System and method for multi-modal authentication using speaker verification

ABSTRACT

A system authenticates an electronic transaction between a first user-operated device and a computer. The computer is configured to conduct electronic transactions. The system includes a voice browser and a session correlator. The voice browser is configured to receive and process user-spoken information from a second user-operated device, where the voice browser is programmed to compare a user-spoken transaction identifier to a computer generated transaction identifier, and to compare a user-spoken verification identifier to a voice print of the user. The session correlator is coupled to the voice browser and is configured to transmit an authentication message to the computer if the user-spoken transaction identifier matches the computer transaction identifier, and if the user-spoken verification identifier matches the voice print.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates generally to electronic transactions, andparticularly to verifying and authenticating electronic transactions.

2. Technical Background

The use and uses of electronic transactions in commerce are ubiquitous.Many transactions are being conducted on-line, between users andcommercial web-sites operating in the electronic market place. Theseweb-sites are sponsored by banks, stock brokerage firms, retailers,wholesalers and countless others. Other transactions are being conductedusing point-of-sale (POS) terminals in brick and mortar commercialestablishments. Often POS terminals include credit, debit, and checkauthorization capabilities. Still other transactions, such as cashwithdrawals, are being conducted using ATM machines provided byfinancial institutions. Some of these devices are used as stand-alonedevices and some are networked. Because of the sheer magnitude of cashbeing transferred electronically, security is absolutely critical. Bothfinancial and commercial institutions are concerned with the difficultyin obtaining verification and authentication during such transactions.Stolen credit cards are often used by criminal elements to fraudulentlypurchase goods and services, withdraw cash, or conduct other financialtransactions. Computer hackers are also a threat.

What is needed is a secure system and method for authenticating andverifying the identity of the parties involved in an electronictransaction. What is needed is a system and method for substantiallyeliminating the fraudulent usage of debit and credit cards duringelectronic transactions. A method and system for authentication isneeded to provide security during on-line transactions, ATMtransactions, and point-of-sale (POS) transactions.

SUMMARY OF THE INVENTION

The present invention addresses the needs described above. The presentinvention provides a secure system and method for providingauthenticating and verifying data during the course of an electronictransaction.

One aspect of the present invention is a computerized method forauthenticating an electronic transaction between a user and a computer.The computer is configured to conduct electronic transactions. Themethod includes: receiving a computer-generated transaction identifierfrom the computer via an electronic data link; receiving a user-spokentransaction identifier and a user-spoken verification identifiertransmitted by the user via a voice connection; comparing theuser-spoken transaction identifier with the computer transactionidentifier; comparing the user-spoken verification identifier with avoice print of the user; and transmitting an authentication message tothe computer if the user-spoken transaction identifier matches thecomputer-generated transaction identifier and if the user-spokenverification identifier matches the voice print.

In another aspect, the present invention includes a system forauthenticating an electronic transaction between a first user-operateddevice and a computer. The computer is configured to conduct electronictransactions. The system includes a voice browser configured to receiveand process user-spoken information when coupled to a seconduser-operated device. The voice browser is programmed to compare auser-spoken transaction identifier to a computer-generated transactionidentifier, and to compare a user-spoken verification identifier to avoice print of the user. A session correlator is coupled to the voicebrowser. The session correlator is configured to transmit anauthentication message to the computer if the user-spoken transactionidentifier matches the computer transaction identifier, and if theuser-spoken verification identifier matches the voice print.

In another aspect, the present invention includes a computerized voiceverification method for authenticating an electronic transaction betweena user and a computer. The computer is configured to conduct electronictransactions. The method includes: enrolling the user in a voiceverification system, whereby the user provides the system with a uservoice print; performing the electronic transaction; receiving atransaction identifier from the computer via an electronic data link inresponse to performing the electronic transaction; receiving auser-spoken transaction identifier and a user-spoken verificationidentifier transmitted by the user via a voice connection; comparing theuser-spoken transaction identifier with the computer transactionidentifier and the user-spoken verification identifier with a voiceprint of the user; and transmitting an authentication message to thecomputer if the user-spoken transaction identifier matches the computertransaction identifier, and if the user-spoken verification identifiermatches the voice print.

