Voice Biometric Authentication in a Virtual Assistant

ABSTRACT

Aspects of the disclosure relate to voice biometric authentication in a virtual assistant. In some embodiments, a computing platform may receive, from a user device, an audio file comprising a voice command to access information related to a user account. The computing platform may retrieve one or more voice biometric signatures from a voice biometric database associated with the user account, and apply a voice biometric matching algorithm to compare the voice command of the audio file to the one or more voice biometric signatures to determine if a match exists between the voice command and one of the one or more voice biometric signatures. In response to determining that a match exists, the computing platform may retrieve information associated with the user account, and then send, via the communication interface, the information associated with the user account to the user device.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims priority to U.S. Pat.Application No. 16/938,018, filed Jul. 24, 2020, and entitled “VoiceBiometric Authentication in a Virtual Assistant,” which is incorporatedherein by reference in its entirety.

BACKGROUND

Enterprise organizations may utilize various computing infrastructuresto maintain confidential information and/or other sensitive data that iscreated and/or used for various purposes. Ensuring that this data issecure and only accessible to appropriate users for appropriate purposesmay be critically important to protecting the integrity andconfidentiality of the underlying information and associated resources.This aim may be further complicated by the rise of interactive voicerecognition (IVR) systems and other voice recognition technology,because of the possibility of unauthorized access to confidentialinformation using voice commands. This is even more particularly anissue with regard to user devices equipped with virtual assistants thatuse voice recognition technology, as such user devices may frequently besubject to access by various different users.

SUMMARY

Aspects of the disclosure provide effective, efficient, scalable, andconvenient technical solutions that address and overcome the technicalproblems associated with ensuring information security and preventingunauthorized access by using voice biometric authentication in userdevices with virtual assistants.

In accordance with one or more embodiments, a computing platform havingat least one processor, a communication interface, and memory that mayreceive, via the communication interface, from a user device, an audiofile comprising a voice command to access information related to a useraccount. Subsequently, the computing platform may retrieve one or morevoice biometric signatures from a voice biometric database associatedwith the user account. Based on applying a voice biometric matchingalgorithm to compare the voice command of the audio file to the one ormore voice biometric signatures, the computing platform may determine ifa match exists between the voice command and one of the one or morevoice biometric signatures. In response to determining that a matchexists between the voice command and one of the one or more voicebiometric signatures, the computing platform may retrieve informationassociated with the user account. Thereafter, the computing platform maysend, via the communication interface, the information associated withthe user account to the user device.

In some embodiments, retrieving information associated with the useraccount may include transmitting a user identity verification to anenterprise server and retrieving the information associated with theuser account from the enterprise server.

In some embodiments, in response to determining a mismatch between thevoice command and one of the one or more voice biometric signatures, thecomputing platform may generate an error message to transmit to the userdevice, and the error message may comprise at least one of: an audiofile, a video file, an image file, or text content.

In some embodiments, the computing platform may receive, from the userdevice, a second audio file comprising a second voice command toinitiate a transaction related to the user account. Then, the computingplatform may apply the voice biometric matching algorithm to compare thesecond voice command of the second audio file to the one or more voicebiometric signatures to determine if a match exists between the secondvoice command and one of the one or more voice biometric signatures. Inresponse to determining that a match exists between the second voicecommand and one of the one or more voice biometric signatures, thecomputing platform may transmit a notification comprising a transactionverification to an enterprise server.

In some embodiments, the computing platform may, in response todetermining a mismatch between the voice command and the one or morevoice biometric signatures, determine whether a level of backgroundnoise associated with the audio file is higher than a noise threshold.In response to determining that the level of background noise is higherthan the noise threshold, the computing platform may generate a messageto transmit to the user device, and the message may include anindication that the voice command was not verified and a request for arepeat voice command with a lower level of background noise. Thereafter,and upon sensing that a level of background noise at the user device islower than the noise threshold, the computing platform may transmit aprompt to the user device to obtain the repeat voice command.

In some embodiments, the computing platform may, in response todetermining a mismatch between the voice command and the one or morevoice biometric signatures, determine if a match percentage is above amatch threshold. Based on determining that the match percentage is abovethe match threshold, the computing platform may generate a message totransmit to the user device, and the message may comprise a request fora repeat voice command. The computing platform may, in response todetermining that the match percentage is below match threshold, generatean alert comprising a notification of an unauthorized voice commandattempt at the user device. Then, the computing platform may send, viathe communication interface, the alert to an enterprise server.

In some embodiments, the computing platform may determine if a number ofvoice command attempts exceeds an attempt threshold. Upon determiningthat the number of voice command attempts exceeds the attempt threshold,the computing platform may generate an alert comprising a notificationof unauthorized voice command attempts at the user device. Then, thecomputing platform may send, via the communication interface, the alertto an enterprise server. In some embodiments, upon determining that thenumber of voice command attempts exceeds the attempt threshold, thecomputing platform may send, via the communication interface, the alertto a second user device. The second user device may be a user accountverified device, and the alert may comprise information related to thenumber of voice command attempts. In some embodiments, upon determiningthat the number of voice command attempts exceeds the attempt threshold,the computing platform may send, via the communication interface, acommand to the user device to disable voice command functionality.

In some embodiments, at least one biometric signature of the one or morevoice biometric signatures may be created by a voice biometric trainingcomputing platform based on passive voice monitoring audio data. In someembodiments, creating the at least one voice biometric signature by thevoice biometric training computing platform based on passive voicemonitoring audio data may include computing a confidence levelassociated with the at least one biometric signature. In someembodiments, creating the at least one voice biometric signature by thevoice biometric training computing platform based on passive voicemonitoring audio data may include updating an initially-created voicebiometric signature based on additional received passive voicemonitoring audio data.

In some embodiments, at least one biometric signature of the one or morevoice biometric signatures may be created by a voice biometric trainingcomputing platform based on active voice monitoring data. In someembodiments, creating the at least one voice biometric signature by thevoice biometric training computing platform based on active voicemonitoring audio data may include sending a plurality of user voicecommands to the user device, transmitting, from the user device to thevoice biometric training computing platform, audio data responsive toeach of the plurality of user voice commands, and computing the at leastone voice biometric signature from the audio data responsive to each ofthe plurality of user voice commands.

In accordance with one or more embodiments, a method is provided at acomputing platform comprising at least one processor, a communicationinterface, and memory. The method may include receiving, from a userdevice, an audio file comprising a voice command to access informationrelated to a user account. One or more voice biometric signatures may beretrieved from a voice biometric database associated with the useraccount. A voice biometric matching algorithm may be applied to comparethe voice command of the audio file to the one or more voice biometricsignatures to determine if a match exists between the voice command andone of the one or more voice biometric signatures. In response todetermining that a match exists between the voice command and one of theone or more voice biometric signatures, information associated with theuser account may be retrieved. Thereafter the information associatedwith the user account may be sent, via the communication interface, tothe user device.

In some embodiments, in response to determining a mismatch between thevoice command and one of the one or more voice biometric signatures, themethod may include generating an error message to transmit to the userdevice, and the error message may comprise at least one of: an audiofile, a video file, an image file, or text content.

In accordance with one or more embodiments, one or more non-transitorycomputer-readable media may be provided storing instructions that, whenexecuted by a computing platform comprising at least one processor, acommunication interface, and memory cause the computing platform toreceive, from a user device, an audio file comprising a voice command toaccess information related to a user account, retrieve one or more voicebiometric signatures from a voice biometric database associated with theuser account, apply a voice biometric matching algorithm to compare thevoice command of the audio file to the one or more voice biometricsignatures to determine if a match exists between the voice command andone of the one or more voice biometric signatures, in response todetermining that a match exists between the voice command and one of theone or more voice biometric signatures, retrieve information associatedwith the user account, and send, via the communication interface, theinformation associated with the user account to the user device.

These features, along with many others, are discussed in greater detailbelow.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of example and not limitedin the accompanying figures in which like reference numerals indicatesimilar elements and in which:

FIGS. 1A and 1B depict an illustrative computing environment for one ormore devices using voice biometric authentication in a virtual assistantin accordance with one or more example embodiments;

FIGS. 2A-2B depict an illustrative event sequence for a passive voicesignature setup at a voice biometric training server in accordance withone or more example embodiments;

FIGS. 2C-2D depict an illustrative event sequence for an active voicesignature setup at a voice biometric training server in accordance withone or more example embodiments;

FIGS. 2E-2G depict an illustrative event sequence for a voice biometricauthentication at a voice biometric authentication computing platform inaccordance with one or more example embodiments;

FIGS. 3-5 depict example graphical user interfaces for devices usingbiometric voice authentication in a virtual assistant in accordance withone or more example embodiments; and

FIG. 6 depicts an illustrative method for voice biometric authenticationin accordance with one or more example embodiments.

DETAILED DESCRIPTION

In the following description of various illustrative embodiments,reference is made to the accompanying drawings, which form a parthereof, and in which is shown, by way of illustration, variousembodiments in which aspects of the disclosure may be practiced. It isto be understood that other embodiments may be utilized, and structuraland functional modifications may be made, without departing from thescope of the present disclosure.

It is noted that various connections between elements are discussed inthe following description. It is noted that these connections aregeneral and, unless specified otherwise, may be direct or indirect,wired or wireless, and that the specification is not intended to belimiting in this respect.

As a brief introduction to the concepts described further herein, one ormore aspects of the disclosure describe a voice biometric authenticationsystem that may be developed and deployed to safeguard confidentialcustomer information accessible from a user device using a virtualassistant. Specifically, a voice biometric authentication system in avirtual assistant to authenticate voice commands relating to accessinguser account information is described herein. The virtual assistant maycarry out certain voice commands without voice authentication (e.g.,voice commands unrelated to user account information) and may submitother commands through the voice biometric authentication system as aprecursor to carry out such commands (e.g., voice commands to accessinformation related to a user account). In some instances, the virtualassistant may directly respond to a user voice command with an audioresponse or audio-visual response, e.g., that indicates whether thevoice biometric authentication system determined the voice command to beauthorized by the user account. Additionally or alternatively, thevirtual assistant may request additional voice commands from the user,depending on determinations made by the voice biometric authenticationsystem in response to an initial voice command.

