System and methods for personal identification number authentication and verification

ABSTRACT

Systems and methods to authenticate and verify user access replace the digits of a personal identification number (PIN) of a particular user with prompted randomized words that are to be uttered by an unidentified user. By virtue of this replacement, the PIN remains secret. A known speaker provides voice samples to the system in advance. The words uttered by the unidentified user (in response to the prompted words being displayed) correspond to digits. The uttered words are checked against the PIN, and are used to verify if the unidentified user&#39;s voice matches the voice of the known speaker.

FIELD OF THE INVENTION

The invention relates to authentication and verification based on theusage of personal identification numbers, and, in particular, systemsand methods that prevent a personal identification number from beingshared, stolen, and/or otherwise used inappropriately to gain access toa secure system.

BACKGROUND OF THE INVENTION

Secure systems are systems that limit access in one or more ways. Securesystems may include physical secure systems, including but not limitedto automated teller machines (ATMs), electronically locked doors, and/orother physical secure systems, as well as virtual secure systems,including but not limited to online access to a particular website, anaccount on a website, a particular area within a website, and/or othervirtual secure systems. One commonly employed security measure foraccess to secure systems is a personal identification number, or PIN.Known examples include a bankcard or debit card that requires aparticular personal identification number before a (financial)transaction can be initiated and/or completed.

Some secure systems employ speech recognition technology. Speechrecognition commonly uses one or more recorded audio files from aparticular speaker that include sound generated by that speaker. Throughanalysis and/or signal processing, a speech recognition system maydetermine which word or phrase the particular speaker uttered, and/orwhether the utterance matches a predetermined passphrase, password,and/or other utterance that has been predetermined to grant a speakeraccess to the secure system.

Some secure systems employ voice recognition technology (also referredto as speaker verification technology). Speaker verification commonlyuses recorded audio files that include sound generated by one or morepeople (also referred to herein as speakers). Based on one or more audiofiles, one or more audio characteristics and/or parameters may beassessed per speaker. A set of audio characteristics, together with anyother information that may be useful to characterize and/or identify aparticular speaker, may form the basis of a model of the particularspeaker (for example, a parameterized model may represent a particularspeaker). Models of speakers may be used to assess, estimate, determine,and/or otherwise reach a decision on whether a particular recorded audiofile (or a particular speaker model) appears to represent a knownspeaker, and/or which known speaker in particular.

In some implementations, speakers may be represented by speaker modelsincluding sets and/or vectors or values and/or coefficients. By way ofnon-limiting example, some speaker verification systems may be based onspeaker models that include fixed-length vectors. As used herein, afixed-length vector may refer to a vector having the same number (or asimilar number) of values and/or coefficients regardless of the numberand/or length of the recorded audio files associated with the particularspeaker represented by the particular model that includes thefixed-length vector.

SUMMARY

One aspect of the disclosure relates to systems and methods forauthentication and verification, e.g. in the context of user access to asecure system. Prior to being authenticated and verified, a user isconsidered and referred to as an unidentified user. An unidentified usermay request access, e.g. to a secure system. As part of this request,the unidentified user may present information to the system forauthentication and verification (also referred to as the system). Thepresented information may include a claim of who the unidentified useris, and/or to which group or class of people the unidentified userbelongs. Such a claim may be referred to as an identity claim, and theuser making such a claim may be referred to as the claimed user. Forexample, at an ATM, a user may present a card (e.g. a bankcard and/ordebit card). Mere possession of the card may not be sufficient to grantthe user access to perform financial transactions (e.g. a withdrawal)using the ATM. Mere presentation of the card (e.g. by inserting the cardinto the ATM) may not be sufficient to grant the user access to performfinancial transactions. In some implementations, information may bepresented to the system for authentication and verification through avoice command, an access code, a user identification, an email-address,a mailing address, an identification number, a social security number,an account number, a name of an account holder, and/or through otherways in which a user can present information to the system that include,implicitly or otherwise, an identity claim.

In some implementations, responsive to a request for access, apresentation of information, and/or a presentation of an identity claim,the system for authentication and verification may be configured toobtain a target personal identification sequence (e.g. a target PIN)that is associated with a particular user, in particular the claimeduser. The system may grant access to the unidentified user responsiveto, among other conditions described in this disclosure, theunidentified user entering and/or providing a personal identificationsequence that matches the specific target personal identificationsequence that is associated with the claimed user.

The system may include one or more servers, one or more physicalprocessors (interchangeably referred to herein as “processors”), one ormore computer program components, physical storage media(interchangeably referred to herein as “storage”), one or moreinterfaces, and/or other components.

Users may interact with the system through client computing platforms,interfaces, and/or other components. Client computing platforms mayinclude one or more processors configured to execute computer programcomponents. The computer program components may be configured to enablea user associated with a client computing platform to interact with thesystem, any component thereof, other client computing platforms, and/orprovide other functionality attributed herein to client computingplatforms.