In yet another aspect, the present invention includes a computerizedmethod for controlling web-site navigation. The method includes:providing an authentication system including a voice recognition unitand a session correlator, the voice recognition unit having access to apre-registered voice print of the user, whereby the authenticationsystem is coupled to a user computer and a web-site during thecomputerized method; conducting a transaction between the user computerand the web-site, the web-site transmitting a transaction identifier tothe user computer and the authentication system in response to thetransaction; receiving a user-spoken transaction identifier and auser-spoken verification identifier via a telephonic connection, theauthentication system being programmed to compare the user-spokentransaction identifier to the transaction identifier and the user-spokenverification identifier to the pre-registered voice print; transmittingan authentication message to the web-site if the user-spoken transactionidentifier matches the transaction identifier and if the user-spokenverification identifier matches the voice print; receiving at least oneuser-spoken command for controlling web-site navigation, theauthentication system being programmed to convert the at least oneuser-spoken command into at least one computer-readable command; andtransmitting the at least one computer readable command to the web-site,the at least one computer readable command being executed by theweb-site, whereby the user controls web-site navigation of the web-siteby the at least one user-spoken command.

Additional features and advantages of the invention will be set forth inthe detailed description which follows, and in part will be readilyapparent to those skilled in the art from that description or recognizedby practicing the invention as described herein, including the detaileddescription which follows, the claims, as well as the appended drawings.

It is to be understood that both the foregoing general description andthe following detailed description are merely exemplary of theinvention, and are intended to provide an overview or framework forunderstanding the nature and character of the invention as it isclaimed. The accompanying drawings are included to provide a furtherunderstanding of the invention, and are incorporated in and constitute apart of this specification. The drawings illustrate various embodimentsof the invention, and together with the description serve to explain theprinciples and operation of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of the authentication system in accordancewith a first embodiment of the present invention;

FIG. 2 is a block diagram of the authentication system being used in anInternet web-site application in accordance with a second embodiment ofthe present invention;

FIG. 3 is a block diagram of the authentication system being used in anATM banking application in accordance with a third embodiment of thepresent invention;

FIG. 4 is a block diagram of the authentication system being used in apoint-of-sale application in accordance with a fourth embodiment of thepresent invention;

FIG. 5 is a flow chart of an authentication process in accordance withthe present invention;

FIG. 6 is a flow chart showing a method for controlling a web-site usingtelephonic voice menu commands; and

FIG. 7 is a flow chart showing a method for controlling a web-site usinga predetermined suite of voice commands.

DETAILED DESCRIPTION OF THE INVENTION

Reference will now be made in detail to the present exemplaryembodiments of the invention, examples of which are illustrated in theaccompanying drawings. Wherever possible, the same reference numberswill be used throughout the drawings to refer to the same or like parts.An exemplary embodiment of the authentication system of the presentinvention is shown in FIG. 1, and is designated generally throughout byreference numeral 10.

In accordance with the invention, the present invention includes amethod and system for authenticating an electronic transaction between afirst user-operated device, such as a personal computer, and acommercial institution computer, such as a web-site, configured toconduct electronic transactions. The system includes a voice browsercoupled to a second user-operated device, such as a telephone set. Thevoice browser is configured to receive and process user-spokeninformation from the second user operated device, whereby a user-spokentransaction identifier is compared to a transaction identifier, and auser-spoken verification identifier is compared to a voice print of theuser. A session correlator is coupled to the voice browser. The sessioncorrelator is configured to transmit an authentication message to thecomputer if the user-spoken transaction identifier matches the computertransaction identifier and if the user-spoken verification identifiermatches the voice print.

The system and method of the present invention provides secureauthentication and verification of user provided data during the courseof an electronic transaction. The system and method of the presentinvention substantially eliminates the fraudulent usage of debit andcredit cards during electronic transactions. The system and method ofthe present invention is effective in providing security during on-linetransactions, ATM transactions, and point-of-sale (POS) transactions.The system and method of the present invention also provides the userwith a “hands-free” way of navigating the web using a full-duplex voicecommunications medium (wire line telephone, wireless telephone, radio,and etc.).