Voice activated systems may operate to provide users with variousinformation. In many scenarios, the context of user requests may entailthe disclosure of potentially confidential or private customerinformation (e.g., relating account information, credit card statements,account balances, or the like). According to aspects of the presentdisclosure, a voice biometric authentication system is employed with auser device equipped with an IVR-like virtual assistant. Confidential orprotected information may be provided to the user device only uponauthenticating a voice command to access such information. In short,such confidential information may be protected from being inadvertentlyprovided to an unauthorized user, without adding undue difficulty to anauthorized user is still being able to access the such information.

As an example, a banking institution may employ the approaches describedbelow to authenticate a voice command requesting access to a bankaccount or other banking services, e.g., from a mobile device using avirtual assistant. Instead of prompting users for access credentials(e.g., an account number or an access identifier), the voice biometricauthentication system may verify the identity of the user based onanalysis of the voice command. The identity of a user issuing the voicecommand may be confirmed and authorized based on the voice commanditself. Due to the ability to quickly authorize a voice command withoutnecessarily requiring additional access credentials, a positive userexperience may be provided. Additionally, preventing unauthorized usersfrom accessing private of confidential information using voice commands,and in some cases preventing potentially fraudulent activity on a useraccount, further provides benefits to both account holders andenterprise organizations associated with the account. Other benefits andadvantages will be appreciated with the benefit of the additionaldisclosures set forth below.

FIGS. 1A and 1B depict an illustrative computing environment for one ormore devices using voice biometric authentication in a virtual assistantin accordance with one or more example embodiments. Referring to FIG.1A, computing environment 100 may include one or more computer systems.For example, computing environment 100 may include a voice biometricauthentication computing platform 110, a voice biometric training server120, a first user device 130, a second user device 140, enterpriseserver infrastructure 160, and an enterprise data storage platform 170.

As illustrated in greater detail below, voice biometric authenticationcomputing platform 110 may include one or more computing devicesconfigured to perform one or more of the functions described herein. Forexample, voice biometric authentication computing platform 110 mayinclude one or more computers (e.g., laptop computers, desktopcomputers, servers, server blades, or the like) and/or other computercomponents (e.g., processors, memories, communication interfaces) thatmay be used to host and maintain a voice-activated virtual assistant. Insome instances, the voice biometric authentication computing platform110 may be configured to train the virtual assistant using previousvoice commands and/or interactive voice response sessions, to use thevirtual assistant to verify of identity of an individual, to provideresponses to the individual and/or to cause one or more events to beprocessed based on voice commands and/or verification of the identity ofthe individual associated with the voice command. In some instances, thevoice biometric authentication computing platform 110 may be configuredto dynamically update the virtual assistant as additional data and/orfeedback is received.

In some cases, a virtual assistant associated with voice biometricauthentication computing platform 110 may include functionality tofacilitate user interaction via a user device to perform one or moredesired activities, such as electronic transaction management activities(e.g., budgeting activities and the like) and performance and/orscheduling of one or more electronic transactions (e.g., scheduling abill-pay transaction, initiating an electronic funds transfer, and thelike). In some cases, the virtual assistant may interact with othernetworked computing systems managing and/or monitoring electronictransactions associated with the user. For example, the virtualassistant may access information from one or more online computingsystems, such as recurring deposit electronic transactions from anelectronic deposit computing system, bill-pay electronic transactionsfrom a bill-pay computing system, and/or one or more customerpreferences (e.g., budget information, minimum threshold information,and the like).

Voice biometric training server 120 may include one or more computingdevices and/or other computer components (e.g., processors, memories,communication interfaces). In addition, and as illustrated in greaterdetail below, voice biometric training server 120 may be configured toreceive information from, send information to, and/or otherwise exchangeinformation with one or more devices described herein.

User device 130 may include one or more computing devices and/or othercomputer components (e.g., processors, memories, communicationinterfaces). In addition, and as illustrated in greater detail below,user device 130 may be configured to receive information from, sendinformation to, and/or otherwise exchange information with one or moredevices described herein. In some examples, user device 130 may beremote from voice biometric authentication computing platform 110 and/orvoice biometric training server 120. User device 130 may be equippedwith a virtual assistant and may, among other functions, be configuredto receive audio files of voice commands and to transmit the audio filesto other devices as described herein.

User device 140 may include one or more computing devices and/or othercomputer components (e.g., processors, memories, communicationinterfaces). In addition, and as illustrated in greater detail below,user device 140 may be configured to receive information from, sendinformation to, and/or otherwise exchange information with one or moredevices described herein. In some examples, user device 140 may beremote from voice biometric authentication computing platform 110 and/orvoice biometric training server 120 and/or user device 130. User device140 may be a user account verified device and may provide informationrelated to unauthorized attempts to access the user account from anotherdevice.

User device 130 may be a mobile computing device (e.g., smartphone,tablet, smart watch, laptop computer, or the like) or desktop computingdevice (e.g., desktop computer, terminal, or the like) and/or mayinclude a smart speaker or other related devices. In addition, userdevice 130 may be linked to and/or used by a first user (who may, e.g.,be a customer of an enterprise organization (e.g., a financialinstitution) associated with enterprise server infrastructure 160 andenterprise data storage platform 170), but may also accessible to otherusers. User device 140 may be a mobile computing device (e.g.,smartphone, tablet, smart watch, laptop computer, or the like) ordesktop computing device (e.g., desktop computer, terminal, or thelike). In addition, user device 140 may be linked to and/or used by thefirst user. User device 140 may, in some instances, not be accessible toother users or may be associated with a higher degree of user accountsecurity than user device 130. User device 130 and/or user device 140may be used to interact with an account for an enterprise organization(e.g., an online banking account, or the like). In some instances, userdevice 130 and/or user device 140 may be configured to communicate witha virtual assistant host platform (e.g., voice biometric authenticationcomputing platform 110 and/or voice biometric training server 120, orthe like) to provide one or more virtual assistant services to theindividual. In some instances, user device 130 and/or user device 140may be configured to display one or more user interfaces (e.g., onlinebanking interfaces, or the like) and/or provide one or more audiooutputs.

In some cases, a virtual assistant may include functionality tofacilitate user interaction via user device 130 to perform one or moredesired activities, such as electronic transaction management activities(e.g., budgeting activities and the like) and performance and/orscheduling of one or more electronic transactions (e.g., scheduling abill-pay transaction, initiating an electronic funds transfer, and thelike). The virtual assistant may allow a user to quickly and easilyaccess various types of account information, e.g., using voice commands.In some cases, the virtual assistant may be capable of authenticating avoice command via a voice biometric authentication system as describedherein. This will safeguard against inadvertent or unauthorizeddisclosure of confidential or private account information while stillallowing the authorized user be able to easily access accountinformation. In some cases, the user may configure one or more settingof the virtual assistant related to the use of the voice biometricauthentication system, such as what types of voice commands trigger avoice biometric authentication process or how sensitive the voicebiometric authentication system is in triggering an unauthorized voicecommand alert. The may improve user experience in personalizing variousaspects of the voice biometric authentication system.

In some cases, a virtual assistant service may interact with othernetworked computing systems managing and/or monitoring electronictransactions associated with the user. For example, the virtualassistant may interact with enterprise server infrastructure 160 and/orenterprise data storage platform 170 to retrieve information related tothe enterprise user account, such as recurring electronic transactionsfrom an electronic deposit computing system, bill-pay electronictransactions from a bill-pay computing system, and/or one or morecustomer preferences (e.g., budget information, minimum thresholdinformation, and the like). In some examples, virtual assistant mayinteract with enterprise server infrastructure 160 to initiate one ormore transactions related with the enterprise user account. The virtualassistant may cause display of a virtual assistant user interface screenon display screen of user device, e.g., in response to one or more userqueries using the virtual assistant.

User device 130 may include one or more sensors for use in capturing orotherwise sensing biometric information of a user of user device 130.For example, user device 130 may include one or more sensors within thedevice and one or more sensors externally connected to user device 130,such as biometric sensors which may be communicatively coupled to userdevice 130 via an I/O port. User device 130 may further include one ormore of an audio input (e.g., a microphone), a fingerprint sensor, acamera (e.g., a still camera, a video camera, an infrared/biometriccamera, and the like), and/or a location sensor (e.g., a GPS device, atriangulation device such as a telecommunications modem, and the like).In some cases, user device 130 may be a stand-alone device dedicated tothe function of receiving and responding to voice commands. In somecases, an application and/or an application programming interface (API)interfacing with an application may run on user device 130 (e.g., amobile phone, a wearable device, a smartwatch, a laptop computer, adesktop computer, a tablet device, and the like). In some cases, userdevice 130 may be a stand-alone device, such as a self-servicetransaction device, a kiosk, or the like. In some cases, user device 130may be an external hardware device that may plug into, or otherwiseconnect, with a personal computing device. For example, user device 130may connect to a mobile phone or other such device via a hardwiredconnection (e.g., a universal serial bus (USB) connection, a mini-USBconnection, and the like) or via a wireless connection (e.g., aBluetooth connection, a WiFi, connection, a telecommunications networkconnection, an infrared (IR) communication link, and the like).

In some cases, an individual, may desire to use user device 130 (alongwith voice biometric training server 120) to generate a voice biometricsignature that may be used for data security and/or authenticationpurposes, as will be described in more detail below. In some cases, theindividual may desire to use a voice biometric signature to allow use ofthe added security that the voice biometric authentication systemoffers. In some cases, the individual may desire to use the voicebiometric signature to avoid a possibility of an improper impersonationby an unauthorized user at the expense of the individual’s credentials.In that regard, the user’s voice signal may be combined with additionalinformation that may be incorporated into the voice biometric signature,and/or applied as an overlay over the user’s voice signal as, for anexample, a “digital watermark.” In doing so, the voice biometricauthentication system may further reduce the likelihood of anunauthorized user attempting to mimic or use a voice recording in anattempt to access information of another user’s account.

