Voice control and telecommunications service integration

ABSTRACT

This disclosure describes techniques that facilitate selectively interacting with a computing resource based on receipt of an incoming voice command. Particularly, a voice control integration system may parse content of an incoming voice command to authenticate an identity of the client, and further determine an intended meaning of the incoming voice command. In doing so, the voice control integration system may interact with a computing resource to perform an action that fulfills a client request. Computing resources may be associated with service providers or client devices of a client. Further, the voice control integration system may authenticate a client identity based on a one or two-factor authentication protocol, of which one may correspond to a biometric analysis of the incoming voice command. Further, a second-factor of the two-factor authentication protocol may be implemented via a voice interaction device, another client device accessible to the client, or a combination of both.

RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.15/645,458, filed Jul. 10, 2017 and titled “Voice Control andTelecommunications Service Integration,” which claims the benefit ofU.S. Provisional Patent Application No. 62/360,845, filed on Jul. 11,2016, and titled “Voice Control and Telecommunication ServiceIntegration,” which are herein incorporated by reference in theirentirety.

BACKGROUND

Mobile telecommunications devices have evolved into highly-capablecomputational platforms that offer features and functionality thatextend beyond wireless voice communications. At present, consumers relygreatly upon accessing an increasingly diverse and growing number ofservices and capabilities via client devices, such as mobiletelecommunications devices. In some instances, consumers may accessdedicated software applications, remote servers or client devices, toaccess information on the Internet or send commands to Internet-based orlocal machine services. However, in a home or office setting, consumersmay have their extremities occupied and may not be able to accessnavigate through the user interfaces of such applications and devicesthrough physical input.

Further, service providers may develop and refine individual userinterfaces of software applications or services for the purpose ofproviding consumers with a seamless computing experience. That said, agrowing source of limitation and frustration for consumers is the sheerdiversity and growing number of customized user interfaces thatconsumers are required to learn, adapt, and navigate through in order toappreciate the services and capabilities of their computationalplatforms.

BRIEF DESCRIPTION OF THE DRAWINGS

The detailed description is set forth with reference to the accompanyingfigures. In the figures, the left-most digit(s) of a reference numberidentifies the figure in which the reference number first appears. Theuse of the same reference numbers in different figures indicates similaror identical items or features.

FIG. 1 illustrates a schematic view of a computing environment thatfacilitates an operation of a voice control integration system.

FIG. 2 illustrates a block diagram of a voice control integration systemthat may selectively automate an action associated with an incomingvoice command from a client.

FIG. 3 illustrates a block diagram of a voice interaction device 302that selectively receives and transmits audible communications from aclient.

FIGS. 4A, 4B, and 4C illustrate a block diagrams of steps relating to aclient interaction with the voice control integration system via a voiceinteraction device.

FIG. 5 illustrates a voice control integration system process forperforming at least one action associated with a computing resource thatis based at least in part on receipt of an incoming voice command from avoice interaction device.

FIG. 6 illustrates a voice control integration system process forperforming at least one action that is associated with a client accountthat is associated with a service provider.

FIG. 7 illustrates a voice control integration system process forperforming at least one action associated with a client deviceassociated with the client.

FIG. 8 illustrates a voice control integration system process forauthenticating a client identity based on a single-factor or two-factorauthentication protocol.

FIG. 9 illustrates a voice control integration system process forauthenticating a client identity via a two-factor authenticationprotocol.

DETAILED DESCRIPTION

This disclosure describes techniques that facilitate selectivelyinteracting with a computing resource based at least in part on receiptof a voice-initiated command. Particularly, a voice control integrationsystem is described that provides a client with a means for accessingmultiple services and computational capabilities. Typically, eachservice and computational capability may be associated with a computingresource. The voice control integration system may be configured toautomate and streamline access to each of the computing resources, thusforegoing an extensive client interaction that is typically associatedwith gaining access to a computing resource. By automating andstreamlining access to such computing resources, the voice controlintegration system may reduce an overall volume of communicationsbetween a client device and the underlying computing resource, which inturn may translate into a network bandwidth efficiency for theunderlying computing resource, an improved quality of user experience,an improved quality of service experience, or any combination thereof.

In various examples, the voice control integration system may establisha communicative connection with a computing resource of a serviceprovider or a client device associated with a client. In doing so, thevoice control integration system may perform one or more actionsassociated with a service of a service provider, or a computationalcapability of the client device. In a non-limiting example, thecomputing resource may correspond to a server of a service provider,such as a telecommunications service provider. In other examples, thecomputing resource may correspond to a client device that is associatedwith the client, such as an entertainment system, a television system, athermostat, or any client device that may be communicatively coupled tothe voice control integration system via one or more communicationnetworks.

Moreover, the voice control integration system may receive an incomingvoice command via a voice interaction device that is communicativelycoupled to the voice control integration system. The voice interactiondevice may include a speaker component and a microphone component thatselectively transmits and receives audible communications to and from aclient. The voice interaction device may further include one or morenetwork interfaces that facilitate a communicative coupling with thevoice control integration system, and in some instances, computingresources associated with a service provider or computing resourcesassociated with a client. In some examples, the voice interaction devicemay be an integrated component of a client device, or a client devicethat is located within a predetermined proximity of the client. Theproximity of the voice interaction device to the client is based atleast in part on an ability of the voice interaction device to capturean incoming voice command from the client.

In a non-limiting example, the voice control integration system mayreceive an incoming voice command that relates to an operation of aclient device subscribed to a telecommunications service of atelecommunications service provider. In this example, a client mayenunciate a voice command that requests a change to a product setting ofa client device. The voice control integration system may parse contentof the incoming voice command to authenticate an identity of the client,and further determine an intended meaning of the incoming voice command.In some examples, the voice control integration system may parse contentof the incoming voice command via at least one of a natural languageprocessing algorithm or a natural language understanding algorithm todetermine an intended meaning. In response to doing so, the voicecontrol integration system may interact with a computing resource of thetelecommunications service provider to perform at least one action thatfulfills the client request.

Moreover, the voice control integration system may be configured toauthenticate a client identity based on a single-factor authenticationprotocol, or alternatively a two-factor authentication protocol. Thesingle-factor authentication protocol may correspond to an initialbiometric analysis of the incoming voice command. Alternatively, thesingle factor authentication protocol may correspond to a request for aclient to audibly respond to a phrase or question transmitted by a voiceinteraction device. A selection between a single-factor or two-factorauthentication protocol may be based on assignment by one of a serviceprovider or client, whomever has ownership or control of the underlyingcomputing resource.

Additionally, the voice control integration system may include a datastore that records a selection of a single-factor or two-factorauthentication protocol for each computing resource. In some examples,the data store may include an indication of a single-factor ortwo-factor authentication protocol for all actions associated with aparticular computing resource. In other examples, the data store mayinclude an additional level of granularity by indicating that atwo-factor authentication protocol is associated to a portion of, butnot all, client interactions with a computing resource. For example, thedata store may include an indication that assigns a two-factorauthentication protocol for particular interactions that involve clientsensitive or service provider sensitive data, such as financialdistributions, adjustments to account settings, or adjustments toproduct settings. In this example, a single-factor authenticationprotocol may be assigned to all other client interactions with thatparticular computing resource.

In some examples, a two-factor authentication protocol may beimplemented via the voice interaction device, another client device thatis accessible to the client, or a combination of both. For example, thetwo-factor authentication protocol may request that a client audiblyrespond to a phrase or question that is delivered by the voiceinteraction device. Alternatively, the two-factor authenticationprotocol may involve the voice interaction device delivering a requestfor the client to respond to a question associated with multimediacontent presented on another client device.