The one or more servers included in the system may include one or moreprocessors configured to provide information-processing capabilities andexecute computer program components. The system may be configured toprocess and/or exchange information, including but not limited toprocessing and/or exchanging information by executing computer programcomponents. The computer program components may include one or more of apersonal identification component, a mapping component, a target promptcomponent, a presentation component, an audio component, a promptauthentication component, a speaker verification component, an accesscomponent, a time component, an audio characteristics component, and/orother components.

The personal identification component may be configured to obtain and/ordetermine target personal identification sequences, including but notlimited to personal identification numbers. In some implementations,personal identification sequences may include one or more of letters,numbers, alphanumeric characters, symbols, special characters, and/orother characters. Individual target personal identification sequencesmay be associated with individual users. If a user enters a PINpublicly, as may be common in some cases when using an ATM, the user'sPIN may not remain secret. For example, a nearby on-looker could learnthe user's PIN by watching the user enter the PIN.

The mapping component may be configured to obtain, generate, and/ordetermine mappings between user-selectable input options (e.g. inputoptions available for selection by users through client computingplatforms, interfaces, and/or other components) and prompts thatrepresent words. By way of non-limiting example, user-selectable inputoptions may include buttons, keys, selectable fields in a userinterface, and/or other input options available for selection by users,including but not limited to input options on a keypad, keyboard, panel,touch screen, and/or other implementation of a user interface. Mappingsmay be implemented as a set of associations and/or correspondencies. Forexample, in some implementations, the user-selectable input optionsinclude the digits from zero to nine. A mapping may be defined as anassociation of each of the individual ones of the digits from zero tonine to a particular prompt. New mappings may be obtained, generated,and/or determined as needed, e.g. for each attempt to authenticate andverify a particular user, and/or for each number, latter, symbol,object, and/or other item in a personal identification sequence.

Prompts may include visual, graphic, textual, auditory, and/or otherwisesensory representations of words, concepts, numbers, and/or otherobjects. As an example, a set of prompts may include a set of words thatindicate different colors, such as “red,” “blue, “green,” orange,” etc.A mapping may be defined in which the number 0 is associated with theword “orange,” 1 with “blue,” 2 with “green,” 3 with “red,” and soforth. Based on this mapping, the sequence 1-2-3 corresponds to thesequence “blue”-“green”-“red”, the sequence 2-0-1 corresponds to thesequence “green”-“orange”-“blue” and so forth. In some implementations,a prompt may include a written word, such as “orange.” In someimplementations, a prompt may include a depiction of an object that isand/or represents “orange.” Other implementations are envisioned and maybe considered within the scope of this disclosure.

The target prompt component may be configured to obtain and/or determinesequences of prompts, e.g. a target sequence of prompts. In someimplementations, a sequence of prompts may correspond to a (target)personal identification sequence. For example, based on an exemplarymapping, a sequence of prompts “blue”-“green”-“red” may correspond to atarget personal identification sequence 1-2-3.

The presentation component may be configured to effectuate presentationof prompts to users. In some implementations, such a presentation may bemade in accordance with a mapping, e.g. as obtained and/or determined bythe mapping component. In some implementations, individual ones of thepresented prompts to a particular unidentified user may be associatedwith individual ones of the user-selectable input options according to aparticular mapping. For example, in some implementations, prompts may bepresented to a user through the same user interface used for theuser-selectable input options. For example, each button on a touchscreenmay display a combination of a digit and a prompt in accordance with amapping, such that, e.g., the first button indicates the number 0 andthe word “orange,” the second button indicates the number 1 with theword “blue,” the third button indicates the number 2 with the word“green,” the fourth button indicates the number 3 with the word “red,”and so forth.

The audio component may be configured to obtain and/or determine audiofiles (and/or other electronic representations) comprising soundgenerated by users (e.g. utterances, sentences, statements, and/or othersounds that can be produced by humans). As used herein, the act orprocess by a user to generate sound may be referred to as vocalization.In some implementations, the sound may be generated in response to apresentation by the presentation component. In some implementations, oneor more audio files (and/or other electronic representations) may beobtained through a microphone.

The prompt authentication component may be configured to makedeterminations regarding audio files (and/or other electronicrepresentations). For example, the prompt authentication component maybe configured to determine whether one or more particular audio filesrepresent a vocalization of one or more prompts, e.g. a target sequenceof prompts. For example, the prompt authentication component may beconfigured to determine whether one or more particular audio filesrepresent a vocalization by a user of a prompt, e.g. “blue.” In someimplementations, the prompt authentication component may operate basedon and/or using speech recognition techniques. In some implementations,speech recognition techniques may be speaker-independent.