In some cases, the user’s voice signal may be captured using an audioinput of user device 130 and the user’s voice signal may comprise avoice command spoken by the user, such as a particular word or phrase.In some examples, user device 130 may capture a geographic locationusing a location sensor to identify a current location of user device130, e.g., where user device 130 is a mobile device. Additionally, userdevice 130 may capture additional biometric information using one ormore biometric sensors, such as a fingerprint sensor, a camera, and/orother such sensors that may be capable of capturing biometricinformation. In some cases, the biometric information captured may beused in a user authentication procedure for allowing the user access touser device 130. For example, user device 130 may capture fingerprintinformation, retina scan information, facial recognition informationwith or without text information, or other user verification and/orpasswords to facilitate user logon to the user device 130 and/or anapplication running on user device 130. Once the user login has beenverified, the user may be allowed access to one or more features and/orfunctionality of user device 130, including creation and/or use of avoice biometric signature. In some cases, user device 130 may beconfigured to incorporate additional information into the user’s voicesignal to generate a unique voice biometric signature for the user.

User device 130 may include a mobile portal or online portal thatprovides access to an enterprise organization system (e.g., viaenterprise server infrastructure 160) by a communication session withuser device 130. Communications used to access to the enterpriseorganization through the mobile portal may be referred to as mobilecommunications. In some examples, mobile communications may includeHyperText Transfer Protocol (HTTP) requests. The mobile portal mayprovide access to enterprise organizations via a mobile application(which may be referred to as a “mobile app” or “app”) installed on userdevice 130, which may be a mobile computing device, e.g., a smartphone,a palmtop computer, a tablet computer, and other types of mobilecomputing devices configured to run mobile applications. A mobileapplication may thus be in communication with the mobile portal throughone or more wireless networks (e.g., a cellular network), wired networks(e.g., the Internet), or a combination of wired or wireless networks.

An online portal may also provide access to the enterprise organizationvia a communication session with user device 130. Communications used toaccess to the enterprise organization through the online portal may bereferred to as online communications. In some examples, onlinecommunications may include HTTP requests. The online portal may provideaccess to the enterprise organization over the Internet and may thusinclude one or more web pages and web services. Accordingly, user device130 may be in communication with the online portal via a web browser onuser device 130. In such examples, user device 130 may thus be, e.g., adesktop computer, a laptop computer, a tablet computer, a palmtopcomputer, a smartphone, and any other computing device capable of webaccess.

In aspects described herein, user device 130 may display, playback, orotherwise present prompts to a user to speak certain voice commands,such as a key phrase. In response, user device 130 may receive thespoken voice commands and may thereafter pass the voice commands tovoice biometric authentication computing platform 110 and/or voicebiometric training server 120 for analysis. When using a mobileapplication or web browser on user device 130, a user may speak thevoice command into a microphone of the user device 130, and an audiofile comprising the spoken voice command may be uploaded to the mobileportal or online portal.

Enterprise server infrastructure 160 may include one or more computingdevices and/or other computer components (e.g., processors, memories,communication interfaces). In addition, and as illustrated in greaterdetail below, enterprise server infrastructure 160 may be configured tohost, execute, and/or otherwise provide one or more enterpriseapplications. Enterprise server infrastructure 160 may also beconfigured to receive information from, send information to, and/orotherwise exchange information with one or more devices as describedherein. The location where enterprise server infrastructure 160 isdeployed may be remote from voice biometric authentication computingplatform 110 and/or voice biometric training server 120 and/or userdevice 130 and/or user device 140.

For example, enterprise server infrastructure 160 may be configured tohost, execute, and/or otherwise provide one or more speech processingprograms, machine learning models, an enterprise mobile application foruser devices, and/or other programs associated with an enterpriseserver, such as a trading platform. In some instances, enterprise serverinfrastructure 160 may be configured to provide various enterpriseand/or back-office computing functions for an enterprise organization,such as a financial institution. For example, enterprise serverinfrastructure 160 may include various servers and/or databases thatstore and/or otherwise maintain account information, such as financialaccount information including account balances, transaction history,account owner information, trade history, market share information,trading portfolios, a trading platform, tax related documents andinformation, and/or other information. In addition, enterprise serverinfrastructure 160 may process and/or otherwise execute tasks onspecific accounts based on commands and/or other information receivedfrom other computer systems included in computing environment 100.Additionally, or alternatively, enterprise server infrastructure 160 mayreceive instructions from voice biometric authentication computingplatform 110 and then execute those instructions.

In some examples, enterprise server infrastructure 160 may be acomponent of a banking system. The banking system may include a customerdatabase and various communication portals that provide access to thebanking system. The communication portals of the banking system serve asentry points into the banking system to receive communications from aremote location, such as user device 130 or user device 140. The bankingsystem may also include different types of communication portals toallow individuals to access the banking system using different types ofdevices. In some instances, the banking system may include aninteractive voice response (IVR) portal, a mobile portal, and/or anonline portal to facilitate communications with the banking system.

Enterprise data storage platform 170 may include one or more computingdevices and/or other computer components (e.g., processors, memories,communication interfaces). In addition, and as illustrated in greaterdetail below, enterprise data storage platform 170 may be configured toreceive information from, send information to, and/or otherwise exchangeinformation with one or more devices as described herein. The locationwhere enterprise data storage platform 170 is deployed may be remotefrom voice biometric authentication computing platform 110 and/or voicebiometric training server 120 and/or user device 130 and/or user device140 and/or enterprise server infrastructure 160. In addition, and asillustrated in greater detail below, enterprise data storage platform170 may be configured to store and/or otherwise maintain enterprisedata. Additionally, or alternatively, enterprise server infrastructure160 may be configured to store and/or otherwise maintain enterprisedata. For example, enterprise server infrastructure 160 may beconfigured to store and/or otherwise maintain task templates associatedwith users, historical data related to users, biometric identifiersassociated with users, behavioral identifiers associated with users,location data of computing devices, and so forth. Additionally, oralternatively, enterprise server infrastructure 160 may load data fromenterprise data storage platform 170, manipulate and/or otherwiseprocess such data, and return modified data and/or other data toenterprise data storage platform 170 and/or to other computer systemsincluded in computing environment 100.

In some embodiments, enterprise data storage platform 170 may storecustomer profiles. The customer profiles may include customerinformation relating to an enterprise organization customer. Customerinformation may include, for example, the name of the customer, contactinformation for the customer, and account information for the customer.Customer information may also include information that the enterpriseorganization may utilize to determine the identity or authenticate anindividual such as answers to security questions, phone numbers or oneor more network addresses from which the individual previously contactedthe enterprise organization, device identification numbers of devicesthe individual has previously used to contact the enterpriseorganization, and other types of information that may be utilized toidentify or authenticate an individual. Customer information may includeother types of information related to enterprise organization customers.

In some arrangements, enterprise server infrastructure 160 andenterprise data storage platform 170 may be owned and/or operated by afirst enterprise organization, and/or enterprise server infrastructure160 and enterprise data storage platform 170 may be deployed anenterprise centers that are owned and/or operated by the firstenterprise organization. In addition, voice biometric authenticationcomputing platform 110 and voice biometric training server 120 may alsobe owned and/or operated by the first enterprise organization, and/orvoice biometric authentication computing platform 110 and/or voicebiometric training server 120 may be deployed an enterprise centers thatare owned and/or operated by the first enterprise organization. Still inother examples, voice biometric authentication computing platform 110and/or voice biometric training server 120 may be owned or operated by adifferent organization (e.g., a second enterprise organization) and/orvoice biometric authentication computing platform 110 and/or voicebiometric training server 120 may be deployed remote from the enterpriseserver infrastructure 160 and enterprise data storage platform 170. Asillustrated in greater detail below, some aspects of the disclosure mayprovide technical benefits that are not found in conventional systems,because voice biometric authentication computing platform 110 mayauthenticate voice commands prior to such voice commands beingprocessed, e.g., so as to access information associated with a userdevice from enterprise server infrastructure 160 and/or enterprise datastorage platform 170.

Computing environment 100 also may include one or more networks, whichmay interconnect one or more of voice biometric authentication computingplatform 110, voice biometric training server 120, user device 130, userdevice 140, enterprise server infrastructure 160, and enterprise datastorage platform 170. For example, computing environment 100 may includea network 150 (which may, e.g., interconnect voice biometricauthentication computing platform 110, voice biometric training server120, user device 130, user device 140, enterprise server infrastructure160, enterprise data storage platform 170, and/or one or more othersystems which may be associated with an enterprise organization, such asa financial institution, with one or more other systems, publicnetworks, sub-networks, and/or the like).

In one or more arrangements, voice biometric authentication computingplatform 110, voice biometric training server 120, user device 130, userdevice 140, enterprise server infrastructure 160, and enterprise datastorage platform 170 may be any type of computing device capable ofreceiving a user interface, receiving input via the user interface, andcommunicating the received input to one or more other computing devices.For example, voice biometric authentication computing platform 110,voice biometric training server 120, user device 130, user device 140,enterprise server infrastructure 160, enterprise data storage platform170, and/or the other systems included in computing environment 100 may,in some instances, include one or more processors, memories,communication interfaces, storage devices, and/or other components. Asnoted above, and as illustrated in greater detail below, any and/or allof voice biometric authentication computing platform 110, voicebiometric training server 120, user device 130, user device 140,enterprise server infrastructure 160, and enterprise data storageplatform 170 may, in some instances, be special-purpose computingdevices configured to perform specific functions.

Referring to FIG. 1B, voice biometric authentication computing platform110 may include one or more processor(s) 111, memory(s) 112, andcommunication interface(s) 113. A data bus may interconnect processor111, memory 112, and communication interface 113. Communicationinterface 113 may be a network interface configured to supportcommunication between voice biometric authentication computing platform110 and one or more networks (e.g., network 150 or the like). Memory 112may include one or more program modules having instructions that whenexecuted by processor 111 cause voice biometric authentication computingplatform 110 to perform one or more functions described herein and/orone or more databases that may store and/or otherwise maintaininformation which may be used by such program modules and/or processor111. In some instances, the one or more program modules and/or databasesmay be stored by and/or maintained in different memory units of voicebiometric authentication computing platform 110 and/or by differentcomputing devices that may form and/or otherwise make up voice biometricauthentication computing platform 110. For example, memory 112 may have,store, and/or include an audio data processing engine 112 a, a voicebiometric authentication module 112 b, a voice biometric database 112 c,and a local synchronization module 112 d. Audio data processing engine112 a may have instructions that direct and/or cause voice biometricauthentication computing platform 110 to process audio files anddetermine voice commands associated with those audio files. Voicebiometric authentication module 112 b may verify that voice commands areassociated with an authorized user, e.g., an account holder, based onanalysis of voice biometrics, as discussed in greater detail below.