The techniques described herein may be implemented in a number ofcontexts. Several example implementations and context are provided withreference to the following figures. Further, the term “techniques,” asused herein, may refer to system(s), method(s), computer-readableinstruction(s), module(s)m algorithms, hardware logic, and/oroperation(s) as permitted by the context described above and throughoutthe document.

FIG. 1 illustrates a schematic view of a computing environment 100 thatfacilitates an operation of a voice control integration system 102. Invarious examples, the voice control integration system 102 mayfacilitate selectively interacting with a computing resource, based onincoming voice command 104 of a client 106. Particularly, the voicecontrol integration system 102 may parse content of an incoming voicecommand 104 to authenticate an identity of the client, and furtherdetermine an intended meaning of the incoming voice command 104. Indoing so, the voice control integration system 102 may interact with acomputing resource to perform an action that fulfills a requestassociated with the incoming voice command 104. In some examples, thecomputing resources may correspond to one or more server(s)108(1)-108(N) of a service provider, or one or more client device(s)110(1)-110(N) associated with a client.

In the illustrated example, the client 106 may vocalize an incomingvoice command 104 towards a voice interaction device 112. The incomingvoice command 104 may relate to a service of a service provider, or acomputational capability of one or more client device(s) 110(1)-110(N)associated with a client 106. Particularly, the incoming voice command104 may relate to adjusting a parameter of a service associated with aservice provider. In a non-limiting example, the service provider maycorrespond to a telecommunications service provider. In this instance,the parameter of the service provider may correspond to one of anaccount setting, a product setting, or a service setting. Similarly, theincoming voice command 104 may relate to adjusting a parameter of aclient device 110 associated with the client 106. The client device 110may correspond to one of an entertainment system, a television system, athermostat, or any client device that may be communicatively coupled tothe voice control integration system via one or more communicationnetworks. In this instance, the parameter of the client device 110 maycorrespond to activating the client device 110 or adjusting a setting ofthe client device 110.

Further, the voice interaction device 112 may selectively receive andtransmit audible communications to and from a client. Particularly, thevoice interaction device 112 may be communicatively coupled to the voicecontrol integration system 102 via one or more network(s) 114.

In some examples, the voice control integration system 102 may parsecontent of the incoming voice command to authenticate an identity of theclient, identify a server or a client device that is associated with theincoming voice command 104, and determine an intended meaning of theincoming voice command. Further, the voice control integration system102 may generate computer executable instructions that automateperformance of an action that fulfills a request associated with theincoming voice command 104. In some examples, the voice controlintegration system 102 may transmit a first data packet 116 to a server108 associated with a service provider, or a second data packet 118 to aclient device 110 associated with the client 106. The first data packet116 and the second data packet 118 may include computer executableinstructions that automate performance of the action that on the server108 or client device 110 respectively, whereby the action fulfills arequest associated with the incoming voice command. Upon doing so, thevoice control integration system 102 may further transmit a third datapacket 120 to the voice interaction device 112. The third data packet120 may include a message that is to be audibly output by the voiceinteraction device 112, the message relating to performance of an actionrelating to incoming voice command 104.

In some examples, the voice control integration system 102 mayauthenticate a client identity based on a single-factor or a two-factorauthentication protocol. The single-factor authentication protocol maybe based on a voice biometric analysis of the incoming voice command104. Further, a second-factor of a two factor authentication protocolmay involve transmitting data to a client device 110 of the client 106,along with a message to the client 106 via the voice interaction device112. The data transmitted to the client device 110 may includemultimedia content that is to be presented on a user interface of theclient device 110. Further, the message transmitted to the client 106may include a request for the client 106 to respond to a questionassociated with the presentation of the multimedia content on the clientdevice 110

In the illustrated example, the voice control integration system 102 mayoperate on one or more distributed computing resource(s) 122. The one ormore distributed computing resource(s) 122 may include one or morecomputing device(s) 124(1)-124(N) that operate in a cluster or otherconfiguration to share resources, balance load, increase performance,provide fail-over support or redundancy, or for other purposes. The oneor more computing device(s) 124(1)-124(N) may include one or moreinterfaces to enable communications with other networked devices, suchas the client device(s) 110(1)-110(N), via one or more network(s) 114.Further, the one or more network(s) 114 may include public networks suchas the Internet, private networks such as an institutional and/orpersonal intranet, or some combination of private and public networks.The one or more network(s) 114 can also include any type of wired and/orwireless network, including but not limited to local area network(LANs), wide area networks (WANs), satellite networks, cable networks,Wi-Fi networks, Wi-Max networks, mobile communications networks (e.g.3G, 4G, and so forth), or any combination thereof.

Furthermore, the client device(s) 110(1)-110(N) may include any sort ofelectronic device, such as a cellular phone, a smart phone, a tabletcomputer, an electronic reader, a media player, a gaming device, apersonal computer (PC), a laptop computer, etc. The client device(s)110(1)-110(N) may have a subscriber identity module (SIM), such as aneSIM, to identify the client device(s) 110(1)-110(N) to atelecommunication service provider network (also preferred to herein as“telecommunication network”).

FIG. 2 illustrates a block diagram of a voice control integration system202 that may selectively automate an action associated with an incomingvoice command from a client. The voice control integration system 202may facilitate selectively interacting with a computing resource, basedon an incoming voice command of a client. Further, the voice controlintegration system may provide a means to authenticate an identity of aclient, identify a server or client device that is associated with theincoming voice command, and determine an intended meaning of theincoming voice command. The server may correspond to a service provider,such as a telecommunications service provider. Further, the clientdevice may be associated with the client, such as an entertainmentsystem, a television system, a thermostat, or any client device that maybe communicatively coupled to the voice control integration system viaone or more communication networks.

In the illustrated example, the voice control integration system 202 maycorrespond to the voice control integration system 102. Further, thevoice control integration system 202 may include input/outputinterface(s) 204. The input/output interface(s) 204 may include any typeof output interface known in the art, such as a display (e.g. a liquidcrystal display), speakers, a vibrating mechanism, or a tactile feedbackmechanism. Input/output interface(s) 204 also include ports for one ormore peripheral devices, such as headphones, peripheral speakers, or aperipheral display. Further, the input/output interface(s) 204 mayfurther include a camera, a microphone, a keyboard/keypad, or atouch-sensitive display. A keyboard/keypad may be a push buttonnumerical dialing pad (such as on a typical telecommunication device), amulti-key keyboard (such as a conventional QWERTY keyboard), or one ormore other types of keys or buttons, and may also include ajoystick-like controller and/or designated navigation buttons, or thelike.

Additionally, the voice control integration system 202 may includenetwork interface(s) 206. The network interface(s) 206 may include anysort of transceiver known in the art. For example, the networkinterface(s) 206 may include a radio transceiver that performs thefunction of transmitting and receiving radio frequency communicationsvia an antenna. In addition, the network interface(s) 206 may alsoinclude a wireless communication transceiver and a near field antennafor communicating over unlicensed wireless Internet Protocol (IP)networks, such as local wireless data networks and personal areanetworks (e.g. Bluetooth or near field communication (NFC) networks).Further, the network interface(s) 206 may include wired communicationcomponents, such as an Ethernet port or a Universal Serial Bus (USB).

Further, the voice control integration system 202 may include one ormore processor(s) 208 that are operably connected to memory 210. In atleast one example, the one or more processor(s) 208 may be a centralprocessing unit(s) (CPU), graphics processing unit(s) (GPU), a both aCPU and GPU, or any other sort of processing unit(s). Each of the one ormore processor(s) 208 may have numerous arithmetic logic units (ALUs)that perform arithmetic and logical operations as well as one or morecontrol units (CUs) that extract instructions and stored content fromprocessor cache memory, and then executes these instructions by callingon the ALUs, as necessary during program execution. The one or moreprocessor(s) 208 may also be responsible for executing all computerapplications stored in the memory, which can be associated with commontypes of volatile (RAM) and/or nonvolatile (ROM) memory.