As embodied herein, and depicted in FIG. 1, a block diagram of theauthentication system in accordance with a first embodiment of thepresent invention is disclosed. Authentication system 10 includes voicebrowser 20 and session correlator 30. Voice browser 20 includestelephony interface 200 connected to telephone network 12 and computer202. Computer 202 is coupled to voice print database 204, voice menuoption library 206, speech synthesizer 208, and speech recognition unit210. Session correlator 30 includes computer 300, server 302, andsession correlator software 304. In the example shown in FIG. 1, voicebrowser 20 and session correlator 30 are network resources disposedanywhere in the network backbone. One of ordinary skill in the pertinentart will recognize that browser 20 and correlator 30 may be co-locatedin a network data center. In that embodiment, computer 202 and computer300 may well be embodied in one computer.

It will be apparent to those of ordinary skill in the pertinent art thatmodifications and variations can be made to telephone interface 200 ofthe present invention depending on network 12. For example, if interface200 is connected to a T-1 line, interface 200 must accommodate abandwidth of about 1.5 Mb/s and 24 64 kb/s voice grade channels. Inanother embodiment, interface 200 is connected to several T-1 lines. Inyet another embodiment, interface 200 is connected to a T-3 line. Inthis embodiment, interface 200 must accommodate a bandwidth ofapproximately 45 mb/s and about 672 64 kb/s voice grade channels. Inanother embodiment, the telephone network is a wireless network, inwhich case interface 200 must be configured to transmit and receive RFsignals, and programmed to accommodate wireless access protocol (WAP).In another embodiment, the telephone network is an I/P network andinterface 200 must accommodate a voice-over-I/P protocol such thesession initiation protocol (SIP).

It will be apparent to those of ordinary skill in the pertinent art thatmodifications and variations can be made to server 302 depending onsystem component choices. One of ordinary skill in the art willrecognize that Internet 14 includes physical devices such as wires,cables, optical fiber, photonic components, routers, bridges, intranets,extranets, and other networks. Server 302 must be configuredaccordingly. Internet 14 also represents a communications medium thatsupports standard web protocols such as HTTP and a secure transportprotocol.

It will be apparent to those of ordinary skill in the pertinent art thatmodifications and variations can be made to voice menu option library206, speech synthesizer 208, speech recognition unit 210, and sessioncorrelator software 304 depending on the implementation software used indeveloping each of these modules. In one embodiment, all of thesemodules are resident in a Java application server located in a networkdata center. As discussed above, in other embodiments, sessioncorrelator software 304 is located in a separate application server inthe network backbone. Voice menu option library 206, speech synthesizer208, and recognition module 210 may be developed using any suitablescripting software development tool, such as Voice XML, IBM's directtalk, or by using the software tools marketed by Nuance, Inc.

It will be apparent to those of ordinary skill in the pertinent art thatmodifications and variations can be made to session correlator software304 depending on the degree of sophistication of voice browser 20. Inone embodiment, library 206 includes a suite of menu options forproviding authentication and verification. In this embodiment, sessioncorrelator module 304 is programmed to provide a simple interfacebetween the web-site server and voice browser 20. After a transaction isrequested, the web-site server provides the authentication identifierand credit card data to system 10, via session correlator 30. Sessioncorrelator 30 provides the web-site server with an authenticationmessage or a denial message, depending on the outcome of the comparisonmade by voice browser 20. In another embodiment, voice browser 20 isused to navigate web-pages. Thus, the complexity of session correlatormodule 304 is increased to provide an interface between the commercialcomputer and voice browser 20. Session correlator module 304 isprogrammed to provide current web-page data to voice browser 20 in orderfor voice browser 20 to provide the user with a suite of voice commandsthat are correlated with icons displayed on the current web-page.Session correlator module 304 is also programmed to transmit eachcommand in the suite of voice commands in a format recognized by theweb-site. One of ordinary skill in the art will also recognize thatmodifications and variations can be made to voice menu option library206 depending on the flexibility inherent in the user interface of voicebrowser 20. In one embodiment, voice menu option library 206 consists ofa database of menu options that is used in conjunction with voice printdatabase 204, speech synthesizer 208, and speech recognition software210 during the authentication process. Browser computer 202 accesseslibrary 206 to obtain the appropriate user prompt. Subsequently, theuser is prompted for the proper transaction identifier and verificationidentifier. In another embodiment, library 206 is more complex. Itincludes menu options for controlling web-site navigation by voicecommand. Speech recognition module 210 is programmed to interpretpossible user responses to the synthesized voice menu options. In oneembodiment, the menu options are designed to prompt the user to make aselection by using pre-selected words or phrases as suggested by theprompt. In another embodiment, the user employs numeric answers to makemenu selections. He speaks “one” when selecting menu option one, “two”when selecting menu option two, and so on.

