetraffic toward DN 1050. In some embodiments, UPF/PGW-U 1035 maycommunicate (e.g., via the N4 interface) with SMF/PGW-C 1020, regardinguser plane data processed by UPF/PGW-U 1035.

HSS/UDM 1040 and AUSF 1045 may include one or more devices, systems,VNFs, etc., that manage, update, and/or store, in one or more memorydevices associated with AUSF 1045 and/or HSS/UDM 1040, profileinformation associated with a subscriber. AUSF 1045 and/or HSS/UDM 1040may perform authentication, authorization, and/or accounting operationsassociated with the subscriber and/or a communication session with UE1003.

DN 1050 may include one or more wired and/or wireless networks. Forexample, DN 1050 may include an Internet Protocol (“IP”)-based PDN, awide area network (“WAN”) such as the Internet, a private enterprisenetwork, and/or one or more other networks. UE 1003 may communicate,through DN 1050, with data servers, other UEs UE 1003, and/or to otherservers or applications that are coupled to DN 1050. DN 1050 may beconnected to one or more other networks, such as a public switchedtelephone network (“PSTN”), a public land mobile network (“PLMN”),and/or another network. DN 1050 may be connected to one or more devices,such as content providers, applications, web servers, and/or otherdevices, with which UE 1003 may communicate.

The device 1051 may include one or more devices, systems, VNFs, etc.,that perform one or more operations described herein. For example, thedevice 1051 detect voice commands, facilitate the creation of accounts,and/or perform actions associated with the accounts.

FIG. 11 illustrates an example Distributed Unit (“DU”) network 1100,which may be included in and/or implemented by one or more RANs (e.g.,RAN 1010, RAN 1012, or some other RAN). In some embodiments, aparticular RAN may include one DU network 1100. In some embodiments, aparticular RAN may include multiple DU networks 1100. In someembodiments, DU network 1100 may correspond to a particular gNB 1011 ofa 5G RAN (e.g., RAN 1010). In some embodiments, DU network 1100 maycorrespond to multiple gNBs 1011. In some embodiments, DU network 1100may correspond to one or more other types of base stations of one ormore other types of RANs. As shown, DU network 1100 may include CentralUnit (“CU”) 1105, one or more Distributed Units (“DUs”) 1103-1 through1103-N (referred to individually as “DU 1103,” or collectively as “DUs1103”), and one or more Radio Units (“RUs”) 1101-1 through 1101-M(referred to individually as “RU 1101,” or collectively as “RUs 1101”).

CU 1105 may communicate with a core of a wireless network (e.g., maycommunicate with one or more of the devices or systems described abovewith respect to FIG. 10, such as AMF 1015 and/or UPF/PGW-U 1035). In theuplink direction (e.g., for traffic from UEs UE 1003 to a core network),CU 1105 may aggregate traffic from DUs 1103, and forward the aggregatedtraffic to the core network. In some embodiments, CU 1105 may receivetraffic according to a given protocol (e.g., Radio Link Control (“RLC”))from DUs 1103, and may perform higher-layer processing (e.g., mayaggregate/process RLC packets and generate Packet Data ConvergenceProtocol (“PDCP”) packets based on the RLC packets) on the trafficreceived from DUs 1103.

In accordance with some embodiments, CU 1105 may receive downlinktraffic (e.g., traffic from the core network) for a particular UE 1003,and may determine which DU(s) 1103 should receive the downlink traffic.DU 1103 may include one or more devices that transmit traffic between acore network (e.g., via CU 1105) and UE 1003 (e.g., via a respective RU1101). DU 1103 may, for example, receive traffic from RU 1101 at a firstlayer (e.g., physical (“PHY”) layer traffic, or lower PHY layertraffic), and may process/aggregate the traffic to a second layer (e.g.,upper PHY and/or RLC). DU 1103 may receive traffic from CU 1105 at thesecond layer, may process the traffic to the first layer, and providethe processed traffic to a respective RU 1101 for transmission to UE1003.