In some examples, memory 210 may include system memory, which may bevolatile (such as RAM), non-volatile (such as ROM, flash memory, etc.)or some combination of the two. The memory may also include additionaldata storage devices (removable ad/or non-removable) such as, forexample, magnetic disks, optical disks, or tape.

The memory 210 may further include non-transitory computer-readablemedia, such as volatile and nonvolatile, removable and non-removablemedia implemented in any method or technology for storage ofinformation, such as computer readable instructions, data structures,program modules, or other data. System memory, removable storage andnon-removable storage are all examples of non-transitorycomputer-readable media. Examples of non-transitory computer-readablemedia include, but are not limited to, RAM, ROM, EEPROM, flash memory orother memory technology, CD-ROM, digital versatile disks (DVD) or otheroptical storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other non-transitorymedium which can be used to store the desired information.

In the illustrated example, the memory 210 may include an operatingsystem 212, an input module 214, an authentication module 216, a devicedetection module 218, a request analysis module 220, and a data store222. The operating system 212 may be any operating system capable ofmanaging computer hardware and software resources. The input module 214,authentication module 216, device detection module 218, and a requestanalysis module 220 may include routines, program instructions, objects,and/or data structures that perform particular tasks or implementparticular abstract data types.

Moreover, the input module 214 may receive data associated with anincoming voice command from a client. The data may be received from avoice interaction device that is configured to detect voice commands ofa client that is within a predetermined distance of the voiceinteraction device.

The authentication module 216 may further include a first-factorauthentication component 224, a second-factor authentication component226, and an authentication score component 228. The first-factorauthentication component 224 may perform an initial authentication of anidentity of a client via a voice biometric analysis of the incomingvoice command. The voice biometric analysis may include an analysis ofan accent of a client voice, tonality of a client voice, a refraction ofsound of a client voice, frequency of a client voice, and pitch of aclient voice. Further, the first-factor authentication component 224 maycompare the voice biometric analysis of the incoming voice command witha voice biometric template of the client that is stored within the datastore 222. In this instance, authentication of the client identity maybe based on a similarity of the incoming voice command and the voicebiometric template. That is, a client identity may be verified on thebasis that a similarity of the incoming voice command and the voicebiometric template is greater than a predetermined similarity threshold.

Moreover, the second-factor authentication component 226 may selectivelyinitiate a two-factor authentication protocol to verify an identity of aclient. A selection between a single-factor or two-factor authenticationprotocol may be based on data within the data store 222. Selection of asingle-factor or two-factor authentication protocol may be based on thesensitivity of data that is being accessed by the voice controlintegration system 202. For example, with reference to a computingresource associated with a service provider, a two-factor authenticationprotocol may be assigned to particular actions that involve clientsensitive or service provider sensitive data, such as financialdistributions, adjustments to account settings, or adjustments toproduct settings.

Moreover, the second-factor authentication component 226 may determine adata format for presentation of the second-factor authenticationprotocol. In some examples, the data format may correspond to an audiodata format, an image data format, or a video data format. In oneexample, the second-factor authentication protocol may involverequesting that a client audibly respond to a phrase or questiontransmitted by a voice interaction device. In another example, thesecond-factor authentication component 226 may generate a second-factorauthentication protocol that presents a client with image data or videodata, followed by a request to respond to a question or phrase thatrelates to the image data or video data. For example, the second-factorauthentication component 226 may transmit a data packet to a clientdevice that is proximate to the client at a time that the clientbroadcasts the incoming voice command. The data packet may include theimage data or the video data of the second-factor authenticationprotocol. Further, the second-factor authentication component 225 maytransmit a message towards the client, via the voice interaction deviceor the client device. The message may request the client to respond to aquestion or phrase that is associated with a presentation of the imagedata or video data. A verification of the client identity may be basedat least in part on a correct response to the question or phrase, as itrelates to the image data or video data.

Furthermore, the authentication score component 228 may generate andassociate an authentication score with particular authentication schema,and particular types of access to computing resources. For example, theauthentication score component 228 may associate a first authenticationscore with a voice biometric analysis of an incoming voice command, anda second, relatively higher, authentication score with an authenticationschema that combines the voice biometric analysis and a second-factorauthentication. Further, the authentication score component 228 mayfurther associate an authentication score threshold for particular typesof access to particular computing resources. For example, theauthentication score threshold for access to a financial account may bedifferent (i.e. relatively higher) than an authentication scorethreshold to activate an entertainment system. The authentication scoresmay be set by the client or operator of the computing resource beingaccessed. In that regard, the authentication score component 228 mayselect an appropriate authentication scheme based at least in part onthe authentication score of the appropriate authentication scheme beinggreater than the authentication score threshold for the particular typeof access to the computing resource.

An authentication score, and corresponding authentication scorethreshold, may be alpha-numeric (i.e. 0 to 10, or A to F), descriptive(i.e. low, medium, or high), based on color (i.e. red, yellow, green),or any other suitable rating scale, or combination thereof. In someexamples, an authentication scheme having a high authentication score(i.e. 5 to 10, high, or green) may reflect a high level of confidence inan accuracy of the authentication scheme relative to an authenticationscheme with a low authentication score (i.e. 0 to 5, low, or, red). Thatis, an authentication scheme with a high authentication score is lesslikely to permit fraudulent access to a computing resource, whencompared to an authentication scheme with a relatively lowerauthentication score. Additionally, a high authentication scorethreshold may reflect a requirement for an authentication scheme with acorrespondingly high authentication score.

Additionally, the device detection module 218 may detect and identify aclient device based on proximity to the client at a point in time thatthe voice interaction device, or the voice control integration system,receives an incoming voice command. The purpose of doing so may be toprovide the client with data associated with a two-factor authenticationprotocol.

In some examples, the device detection module 218 may further detect andidentify a client device based on the data format that the client deviceis configured to present. For example, the second-factor authenticationcomponent 226 may generate a second-factor authentication protocol thatinvolves the presentation of image data. In this example, the devicedetection module 218 may detect and identify a client device that isconfigured to present image data, and that is proximate to the client ata point in time that the incoming voice command is delivered.

Moreover, the request analysis module 220 may parse content of anincoming voice command via a natural language processing algorithm and anatural language understanding algorithm to identify a computingresource that is associated with the incoming voice command, and anintended meaning of the incoming voice command. The request analysismodule 220 may further determine a request that is associated with theincoming voice command, based at least in part on the intended meaning.In some examples, the request may be explicitly stated within theincoming voice command. In other examples, the request may be implied,based on an intended meaning. For example, an incoming voice commandthat states “why did my cell phone stop working?” may implicitly requesta diagnostic check of the client device and/or a telecommunicationsservice associated with the client device.

Additionally, the data store 222 may store biometric templates of aclient voice print for the purpose of conducting a first-factorauthentication of a client identity. In some examples, the first-factorauthentication may be performed on the incoming voice command asdelivered by the client. Further, the client voice print may include apredefined template of an accent of a client voice, tonality of a clientvoice, a refraction of sound of a client voice, frequency of a clientvoice, and pitch of a client voice.