In yet another embodiment, library 206 includes a suite of navigationcommands that allow the user to control web-site navigation. In oneversion, the suite is designed as a static set of commands. In anotherversion, the software is programmed to provide a dynamic suite ofcommands that adapt to changing web-site environments. In both versions,session correlator 30 provides library 206 with information regardingthe web-page that is currently being accessed by the user. In the staticversion, computer 202 accesses the pre-loaded static commands in library206. The static commands relate to cursor movement and mouse clickingoperations. In the dynamic version, computer 202 uses the web-pageinformation to generate and load a set of commands that reflect thecontents of the current web-page. The dynamic commands allow the user toselect any icon by speaking the name of the icon. For example, if theuser is navigating a search-engine, she says “Finance” to select the“Finance” icon displayed on the web-page.

As embodied herein, and depicted in FIG. 2, a block diagram ofauthentication system 10 being used in an Internet web-site applicationin accordance with a second embodiment of the present invention isdisclosed. In this application, user 40 employs his personal computer 44to make an electronic transaction with web-site 50. Personal computer 44is coupled to web-site 50 via the Internet 14. In this embodiment, thepresent invention is used, for example, in purchasing airline tickets,performing on-line banking, or participating in an on-line auction.Another important application involves music distribution. The presentinvention is used to authenticate users so that they may download musicfiles to their personal computer or their music player. The aboveapplications are representative examples, and the present inventionshould not be construed as being limited by them.

In response to the user's request for a transaction, web-site 50provides the user with an authentication identifier. The user dials apredetermined number corresponding to the authentication service toconnect his telephone set 42 to voice browser 20 via telephone network12. When the connection is made, voice browser 20 initiates the callwith a voice prompt. In response, user 40 provides voice browser 20 withthe transaction identifier received from the web-site, and thepre-registered verification identifier. After providing the user with atransaction identifier, server 52 transmits the transaction identifierto authentication system 10 via the Internet 14. If the two transactionidentifiers match, and the verification data provided by the user iscorrect, session correlator 30 transmits an authentication message toweb-site 50 authorizing the transaction. The method of authenticatingand verifying an electronic transaction is described in more detailbelow, in conjunction with the flow diagram shown in FIG. 5.

As embodied herein, and depicted in FIG. 3, a block diagram of theauthentication system being used in an ATM banking application inaccordance with a third embodiment of the present invention isdisclosed. In this embodiment, the user employs ATM machine 60 toperform a financial electronic transaction, such as cash withdrawal or atransfer of funds between bank accounts. ATM machine 60 includes display62, keypad 64, speaker 66, and microphone 68. ATM machine 60 alsoincludes a slot for debit/credit card insertion, and a cash withdrawalslot. ATM machine is coupled to financial institution 70 by way of datalink 16. Speaker 66 and microphone 68 are coupled to voice browser 20via telephone network 12. Server 72 is coupled to session correlator 30via the Internet 14. In this embodiment, financial institution 70employs authentication system 10 to authenticate and verify thetransaction in a manner described in detail below. In anotherembodiment, ATM machine 60 is replaced by a teller operated computer.When a customer requests a transaction at the teller's window, thetransaction is conducted between the customer and the teller. To performthe authentication procedure, the customer provides his authenticationand verification data by speaking them into a microphone connected tothe teller's computer.