The speaker verification component may be configured to makedeterminations regarding identities of speakers. For example, thespeaker verification component may be configured to determine whetherone or more particular audio files (and/or other electronicrepresentations) match a particular speaker, a particular speaker model,particular parameters representing audio characteristics, soundsgenerated by a particular speaker, audio characteristics of soundsgenerated by a particular speaker, and/or other speaker-specific audiocharacteristics. In some implementations, the one or more particularaudio files may be obtained by the audio component. In someimplementations, speaker-specific audio characteristics may bedetermined prior to a particular user using the system forauthentication and verification, e.g. through recorded audio of theparticular user generating sounds (e.g. vocalizing a set of words).

The access component may be configured to effectuate grants or denialsof access to users. The access component may be configured to effectuatea grant or denial of access to a user based on determinations by, e.g.the prompt authentication component and/or the speaker verificationcomponent. For example, a user may be considered unidentified until theuser has been authenticated by the prompt authentication component andverified by the speaker verification component. The access component maybe configured to grant a user access once the user has been identified.Grants of access may include access to one or more secure systems.

The time component may be configured to enforce restrictions,limitations, and/or other requirements to users seeking a grant ofaccess. For example, in some implementations, a user may be required toprovide an audio response (e.g. a vocalization of one or more prompts)within a time limit.

The audio characteristics component may be configured to determine oneor more audio characteristics of audio files and/or otherrepresentations of sound generated by users. For example, soundgenerated by a particular user may be used by the audio characteristicscomponent to change, modify, update, and/or otherwise affectspeaker-specific audio characteristics associated with the particularuser.

These and other objects, features, and characteristics of the describedembodiments, as well as the methods of operation and functions of therelated elements of structure and the combination of parts and economiesof manufacture, will become more apparent upon consideration of thefollowing description and the appended claims with reference to theaccompanying drawings, all of which form a part of this specification,wherein like reference numerals designate corresponding parts in thevarious figures. It is to be expressly understood, however, that thedrawings are for the purpose of illustration and description only andare not intended as a definition of the limits of the invention. As usedin the specification and in the claims, the singular form of “a”, “an”,and “the” include plural referents unless the context clearly dictatesotherwise.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an authentication and verification system inaccordance with one or more embodiments.

FIG. 2 illustrates a method to implement an authentication andverification system in accordance with one or more embodiments.

FIGS. 3A-3B-3C-3D illustrate exemplary user interfaces and/or mappingsbetween user-selectable input options and prompts, in accordance withone or more embodiments.

FIG. 4 illustrates a method to implement authentication in accordancewith one or more embodiments.

FIG. 5 illustrates an exemplary user interface and/or redirectionmapping, in accordance with one or more embodiments.

DETAILED DESCRIPTION

FIG. 1 illustrates an authentication and verification system 100, alsoreferred to as system 100. System 100 may be used in the context of useraccess to a secure system. System 100 may include one or more servers12, one or more processors 110, one or more physical storage media 50,one or more computer program components, one or more interfaces 120,and/or other components.

Physical storage media 50 may be configured to store information thatrepresents audio characteristics of sounds generated by users. As usedherein, the term “user” may be used interchangeably with the term“speaker.” In some implementations, speaker-specific audiocharacteristics may be determined prior to a particular user usingsystem 100. In some implementations, physical storage media 50 may beconfigured to store personal identification sequences, including but notlimited to personal identification numbers. In some implementations,individual personal identification sequences may be associated withindividual users of system 100.

As used herein, the term “authentication” and derivatives thereof arerelated to the knowledge of a user, e.g. whether the user knows aparticular personal identification number or password. As used herein,the term “verification” and derivatives thereof are related to personalbiophysical characteristics of a user, e.g. whether the user's voicecharacteristics match previously recorded and/or determined voicecharacteristics, or whether the user's biometrics are matching. As usedherein, an “unidentified” user refers to a user who is not bothauthenticated and verified using the authentication and verificationdescribed herein.

Server(s) 12 may include physical storage media 50, as depicted inFIG. 1. In some implementations, functionality attributed herein toprocessor 110 of server 12 or to a computer program component of server12 may be not limited to server 12, but rather may be provided byresources of client computing platform(s) 14, and/or jointly provided byboth server 12 and one or more client computing platforms 14. Thedepiction in FIG. 1 is not intended to be limiting in any way withregard to the location of any particular functionality described herein.The terms “client computing platform” and “client” may be usedinterchangeably herein.

Server 12, client computing platforms 14, and/or external resources 16may be operatively linked via one or more electronic communicationlinks. For example, such electronic communication links may beestablished, at least in part, via a network 13 such as the Internetand/or other communication networks. It will be appreciated that this isnot intended to be limiting, and that the scope of this disclosureincludes implementations in which servers 12, client computing platforms14, and/or external resources 16 may be operatively linked via someother communication media.

The computer program components may include one or more of a personalidentification component 22, a mapping component 23, a target promptcomponent 24, a presentation component 25, an audio component 26, aprompt authentication component 27, a speaker verification component 28,an access component 29, a time component 30, an audio characteristicscomponent 31, and/or other components.