Voice biometric database 112 c may store voice signatures or voiceprints associated with authorized users, which may be used by voicebiometric authentication module 112 b and/or voice biometric trainingserver 120 in setting up or updating the voice signatures. The voicebiometric database 112 c may include sets or collections of one or morevoice biometric signatures. In some examples, the voice biometricsignatures may comprise recordings of a key phrase recorded, e.g.,during a setup process. Each voice biometric signature may berespectively associated with a customer profile in the voice biometricdatabase 112 c. In some examples, the key phrase may include the fullname (first name and last name) of the customer. In some examples, thekey phrase may include common voice commands for use with the virtualassistant. A key phrase may also be referred to, in some instances, as apassphrase. Local synchronization module 112 d may have instructionsthat direct and/or cause voice biometric authentication computingplatform 110 to synchronize device information (which may, e.g., includedevice signatures and/or other information associated with devicesdetected at various locations) with various enterprise systems (e.g.,enterprise server infrastructure 160, enterprise data storage platform170) which may be deployed at various enterprise locations and/or othersystems. In some examples, memory 112 may have, store, and/or include avoice biometric engine, a voice signature engine, a speech-to-textengine, a filtering engine, a business rules engine, an authenticationengine, and the like, and/or such components may be included and/orstored in one or more of audio data processing engine 112 a, voicebiometric authentication module 112 b, voice biometric database 112 c,or local synchronization module 112 d.

The audio data processing engine 112 a may be configured to generate avoice print as output when provided audio data as input. The voice printmay be, for example, a string of alphabetic and numeric characters.Additionally, the voice print may include one or more characteristicsrelating to biometrics of the voice print. Accordingly, the audio dataprocessing engine 112 a may be configured to generate the string ofalphabetic and numeric characters as output when provided voice audiodata as input. During an enrollment process, an enterprise organizationmay ask a user to speak a key phrase and so as to provide audio data tothe audio data processing engine 112 a in order to obtain a voice printof the key phrase for the user. The voice print for the user may then bestored in the voice biometric database 112 c and associated with a userprofile for the user. When the user subsequently attempts to accessaccount information, the user may be prompted to speak the key phraseagain, e.g., in addition to or in combination with one or more othervoice commands, and the audio data processing engine 112 a may receivethe spoken key phrase and generate a voice print for the spoken keyphrase. The voice print may then be compared to one or more of the voicebiometric signatures stored in the voice biometric database 112 c.

The audio data processing engine 112 a may be a commercially availableautomatic speech recognition (ASR) system. The voice biometricauthentication computing platform may utilize the audio data processingengine 112 a to convert an audio voice command to text. In certainexamples, the voice command text may include a name of user in textform. The audio data processing engine 112 a may extract the name of theindividual from the voice command text. Because the extracted name is intext form, the voice biometric database 112 c may be queried with theextracted name to obtain one or more voice biometric signaturesrespectively associated with users having that name.

The voice biometric authentication module 112 b may be configured tocompare the voice print of a voice command to a voice biometricsignature (e.g., a voice print of a previous recording of the same voicecommand) and determine whether there is match. If there is a match, thenthe voice biometric authentication module 112 b may conclude that theuser that provided the voice command is the same user associated withthe voice biometric signature. The voice biometric authentication module112 b may provide a confidence score quantifying the likelihood of amatch between the voice command and the voice biometric signature. Arelatively high confidence score may indicate a relatively highlikelihood that the same user provided both the voice command and thevoice biometric signature. A relatively low confidence score mayindicate a relatively low likelihood that the same user provided boththe voice and the voice biometric signature. Stated differently, arelatively low confidence score may indicate that one user provided thevoice command and a different user provided the voice biometricsignature. The voice biometric authentication module 112 b may beconfigured for one-to-one voice biometric comparisons in which one voicecommand is compared with one voice biometric signature and, based onthis comparison, one confidence score is generated for the comparisonperformed. The voice biometric authentication module 112 b may also beconfigured for one-to-many voice print comparisons in which one voicecommand is compared to each voice biometric signature in a collection ofmultiple voice biometric signatures. For a one-to-many voice biometriccomparison, the voice biometric authentication module 112 b may generatea collection of multiple confidence scores for each respectivecomparison performed.

A collection of voice biometric signatures from voice biometric database112 c may be filtered before the collection of voice biometricsignatures is provided to the voice biometric authentication module 112b. When the collection of voice biometric signatures is filtered, one ormore voice biometric signatures may be removed from the collection suchthat the voice biometric authentication module 112 b does not comparethe voice command to the voice biometric signatures removed from thecollection. A collection of voice biometric signatures may be filteredwhen a total number of voice biometric signatures to be provided to thevoice biometric authentication module 112 b exceeds a predetermined sizethreshold. The predetermined size threshold may be selected based on oneor more capabilities of the voice biometric authentication module 112 bto perform the comparisons within a desired response time.

A collection of voice biometric signatures from voice biometric database112 c may be filtered based on a variety of criteria. In some exampleimplementations, a collection of voice biometric signatures may befiltered based on a characteristic of the voice command. As noted above,voice command may originate from a mobile communication or an onlinecommunication and may therefore be respectively associated with a phonenumber, network address, or device identifier, which may, for instance,be considered characteristics of the voice command. As also noted above,the voice biometric database 112 c may store user information indicatingprevious voice communication received with respect to a user profile andinformation related to those previous voice communications, e.g., phonenumbers, network addresses, or device identifiers. Through anassociation with a user profile, a stored voice biometric signature mayalso be associated with the previous voice communications received withrespect to that user profile. Accordingly, in filtering the collectionof voice biometric signatures based on one or more characteristics, thephone number, network address, or device identifier associated with acurrent voice command may be compared to the phone number, networkaddress, or device identifier associated with an associated voicebiometric signature. In some examples, filtering may be performed basedon such comparisons to determine whether to remove a voice biometricsignature from the collection of voice biometric signatures providedfrom voice biometric database 112 c. It will be appreciated that thecharacteristics of current and previous voice commands and/orcommunications represent just one type of criteria by which a collectionof voice biometric signatures may be filtered. Additional andalternative criteria may be selectively employed to filter a collectionof voice biometric signatures.

In some examples, voice biometric authentication module 112 b may applyvarious business rules related to the identification and authenticationof a user. For example, a confidence score may be compared to aconfidence threshold in order to determine whether or not toauthenticate the voice command from a user. The voice biometricauthentication module 112 b may also determine whether to performadditional verification steps based on a comparison of the confidencescore to a confidence threshold. The voice biometric authenticationmodule 112 b may also apply various business rules to direct acommunication associated with the voice command once a voice command hasbeen authenticated, e.g., in order to provide requested user accountinformation.

In some examples, voice biometric authentication module 112 b mayperform further authentication of the identity of the user issuing avoice command. For example, voice biometric authentication module 112 bmay query a user database or a list of users of the voice biometricdatabase 112 c for security questions associated with a user profile andissue challenges to a user attempting to access account information,based on certain determinations made by the voice biometricauthentication module 112 b, such as a confidence score of the voicecommand being below a threshold. The challenges may prompt the user toprovide an answer to a security question. The voice biometricauthentication module 112 b may then authenticate or reject the identityof user depending on the number of challenges answered correctly. Thevoice biometric authentication module 112 b may also communicate thenumber of challenges answered correctly or incorrectly to another device(e.g., user device 140 or enterprise server infrastructure 160), forfurther determination as to how to handle the voice command session.Security questions posed may be based on static information (e.g., “Whatstreet did you grow up on?”) or dynamic information (e.g., “Whichrestaurant did you eat at within the last week?”).

If the voice command is authenticated, then the user issuing the voicecommand may be granted access information relating to associated useraccounts and other relate services. Authentication of a voice command isdescribed in further detail below.

Two approaches to voice biometrics technology may be employed: passivevoice biometrics and active voice biometrics. With passive voicebiometrics, any speech received from user may be processed, analyzedand, in some instances, matched to a previously obtained voice biometricsignature. With active voice biometrics, an audio file of a phrasespoken by user may be received responsive to a prompt for the phrase,and that audio file may be processed and analyzed, and in someinstances, matched to a previously obtained voice biometric signaturecorresponding to that phrase. In either case, a voice biometricsignature may be created and/or refined for a particular user, and voicebiometrics may indicate whether a user associated with a voice commandand a user associated with the voice biometric signature are the same.FIGS. 2A-2B depict an illustrative event sequence for a passive voicebiometric setup at a voice biometric training server in accordance withone or more example embodiments. FIGS. 2C-2D depict an illustrativeevent sequence for an active voice biometric setup at a voice biometrictraining server in accordance with one or more example embodiments.

For example, voice biometric authentication computing platform 110 maydetermine that a voice signature associated with a user or a useraccount has not yet been setup, which may cause a user device (e.g.,user device 130 or user device 140) to generate, display, and/orotherwise present a graphical user interface similar to graphical userinterface 300, which is illustrated in FIG. 3 . As seen in FIG. 3 ,graphical user interface 300 may include text and/or other informationindicating a voice signature for the user account was not detected andprompting the user to initiate a set process (e.g., “There is no voicesignature associated with this user account. A voice signature willimprove voice functionality. Would you like to set up a verified voicesignature?”) as well as one or more user-selectable controls allowingthe user of the user device, such as user device 130 or user device 140to make a selection (e.g., “Active setup (recommended) I Passive setup INot interested in voice functionality (return to main menu)”). In thatregard, the graphical user interface 300 may include a recommendedoption (“Active setup” in FIG. 3 ). For example, an active voicesignature setup may be a recommended option to the extent that it mayproduce to a more accurate voice signature. However in other examples,other options may be recommended options. For example, if time is aconcern, a passive voice signature setup may be recommended (“Passivesetup”) as it may create a signature while requiring less time from theuser (e.g., in not requiring the specified voice commands from the useras will be described in more detail below). In some examples, aselection to not create a voice signature may be provided as an option(“Not interested in voice functionality (return to previous menu)”) andmay be useful to users who do not expect to use voice functionality witha respective device. In some examples, a selection to not create a voicesignature may be a recommended option, e.g., where the user device isshared with many different users and may be likely subjected tounauthorized voice commands.