RU 1101 may include hardware circuitry (e.g., one or more RFtransceivers, antennas, radios, and/or other suitable hardware) tocommunicate wirelessly (e.g., via an RF interface) with one or more UEsUE 1003, one or more other DUs 1103 (e.g., via RUs 1101 associated withDUs 1103), and/or any other suitable type of device. In the uplinkdirection, RU 1101 may receive traffic from UE 1003 and/or another DU1103 via the RF interface and may provide the traffic to DU 1103. In thedownlink direction, RU 1101 may receive traffic from DU 1103, and mayprovide the traffic to UE 1003 and/or another DU 1103.

RUs 1101 may, in some embodiments, be communicatively coupled to one ormore Multi-Access/Mobile Edge Computing (“MEC”) devices, referred tosometimes herein simply as (“MECs”) 1107. For example, RU 1101-1 may becommunicatively coupled to MEC 1107-1, RU 1101-M may be communicativelycoupled to MEC 1107-M, DU 1103-1 may be communicatively coupled to MEC1107-2, DU 1103-N may be communicatively coupled to MEC 1107-N, CU 1105may be communicatively coupled to MEC 1107-3, and so on. MECs 1107 mayinclude hardware resources (e.g., configurable or provisionable hardwareresources) that may be configured to provide services and/or otherwiseprocess traffic to and/or from UE 1003, via a respective RU 1101.

For example, RU 1101-1 may route some traffic, from UE 1003, to MEC1107-1 instead of to a core network (e.g., via DU 1103 and CU 1105). MEC1107-1 may process the traffic, perform one or more computations basedon the received traffic, and may provide traffic to UE 1003 via RU1101-1. In this manner, ultra-low latency services may be provided to UE1003, as traffic does not need to traverse DU 1103, CU 1105, and anintervening backhaul network between DU network 1100 and the corenetwork. In some embodiments, MEC 1107 may include, and/or may implementsome or all of the functionality described above with respect to thedevice 1051, such as a voice command device, a communication device, anauthentication service, a messaging service, a service, and/or a userdevice.

FIG. 12 is an illustration of a scenario 1200 involving an examplenon-transitory machine readable medium 1202. The non-transitory machinereadable medium 1202 may comprise processor-executable instructions 1212that when executed by a processor 1216 cause performance (e.g., by theprocessor 1216) of at least some of the provisions herein. Thenon-transitory machine readable medium 1202 may comprise a memorysemiconductor (e.g., a semiconductor utilizing static random accessmemory (SRAM), dynamic random access memory (DRAM), and/or synchronousdynamic random access memory (SDRAM) technologies), a platter of a harddisk drive, a flash memory device, or a magnetic or optical disc (suchas a compact disk (CD), a digital versatile disk (DVD), or floppy disk).The example non-transitory machine readable medium 1202 storescomputer-readable data 1204 that, when subjected to reading 1206 by areader 1210 of a device 1208 (e.g., a read head of a hard disk drive, ora read operation invoked on a solid-state storage device), express theprocessor-executable instructions 1212. In some embodiments, theprocessor-executable instructions 1212, when executed cause performanceof operations, such as at least some of the example method 200 of FIG.2, example method 300 of FIG. 3, and/or the example method 500 of FIG.5, for example. In some embodiments, the processor-executableinstructions 1212 are configured to cause implementation of a system,such as at least some of the example system 100 of FIG. 1, for example.

As used in this application, “component,” “module,” “system”,“interface”, and/or the like are generally intended to refer to acomputer-related entity, either hardware, a combination of hardware andsoftware, software, or software in execution. For example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. By way of illustration, both an application runningon a controller and the controller can be a component. One or morecomponents may reside within a process and/or thread of execution and acomponent may be localized on one computer and/or distributed betweentwo or more computers.