Personal identification component 22 may be configured to obtain and/ordetermine target personal identification sequences, including but notlimited to personal identification numbers. Individual target personalidentification sequences may be associated with individual users. Asused herein, the term “obtain” (and derivatives thereof) may includeactive and/or passive retrieval, determination, derivation, transfer,and/or exchange of information, and/or any combination thereof. As usedherein, the term “determine” (and derivatives thereof) may includemeasure, calculate, compute, estimate, approximate, generate, and/orotherwise derive, and/or any combination thereof. As used herein, anyassociation (or correspondency) involving personal identificationsequences, users, and/or another entity that interacts with any part ofthe system, may be a one-to-one association, a one-to-many association,a many-to-one association, and/or a many-to-many association or N-to-Massociation (note that N and M may be different numbers greater than 1).

Mapping component 23 may be configured to obtain, generate, and/ordetermine mappings between user-selectable input options (e.g. inputoptions available for selection by users through client computingplatforms 14, interfaces 120, and/or other components) and prompts thatrepresent words. By way of non-limiting example, user-selectable inputoptions may include buttons, keys, selectable fields in a user interface(e.g. interface 120), a microphone, and/or other input options availablefor use or selection by users, including but not limited to inputoptions on a keypad, keyboard, panel, touch screen, and/or otherimplementation of a user interface. Mappings may be implemented as a setof associations and/or correspondencies. For example, in someimplementations, the user-selectable input options include the digitsfrom zero to nine. A mapping may be defined as an association ofindividual ones of the digits from zero to nine to a particular prompt.In some implementations, one or more prompts may be associated with morethan one user-selectable input option. This concept may be referred toas word redundancy. By virtue of word redundancy, a nearby onlookerwould not learn the particular user's PIN merely by seeing whichuser-selectable input options are selected by a user.

Prompts may include visual, graphic, textual, auditory, and/or otherwisesensory representations of words, concepts, numbers, and/or otherobjects. As an example, a set of prompts may include a set of wordsincluding “cat,” “dog,” “huddle,” etc. A mapping may be defined in whichthe number 1 is associated with the word “cat,” 2 with “dog,” 3 with“huddle, and so forth. Based on this mapping, the sequence 1-2-3corresponds to the sequence “cat”-“dog”-“huddle”. In someimplementations, a prompt may include a written word. By way ofnon-limiting example, FIG. 3A illustrates a mapping 301 that includes anassociation between the sequence of user-selectable input options orbuttons “1-2-3” and the sequence of prompts “cat”-“dog”-“huddle”. Notethat the set of user-selectable input options as depicted in FIG. 3Aincludes the digits from zero to nine, and symbols for “star” and“hash,” or “*” and “#”, as may be commonly found on telephones. Thedepicted set of user-selectable input options is not intended to belimiting. In some implementations, depicted prompts may be selectablethrough a microphone. In other words, the depicted mapping in FIG. 3Amay include no buttons or keys, but merely prompt the user to say words,e.g. into a microphone.

In some implementations, mapping component 23 may be configured toobtain, generate, and/or determine new mappings as needed, e.g. for eachattempt to authenticate and verify a particular user, and/or for eachnumber, latter, symbol, object, and/or other item in a personalidentification sequence.

For example, as illustrated in FIGS. 3B-3C-3D, subsequent attempts toauthenticate and verify users using system 100 may use mapping 302 (FIG.3B), mapping 303 (FIG. 3C), and mapping 304 (FIG. 3D) in turn. Based onthese mappings, the same sequence 1-2-3 would respectively correspond to“orange-shimmer-circle” using mapping 302, to “cat-doll-muddy” usingmapping 303, and to “flagstaff-bromide-traction” using mapping 304. Theparticular mappings depicted in FIGS. 3A-3B-3C-3D are not intended to belimiting in any way. In some implementations, mappings may berandomized, at least in part. For example, mapping component 23 may beconfigured to randomize mappings.

In some implementations, the mappings illustrated in FIGS. 3A-3B-3C-3Dmay be used in a single attempt to authenticate and verify a particularuser using system 100 and using a 4-digit PIN. For example, if theparticular user's PIN is 1-2-3-4, the corresponding sequence of prompts,by virtue of using mappings 301, 302, 303, and 304, respectively, wouldbe “cat-shimmer-muddy-bromide.” By virtue of the mappings changingfrequently, a nearby onlooker/listener would not learn the particularuser's PIN merely by listening in, in particular if, in certainmappings, a particular prompt is used to more than one prompt. Forexample, mapping 304 depicted in FIG. 3D includes the prompts “bromide,”“cat,” “flagstaff,” “circle,” “orange,” and “traction” twice.

Target prompt component 24 may be configured to obtain and/or determinesequences of prompts, e.g. a target sequence of prompts. In someimplementations, a sequence of prompts may correspond to a (target)personal identification sequence. For example, referring to FIG. 3A,according to mapping 301, a sequence of prompts “cat”-“dog”-“huddle” maycorrespond to a target personal identification sequence 1-2-3.