In some embodiments, prompting the user to create a voice signature mayinclude providing the user with information regarding the various setupoptions so that the user may be able to make a more informed selection.For example, in prompting the user, there may be a selection to obtainmore information associated with the various selections. In someembodiments, a recommended selection may be determined based oninformation associated with the user account and/or user device, such asif other users use the device, how many users user the user device,account settings of the user account, and the like. In some embodiments,prompting the user to create a voice signature may occur upon a userfirst issuing a voice command, upon a user first logging in to the useraccount from a particular voice-enabled device, upon a user downloadingan application associated with an enterprise organization for which theuser has an account, and the like.

Referring to FIG. 2A, at step 201, voice biometric training server 120may receive a prompt for a passive voice signature setup. For example,at step 201, voice biometric authentication computing platform 110 oruser device 130 may initiate the prompt (e.g., by a user selection atuser device 130 or based on a determination at voice biometricauthentication computing platform 110 that no voice signature exists fora user account) and thereafter the prompt may be transmitted to voicebiometric training server 120. For instance, a user selection may bereceived at user device 130, and user device 130 may thereafter transmitthe prompt for a passive voice signature setup to voice biometrictraining server 120. As described above and as shown in the examplegraphical user interface 300 of FIG. 3 , this prompt may be based on aselection between an active voice signature setup and a passive voicesignature setup. In some examples, this prompt may simply be based on auser selecting not to perform an active voice signature setup. Asanother example, voice biometric authentication computing platform 110may determine that there is no voice signature associated with aparticular user account (e.g., a user account associated with userdevice 130 and/or user device 140), and voice biometric authenticationcomputing platform 110 may thereafter transmit the prompt for a passivevoice signature setup to voice biometric training server 120. Such asetup may also be automatically prompted upon a user first issuing voicecommands, e.g., from user device 130.

At step 202, voice biometric training server 120 may receive passivevoice monitoring data from, e.g., user device 130, user device 140,and/or one or more other data sources. For example, at step 202, voicebiometric training server 120 may receive any speech from an individualat user device 130. As another example, voice biometric training server120 may receive any speech associated with use of voice commands toaccess a user account independent of a device that receives the voicecommand (e.g., upon a second-factor user authentication, such as apassword, fingerprint, or the like). Voice biometric training server 120may receive, via the communication interface (e.g., communicationinterface 113 of voice biometric authentication computing platform 110or a communication interface of voice biometric training server 120),from one or more data source computer systems (e.g., from user device130, user device 140, and/or one or more other data sources), passivevoice monitoring data. The passive voice monitoring data may, forinstance, include any number of voice data, including voice commandsrelating to access an account balance, verifying one or moretransactions of an account, accessing one or more settings of the useraccount, accessing account activity data, accessing previous orscheduled transfers, changing transfers, creating news transfers, andthe like. The passive voice monitoring data may, for instance, simplyinclude regular speech by an individual, e.g., speech that is notspecific to voice command for the virtual assistant. The passive voicemonitoring data may, for instance, be specific to a customers and/orother individual, and/or may be specific to a device.

At step 203, voice biometric training server 120 may setup an initialvoice print or voice signature based on the passive voice monitoringdata. For example, at step 203, voice biometric training server 120 mayapply a type of voice signature model specific to the range, quantityand/or type of passive voice monitoring data received from the one ormore data source computer systems. For instance, voice biometrictraining server 120 may apply certain settings or characteristics increating the voice biometric signature, e.g., based on the promptreceived at step 201. The accuracy of the voice biometric signaturecreated at step 203 may be based on factor associated with the passivevoice monitoring data received, such as the quality, quantity,uniformity, repeatability, and the like. Creating the voice biometricsignature at step 203 may also entail quantifying the accuracy of thesignature, e.g., by computing a confidence level associated to the voicebiometric signature. In some examples, step 203 may only be performedupon the receipt of a sufficient amount or quality of received passivevoice monitoring data. In some examples, an alert may be sent to a userdevice (e.g., user device 130 or user device 140) if an amount of timehas passed and a sufficient amount and/or quality of passive voicemonitoring data has still not yet been received. In such examples, thealert may also include a prompt to initiate an active voice biometricsignature setup.

In some embodiments, voice biometric training server 120 may be setup tocontinue receiving additional passive voice monitoring data after aninitial voice biometric signature has been created. In that regard, atstep 204, voice biometric training server 120 may receive additionalpassive voice monitoring data. The additional passive voice monitoringdata received at step 204 may be similar to the passive voice monitoringdata received at step 202. In some examples, the additional passivevoice monitoring data received at step 204 may only be specific to usercommands using the virtual assistant and/or user commands related toaccessing information associated with the user account for the firstenterprise organization. In some examples, the additional passive voicemonitoring data received at step 204 may include all speech detected ata device of the user, such as user device 130 or user device 140. Insome examples, receiving additional passive voice monitoring data atstep 204 may be based on a user selection to continue to refine thevoice signature, or based on a command from voice biometricauthentication computing platform 110 to continue to refine the voicesignature. In some example, continuing to refine the voice signature maybe based on a confidence level associated to the voice biometricsignature created at step 203.

Now referring to FIG. 2B, at step 205, voice biometric training server120 verifies that the additional passive voice monitoring data matchesthe voice biometric signature created at step 203. In some embodiments,step 205 may include applying a voice biometric signature matchingalgorithm, as will be described in more detail below. The voicebiometric matching algorithm may take into account a number of featuresregarding the voice biometric signature, such as the confidence intervalassociated with the voice biometric signature, the amount of passivevoice monitoring data the was received at step 202 relative to theadditional passive voice monitoring data received at step 204, the typeof voice command(s) associated with the additional passive voicemonitoring data received at step 204, and the like.

Upon determining that there is a mismatch between the additional passivevoice monitoring data and the voice biometric signature, voice biometrictraining server 120 may update or refine the voice biometric signatureat step 206. Following the receipt and analysis of additional passivevoice monitoring data relative to the voice biometric signature at step205 and, in some cases, updating the voice biometric signature at step206, the confidence level associated with the voice biometric signaturemay be computed (or recomputed) at step 207.

At step 208, the voice biometric signature, created, and in some casesrefined, using a passive voice signature setup, may be transmitted forstorage in a voice biometric database. As shown in FIG. 1B, voicebiometric database 112 c may be part of the voice biometricauthentication computing platform 110. In other examples, the voicebiometric database may be located in enterprise data storage platform170. Still in other examples, the voice biometric database may belocated in various other locations without departing from the scope ofthe present disclosure, including but not limited to voice biometrictraining server 120, user device 130, user device 140, and/or enterpriseserver infrastructure 160. In some examples, steps 205 and 207 may beskipped, e.g., if the initially created voice biometric signature atstep 203 is associated with a high confidence level. Still, in someexamples, step 205, 206, 207, and 208 may be repeated one or more timesto continue to refine and update the voice biometric signature.

Now referring to FIG. 2C, an illustrative event sequence for an activevoice biometric setup at a voice biometric training server is depictedin accordance with one or more example embodiments. At step 209, voicebiometric training server 120 may receive a prompt for an active voicesignature setup. For example, at step 209, voice biometricauthentication computing platform 110 or user device 130 may initiatethe prompt (e.g., by a user selection at user device 130 or based on adetermination at voice biometric authentication computing platform 110that no voice signature exists for a user account) and thereaftertransmit the prompt to voice biometric training server 120. Such aprompt may include causing a user device (e.g., user device 130 or userdevice 140) to generate, display, and/or otherwise present a graphicaluser interface similar to graphical user interface 300, which isillustrated in FIG. 3 , and the subsequent selection by the user for anactive voice signature setup (“Active setup (recommended)”). An activevoice biometric may be a recommended option where such a setup is likelyto result in a more accurate voice biometric signature of the user.

For instance, a user selection may be received at user device 130, anduser device 130 may thereafter transmit the prompt for an active voicesignature setup to voice biometric training server 120. In someexamples, this prompt may simply be automatically initiated based on atype of user device and/or a type of user account associated with theuser. In particular, and to the extent that an active voice biometricmay be a recommended option where such a setup is likely to result in amore accurate voice biometric signature of the user, the voice biometricauthentication computing platform 110 may determine that an active voicesignature setup is to be performed in examples where a higher level ofsecurity is sought to protect against unauthorized voice commands. Asanother example, voice biometric authentication computing platform 110may simply determine that there is no voice signature associated with aparticular user account (e.g., a user account associated with userdevice 130 and/or user device 140), and voice biometric authenticationcomputing platform 110 may thereafter transmit the prompt for an activevoice signature setup to voice biometric training server 120. Such asetup may also be automatically prompted upon a user first issuing voicecommands, e.g., from user device 130.

At step 210, voice biometric training server 120 send user voicecommands to a user device (e.g., user device 130, user device 140). Theuser voice commands may include a series of example voice commands thatwould be used to access account information associated with a user(e.g., “check balance,” “transfer funds,” “verify recent transactions,”and the like). In some examples, the user voice commands may include aseries of words or phrases that allow voice biometric training server120 to establish a voice biometric fingerprint for any number of voicecommand phrases. The user voice commands may be provided to a userdevice for audio and/or video playback, display, or other type ofpresentation by the user device. In response to the user voice commands,audio data responsive to each of the user voice commands at step 211.The audio data may be transmitted from a user device, such as userdevice 130 or user device 140. For example, at step 210, voice biometrictraining server 120 may send a single user voice command and, uponreceipt of audio data response to that single user voice command from auser device at step 211, steps 210 and 211 may be repeated an additionalnumber of times with additional user voice commands. As another example,voice biometric training server 120 may send a series of user voicecommands at once at step 210, and at step 211 audio data may betransmitted to voice biometric training server 120 responsive to each ofthe series of user voice commands. Voice biometric training server 120may receive, via the communication interface (e.g., communicationinterface 113 of voice biometric authentication computing platform 110or a communication interface of voice biometric training server 120),from one or more data source computer systems (e.g., from user device130, user device 140, and/or one or more other data sources), audio dataresponsive to the user voice commands.