Unless specified otherwise, “first,” “second,” and/or the like are notintended to imply a temporal aspect, a spatial aspect, an ordering, etc.Rather, such terms are merely used as identifiers, names, etc. forfeatures, elements, items, etc. For example, a first object and a secondobject generally correspond to object A and object B or two different ortwo identical objects or the same object.

Moreover, “example” is used herein to mean serving as an example,instance, illustration, etc., and not necessarily as advantageous. Asused herein, “or” is intended to mean an inclusive “or” rather than anexclusive “or”. In addition, “a” and “an” as used in this applicationare generally be construed to mean “one or more” unless specifiedotherwise or clear from context to be directed to a singular form. Also,at least one of A and B and/or the like generally means A or B or both Aand B. Furthermore, to the extent that “includes”, “having”, “has”,“with”, and/or variants thereof are used in either the detaileddescription or the claims, such terms are intended to be inclusive in amanner similar to the term “comprising”.

Although the subject matter has been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the subject matter defined in the appended claims is notnecessarily limited to the specific features or acts described above.Rather, the specific features and acts described above are disclosed asexample forms of implementing at least some of the claims.

Furthermore, the claimed subject matter may be implemented as a method,apparatus, or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware, or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable device, carrier, or media. Of course, manymodifications may be made to this configuration without departing fromthe scope or spirit of the claimed subject matter.

Various operations of embodiments are provided herein. In an embodiment,one or more of the operations described may constitute computer readableinstructions stored on one or more computer readable media, which ifexecuted by a computing device, will cause the computing device toperform the operations described. The order in which some or all of theoperations are described should not be construed as to imply that theseoperations are necessarily order dependent. Alternative ordering may beimplemented without departing from the scope of the disclosure. Further,it will be understood that not all operations are necessarily present ineach embodiment provided herein. Also, it will be understood that notall operations are necessary in some embodiments.

Also, although the disclosure has been shown and described with respectto one or more implementations, alterations and modifications may bemade thereto and additional embodiments may be implemented based upon areading and understanding of this specification and the annexeddrawings. The disclosure includes all such modifications, alterationsand additional embodiments and is limited only by the scope of thefollowing claims. The specification and drawings are accordingly to beregarded in an illustrative rather than restrictive sense. In particularregard to the various functions performed by the above describedcomponents (e.g., elements, resources, etc.), the terms used to describesuch components are intended to correspond, unless otherwise indicated,to any component which performs the specified function of the describedcomponent (e.g., that is functionally equivalent), even though notstructurally equivalent to the disclosed structure. In addition, while aparticular feature of the disclosure may have been disclosed withrespect to only one of several implementations, such feature may becombined with one or more other features of the other implementations asmay be desired and advantageous for any given or particular application.

In the preceding specification, various example embodiments have beendescribed with reference to the accompanying drawings. It will, however,be evident that various modifications and changes may be made thereto,and additional embodiments may be implemented, without departing fromthe broader scope of the invention as set forth in the claims thatfollow. The specification and drawings are accordingly to be regarded inan illustrative rather than restrictive sense.

To the extent the aforementioned implementations collect, store, oremploy personal information of individuals, groups or other entities, itshould be understood that such information shall be used in accordancewith all applicable laws concerning protection of personal information.Additionally, the collection, storage, and use of such information canbe subject to consent of the individual to such activity, for example,through well known “opt-in” or “opt-out” processes as can be appropriatefor the situation and type of information. Storage and use of personalinformation can be in an appropriately secure manner reflective of thetype of information, for example, through various access control,encryption and anonymization techniques for particularly sensitiveinformation.