Presentation component 25 may be configured to effectuate presentationof prompts to users. In some implementations, such a presentation may bemade in accordance with a mapping, e.g. as obtained and/or determined bymapping component 24. In some implementations, individual ones of thepresented prompts to a particular unidentified user may be associatedwith individual ones of the user-selectable input options according to aparticular mapping. For example, in some implementations, prompts may bepresented to a user through interface 120. For example, each field on anelectronic screen may display a combination of a digit and a prompt inaccordance with a mapping. By way of non-limiting example, FIG. 3Aillustrates that the first field may indicate the number 1 and the word“cat,” the second field may indicate the number 2 with the word “dog,”the third field may indicate the number 3 with the word “huddle,” and soforth. Note that FIGS. 3A-3B-3C-3D illustrate mappings betweenuser-selectable input options and prompts, as well as one or more userinterfaces (e.g. interface 120) that may be used by users to provideand/or enter user-selectable input options, including but not limited tovocalizations of prompts. In some implementations, presentationcomponent 25 may be configured to include animations in the presentationof prompts. For example, the displayed prompt may disappear gradually(e.g. by removing some letters at a time and/or replacing some letterswith other characters), e.g. in response to receiving a user-selectableinput option. For example, as soon as a user provides a firstuser-selectable input option, presentation component 25 may beconfigured to change, animate, and/or remove a first set of displayedprompts in preparation for the next character in a target personalidentification sequence.

Audio component 26 may be configured to obtain and/or determine audiofiles (and/or other electronic representations) comprising soundprovided, entered, and/or otherwise generated by users. In someimplementations, the sound may be generated in response to apresentation by presentation component 25. In some implementations, oneor more audio files (and/or other electronic representations) may beobtained through a microphone. For example, in response to apresentation of a particular mapping, a user may say a sequence of wordsthat correspond to a personal identification sequence. For example,referring to FIG. 3A, according to mapping 301, a target personalidentification sequence 1-2-3 may correspond to a sequence of prompts“cat”-“dog”-“huddle”. Instead of entering or saying “1-2-3,” aparticular user may authenticate (or initiate authentication) by sayingthe words “cat”-“dog”-“huddle”. Audio component 26 may be configured toobtain one or more audio files comprising sound generated by theparticular user saying “cat”-“dog”-“huddle”. A nearby onlooker would notlearn the particular user's PIN by watching the particular user usesystem 100. By virtue of the mappings changing frequently, a nearbyonlooker would also not learn the particular user's PIN merely bylistening in.

As used herein, the term “file” may refer to an electronic audio stream,a separate electronic file or document, and/or any part, fragment,and/or section thereof. An audio file may be associated with one or morespeakers. In some implementations, individual audio files may have1-to-1 associations with individual speakers. A set of audio files,associated with a set of speakers may be used as and/or referred to as atraining set or training data. Training data may be used to train system100, e.g. to classify a feature, audio parameter, audio characteristic,individual speaker, and/or any combination thereof.

Prompt authentication component 27 may be configured to makedeterminations regarding audio files (and/or other electronicrepresentations). For example, prompt authentication component 27 may beconfigured to determine whether one or more particular audio files (e.g.as obtained and/or determined by audio component 26) represent avocalization of one or more prompts, e.g. a target sequence of prompts.For example, prompt authentication component 27 may be configured todetermine whether one or more particular audio files represent avocalization by a user of a prompt, e.g. “cat,” or a sequence ofprompts, e.g. “cat”-“dog”-“huddle”. In some implementations, promptauthentication component 27 may operate based on and/or using speechrecognition techniques. In some implementations, speech recognitiontechniques may be speaker-independent. In some implementations, promptauthentication component 27 may be configured to make a determinationper prompt whether one or more particular audio files represent avocalization by a user of a particular prompt. In some implementations,prompt authentication component 27 may be configured to made adetermination per prompt based on speaker-dependent models, e.g. usingspeaker-verification techniques in combination with previously recordedaudio samples for a speaker.

For example, in some implementations, prompt authentication component 27may be configured to determine a likelihood that a particularvocalization matches a particular prompt. For example, in someimplementations, prompt authentication component 27 may be configured todetermine a similarity between a particular vocalization and one or moreprompts. In some implementations, prompt authentication component 27 maynot need to perform speech recognition for a large set of possiblewords, but rather may be optimized to perform speech recognition for asmall set of possible words, e.g. the set of words that correspond tothe set of prompts used for a mapping by mapping component 23 (or alimited set of words used by mapping component 23 to obtain, generate,and/or determine a mapping). Such a limited set of words may be referredto as a codebook. The codebook for a particular user need not be static,but rather may change over time. For example, certain words may beremoved from the codebook and/or added to the codebook. In someimplementations, speech recognition techniques involve probabilities ofa match or mismatch, rather than certainties. For this reason,determinations based on speech recognition techniques mayinterchangeably be referred to as estimations.