At step 212, voice biometric training server 120 may setup an initialvoice print or voice signature based on the audio data responsive to theuser voice commands. For example, at step 212, voice biometric trainingserver 120 may apply type of voice signature model specific to therange, quantity and/or type of audio data received from the one or moreuser devices. For instance, voice biometric training server 120 mayapply certain settings or characteristics in creating the voicebiometric signature. The accuracy of the voice biometric signaturecreated at step 212 may be based on factors associated with the audiodata received, such as the quality, quantity, uniformity, repeatability,and the like. Creating the voice biometric signature at step 212 mayalso entail quantifying the accuracy of the signature, e.g., bycomputing a confidence level associated to the voice biometricsignature. In some examples, step 212 may only be performed upon thereceipt of a certain quality of audio data responsive to the user voicecommands. In some examples, an alert may be sent to a user device (e.g.,user device 130 or user device 140) if the quality of the audio data isinsufficient to create a biometric voice signature. In some embodiments,voice biometric training server 120 may continue to send user voicecommands and receive audio data responsive to those user voice commandsuntil there is sufficient voice command data to create the voicebiometric signature at step 212. In some examples, sending additionaluser commands and thereafter receiving audio data responsive to the uservoice commands may be based on a user selection to continue to refinethe voice signature, or based on a command from voice biometricauthentication computing platform 110 to continue to refine the voicesignature.

Now referring to FIG. 2D, the confidence level associated with the voicebiometric signature may be computed at step 213. In some examples, thevoice biometric signature may continue to be refined based on aconfidence level associated to the voice biometric signature computed atstep 213, e.g., by continuing to collect additional audio data. At step214, the voice biometric signature, created using an active voicesignature setup, may be transmitted for storage in a voice biometricdatabase. In some examples, the voice biometric database may be locatedin enterprise data storage platform 170 or in voice biometric database112 c of voice biometric authentication computing platform 110. Still inother examples, the voice biometric database may be located in variousother locations without departing from the scope of the presentdisclosure, including but not limited to voice biometric training server120, user device 130, user device 140, and/or enterprise serverinfrastructure 160.

Referring to FIG. 2E, an illustrative event sequence for a voicebiometric authentication at a voice biometric authentication computingplatform is depicted. The voice biometric authentication may occur aftera voice signature is set up, e.g., in accordance with the voicesignature setup event sequences described for FIGS. 2A-2B or 2C-2D. Atstep 215, voice biometric authentication computing platform 110 mayreceive, via communication interface 113, an audio file comprising avoice command to access information related to a user account. Forexample, at step 215, the voice command may be sent from user device130, which is equipped with a virtual assistant having IVR features, asdescribed above. In some examples, user device 130 may be a deviceassociated with a user account (e.g., in which a verified user accountaccess previously occurred). In some examples, certain types orclassifications of voice commands received at step 215 may trigger thevoice authentication process. In some examples, all voice commandsreceived at step 215 may initiate the voice authentication process.

In some aspects, a particular user account may be associated with userdevice 130, e.g., if user device 130 is currently logged into the useraccount in an application, if user device 130 was previously logged intothe user account, if the user account is associated with user device130, and the like. In some aspects, a particular user account may bereferenced by a keyword in the voice command, such as by identifying aname on the user account, by identifying an account number, byidentifying an account username and/or password or passcode, and thelike. In some aspects, one or more users may be associated with userdevice 130, each of the one or more users may have one or more useraccounts. As described in more detail below, voice biometricauthentication computing platform 110 may, in some examples, analyzevoice biometrics associated with the one or more users as part ofauthenticating the voice command received at step 215.

Authentication, as used in this description, may refer to verifying theidentity of a user, such as the user that provides the voice command.Authentication may include identifying a user associated with the useraccount and verifying that the voice command match voice biometricsassociated with the user of the user account. In some instances, morethan one user may be associated with a user account, and authenticationmay include analyzing the voice command with respect to voice biometricsof each of the more than one user. When the voice command include akeyword identifying an aspect of the user account, authentication mayinclude verifying that the information associated with the keyword alongwith voice biometrics of the voice command.

After receiving the voice command, voice biometric authenticationcomputing platform 110 may retrieve one or more voice biometricsignatures associated with the user account from a voice biometricdatabase at step 216. As described above, the voice biometric databasemay be voice biometric database 112 c. Still in other examples, thevoice biometric database may be located in various other locationswithout departing from the scope of the present disclosure, includingbut not limited to voice biometric training server 120, user device 130,user device 140, enterprise server infrastructure 160, and/or enterprisedata storage platform 170. The retrieved voice biometric signature maybe specific to a particular user or particular to a voice command by theuser. The voice biometric database may be queried for voice biometricsignatures associated with a name on the user account. In some examples,a plurality of voice biometric signatures may be retrieved, e.g., wheremore than one user is associated with a user account. In some examples,a voice biometric signature may be associated with a key phrase, andthere may thus be a plurality of voice biometric signatures, eachassociated with a different key phrase. Voice biometric authenticationcomputing platform 110 may employ various search and/or filteringtechniques to identify and retrieve the one or more voice biometricsignatures associated with the user account. For instance, voicebiometric authentication computing platform 110 may filter a resultantset of voice biometric signatures based on a characteristic of the voicecommand received at step 215, e.g., to identify one or more voicebiometric signatures with a same or similar characteristic. In someexamples, the voice command may include a key phrase that includes anidentifier associated with the user and/or user account. One or morevoice biometric signatures may then be retrieved based on the identifierincluded in the key phrase. For example, the voice biometric databasemay be queried to identify one or more voice biometric signatures thatare associated with a name on a user account that matches a nameincluded in the key phrase. In some examples, voice biometricauthentication computing platform 110 may determine that there are novoice biometric signatures in the voice biometric database, and maythereafter transmit a prompt to the user device related to the setup ofa voice biometric signature. Such a prompt may include the display ofgraphical user interface 300 of FIG. 3 .

At step 217, based on applying a voice biometric matching algorithm tocompare the voice command of the audio file to the one or more voicebiometric signatures, voice biometric authentication computing platform110 may determine if a match exists between the voice command and one ofthe one or more voice biometric signatures. The voice biometric matchingalgorithm may take into account a number of features regarding the voicebiometric signature, such as the confidence interval associated with thevoice biometric signature, a classification of the voice command, one ormore key phrases included in the voice command, and the like. The voicebiometric matching algorithm may include comparing a number of featuresof the voice command to the voice biometric signature, such as tonality,pitch, loudness, phonation, rate, and the like. In some examples, thevoice biometric matching algorithm may determine a relative match amountor relative match percentage to quantify a degree to which the voicecommand and the one or more voice biometric signatures match. Therelative match amount or relative match percentage may be compared to amatch threshold to determine if the voice command sufficiently matchesthe one or more voice biometric signatures.

As part of step 217, voice biometric authentication computing platform110 may compute a confidence score based on comparing the voice commandto the one or more voice biometric signatures. The confidence score mayquantify the likelihood that the user that provided the voice command isalso associated with the one or more voice biometric signatures. Inexamples where more than one voice biometric signatures are compared toa single voice command, voice biometric authentication computingplatform 110 may identify a voice biometric signature having the higherconfidence score and using that voice biometric signature for subsequentsteps, e.g., for accessing user account information associated with thevoice biometric signature. It will be appreciated, however, that eventhough a voice biometric signature has the highest confidence score fromplurality of voice biometric signatures, the confidence score maynonetheless not be high enough to justify authenticating the voicecommand. Accordingly, the highest confidence score may be compared to alower threshold and an upper threshold. If the confidence score is lessthan the lower threshold, then voice biometric authentication computingplatform 110 may determine to not authenticate the voice command. If,however, the confidence score is greater than the lower threshold, thenvoice biometric authentication computing platform 110 may authenticatethe voice command. In some situations, the confidence score may begreater than the lower threshold but less than the upper threshold. Inthese situations, voice biometric authentication computing platform 110may perform additional steps in an attempt to verify the voice command.For example, voice biometric authentication computing platform 110 mayprompt the user at user device 130 to answer one or more securityquestions, based on security questions and answers associated with useraccount and/or associated with the voice biometric signature having thehighest confidence score, as an additional step. If the user cannotprovide correct answers to the security questions, then voice biometricauthentication computing platform 110 might not authenticate the voicecommand. If, however, the user can provide correct answers to thesecurity questions, then voice biometric authentication computingplatform 110 may authenticate the voice command and access informationassociated with the user account. Once the voice command isauthenticated, voice biometric authentication computing platform 110 maybe able to access information related to the user account.

In response to determining that a match exists between the voice commandand one of the one or more voice biometric signatures, voice biometricauthentication computing platform 110 may transmit a verification of thematch, e.g., a user identity verification, to enterprise serverinfrastructure 160 at step 217 and then retrieve information associatedwith the user account from enterprise server infrastructure 160 or fromenterprise data storage platform 170. Thereafter, voice biometricauthentication computing platform 110 may send, via the communicationinterface 113, the information associated with the user account to userdevice 130. The retrieved information may be specific to the type ofvoice command received at step 215. The retrieved information may beprovided to the user via user device 130, using any combination ofpresentation formats, such as an audio display, a video display, atext-based message, and the like.