Further, the data store 222 may include a record of a selection of asingle-factor or two-factor authentication protocol for each computingresource. In some examples, the data store 222 may include an indicationof a single-factor or two-factor authentication protocol for all actionsassociated with a particular computing resource. In other examples, thedata store 222 may include an additional level of granularity byindicating that a two-factor authentication protocol may be associatedwith a portion of, but not all, client interactions with a computingresource. For example, the data store 222 may include an indication thatassigns a two-factor authentication protocol for particular interactionsthat involve client sensitive or service provider sensitive data, suchas financial distributions, adjustments to account settings, oradjustments to product settings. In this example, a single-factorauthentication protocol may be assigned to all other client interactionswith that particular computing resource.

Additionally, the data store 222 may include a client account that isassociated with the client. The client account may comprise a clientprofile that includes an indication of the service providers and clientdevices that are associated with a client, along with correspondingauthentication protocols. In some instances, the authenticationprotocols may be assigned to all actions associated with a computingresource of a service provider or client device. In other examples,authentication protocols may be assigned to particular actionsassociated with computing resources of a service provider or clientdevice. Further, a client account may include support data that may behelp fulfill a client request. The support data may include, but is notlimited to, diagnostic data associated with a client device or a serviceprovider, a current geographic location of a client device, clientprofile data such as financial data, client account data and servicehistory with a particular service provider, or a record of previousclient interactions with a particular service provider. For example,consider an incoming voice command that requests help with thefunctionality of a client device. The voice control integration system202 may determine that diagnostic test data associated with the clientdevice may help resolve the request. Thus, the voice control integrationsystem 202 may access diagnostic test data associated client device fromthe client account, and in doing so, transmit a data packet to theclient device that dynamically adjusts a product setting of the clientdevice. Product settings may include, but are not limited to, clientaccount settings, operating system settings, network signal strengthsettings, and data through-put settings.

FIG. 3 illustrates a block diagram of a voice interaction device 302that selectively receives and transmits audible communications to andfrom a client. The voice interaction device 302 may correspond to thevoice interaction device 112. Particularly, the voice interaction device302 may be communicatively coupled to the voice control integrationsystem 202 via network interface(s) 304. The network interface(s) 304may correspond to network interface(s) 206. In this example, the voiceinteraction device 302 may transmit and receive data to and from thevoice control integration system 202, or one or more computingresources, via the network interface(s) 304. The data may includeaudible data received from a client, audible data intended fortransmission to the client, and data packets of computer executableinstructions received from the voice control integration system 202 thatare intended for transmission to a computing resource. In some examples,the data packets may automate a performance of one or more actions onthe computing resource.

Further, the voice interaction device 302 may include input/outputinterface(s) 306 that transmit and receive audible data to and from aclient. The input/output interface(s) 306 may correspond to theinput/output interface(s) 204. For example, the input/outputinterface(s) 306 may include a speaker component and a microphonecomponent that selectively transmits and receives audible communicationsto and from a client. The microphone may be configured to receiveaudible data from a client that is located within a predetermineddistance of the voice interaction device 302. In various examples, theproximity of the voice interaction device 302 to the client is based atleast in part on a capability of the microphone to capture audible datafrom the client.

In the illustrated example, the voice interaction device 302 may includeone or more processor(s) 308 operably connected to memory 310. The oneor more processor(s) 308 may correspond to the one or more processor(s)208, and the memory 310 may correspond to the memory 210.

In the illustrated example, the memory 310 may include an operatingsystem 312 and a voice interaction application 314. The operating system312 may be used to implement the voice interaction application 314. Theoperating system may be any operating system capable of managingcomputer hardware and software resources. The voice interactionapplication 314 may include routines, program instructions, objects,and/or data structures that perform particular tasks or implementparticular abstract data types.

Further, the voice interaction application 314 may be configured tocommunicate audio data with the voice control integration system 202. Insome examples, the voice interaction application 314 may be configuredto perform the computational processing that corresponds to the one ormore modules of the voice control integration system 202, such as theauthentication module 216, the device detection module 218, the requestanalysis module 220, and the data store 222. In some examples, the voiceinteraction application 314 may include a data store that corresponds todata store 222.

FIGS. 4A, 4B, and 4C illustrate block diagrams of steps relating to aninteraction of a client 402 with the voice control integration system404 via a voice interaction device 406. In various examples, the client402 may interact with the voice control integration system 404 toautomate performance of one or more actions associated with a computingresource. The computing resource may correspond to a server of a serviceprovider, such as a telecommunications service provider. Alternatively,or additionally, the computing resource may correspond to a clientdevice that is associated with the client, and that may becommunicatively coupled to the voice control integration system 404.

FIG. 4A illustrates a block diagram of a client interaction that isintended to control an operation of a service of a service provider 408.The voice control integration system 404 may be communicatively coupledto a server of the service provider 408 via the one or more network(s)410. The one or more network(s) 410 corresponds to one or morenetwork(s) 114.

At block 412, the client 402 may vocalize an incoming voice command inproximity to a voice interaction device 406. Particularly, the client402 may vocalize an incoming voice command to create, adjust, or deletea service parameter of the service provider 408. The service parametermay correspond to a feature of a client account, such as a data usageallocation, or activation of a service subscription feature, and soforth. Further, the voice interaction device 406 may transmit theincoming voice command to the voice control integration system 404. Thevoice control integration system 404 may parse content of the incomingvoice command to authenticate the client, identify the client device,and determine an intended meaning of the incoming voice command.

At block 414, the voice control integration system 404 may generate anddeploy a data packet 416 that automates performance of an action basedat least in part on the parsed content of the incoming voice command.The voice control integration system 404 may transmit the data packet416 to the service provider 408, via the one or more network(s) 410. Indoing so, the voice control integration system 404 may cause the voiceinteraction device 406 to audibly transmit a message to the client 402that confirms performance of the action.

FIG. 4B illustrates a block diagram of a client interaction that isintended to transmit a message to a recipient device 418. The messagemay include an audio message or a short message service (SMS)communication. Additionally, or alternatively, the client interactionmay intend for transmission of a data file to the recipient device 418.The data file may be any type of data file such as an image file, audiofile, video file, and so forth. Further, the data file may be stored onthe client device, or accessible via a client account.

At block 420, the client 402 may vocalize an incoming voice command inproximity to a voice interaction device 406. The incoming voice commandmay dictate a message that is intended for transmission to a recipientdevice 418. Additionally, the incoming voice command may identify aformat of the message (i.e. audio, SMS, or MMS communication), and anidentifier of recipient device 418. In some examples, the message mayalso include a reference to a data file that is to be transmitted withthe message, to the recipient device 418.

The voice interaction device 406 may transmit the incoming voice commandto the voice control integration system 404, via one or more network(s)410. The voice control integration system 404 may parse content of theincoming voice command to copy out the message, authenticate an identityof the client 402, and identify the recipient device 418. In oneexample, the voice control integration system 404 may identify therecipient device 418 by cross-referencing portions of the incoming voicecommand with a client profile associated with the client 402.Particularly, the client 402 may vocalize a recipient's name in theincoming voice command. The recipient may be a person, business, orother entity. The recipient's name may correspond to a title, nickname,business name, or colloquial identifier, such as, ACME store, my work,my wife's work, boss, partner, mother, father, wife, husband, sister,brother, daughter, or son, and so forth.

Furthermore, the voice control integration system 404 may parse througha client profile associated with the client 402 to identify a recipientdevice 418 that is associated with the recipient, based at least in parton the recipient's name. Thereafter, the voice control integrationsystem 404 may identify a corresponding recipient device 418. In theillustrated example, the client vocalizes a voice command to send a textmessage to their brother. In doing so, the voice control integrationsystem 404 may parse through a client profile associated with the client402 to identify and confirm ‘Andy,’ the client's brother, as theintended recipient of the text message.