Speaker verification component 28 may be configured to makedeterminations regarding identities of speakers. For example, speakerverification component 28 may be configured to determine whether one ormore particular audio files (and/or other electronic representations)match a particular speaker, a particular speaker model, particularparameters representing audio characteristics, sounds generated by aparticular speaker, audio samples generated by a particular speaker,audio characteristics of sounds generated by a particular speaker,and/or other speaker-specific audio characteristics. In someimplementations, the one or more particular audio files may be obtainedby audio component 26. In some implementations, speaker-specific audiocharacteristics may be determined prior to a particular user usingsystem 100 for authentication and verification, e.g. through recordedaudio of the particular user generating sounds (e.g. vocalizing a set ofwords). In some implementations, speaker-specific audio characteristicsmay be determined for a set of users of system 100, a set of actualpeople, a set of account holder, and/or other speakers.

In some implementations, speaker verification component 28 may beconfigured to assess, determine, estimate, confirm, and/or otherwisereach a decision on whether a particular recorded audio file (or aparticular speaker model) appears to (and/or are deemed to) representand/or match a known speaker, and/or which known speaker in particular.In some implementations, speaker verification component 28 may beconfigured to assess, determine, estimate, confirm, and/or otherwisereach a decision on whether an unidentified speaker (represented by anaudio file including sound generated by the unidentified speaker) isand/or appears to be the same person as a known speaker (representede.g. by a speaker model).

In some implementations, operations by speaker verification component 28may be performed based on one or more similarity scores and/or otherspeaker verification techniques (in particular for speaker-dependentanalysis and/or user-specific analysis). For example, an unidentifiedspeaker may be assessed as being the same person as a known speaker iftheir respective similarity score is higher than a threshold. In someimplementations, the particular similarity score (for example afternormalizing and/or calibration) may need to surpass a minimum thresholdlevel of similarity. In some implementations, the particular similarityscore may need to outrank and/or outscore the one or more next closestsimilarity scores by at least a specific predetermined factor. Othertests based on the similarity scores, as well as combinations ofmultiple such tests, are contemplated within the scope of thisdisclosure. The usage of similarity scores is exemplary, and notintended to be limiting.

In some implementations, speaker verification techniques used by system100 may involve assessing and/or otherwise reaching a decision onwhether a particular speaker is the same person as any of a set ofidentified speakers. Sound generated by identified speakers may bestored in recorded audio files.

Access component 29 may be configured to effectuate grants or denials ofaccess to users. Access component 29 may be configured to effectuate agrant or denial of access to a user based on determinations by, e.g.prompt authentication component 27, speaker verification component 28,and/or other components of system 100. For example, in someimplementations, a user may be considered unidentified until the userhas been authenticated by prompt authentication component 27 andverified by speaker verification component 28. Access component 29 maybe configured to grant a user access once the user has been identified.Grants of access may include access to one or more secure systems. Forexample, access may include physical or virtual access to a certainarea, a restricted area, certain features, certain transactions, asecure website, and so forth, and/or any combination thereof.

Time component 30 may be configured to enforce restrictions,limitations, and/or other requirements to users seeking a grant ofaccess. For example, in some implementations, a user may be required toprovide an audio response (e.g. a vocalization of one or more prompts)within a time limit. For example, in some implementations, timecomponent 30 may be configured to require a user to provide multipleprompts at a certain pace, tempo, and/or rhythm. In someimplementations, a required tempo may be indicated visually, e.g. usinginterface 120. In some implementations, certain aspects of speechrecognition technology and/or speaker verification technology, includingbut not limited to word boundary detection, may be made easier, simpler,better, and/or no longer needed by virtue of the user providingindividual words or phrases at a predetermined and/or known pace, tempo,and/or rhythm. In some implementations, certain aspects of speechrecognition technology may be made easier, simpler, better, and/or nolonger needed by virtue of using a limited codebook covering arestricted set of prompts instead of a much larger cookbook as may beneeded for common speech recognition.

Audio characteristics component 31 may be configured to determine one ormore audio characteristics of audio files and/or other representationsof sound generated by users. For example, sound generated by aparticular user may be used by audio characteristics component 31 tochange, modify, update, and/or otherwise affect speaker-specific audiocharacteristics associated with the particular user. In someimplementations, a set of files representing audio of a particular usergenerating sounds may be augmented by adding new files representingaudio of a previous user deemed to match the particular user. Forexample, audio characteristics component 31 may be configured to add newfiles to the codebook of a particular user.