One of ordinary skill in the art will recognize that modifications andvariations can be made to data link 16 depending on the disposition ofATM machine 60. For example, if ATM machine 60 is located in the lobbyof a financial institution, data link 16 may include a direct connectionto bank computer 74. If ATM machine 60 is at a remote location, ATMmachine 60 may include a modem, in which case data link 16 is connectedto server 72 via a telephone network or the Internet.

As embodied herein, and depicted in FIG. 4, a block diagram of theauthentication system being used in a point-of-sale (POS) application inaccordance with a fourth embodiment of the present invention isdisclosed. This embodiment is very similar to the ATM embodimentdepicted in FIG. 3. POS terminal 80 replaces the ATM machine. POSterminal 80 includes microphone 82, speaker 84, credit card reader 86,an optional signature verification area 88, stylus 90, and display 92.In this embodiment, commercial institution 70 employs authenticationsystem 10 to authenticate and verify the purchase in a manner describedin detail below.

As embodied herein, and depicted in FIG. 5, a flow chart of theauthentication process in accordance with the present invention isdisclosed. In step s500, the user registers with authentication system10. Registration includes providing system 10 with the user's name and auser verification identifier, e.g. a voice print that biometricallyidentifies the user. The voice print is provided by having the userspeak a numerical identifier, such as his telephone number during aregistration session. The user's name or social security number couldalso be used when creating the voice print. Computer 202 (FIG. 1) usesrecognition module 210 to capture the voice print and the other userdata, and creates a user file in database 204. In another embodiment,the user also provides system 10 with payment information, whichincludes a credit/debit card number, and the card's expiration date. Inother embodiments more detailed user information is provided, such asuser address, e-mail address and other information. In step s502, theuser performs the electronic transaction with the commercial computer inaccordance with any one of the embodiments depicted in FIGS. 1–4. Afterthe transaction is conducted, the commercial computer generates atransaction identifier and transmits it to the user. The user must calland authenticate within a predetermined time period or the process flowis directed to step s516, and the transaction is denied. In theembodiment depicted in FIG. 5, the time period is five minutes. Toauthenticate, the user provides voice browser 20 a spoken transactionidentifier and a spoken verification identifier via the telephoneconnection. The spoken transaction identifier must match the transactionidentifier generated by the commercial institution's computer or thetransaction will not be authorized. Even if the transaction identifiersmatch, the spoken verification identifier must also match the voiceprint registered by the user in step s500. If both of the identifiersmatch system 10 generates an authentication message to the commercialinstitution in step s514. Upon receipt of the authentication message,the electronic transaction is completed.

As embodied herein, and depicted in FIG. 6, a flow chart showing amethod for controlling a web-site using telephonic voice menu commandsis disclosed. In step s600, the authentication procedure described aboveis performed. In step s602, voice browser 20 transmits a voice menu tothe user via the telephonic connection. In this embodiment, voicebrowser 20 provides the user with several distinct choices that can beselected by speaking the selected menu option, as described above. Afterthe user makes his selection in step s604, speech recognition module 210converts the user response into a computer-readable command. In steps608, session correlator 30 transmits the command and a sessionidentifier to the web-site. In one embodiment, as shown in FIG. 6, thesession identifier is the authentication message identifier itself. Thisprocess continues until the user is finished navigating the voice menu.