Further, the incoming voice command may also reference a data file thatis to be sent with the message to the recipient device 418. The incomingvoice command may identify the storage location of the data file. Forexample, the incoming voice command may state that a photo taken on aparticular client device of the client 402, is to be sent to therecipient device 418. Alternatively, absent identifying a storagelocation, the voice control integration system 404 may search one ormore data-stores associated with the client 402, for the date file. Inone example, the voice control integration system 404 may parse throughdata-store(s) of one or more client device(s) that are associated withthe client 402, whereby the one or more client device(s) are associatedwith the client on the voice control integration system 404.Alternatively, or additionally, the voice control integration system 404may parse through a client account associated with the client 402 on adata-store of the voice control integration system 404, itself.

At block 422, the voice control integration system 404 may generate adata packet 424 that automates transmission of the message, and datafile, to the recipient device 418. In one example, the voice controlintegration system 404 may be integrated with a telecommunicationsservice provider, and automatically transmit the data packet 424 to therecipient device 418, via one or more network(s) 410. Alternatively, thevoice control integration system 404 may transmit the data packet 424 tothe telecommunications service provider, via the one or more network(s)410, for further delivery to the recipient device 418.

FIG. 4C illustrates a block diagram of a two-factor authenticationprotocol initiated by the voice control integration system 404 for thepurpose of providing a client 402 with access to a computing resource.In some examples, the first-factor of the authentication protocol maycorrespond to an initial authentication of the client identity via avoice biometric analysis of the incoming voice command. Further, thesecond-factor of the authentication protocol may correspond totransmitting an audible request to the client 402 that asks the client402 to authenticate an image that is transmitted to a client device 426associated with the client 402.

At block 428, the client 402 may vocalize an incoming voice command inproximity to a voice interaction device 406, whereby the incoming voicecommand is intended to control a service of a service provider. In theillustrated example, the client 402 may vocalize an incoming voicecommand, such as “I'd like to pay the balance owing on my vendoraccount.” In this example, the voice interaction device 406 may furthertransmit the incoming voice command to the voice control integrationsystem 404. The voice control integration system 404 may parse contentof the incoming voice command to authenticate the client, identify aserver of a service provider, and determine an intended meaning of theincoming voice command. In the illustrated example, the voice controlintegration system 404 may determine that a two-factor authenticationprotocol is required to perform an action relating to payment of thebalance owing on a vendor account.

At block 430, the voice control integration system 404 may transmit adata packet 432 to a client device 426 associated with the client 402for the purpose of initiating a two-factor authentication protocol. Invarious examples, the voice control integration system 404 may detectand identify the client device 426 based on proximity to the client 402at a point in time that the voice interaction device 406, or the voicecontrol integration system 404, receives the incoming voice command.Further, the data packet 432 may include computer executableinstructions that automate a presentation of an image on a userinterface 434 of the client device 426. In the illustrated example, theimage may be associated with the second-factor of the two-factorauthentication protocol. Further, the voice control integration system404 may cause the voice interaction device 406 to transmit a message tothe client 402 that audibly requests the client 402 to respond to aquestion or phrase that relates to the image that is presented on theuser interface 434 of the client device 426.

FIGS. 5, 6, 7, 8, and 9 present processes 500, 600, 700, 800, and 900that relate to operations of the voice control integration system. Eachof processes 500, 600, 700, 800, and 900 illustrate a collection ofblocks in a logical flow chart, which represents a sequence ofoperations that can be implemented in hardware, software, or acombination thereof. In the context of software, the blocks representcomputer-executable instructions that, when executed by one or moreprocessors, perform the recited operations. Generally,computer-executable instructions may include routines, programs,objects, components, data structures, and the like that performparticular functions or implement particular abstract data types. Theorder in which the operations are described is not intended to beconstrued as a limitation, and any number of the described blocks can becombined in any order and/or in parallel to implement the process. Fordiscussion purposes, the processes 500, 600, 700, 800, and 900 aredescribed with reference to the computing environment 100 of FIG. 1 .

FIG. 5 illustrates a voice control integration system process forperforming at least one action associated with a computing resource thatis based at least in part on receipt of an incoming voice command from avoice interaction device. In at least one example, the computingresource may correspond to a remote server of a service provider thatprovides telecommunications services to a client device. In otherexamples, the computing resource may correspond to a client device thatis associated with the client, such as an entertainment system, atelevision system, a thermostat, or any client device that may becommunicatively coupled to the voice control integration system via oneor more communication networks.

At 502, the voice control integration system may receive audio data froma voice interaction device that corresponds to an incoming voice commandfrom a client. The voice interaction device may comprise of a speakercomponent and microphone component that selectively transmits andreceives audible communications to and from a client.

At 504, the voice control integration system may parse content of theincoming voice command via at least one of a natural language processingalgorithm or a natural language understanding algorithm to determine anintended meaning of the incoming voice command. In doing so, the voicecontrol integration system may determine an action that is to beperformed on a computing resource associated with the client. In anon-limiting example, the incoming voice command may relate to modifyinga client account that is associated with a service provider. In thisexample, the voice control integration system may determine that theaction that is to be performed on a computing resource, corresponds tomodifying the client account that is stored on the computing resource ofthe service provider.

At 506, the voice control integration system may determine that supportdata required to perform the action is not available within a clientprofile of the voice control integration system. In doing so, the voicecontrol integration system may transmit a message to the client via thevoice interaction device, requesting the support data. In some examples,the support data may correspond to authentication credentials thatassociate the client with the service provider. In other examples, thesupport data may correspond to client-specific data, such as ageographic location of the client at a point in time of receipt of theincoming voice command.

At 508, the voice control integration system may automate performance ofthe action based at least in part on a receipt of the support data fromthe client. In some examples, the voice control integration system mayreceive the support data via a client interaction with the voiceinteraction device, or via an alternate computing resource that iscommunicatively coupled to the voice control integration system.

At 510, the voice control integration system may transmit a message tothe client indicating a performance of the action. In some examples, themessage may be delivered audibly via the voice interaction device.Alternatively, or additionally, the message may be delivered to analternate computing resource that is communicatively coupled to thevoice control integration system, such as a mobile telecommunicationdevice.

At 512, the voice control integration system may determine that supportdata that is required to perform the at least one action is availablewithin a client account associated with the client. In various examples,the client account may be stored within a data store of the voicecontrol integration system. In other examples, the client account may bestored on a remote server of a service provider that is accessible bythe voice control integration system.

Further, the voice control integration system may automate performanceof the action, based at least in part on the availability of the supportdata. For example, the support data may include authenticationcredentials of a service provider account that is stored within a datastore of the voice control integration system. Thus, the voice controlintegration system may use the authentication credentials to access theservice provider account and perform the action that is based on theincoming voice command.

At 514, the voice control integration system may transmit a message tothe client indicating performance of the action. In some examples, themessage may be delivered audibly via the voice interaction device. Thevoice interaction device may be an integrated component of a clientdevice associated with the client, or a client device that is locatedwithin a predetermined proximity of the client.

FIG. 6 illustrates a voice control integration system process forperforming at least one action that is associated with a client accountthat is associated with a service provider. In various examples, theclient account may be stored on a remote server that is associated withthe service provider. The remote server may be communicatively coupledto the voice control integration system, enabling the latter to automatethe performance of an action on the remote server.

At 602, the voice control integration system may receive audio data froma voice interaction device that corresponds to an incoming voice commandfrom a client. In some examples, the voice interaction device may belocated within a predetermined proximity of the client.