What is claimed is:
 1. A method comprising: detecting a first voice command to perform an action; identifying a voice profile associated with a user based upon first voice characteristics of the first voice command; in response to determining that the voice profile is not linked to an account associated with the action, prompting the user for an identifier associated with a device for creating the account through the device; and in response to receiving the identifier from the user, utilizing the identifier to facilitate creation of the account through the device.
 2. The method of claim 1, wherein facilitating the creation of the account comprises: transmitting a registration request associated with the identifier to a communication device for routing to an authentication service for facilitating the creation of the account through the device.
 3. The method of claim 2, wherein the registration request comprises voice profile information associated with the voice profile and the identifier.
 4. The method of claim 2, comprising: receiving a notification that the account was created through the device in response to a push notification provided to the device by a messaging interface utilized by the authentication service for facilitating the creation of the account through the device.
 5. The method of claim 1, comprising: in response to receiving account registration information associated with the account created through the device, utilizing the account registration information to create an account link linking the voice profile with the account.
 6. The method of claim 5, wherein the utilizing the account registration information comprises: storing a global unique identifier and an authentication key comprised within the account registration information into the account link.
 7. The method of claim 1, comprising: in response to receiving the identifier from the user, associating the identifier with the voice profile.
 8. The method of claim 1, comprising: detecting a second voice command to perform the action associated with the account; identifying the voice profile associated with the user based upon second voice characteristics of the second voice command; and determining whether an account link, linking the voice profile to the account, exists.
 9. The method of claim 8, comprising: in response to determining that the account link exists, utilizing the account link to facilitate performance of the action.
 10. The method of claim 9, wherein the utilizing the account link to facilitate performance of the action comprises: transmitting an action command comprising voice profile information associated with the voice profile and a description of the second voice command to a communication device, wherein the action command triggers the communication device to utilize an authentication service to authenticate the user based upon a global unique identifier and an authentication key associated with the account link.
 11. The method of claim 10, wherein the action command triggers the communication device to transmit a perform action command to a service to perform the action.
 12. The method of claim 11, wherein the perform action command comprises the voice profile information and the second voice command.
 13. A non-transitory computer-readable medium storing instructions that when executed facilitate performance of operations comprising: receiving voice profile information of a voice profile associated with a user and a description of a first voice command by the user to perform an action; in response to determining that the voice profile is not linked to an account associated with the action, transmitting a request to obtain an identifier associated with a device of the user for creating the account through the device; and in response to receiving the identifier, utilizing the identifier to facilitate creation of the account through the device.
 14. The non-transitory computer-readable medium of claim 13, wherein the operation for utilizing the identifier to facilitate creation of the account through the device comprises: transmitting a registration request to an authentication service for facilitating the creation of the account through the device.
 15. The non-transitory computer-readable medium of claim 14, wherein the operations comprise: receiving a notification that the account was created through the device in response to a push notification provided to the device by a messaging interface utilized by the authentication service for facilitating the creation of the account through the device.
 16. The non-transitory computer-readable medium of claim 13, wherein the operations comprise: in response to receiving account registration information associated with the account created through the device, utilizing the account registration information to create an account link linking the voice profile with the account.
 17. The non-transitory computer-readable medium of claim 16, wherein the operations comprise: receiving the voice profile information and a description of a second voice command by the user to perform the action; and in response to determining that the account link exists, utilizing the account link to facilitate the performance of the action.
 18. The non-transitory computer-readable medium of claim 17, wherein the operations comprise: utilizing an authentication service to authenticate the user based upon a global unique identifier and an authentication key associated with the account link; and transmitting a perform action command to a service to perform the action in response to successful authentication of the user by the authentication service.
 19. A system comprising: a memory comprising instructions; and a processor coupled to the memory, the processor configured to execute the instructions to facilitate performance of operations comprising: detecting a voice command to perform an action associated with an account; identifying a voice profile associated with a user based upon voice characteristics of the voice command; and in response to determining that an account link, linking the voice profile to the account, exists, utilizing the account link to facilitate performance of the action.
 20. The system of claim 19, wherein the operations comprise: utilizing an authentication service to authenticate the user based upon a global unique identifier and an authentication key associated with the account link; and transmitting a perform action command to a service to perform the action in response to successful authentication of the user by the authentication service. 