As embodied herein, and depicted in FIG. 7, a flow chart showing amethod for controlling a web-site using a predetermined suite of voicecommands is disclosed. The chart depicted in FIG. 7 assumes that theuser is a registered member of system 10. In step s700, the user isprovided with a suite of commands that are recognized by system 10. Inone embodiment, this step is performed using the voice menu systemdescribed above. This information can also be provided on-line, or byusing written instructions mailed to the user's home after registration.Before navigating a web-site using verbal commands, the user mustperform the authentication described above. In step s704, the useremploys a recognized verbal command to perform the desired web-sitenavigation action. As described above, in one embodiment the user speaksthe name of the icon he desires to select. In step s706, speechrecognition module 210 converts the spoken command into a machinereadable command. Subsequently, correlator 30 transmits themachine-readable command to the web-site for execution. To end thenavigation session, the user merely says “end” or some other wordindicating that the voice browsing session is over.

It will be apparent to those skilled in the art that variousmodifications and variations can be made to the present inventionwithout departing from the spirit and scope of the invention. Thus, itis intended that the present invention cover the modifications andvariations of this invention provided they come within the scope of theappended claims and their equivalents.

1. A computerized method for authenticating an electronic transactionbetween a user and a computer, the computer being configured to conductelectronic transactions, the method comprising: receiving acomputer-generated transaction identifier from the computer via anelectronic data link; receiving a user-spoken transaction identifier anda user-spoken verification identifier transmitted by the user via avoice connection; comparing the user-spoken transaction identifier withthe computer transaction identifier; comparing the user-spokenverification identifier with a voice print of the user; and transmittingan authentication message to the computer if the user-spoken transactionidentifier matches the computer-generated transaction identifier and ifthe user-spoken verification identifier matches the voice print.
 2. Themethod of claim 1, wherein the computer transaction identifier isgenerated by the computer in response to the electric transactionconducted between the user and the computer.
 3. The method of claim 1,further comprising the step of providing the user voice print and userpayment information prior to the electronic transaction.
 4. The methodof claim 3, wherein the user voice print is provided by the user byproviding a spoken telephone number to a voice recognition unit.
 5. Themethod of claim 3, wherein the user voice print is provided by the userby providing a spoken user name to a voice recognition unit.
 6. Themethod of claim 3, wherein the user payment information includes acredit card number and an associated credit card expiration date.
 7. Themethod of claim 1, wherein the step of receiving a user-spokentransaction identifier and the step of receiving a user-spokenverification identifier are performed within a predetermined time fromcompleting the electronic transaction.
 8. The method of claim 7, whereinthe predetermined time is about five minutes.
 9. The method of claim 1,wherein the electronic data link includes the Internet.
 10. The methodof claim 1, wherein the electronic data link includes a private network.11. The method of claim 1, wherein the computer is a system component ofa financial institution.
 12. The method of claim 11, wherein thefinancial institution is a bank.
 13. The method of claim 12, wherein theuser conducts the electronic transaction using an ATM machine.
 14. Themethod of claim 12, wherein the user conducts the electronic transactionby communicating with a bank teller.
 15. The method of claim 1, whereinthe user conducts the electronic transaction using a personal computer.16. The method of claim 1, wherein the user conducts the electronictransaction using a wireless device.
 17. The method of claim 1, whereinthe user conducts the electronic transaction using a hand-held device.18. The method of claim 1, wherein the computer is a system component ofan Internet web-site.
 19. The method of claim 18, further comprising:receiving at least one user-spoken command for controlling web-sitenavigation, the at least one user-spoken command being transmitted bythe user via a telephonic voice connection; converting the at least oneuser-spoken command into at least one computer readable command;transmitting the at least one computer readable command to the computer;and executing the at least one computer readable command, using thecomputer, whereby the user controls web-site navigation of the Internetweb-site by voice command via the telephonic voice connection.
 20. Themethod of claim 19, wherein the user is prompted by a voice menu systemto respond to voice menu options when transmitting the at least oneuser-spoken command.