In some implementations, mapping component 23 may be configured toobtain, generate, and/or determine redirection mappings foruser-selectable input options (e.g. input options available forselection by users through client computing platforms 14, interfaces120, and/or other components). A redirection mapping redirects a userfrom one user-selectable input option or prompt to anotheruser-selectable input option or prompt. In some implementations, a newlygenerated redirection mapping may be presented to a user for eachcharacter in a target personal identification sequence. By way ofnon-limiting example, FIG. 5 illustrates a redirection mapping 501. Forexample, redirection mapping is presented to a user briefly, prior topresentation of, e.g. the user interface of FIG. 3A. Assume that theuser's target PIN is 1-2-3. The redirection mapping instructs the user,based on the direction of the arrow associated with number 1, to say“dog” instead of “cat” (without redirection). For the next prompt, theredirection mapping instructs the user, based on the direction of thearrow associated with number 2, to say “orange” instead of “dog”(without redirection). For the next prompt, the redirection mappinginstructs the user, based on the direction of the arrow associated withnumber 3, to say “dog” instead of “huddle” (without redirection). Notethat a new redirection mapping may be used between prompts.

Interface 120 may be configured to provide an interface between system100 and a user through which the user can provide and/or receiveinformation. This enables data, results, and/or instructions and anyother communicable items, collectively referred to as “information,” tobe communicated between the user and system 100. A non-limiting exampleof information that may be conveyed to a subject is one or more prompts.Examples of interface devices suitable for inclusion in interface 120include a keypad, buttons, switches, a keyboard, knobs, levers, adisplay screen, a touch screen, speakers, a microphone, an indicatorlight, an audible alarm, and a printer. Information may be provided tothe subject by interface 120 in the form of auditory signals, visualsignals, tactile signals, and/or other sensory signals.

By way of non-limiting example, interface 120 may include a light sourcecapable of emitting light. The light source may include, for example,one or more of at least one LED, at least one light bulb, a displayscreen, and/or other sources. Interface 120 may control the light sourceto emit light in a manner that conveys to the subject informationrelated to operation of system 100.

It is to be understood that other communication techniques, eitherhard-wired or wireless, are also contemplated herein as interface 120.For example, in one embodiment, interface 120 may be integrated with aremovable storage interface provided by physical storage media 50. Inthis example, information is loaded into system 100 from removablestorage (e.g., a smart card, a flash drive, a removable disk, etc.) thatenables the user(s) to customize the implementation of system 100. Otherexemplary input devices and techniques adapted for use with system 100as interface 120 include, but are not limited to, an RS-232 port, RFlink, an IR link, modem (telephone, cable, Ethernet, internet or other).In short, any technique for communicating information with system 100 iscontemplated as interface 120.

The computer program components of system 100 may be configured toenable a user of system 100 to interface with system 100 and/or externalresources 16, for example through the client computing platforms 14.Server 12 may include communication lines, or ports to enable theexchange of information with a network 13 and/or other computingplatforms. Illustration of server 12 in FIG. 1 is not intended to belimiting. Server 12 may include a plurality of hardware, software,and/or firmware components operating together to provide thefunctionality attributed herein to server 12. For example, server 12 maybe implemented by a cloud of computing platforms operating together asserver 12.

By way of non-limiting example, client computing platforms 14 mayinclude one or more of a desktop computer, a laptop computer, a handheldcomputer, a NetBook, a Smartphone, a tablet, a mobile computingplatform, a gaming console, a television, a device for streaminginternet media, and/or other computing platforms.

In some implementations, interaction with system 100 may be accomplishedthrough web pages, (mobile) applications, apps, stand-aloneapplications, desktop applications, and/or other types of softwareapplications capable of interacting with one or more networks, forexample the internet. As used herein, content provided through any typeof software application capable of interacting with a network may bereferred to as a web page (including, but not limited to, mobileapplications or “apps”).

Web pages may be rendered, interpreted, and/or displayed forpresentation using a computing platform, such as a client computingplatform 14. As used herein, displaying information through a mobileapplication—or app—is included in the term presentation. Presentation ofweb pages may be supported through a display, screen, monitor of thecomputing platform, and/or projection by the computing platform. Webpages may be accessible from a local computing platform 14 (e.g. notcurrently connected to the internet) and/or hosted by a remote webserver (e.g. connected to the internet and/or one or more othernetworks). Web pages may be accessed through a browser softwareapplication being executed on a computing platform.

As used herein, mobile applications may be included in the term browsersoftware application. The browser software application may be configuredto render, interpret, and/or display one or more web pages forpresentation using a computing platform. A set of linked and/ororganized web pages may form a website. A website may include a set ofrelated and/or linked web pages hosted on one or more web servers andaccessible via one or more networks, e.g. including the internet.

External resources 16 may include sources of information, audio files,speaker models, speech recognition technology, speaker verificationtechniques, similarity scores, hosts and/or providers of computingenvironments and/or virtual environments outside of system 100, externalentities participating with system 100, and/or other resources. In someimplementations, some or all of the functionality attributed herein toexternal resources 16 may be provided by resources included in system100.