At 604, the voice control integration system may parse content of theincoming voice command to identify a service provider to which theincoming voice command had been directed. For example, a client mayenunciate an incoming voice command to verify an account setting of aclient account that is associated with a particular service provider. Indoing so, the voice control integration system may identify theparticular service provider from the incoming voice command, and furtheridentify computing resources associated with the particular serviceprovider that may facilitate verifying the account setting of the clientaccount. In some examples, the data-store of the voice controlintegration system may include data records that identify the computingresources of one or more service providers.

At 606, the voice control integration system may determine an actionthat is to be performed on the computing resource associated with theservice provider. In a non-limiting example, the action may relate tochanging an account setting, paying an outstanding invoice, soliciting arequest for service support, or any other request that may be performedvia a communicative connection with the service provider.

At 608, the voice control integration system may authenticate the clientbased at least in part on a voice biometric analysis of the incomingvoice command. The voice biometric analysis may include an analysis ofan accent, tonality, refraction of sound, frequency, and pitch of theclient voice. Further, the incoming voice command may be compared with avoice biometric template of the client that is stored within the datastore of the voice control integration system. In this instance,authentication of the client identity may be based on a similarity ofthe incoming voice command and the voice biometric template.

At 610, in response to authenticating the client identity of the client,the voice control integration system may generate a data packet forexecution on a platform of the service provider, the data packetincluding computer executable instructions that automate performance ofthe action. In a non-limiting example, the computer executableinstructions may be configured to perform one of a plurality of actions,including initiating a service support request with a service providerrepresentative, changing an account setting associated with the serviceprovider, submitting payment of an outstanding invoice, or initiating adiagnostic check of a client device that is associated with the serviceprovider.

At 612, the voice control integration system may transmit a message tothe client indicating performance of the action. In some examples, themessage may be delivered audibly via the voice interaction device.Alternatively, or additionally, the message may be delivered to analternate computing resource that is communicatively coupled to thevoice control integration system, such as a mobile telecommunicationdevice.

FIG. 7 illustrates a voice control integration system process forperforming at least one action associated with a client deviceassociated with the client. In some examples, the client device maycorrespond to a client device, such as a mobile telecommunicationsdevice. Alternatively, or additionally, the client device may correspondto an entertainment system, a television system, a thermostat, or anyother client device that be communicatively coupled to the voice controlintegration system via one or more communication networks.

At 702, the voice control integration system may receive audio data froma voice interaction device that corresponds to an incoming voice commandof a client. In some examples, the voice interaction device mayselectively communicate with the voice integration system. Further, thevoice interaction device may include a speaker component and amicrophone component that transmits and receives audio communicationsfrom a client.

At 704, the voice control integration system may parse content of theincoming voice command via a natural language processing algorithm and anatural language understanding algorithm to identify a client devicethat is associated with the incoming voice command. In some examples,the incoming voice command may directly enunciate an identity of theclient device. For instance, the incoming voice command may state “turnon the entertainment system.” Alternatively, the incoming voice commandmake an indirect reference to the client device. For instance, the voiceintegration system may determine that an incoming voice command thatstates “turn down the temperature,” refers to a thermostat clientdevice.

At 706, the voice control integration system may determine an actionthat is to be performed on the client device. In a non-limiting example,the action may relate to activating a client device, such as anentertainment system. Alternatively, or additionally, the action maycorrespond to sending a short message service (SMS) communication via amobile telecommunications device.

At 708, the voice control integration system may generate a data packetfor execution on the client device, the data packet including computerexecutable instructions that automate performance of the action on theclient device. The computer executable instructions may be configured toperform one of a plurality of actions, including controlling anoperation of a client device or initiating a diagnostic check of theclient device. In a non-limiting example, an action associated with amobile telecommunications device may include answering an incoming call,initiating an outgoing call, transmitting an SMS message or a multimediamessaging service (MMS) message, or having the voice interaction deviceread an incoming SMS message.

At 710, the voice control integration system may transmit the datapacket via a communication protocol that is associated with the clientdevice. In various examples, the communication protocol may includeunlicensed wireless Internet Protocol (IP) communications, a Bluetoothprotocol, or near field communication (NFC) protocol. In some examples,the communication protocol may be based on wired communications via anEthernet port or a Universal Serial Bus (USB).

In some examples, the voice control integration system may transmit thedata packet directly to the client device via an appropriatecommunication protocol. Alternatively, the voice control integrationsystem may indirectly transmit the data packet to the client device, viathe voice interaction device. For example, the client device may beconfigured to send and receive data via a near field communicationprotocol, such as a Bluetooth protocol. In this instance, provided thevoice interaction device is located within a requisite distance of theclient device to enable Bluetooth connectivity, the voice controlintegration system may transmit the data packet to the voice interactiondevice along with computer executable instructions that facilitatefurther transmission to the client device, via the Bluetooth protocol.

At 712, the voice control integration system may transmit a message tothe client indicating performance of the action. In some examples, themessage may be delivered audibly via the voice interaction device.Alternatively, or additionally, the message may be delivered to analternate computing resource that is communicatively coupled to thevoice control integration system, such as a mobile telecommunicationdevice.

FIG. 8 illustrates a voice control integration system for authenticatinga client identity based on a single-factor authentication protocol, oralternatively a two-factor authentication protocol. In some examples,the voice control integration system may include a data store thatrecords an association between a particular computing resource and anauthentication protocol that authorizes access.

In some examples, an association between a particular computing resourceand an authentication protocol may be assigned by one of a serviceprovider or client, whomever has ownership or control over theparticular computing resource. For example, an authentication protocolthat authorizes access to a computing resource of a service provider maybe determined by the service provider, whereas the authenticationprotocol that authorizes access to a client device of the client may bedetermined by the client. In some instances, the voice controlintegration system may request and receive authentication protocols froma service provider. Similarly, the voice control integration system mayprompt a client, via a voice interaction device, to configure anauthentication protocol for a particular client device.

Additionally, the data store may include an additional level ofgranularity in assigning a two-factor authentication for particularactions associated with a computing resource. For example, rather thanassigning a two-factor authentication for all actions associated with aservice provider, the data store may include an indication that assignsa two-factor authentication protocol for particular actions that involveclient sensitive or service provider sensitive data, such as financialdistributions, adjustments to account settings, or adjustments toproduct settings. In this example, a single-factor authenticationprotocol may be assigned to all other client interactions with thecomputing resource.

At 802, the voice control integration system may receive audio data froma voice interaction device that corresponds to an incoming voice commandfrom a client. In some examples, the voice interaction device may belocated within a predetermined distance of the client, and may include aspeaker component and a microphone component that transmits and receivesaudio communications from a client.

At 804, the voice control integration system may parse content of theincoming voice command via a natural language processing algorithm and anatural language understanding algorithm to identify a computingresource that is associated with the incoming voice command. Further,the voice control integration system may determine an action that is tobe performed on the computing resource. In a non-limiting example, theaction may correspond to sending an SMS communication via a clientdevice. Alternatively, the action may correspond to initiating a changeto an account setting of a client account associated with a serviceprovider.

At 806, the voice control integration system may authenticate the clientbased at least in part on a voice biometric analysis of the incomingvoice command. The voice biometric analysis may include an analysis ofan accent, tonality, refraction of sound, frequency and pitch of theclient voice. Further, the incoming voice command may be compared with avoice biometric template of the client that is stored within the datastore of the voice control integration system. In this instance,authentication of the client identity may be based on the similarity ofthe incoming voice command and the voice biometric template beinggreater than a predetermined similarity threshold.

At 808, the voice control integration system may determine whether atwo-factor authentication protocol is required to verify a clientidentity. In various examples, the data store of the voice controlintegration system may include an indication of whether a particularservice provider, a particular client device, or a particular action isassociated with a two-factor authentication protocol.