Referring to FIG. 2F, in response to determining a mismatch between thevoice command and one of the one or more voice biometric signatures,voice biometric authentication computing platform 110 may generate anerror message at step 219, and the error message may comprise at leastone of: an audio file, a video file, an image file, or text content. Theerror message may be transmitted to user device 130 to notify the userat user device 130 that the voice command could not be authenticated.Additionally, or alternatively, the error message may be transmitted touser device 140 (e.g., as verified device associated with the useraccount) and/or to enterprise server infrastructure 160 to notify theenterprise organize that a voice command was received that could not beauthenticated. In some examples, transmitting the error message to userdevice 130 may also include providing a prompt at user device 130 toreceive an additional voice command in order to re-attemptauthenticating a voice command, as will be described in more detailbelow. Additionally or alternatively, transmitting the error message touser device 140 as part of step 219, va 110 may generate and/or sendinformation to user device 140 which may cause user device 140 togenerate, display, and/or otherwise present a graphical user interfacesimilar to graphical user interface 400, which is illustrated in FIG. 4. As seen in FIG. 4 , graphical user interface 400 may include textand/or other information indicating an unverified or unauthenticatedvoice command by the voice biometric authentication computing platform110 (e.g., “Our voice authentication system has detected an unverifiedvoice attempt to access your account information. Can you confirmwhether the voice attempt was authorized?”) as well as one or moreuser-selectable options allowing the user to respond to the attempt(e.g., “Yes, confirm I authorized access I No, this was unauthorized IView additional information related to the voice attempt”). Selection ofthe “Yes” option may cause voice biometric authentication computingplatform 110 to update a voice biometric signature updated with the useraccount, based on the falsely undetected unauthorized voice command.Selection of the “No” option may cause voice biometric authenticationcomputing platform 110 to transmit a message to user device 130confirming that the attempt to access the user account was verified tobe unauthorized. Selection of the “View additional information relatedto the voice attempt” may cause user device 140 to generate, display,and/or otherwise present another graphical user interface similar tographical user interface 500, which is illustrated in FIG. 5 . As seenin FIG. 5 , graphical user interface 500 may include text and/or otherinformation relating to the unverified or unauthenticated voice commandby the voice biometric authentication computing platform 110 (e.g.,“Alert Message Unverified voice command attempt to access your account”)as well as one or more additional information components related to theattempt (e.g., a name of the device, a number of voice commandattempt(s) made, a location where the voice command attempt(s) weremade, a timestamp of the voice command attempt(s), an identification ofthe type of user account information associated with the voice commandattempt(s), and the like), as well as one or more user-selectableoptions allowing the user to listen to the voice command attempt(s)(e.g., “Listen to voice command audio files”).

At step 220, additional voice commands may be received and additionalmatching may be determined using the voice biometric matching algorithm(essentially repeating steps 215-219). In some embodiments, thecomputing platform may receive, from the user device, a second audiofile comprising a second voice command to initiate a transaction relatedto a user account related to the user account, or access additionalinformation related to the user account. Then, the computing platformmay apply the voice biometric matching algorithm to compare the secondvoice command of the second audio file to the one or more voicebiometric signatures to determine if a match exists between the secondvoice command and one of the one or more voice biometric signatures. Inresponse to determining that a match exists between the second voicecommand and one of the one or more voice biometric signatures, thecomputing platform may transmit a notification comprising a transactionverification to an enterprise server.

In some embodiments, voice biometric authentication computing platform110 may, in response to determining a mismatch between the voice commandand the one or more voice biometric signatures, determine a level ofbackground noise associated with the audio file at step 221. In responseto determining that the level of background noise is higher than a noisethreshold, voice biometric authentication computing platform 110 maygenerate a message to transmit to user device 130, and the message mayinclude an indication that the voice command was not verified and arequest for a repeat voice command with a lower level of backgroundnoise. In some embodiments, upon thereafter sensing that a level ofbackground noise at the user device is lower than the threshold, voicebiometric authentication computing platform 110 may transmit a prompt touser device 130 to obtain the repeat voice command. Accordingly, in suchembodiments, voice biometric authentication computing platform 110 mytreat unverified voice command attempts with noisy backgrounds aspotentially false positives (for detecting an unverified attempt) andmay allow the user to repeat the voice command.

At step 222, voice biometric authentication computing platform 110 may,in response to determining a mismatch between the voice command and theone or more voice biometric signatures, determine if a match percentageis above a match threshold. The match threshold may be considered aminimum amount of a match detected for which it is still possible for auser to repeat a voice command and have such voice commandauthenticated, e.g., if the initially voice command was spoken unclearlyor was interrupted by other noise in the environment. Additionally, oralternatively, voice biometric authentication computing platform 110 maydetermine a match percentage based on a confidence level and/or based oncomparing a confidence level to a threshold.

Referring to FIG. 2G, voice biometric authentication computing platform110 may transmit a prompt to user device 130 to obtain another voicecommand at step 223, e.g., in response to determining that the level ofbackground noise is above a threshold and/or or in response todetermining that the match percentage is not above a threshold but thata mismatch was determined. In some embodiments, based on determiningthat the match percentage is above a threshold, voice biometricauthentication computing platform 110 may generate a message to transmitto user device 130, and the message may comprise a request for a repeatvoice command. Voice biometric authentication computing platform 110may, in response to determining that the match percentage is below athreshold and/or in response to determining that the level of backgroundnoise is lower than a threshold, generate an alert comprising anotification of an unverified or unauthorized voice command attempt atuser device 130. For example, an alert may be generated if mismatchpercentage is too low (or lower than a threshold) from a low backgroundnoise command (or having a background noise level lower than athreshold. Then, voice biometric authentication computing platform 110may send, via communication interface 113, the alert to enterpriseserver infrastructure 160. In some examples, voice biometricauthentication computing platform 110 may also send, via communicationinterface, a user account access rejection message to user device 130,that notifies the user that the voice command(s) were not authenticatedand that access to the user account was rejected. The user accountaccess rejection message may include an audio output alert message forplayback on user device 130 and that indicates that the voice commandsto access the user account could be verified.

At step 224, voice biometric authentication computing platform 110 maydetermine if a number of voice command attempts exceeds an attemptthreshold. Upon determining that the number of voice command attemptsexceeds the attempt threshold, voice biometric authentication computingplatform 110 may generate an alert comprising a notification ofunauthorized voice command attempts at user device 130. Then, at step225, voice biometric authentication computing platform 110 may send, viathe communication interface 113, the alert to enterprise serverinfrastructure 160. In some embodiments, upon determining that thenumber of voice command attempts exceeds the attempt threshold, voicebiometric authentication computing platform 110 may send, via thecommunication interface 113, the alert to user device 140, where userdevice 140 may be a user account verified device, and the alert maycomprise information related to the number of voice command attempts.The information may include information specific to user device 130,such as device signature, device properties, device location, deviceoperating system information, other device properties, and the like.Such information may assist user associated with user device 140 toidentify aspects of the voice command attempts by user device 130, e.g.,user device is stolen device that was previously in possession of theuser. The generation of such alert message may occur in real time asvoice command attempt are received at voice biometric authenticationcomputing platform 110. For example, voice biometric authenticationcomputing platform 110 may send, via the communication interface (e.g.,communication interface 113), to one or more client computing devices(e.g., user device 140), one or more client account notificationsgenerated based determination of unverified or unauthorized voicecommand attempt(s). By sending the one or more client accountnotifications to user device 140, voice biometric authenticationcomputing platform 110 may, for instance, alert a customer of anenterprise organization that his/her account information and/or otherprivate information may be at risk and/or was subject to an attempt atunauthorized access.

At step 226, upon determining that the number of voice command attemptsexceeds the attempt threshold, voice biometric authentication computingplatform 110 (and/or user device 140 and/or enterprise serverinfrastructure 160) may send, via the communication interface 113, acommand to user device 130 to disable voice command functionality.Additionally or alternatively, a command to disable voice commandfunctionality may be transmitted to user device 130 based on otherunusual activity related to the user account and/or other attempts tounsuccessfully access the user account and/or if the voice commandattempt(s) match voice characteristics of prior unauthorized attempts.

Subsequently, voice biometric authentication computing platform 110 mayrepeat one or more steps of the example event sequence discussed abovein authenticating voice biometric data (e.g., audio files comprisingvoice commands). Additionally or alternatively, voice biometricauthentication computing platform 110 may periodically update one ormore voice biometric signatures or voice biometric matching algorithmsas additional information is received and/or generate and send one ormore alert messages, similar to the examples described above.

FIG. 6 depicts an illustrative method for a voice biometricauthentication in accordance with one or more example embodiments.Referring to FIG. 6 , at step 605, a computing platform having at leastone processor, a communication interface, and memory may receive, viathe communication interface, from a user device, an audio filecomprising a voice command to access information related to a useraccount. At step 610, the computing platform may retrieve one or morevoice biometric signatures from a voice biometric database associatedwith the user account. At step 615, based on applying a voice biometricmatching algorithm to compare the voice command of the audio file to theone or more voice biometric signatures, the computing platform maydetermine if a match exists between the voice command and one of the oneor more voice biometric signatures. At step 620, in response todetermining that a match exists between the voice command and one of theone or more voice biometric signatures, the computing platform mayretrieve information associated with the user account, the computingplatform may retrieve information associated with the user account. Atstep 625, the computing platform send, via the communication interface,the information associated with the user account to the user device.

One or more aspects of the disclosure may be embodied in computer-usabledata or computer-executable instructions, such as in one or more programmodules, executed by one or more computers or other devices to performthe operations described herein. Generally, program modules includeroutines, programs, objects, components, data structures, and the likethat perform particular tasks or implement particular abstract datatypes when executed by one or more processors in a computer or otherdata processing device. The computer-executable instructions may bestored as computer-readable instructions on a computer-readable mediumsuch as a hard disk, optical disk, removable storage media, solid-statememory, RAM, and the like. The functionality of the program modules maybe combined or distributed as desired in various embodiments. Inaddition, the functionality may be embodied in whole or in part infirmware or hardware equivalents, such as integrated circuits,application-specific integrated circuits (ASICs), field programmablegate arrays (FPGA), and the like. Particular data structures may be usedto more effectively implement one or more aspects of the disclosure, andsuch data structures are contemplated to be within the scope of computerexecutable instructions and computer-usable data described herein.