 21. The method of claim 1, further comprising:providing at least one voice menu option to the user; processing atleast one user-spoken response to the at least one voice menu option,whereby the at least one user-spoken response is transformed into atleast one computer-readable response; transmitting the at least onecomputer-readable response to the computer; and executing the at leastone computer response, using the computer, whereby the user controls thecomputer by voice command.
 22. The method of claim 1, wherein theuser-spoken transaction identifier and the user-spoken verificationidentifier are transmitted by a telephonic voice connection.
 23. Themethod of claim 1, wherein the electronic transaction includes anon-line purchase of goods or services.
 24. The method of claim 1,wherein the electronic transaction includes a banking transaction. 25.The method of claim 17 wherein the electronic transaction includesdownloading music files.
 26. The method of claim 1, wherein theelectronic transaction includes a point-of-sale transaction.
 27. Asystem for authenticating an electronic transaction between a firstuser-operated device and a computer, the computer being configured toconduct electronic transactions, the system comprising: a voice browserconfigured to receive and process user-spoken information from a seconduser-operated device, the voice browser being programmed to compare auser-spoken transaction identifier to a computer generated transactionidentifier, and to compare a user-spoken verification identifier to avoice print of the user; and a session correlator coupled to the voicebrowser, the session correlator being configured to transmit anauthentication message to the computer if the user-spoken transactionidentifier matches the computer transaction identifier, and if theuser-spoken verification identifier matches the voice print.
 28. Thesystem of claim 27, wherein the voice browser further comprises: a voicerecognition unit coupled to the second user-operated device via anetwork, the voice recognition unit being configured to recognizeaudible tones transmitted over the network; and a database coupled tothe voice recognition unit, the database being configured to store thevoice print of the user and payment information associated with thevoice print.
 29. The system of claim 28, wherein the voice recognitionunit recognizes both spoken input and DTMF input.
 30. The system ofclaim 28, further comprising a telephony interface unit coupled to thevoice recognition unit, the telephony interface unit being configured toconvert signals carried by the network into signals having a correctformat and amplitude.
 31. The system of claim 27, wherein the voicebrowser further comprises a voice menu system, the voice menu systemcomprising: a voice menu option library having stored therein at leastone voice menu option; a user interface transmitter configured totransmit the at least one voice menu option to the user, the userinterface transmitter including a synthesized speech unit for generatingthe at least one voice menu option, and a digitized audio unit forgenerating user-audible signaling tones; and a user interface receiverconfigured to recognize a plurality of user-spoken menu selectionsprovided by the user in response to the at least one voice menu option.32. The system of claim 27, wherein the voice browser includes a digitalsignal processor.
 33. The system of claim 27, wherein the voice browserincludes at least one software module resident in an Internet backbone.34. The system of claim 27, wherein the voice browser includes at leastone software module resident in a telecommunications switch.
 35. Thesystem of claim 27, wherein the voice browser includes at least onesoftware module resident in a computer disposed in a network datacenter.
 36. The system of claim 27, wherein the voice browser includesat least one software module resident in a computer disposed in acustomer premise equipment.
 37. The system of claim 27, wherein thevoice browser includes at least one software module resident in acomputer disposed in an intranet.
 38. The system of claim 27, whereinthe session correlator includes at least one software module resident inan Internet backbone.
 39. The system of claim 27, wherein the sessioncorrelator includes at least one software module resident in atelecommunications switch.
 40. The system of claim 27, wherein thesession correlator includes at least one software module resident in acomputer disposed in a network data center.
 41. The system of claim 27,wherein the session correlator includes at least one software moduleresident in a computer disposed in a customer premise equipment.
 42. Thesystem of claim 27, wherein the session correlator includes at least onesoftware module resident in a computer disposed in an intranet.
 43. Thesystem of claim 27, wherein the second user-operated device includes amicrophone.
 44. The system of claim 27, wherein the second user-operateddevice includes a telephone set.
 45. The system of claim 44, wherein thetelephone set is a wireless telephone.
 46. The system of claim 45,wherein the wireless telephone is configured to use a wireless accessprotocol.
 47. The system of claim 27, wherein the computer transactionidentifier is generated by the computer in response to the electronictransaction conducted between the user and the computer.
 48. The systemof claim 27, wherein the electronic data link includes the Internet. 49.The system of claim 27, wherein the electronic data link includes aprivate network.
 50. The system of claim 27, wherein the computer is asystem component of a financial institution.