At 810, the voice control integration system may determine that atwo-factor authentication protocol is not required to implement theaction on the computing resource, based at least in part on anindication within the data store of the voice control integrationsystem. In this instance, the voice control integration system mayautomate performance of the action on the computing resource. In someexamples, the voice control integration system may generate and transmita data packet to the computing resource that includes computerexecutable instructions that automate performance of the action on thecomputing resource.

At 812, the voice control integration system may transmit a message tothe client indicating performance of the action. In some examples, themessage may be delivered audibly via the voice interaction device.Alternatively, or additionally, the message may be delivered to analternate computing resource that is communicatively coupled to thevoice control integration system, such as a mobile telecommunicationdevice.

At 814, the voice control integration system may determine that atwo-factor authentication protocol is required to implement the actionon the computing resource, based at least in part on an indicationwithin the data store of the voice control integration system.Therefore, the voice control integration system may transmit asecond-factor authentication request to the client via at least one ofthe voice interaction device, or a client device that is within apredetermined distance of the client. Note that the first-factor of thetwo-factor authentication protocol may correspond to the initialauthentication of the client identity at step 806. Additionally, thetwo-factor authentication process is discussed in further detail withreference to FIG. 9 .

At 816, the voice control integration system may automate performance ofthe action on the computing resource, based at least in part onverifying the client identity via the two-factor authenticationprotocol. In some examples, the voice control integration system maygenerate and transmit a data packet to the computing resource thatincludes computer executable instructions that automate performance ofthe action on the computing resource.

At 818, the voice control integration system may transmit a message tothe client indicating performance of the action. In some examples, themessage may be delivered audibly via the voice interaction device.Alternatively, or additionally, the message may be delivered to analternate computing resource that is communicatively coupled to thevoice control integration system, such as a mobile telecommunicationdevice.

FIG. 9 illustrates a voice control integration system process forauthenticating a client identity via a two-factor authenticationprotocol. In some examples, a two-factor authentication protocol may beassigned to a particular computing resource, or a particular actionassociated with a particular computing resource. For example, withreference to a computing resource associated with a service provider, atwo-factor authentication protocol may be assigned to particular actionsthat involve client sensitive or service provider sensitive data, suchas financial distributions, adjustments to account settings, oradjustments to product settings.

At 902, the voice control integration system may determine that atwo-factor authentication protocol is required to implement a particularaction on a computing resource, based at least in part on an indicationwithin the data store of the voice control integration system. Invarious examples, a first-factor of the two-factor authenticationprotocol may correspond to an initial authentication of a clientidentity via the biometric analysis of the incoming voice command.

At 904, the voice control integration system may determine a data formatfor presentation of the second-factor authentication protocol. In someexamples, the second-factor authentication protocol may request a clientaudibly respond to a phrase or question transmitted by a voiceinteraction device that is located within a predetermined distance ofthe client. In other examples, the second-factor authentication protocolmay request a client respond to a question associated with thepresentation of multimedia content, such as image data or video data.For instance, the second-factor authentication protocol may involvepresenting the client with an image, followed by a request to respond toa question or phrase that is associated with a presentation of theimage. The question or phrase may relate to key persons, particularobjects shown in the image data, or an origin of the image data.Similarly, the second-factor authentication protocol may involvepresenting the client with a video segment, followed by similarquestions regarding specific details of the video segment.

At 906, the voice control integration system may determine whether thevoice interaction device is capable of presenting the second-factorauthentication protocol to the client. For example, the voiceinteraction device may be capable of transmitting an audible request forauthentication to the client, however the voice interaction device maynot be capable of presenting multimedia content, such as image data orvideo data, to the client as part of the second-factor authenticationprotocol.

At 908, the voice control integration system may determine that thevoice interaction device is not capable of presenting the second-factorauthentication protocol to the client. In other words, the second-factorauthentication protocol may involve presenting image data or video datato the client. In doing so, the voice control integration system maydetect a client device that is within a predetermined proximity of theclient, and that is capable of presenting the second-factorauthentication.

In some examples, the location of the client may be based on a locationof the voice interaction device that received the incoming voicecommand. Thus, the voice control integration system may attempt todetect one or more client devices that are proximate to the voiceinteraction device. Additionally, or alternatively, the voiceinteraction device may attempt to detect the one or more client devicesthat are proximate to its location, based at least in part on near fieldcommunication protocols such as Bluetooth and NFC protocols.

At 910, the voice control integration system may transmit a first datapacket to a client device that is capable of presenting thesecond-factor authentication protocol, and that is located proximate tothe client location. In a non-limiting example, the voice controlintegration system may transmit multimedia data to a mobiletelecommunications device of the client. Simultaneously, orsubstantially simultaneously, the voice interaction device may audiblyprompt the client to respond to a question related to the multimediadata. Alternatively, an audible or text-based prompt may be deliveredvia the mobile telecommunications device.

At 912, the voice control integration system may transmit a message viaat least the voice interaction device indicating an authenticity of theclient identity based at least in part on receipt of a response to thesecond-factor authentication protocol. Further, the voice controlintegration system may perform an action associated with the incomingvoice command, as discussed with reference to FIGS. 5-8 , and based atleast in part on an authenticated client identity.

At 914, the voice control integration system may determine that thevoice interaction device is capable of transmitting the second-factorauthentication protocol. In other words, the second-factorauthentication protocol may comprise of an audible phrase or questionthat is intended to solicit a response from the client. Therefore, thevoice control integration system may transmit a second data packet tothe voice interaction device.

At 916, the voice control integration system may transmit a message viaat least the voice interaction device indicating an authenticity of theclient identity based at least in part on receipt of a response to thesecond factor authentication protocol. Further, the voice controlintegration system may perform an action associated with the incomingvoice command, as discussed with reference to FIGS. 5-8 , and based atleast in part on an authenticated client identity.

CONCLUSION

Although the subject matter has been described in language specific tofeatures and methodological acts, it is to be understood that thesubject matter defined in the appended claims is not necessarily limitedto the specific features or acts described herein. Rather, the specificfeatures and acts are disclosed as exemplary forms of implementing theclaims.