Various aspects described herein may be embodied as a method, anapparatus, or as one or more computer-readable media storingcomputer-executable instructions. Accordingly, those aspects may takethe form of an entirely hardware embodiment, an entirely softwareembodiment, an entirely firmware embodiment, or an embodiment combiningsoftware, hardware, and firmware aspects in any combination. Inaddition, various signals representing data or events as describedherein may be transferred between a source and a destination in the formof light or electromagnetic waves traveling through signal-conductingmedia such as metal wires, optical fibers, or wireless transmissionmedia (e.g., air or space). In general, the one or morecomputer-readable media may be and/or include one or more non-transitorycomputer-readable media.

Furthermore, it is to be understood that the phraseology and terminologyused herein are for the purpose of description and should not beregarded as limiting. Rather, the phrases and terms used herein are tobe given their broadest interpretation and meaning. The use of“including” and “comprising” and variations thereof is meant toencompass the items listed thereafter and equivalents thereof as well asadditional items and equivalents thereof. The use of the terms“mounted,” “connected,” “coupled,” “positioned,” “engaged” and similarterms, is meant to include both direct and indirect mounting,connecting, coupling, positioning and engaging. In addition, “set” asused in this description refers to a collection that may include oneelement or more than one element. Moreover, aspects of the disclosuremay be implemented in non-transitory computer-readable media havinginstructions stored thereon that, when executed by a processor, causethe processor to perform various steps described in further detailabove.

As described herein, the various methods and acts may be operativeacross one or more computing servers and one or more networks. Thefunctionality may be distributed in any manner, or may be located in asingle computing device (e.g., a server, a client computer, and thelike). For example, in alternative embodiments, one or more of thecomputing platforms discussed above may be combined into a singlecomputing platform, and the various functions of each computing platformmay be performed by the single computing platform. In such arrangements,any and/or all of the above-discussed communications between computingplatforms may correspond to data being accessed, moved, modified,updated, and/or otherwise used by the single computing platform.Additionally or alternatively, one or more of the computing platformsdiscussed above may be implemented in one or more virtual machines thatare provided by one or more physical computing devices. In sucharrangements, the various functions of each computing platform may beperformed by the one or more virtual machines, and any and/or all of theabove-discussed communications between computing platforms maycorrespond to data being accessed, moved, modified, updated, and/orotherwise used by the one or more virtual machines.

Aspects of the disclosure have been described in terms of illustrativeembodiments thereof. Numerous other embodiments, modifications, andvariations within the scope and spirit of the appended claims will occurto persons of ordinary skill in the art from a review of thisdisclosure. For example, one or more of the steps depicted in theillustrative figures may be performed in other than the recited order,and one or more depicted steps may be optional in accordance withaspects of the disclosure.

What is claimed is:
 1. A computing platform, comprising: at least oneprocessor; a communication interface communicatively coupled to the atleast one processor; and memory storing computer-readable instructionsthat, when executed by the at least one processor, cause the computingplatform to: receive, from a user device, an audio file comprising avoice command to access information related to a user account; apply avoice biometric matching algorithm to compare the voice command of theaudio file to one or more voice biometric signatures associated with theuser account to determine if a match exists between the voice commandand one of the one or more voice biometric signatures; and in responseto determining a mismatch between the voice command and the one or morevoice biometric signatures, generate a message to transmit to the userdevice, wherein the message comprises an indication that the voicecommand was not verified and a request for a repeat voice command. 2.The computing platform of claim 1, wherein applying the voice biometricmatching algorithm includes: retrieving one or more voice biometricsignatures associated with the user account from a voice biometricdatabase comprising a plurality of voice biometric signatures.
 3. Thecomputing platform of claim 1, wherein generating the message totransmit to the user device in response to determining a mismatchbetween the voice command and the one or more voice biometric signaturesincludes generating an error message to transmit to the user devicerelating to determining a mismatch between the voice command and the oneor more voice biometric signatures, wherein the error message comprisesat least one of: an audio file, a video file, an image file, or textcontent.
 4. The computing platform of claim 1, wherein the memory storesadditional computer-readable instructions that, when executed by the atleast one processor, cause the computing platform to: responsive to therequest for a repeat voice command, receive, from the user device, asecond audio file comprising a second voice command to initiate atransaction related to a user account related to the user account; applythe voice biometric matching algorithm to compare the second voicecommand of the second audio file to the one or more voice biometricsignatures to determine if a match exists between the second voicecommand and one of the one or more voice biometric signatures; and inresponse to determining that a match exists between the second voicecommand and one of the one or more voice biometric signatures, transmita notification comprising a transaction verification to an enterpriseserver.
 5. The computing platform of claim 1, wherein the memory storesadditional computer-readable instructions that, when executed by the atleast one processor, cause the computing platform to: in response todetermining a mismatch between the voice command and the one or morevoice biometric signatures, determine whether a level of backgroundnoise associated with the audio file is higher than a noise threshold,wherein the message to transmit to the user device is generated inresponse to determining that the level of background noise is higherthan the noise threshold.
 6. The computing platform of claim 5, whereinthe memory stores additional computer-readable instructions that, whenexecuted by the at least one processor, cause the computing platform to:upon sensing that a level of background noise at the user device islower than the noise threshold, transmit a prompt to the user device toobtain the repeat voice command.
 7. The computing platform of claim 1,wherein the memory stores additional computer-readable instructionsthat, when executed by the at least one processor, cause the computingplatform to: in response to determining a mismatch between the voicecommand and the one or more voice biometric signatures, determine if amatch percentage is below a match threshold; and in response todetermining that the match percentage is below the match threshold,send, via the communication interface, an alert to an enterprise server,the alert comprising a notification of an unauthorized voice commandattempt at the user device.
 8. The computing platform of claim 1,wherein the memory stores additional computer-readable instructionsthat, when executed by the at least one processor, cause the computingplatform to: in response to determining that a match exists between thevoice command and one of the one or more voice biometric signatures,retrieve information associated with the user account from an enterpriseserver, wherein retrieving information associated with the user accountcomprises transmitting a user identity verification to the enterpriseserver and retrieving the information associated with the user accountfrom the enterprise server; and send, via the communication interface,the information associated with the user account to the user device. 9.The computing platform of claim 1, wherein the memory stores additionalcomputer-readable instructions that, when executed by the at least oneprocessor, cause the computing platform to: determine if a number ofvoice command attempts exceeds an attempt threshold; upon determiningthat the number of voice command attempts exceeds the attempt threshold,generate an alert comprising a notification of unauthorized voicecommand attempts at the user device; and send, via the communicationinterface, the alert to an enterprise server.
 10. The computing platformof claim 1, wherein the memory stores additional computer-readableinstructions that, when executed by the at least one processor, causethe computing platform to: in response to determining a mismatch betweenthe voice command and the one or more voice biometric signatures, send,via the communication interface, the message to a second user device,wherein the second user device is a user account verified device,wherein the message comprises information related to the mismatchbetween the voice command and the one or more voice biometricsignatures.
 11. The computing platform of claim 1, wherein the memorystores additional computer-readable instructions that, when executed bythe at least one processor, cause the computing platform to: in responseto determining a mismatch between the voice command and the one or morevoice biometric signatures, send, via the communication interface, acommand to the user device to disable voice command functionality. 12.The computing platform of claim 1, wherein at least one voice biometricsignature of the one or more voice biometric signatures is created by avoice biometric training computing platform based on passive voicemonitoring audio data.
 13. The computing platform of claim 12, whereincreating the at least one voice biometric signature by the voicebiometric training computing platform based on passive voice monitoringaudio data includes computing a confidence level associated with the atleast one biometric signature.
 14. The computing platform of claim 12,wherein creating the at least one voice biometric signature by the voicebiometric training computing platform based on passive voice monitoringaudio data includes updating an initially-created voice biometricsignature based on additional received passive voice monitoring audiodata.
 15. The computing platform of claim 1, wherein at least one voicebiometric signature of the one or more voice biometric signatures iscreated by a voice biometric training computing platform based on activevoice monitoring data.
 16. The computing platform of claim 15, whereincreating the at least one voice biometric signature by the voicebiometric training computing platform based on active voice monitoringaudio data includes: sending a plurality of user voice commands to theuser device; transmitting, from the user device to the voice biometrictraining computing platform, audio data responsive to each of theplurality of user voice commands; and computing the at least one voicebiometric signature from the audio data responsive to each of theplurality of user voice commands.
 17. A method, comprising: at acomputing platform comprising at least one processor, a communicationinterface, and memory: receiving, from a user device, an audio filecomprising a voice command to access information related to a useraccount; applying a voice biometric matching algorithm to compare thevoice command of the audio file to one or more voice biometricsignatures associated with the user account to determine if a matchexists between the voice command and one of the one or more voicebiometric signatures; and in response to determining a mismatch betweenthe voice command and the one or more voice biometric signatures,generate a message to transmit to the user device, wherein the messagecomprises an indication that the voice command was not verified and arequest for a repeat voice command.
 18. The method of claim 17, furthercomprising: in response to determining that a match exists between thevoice command and the one or more voice biometric signatures,transmitting a user identity verification to an enterprise server andretrieving information associated with the user account from theenterprise server.
 19. The method of claim 17, further comprising: inresponse to determining a mismatch between the voice command and the oneor more voice biometric signatures, sending the message to a second userdevice, wherein the second user device is a user account verifieddevice, and wherein the message comprises information related to themismatch between the voice command and the one or more voice biometricsignatures.
 20. One or more non-transitory computer-readable mediastoring instructions that, when executed by a computing platformcomprising at least one processor, a communication interface, andmemory, cause the computing platform to: receive, from a user device, anaudio file comprising a voice command to access information related to auser account; apply a voice biometric matching algorithm to compare thevoice command of the audio file to one or more voice biometricsignatures associated with the user account to determine if a matchexists between the voice command and one of the one or more voicebiometric signatures; in response to determining a mismatch between thevoice command and the one or more voice biometric signatures, generate amessage to transmit to the user device, wherein the message comprises anindication that the voice command was not verified; and in response todetermining a mismatch between a subsequent voice command and the one ormore voice biometric signatures, send, via the communication interface,an alert to an enterprise server relating to an unverified voice commandattempt.