 51. The system of claim 50,wherein the financial institution is a bank.
 52. The system of claim 51,wherein the first user-operated device includes an ATM machine.
 53. Thesystem of claim 51, wherein the user conducts the electronic transactionby communicating with a bank teller.
 54. The system of claim 27, whereinthe first user-operated device includes a personal computer.
 55. Thesystem of claim 27, wherein the first user-operated device includes awireless device.
 56. The system of claim 27, wherein the firstuser-operated device includes a hand-held device.
 57. The system ofclaim 27, wherein the computer is a system component of an Internetweb-site.
 58. The system of claim 27, further comprising: a userauthentication input unit coupled to the first user-operated device andthe session correlator, the user authentication unit being configured toaccept a user name and a user password from the user; a database coupledto the user authentication input unit, the database being configured tostore an authentic user name and an authentic user password; and a userauthenticator coupled to the user authentication input unit, thedatabase, and the session correlator, the user authenticator beingprogrammed to compare the user name to the authentic user name, and tocompare the user password to the authentic user password, whereby theuser authenticator provides the session correlator with a transactiondenial message if the user name does not match the authentic user name,or the user password does not match the authentic user password.
 59. Thesystem of claim 27, wherein the electronic transaction includes anon-line purchase of goods or services.
 60. The system of claim 27,wherein the electronic transaction includes a banking transaction. 61.The system of claim 27, wherein the electronic transaction includesdownloading music files.
 62. The system of claim 27, wherein theelectronic transaction includes a point-of-sale transaction.
 63. Acomputerized voice verification method for authenticating an electronictransaction between a user and a computer, the computer being configuredto conduct electronic transactions, the method comprising: enrolling theuser in a voice verification system, whereby the user provides thesystem with a user voice print; performing the electronic transaction;receiving a transaction identifier from the computer via an electronicdata link in response to performing the electronic transaction;receiving a user-spoken transaction identifier and a user-spokenverification identifier transmitted by the user via a voice connection;comparing the user-spoken transaction identifier with the computertransaction identifier and the user-spoken verification identifier witha voice print of the user; and transmitting an authentication message tothe computer if the user-spoken transaction identifier matches thecomputer transaction identifier, and if the user-spoken verificationidentifier matches the voice print.
 64. The method of claim 63, whereina transaction denied message is transmitted to the computer if theuser-spoken transaction identifier does not match the computertransaction identifier, or if the user-spoken verification identifierdoes not match the voice print.
 65. A computerized method forcontrolling web-site navigation, the method comprising: providing anauthentication system including a voice recognition unit and a sessioncorrelator, the voice recognition unit having access to a pre-registeredvoice print of the user, whereby the authentication system is coupled toa user computer and a web-site during the computerized method;conducting a transaction between the user computer and the web-site, theweb-site transmitting a transaction identifier to the user computer andthe authentication system in response to the transaction; receiving auser-spoken transaction identifier and a user-spoken verificationidentifier via a telephonic connection, the authentication system beingprogrammed to compare the user-spoken transaction identifier to thetransaction identifier and the user-spoken verification identifier tothe pre-registered voice print; transmitting an authentication messageto the web-site if the user-spoken transaction identifier matches thetransaction identifier and if the user-spoken verification identifiermatches the voice print; receiving at least one user-spoken command forcontrolling web-site navigation, the authentication system beingprogrammed to convert the at least one user-spoken command into at leastone computer-readable command; and transmitting the at least onecomputer-readable command to the web-site, the at least onecomputer-readable command being executed by the web-site, whereby theuser controls web-site navigation of the web-site by the at least oneuser-spoken command.
 66. The method of claim 65, wherein the at leastone user-spoken command includes a plurality of user-spoken commands.67. The method of claim 65, wherein the plurality of user-spokencommands are transmitted by the user in response to a plurality of voicemenu options provided by the authentication unit.
 68. The method ofclaim 65, wherein a web navigation is denied message is transmitted tothe computer if the user-spoken transaction identifier does not matchthe computer transaction identifier, or if the user-spoken verificationidentifier does not match the voice print.