What is claimed:
 1. One or more non-transitory computer-readable mediastoring computer-executable instructions, that when executed on one ormore processors, causes the one or more processors to perform actscomprising: detecting, via a voice interaction device, an incoming voicecommunication from a client, the incoming voice communication includingan implied request to perform at least one action that is associatedwith a computing resource; parsing content of the incoming voicecommunication to identify the implied request to perform the at leastone action; identifying a client profile associated with the clientbased at least in part on the incoming voice communication, the clientprofile including a two-factor authentication protocol associated withthe computing resource; detecting a client device different from thevoice interaction device; determining a first authentication score basedat least in part on an execution of a first factor of the two-factorauthentication protocol at the client device; transmitting, via thevoice interaction device, a request for execution of a second factor ofthe two-factor authentication protocol; determining a secondauthentication score based at least in part on the requested executionof the second factor of the two-factor authentication protocol at thevoice interaction device; and performing the at least one action that isassociated with the incoming voice communication based at least in parton a combination of at least: (i) the first authentication scoreassociated with the client device and (ii) the second authenticationscore associated with the voice interaction device, wherein: thetwo-factor authentication protocol varies based on a particular type ofaccess to a particular computing resources; the second authenticationscore associated with the voice interaction device is based at least inpart on a voice biometric; and the first authentication score associatedwith the client device is independent of a voice biometric.
 2. The oneor more non-transitory computer-readable media of claim 1, whereinperforming the at least one action corresponds to establishing acommunication session between the voice interaction device and a serviceprovider platform associated with the computing resource, and whereinthe computer-executable instructions, when executed on one or moreprocessors, causes the one or more processors to perform acts furthercomprising: transmitting, to the voice interaction device, anauthentication token to access the service provider platform, based atleast in part on an authentication of the identity of the client via thetwo-factor authentication protocol that utilizes the combination of thefirst authentication score and the second authentication score, whereinperforming the at least one action is further based at least in part onreceipt of the authentication token.
 3. The one or more non-transitorycomputer-readable media of claim 1, wherein the computer-executableinstructions, when executed on one or more processors, causes the one ormore processors to perform acts further comprising: identifying, fromthe client profile, a voice biometric template associated with theclient; and determining a similarity between a biometric voice data of acommunication and the voice biometric template of the client, whereinthe second authentication score is based at least in part on thesimilarity.
 4. The one or more non-transitory computer-readable media ofclaim 1, wherein the computer-executable instructions, when executed onone or more processors, causes the one or more processors to performacts further comprising: identifying, from the client profile, acommunication associated with a recipient device associated with arecipient, the recipient being associated with the client via the clientprofile; receiving, via the voice interaction device, a request to senda communication to the recipient; and transmitting, via the voiceinteraction device, the requested communication.
 5. The one or morenon-transitory computer-readable media of claim 1, wherein thecomputer-executable instructions, when executed on one or moreprocessors, causes the one or more processors to perform acts furthercomprising: determining that support data is required for performance ofthe at least one action associated with the computing resource, thesupport data including the two-factor authentication protocol associatedwith the computing resource and one or more preferences associated withthe computing resource; and retrieving the support data from the clientprofile.
 6. The one or more non-transitory computer-readable media ofclaim 1, wherein the execution of the second factor is associated withthe presentation of multimedia content.
 7. The one or morenon-transitory computer-readable media of claim 1, wherein thecomputer-executable instructions, when executed on one or moreprocessors, causes the one or more processors to perform acts furthercomprising: generating a data packet that includes computer-executableinstructions that automate the performance of the at least one actionwith respect to the client device based at least in part on anauthentication of the identity of the client; transmitting the datapacket to the client device; and transmitting a message, via the voiceinteraction device, indicating a performance of the at least one action.8. A computer-implemented method comprising: detecting, via a voiceinteraction device, an incoming voice communication from a client, theincoming voice communication including an implied request to perform atleast one action that is associated with a computing resource; parsingcontent of the incoming voice communication to identify the impliedrequest to perform the at least one action; identifying a client profileassociated with the client based at least in part on the incoming voicecommunication, the client profile including an authentication protocolassociated with the computing resource; detecting a client devicedifferent from the voice interaction device; determining a firstauthentication score based at least in part on the incoming voicecommunication detected via the voice interaction device; determining asecond authentication score based at least in part on an execution ofthe authentication protocol at the client device; and performing the atleast one action that is associated with the incoming voicecommunication with respect to the computing resource, based at least inpart on a combination of at least: (i) the first authentication scoreassociated with the voice interaction device and (ii) the secondauthentication score associated with the client device, wherein: thefirst authentication score associated with the voice interaction deviceis based at least in part on a voice biometric; and the secondauthentication score associated with the client device is independent ofa voice biometric.
 9. The computer-implemented method of claim 8,wherein the at least one action includes modifying an action of theclient device, and the method further comprises: generating a datapacket for execution on the client device, the data packet includingcomputer-executable instructions that automate the modifying in responseto the implied request.
 10. The computer-implemented method of claim 8,further comprising: detecting at least one client device associated withthe client that is within a predetermined distance of the voiceinteraction device, the at least one client device being configurable topresent multimedia content; and causing a user interface of the clientdevice to present the multimedia content, wherein the multimedia contentincludes at least one of image data or video data.
 11. Thecomputer-implemented method of claim 8, further comprising: accessing aportion of audio data that is associated with the client profile; andprior to transmitting a first message to the client, causing the voiceinteraction device to transmit the portion of audio data to the client.12. The computer-implemented method of claim 8, further comprising:generating a data packet that includes computer-executable instructionsthat automate the performance of the at least one action with respect tothe client device based at least in part on an authentication of theidentity of the client; transmitting the data packet to the clientdevice; and transmitting a message, via the voice interaction device,indicating a performance of the at least one action.
 13. Thecomputer-implemented method of claim 12, further comprising: determiningthat support data is required for the performance of the at least oneaction; and transmitting, via the voice interaction device, a requestfor the client to provide the support data, wherein automating theperformance of the at least one action is further based at least in parton receipt of the support data.
 14. The computer-implemented method ofclaim 8, wherein the incoming voice communication corresponds to aservice support request for a client device, the client deviceconfigured to interact with the computing resource of a serviceprovider, and the computer-implemented method further comprisingaccessing a client account associated with the service provider, theclient account including a client device type and a communicationprotocol of the client device; and generating a data packet forexecution on the client device, the data packet includingcomputer-executable instructions that automate performance of adiagnostic check on the client device, based at least in part on theclient device type, wherein the at least one action corresponds totransmitting the data packet to the client device via the communicationprotocol.
 15. The computer-implemented method of claim 14, furthercomprising: receiving, from the client device, result data associatedwith the diagnostic check; and generating an additional data packet forexecution on the client device, based at least in part on result data,the additional data packet including computer-executable instructionsthat automatically adjust a product setting of the client device.
 16. Avoice control integration system, comprising: one or more processors;and memory coupled to the one or more processors, the memory storing oneor more instructions that, if executed by the one or more processors,cause the one or more processors to perform operations comprising:detecting, via a voice interaction device, an incoming voicecommunication from a client, the incoming voice communication includingan implied request to perform at least one action that is associatedwith a computing resource; parsing content of the incoming voicecommunication to identify the implied request to perform the at leastone action; identifying a client profile associated with the clientbased at least in part on the incoming voice communication, the clientprofile including a two-factor authentication protocol associated withthe computing resource; detecting a client device different from thevoice interaction device; determining a first authentication score basedat least in part on an execution of a first factor of the two-factorauthentication protocol at the client device; transmitting, via thevoice interaction device, a request for execution of a second factor ofthe two-factor authentication protocol; determining a secondauthentication score based at least in part on the requested executionof the second factor of the two-factor authentication protocol at thevoice interaction device; and performing the at least one action that isassociated with the incoming voice communication based at least in parton a combination of at least: (i) the first authentication scoreassociated with the client device and (ii) the second authenticationscore associated with the voice interaction device, wherein: theauthentication protocol varies based on a particular type of access to aparticular computing resources; the second authentication scoreassociated with the voice interaction device is based at least in parton a voice biometric; and the first authentication score associated withthe client device is independent of a voice biometric.
 17. The voicecontrol integration system of claim 16, wherein the instructions, ifexecuted by the one or more processors, cause the one or more processorsto perform operations further comprising: generating a data packet fortransmission to the client device, the data packet includingcomputer-executable instructions that automate performance of the atleast one action on the client in response at least in part to theauthentication; determining that support data is required forperformance of the at least one action, the support data correspondingto diagnostic data associated with the client device; and transmitting,via the voice interaction device, a request for the client to providethe support data, wherein the generating of the data packet fortransmission to the client device is based at least in part on receiptof the support data.
 18. The voice control integration system of claim16, wherein the instructions, if executed by the one or more processors,cause the one or more processors to perform operations furthercomprising: determining that the incoming voice communication isassociated with a service issue of the client device, wherein the atleast one action corresponds to performance of a diagnostic check of theclient device; receiving, from the client device, result data associatedwith the diagnostic check; and generating an additional data packet forexecution on the client device, the additional data packet includingcomputer-executable instructions that automatically adjust a productsetting of the client device, based at least in part on the result data.