Referring to FIG. 1, server(s) 12 and client computing platform(s) 14may include physical storage media 50 (interchangeably referred toherein as “physical storage media”). Physical storage media 50 maycomprise physical storage media that electronically stores information.The functionality of physical storage media 50 may be similar betweendifferent instantiations, even if the stored information may bedifferent. The storage of physical storage media 50 may include one orboth of system storage that is provided integrally (i.e., substantiallynon-removable) and/or removable storage that is removably connectable toserver(s) 12 and/or client computing platform(s) 14 via, for example, aport (e.g., a USB port, a FireWire™ port, etc.) or a drive (e.g., a diskdrive, etc.). Physical storage media 50 may include one or more ofoptically readable storage media (e.g., optical disks, etc.),magnetically readable storage media (e.g., magnetic tape, magnetic harddrive, floppy drive, etc.), electrical charge-based storage media (e.g.,EEPROM, RAM, etc.), solid-state storage media (e.g., flash drive, etc.),and/or other electronically readable storage media. Physical storagemedia 50 may refer to RAM, SRAM, DRAM, eDRAM, SDRAM, volatile memory,non-volatile memory, and/or other types of electronic memory, inparticular non-transitive physical storage media. Physical storage media50 may include one or more virtual storage resources (e.g., cloudstorage, a virtual private network, and/or other virtual storageresources). Physical storage media 50 may store software algorithms,information determined by processor(s) 110, information received fromcomponents of system 100, and/or other information that enablesserver(s) 12 and/or client computing platform(s) 14 to function asdescribed herein.

Server(s) 12 and client computing platform(s) 14 may includeprocessor(s) 110. Processor(s) 110 may be configured to provideinformation-processing capabilities in server(s) 12 and/or clientcomputing platform(s) 14. The functionality of processor(s) 110 may besimilar between different instantiations, even if the processingcapabilities may be different. Processor(s) 110 may include one or moreof a digital processor, an analog processor, a digital circuit designedto process information, an analog circuit designed to processinformation, and/or other mechanisms for electronically processinginformation. Although processor(s) 110 is shown in FIG. 1 as a singleentity, this is for illustrative purposes only. In some embodiments,processor(s) 110 may include a plurality of processing units. Theseprocessing units may be physically located within the same device, orprocessor(s) 110 may represent processing functionality of a pluralityof devices operating in coordination. The processor(s) 110 may beconfigured to execute components 22-31, and/or other components.Processor 110 may be configured to execute components 22-31, and/orother components by software; hardware; firmware; some combination ofsoftware, hardware, and/or firmware; and/or other mechanisms forconfiguring processing capabilities on processor(s) 110.

It should be appreciated that although components 22-31 are illustratedin FIG. 1 as being co-located within the same processing unit, one ormore of components 22-31 may be located remotely from the othercomponents. The description of the functionality provided by thedifferent components 22-31 described herein is for illustrativepurposes, and is not intended to be limiting, as any of components 22-31may provide more or less functionality than is described. For example,one or more of components 22-31 may be eliminated, and some or all ofits functionality may be provided by other ones of components 22-31. Asanother example, processor 110 may be configured to execute one or moreadditional components that may perform some or all of the functionalityattributed herein to one of components 22-31.

It is noted that the division of functionality between server(s) 12 andclient computing platform(s) 14 is not intended to be limited by thisdisclosure. Functions described in relation with server(s) 12 may beperformed and/or shared by one or more other components of system 100,including client computing platform(s) 14, and vice versa.

FIG. 2 illustrates a method 200 for implementing an authentication andverification system, in accordance with one or more embodiments. FIG. 4illustrates a method 400 for implementing authentication, in accordancewith one or more embodiments. The operations of methods 200 and 400presented below are intended to be illustrative. In some embodiments,methods 200 and 400 may be accomplished with one or more additionaloperations not described, and/or without one or more of the operationsdiscussed. Additionally, the order in which the operations of methods200 and 400 are illustrated in FIG. 2 and FIG. 4 and described below isnot intended to be limiting.

In some embodiments, methods 200 and 400 may be implemented in one ormore processing devices (e.g., a digital processor, an analog processor,a controller, a digital circuit designed to process information, ananalog circuit designed to process information, and/or other mechanismsfor electronically processing information). The one or more processingdevices may include one or more devices executing some or all of theoperations of methods 200 and 400 in response to instructions storedelectronically on an physical storage media medium. The one or moreprocessing devices may include one or more devices configured throughhardware, firmware, and/or software to be specifically designed forexecution of one or more of the operations of methods 200 and 400.

Referring to FIG. 2, at an operation 202, information is stored thatrepresents audio characteristics of sounds generated by a speaker. Insome embodiments, operation 202 is performed by physical storage mediathe same as or similar to physical storage media 50 (shown in FIG. 1 anddescribed herein).

At an operation 204, a target personal identification sequence isobtained. The target personal identification sequence is associated withthe speaker. In some embodiments, operation 204 is performed by apersonal identification component the same as or similar to personalidentification component 22 (shown in FIG. 1 and described herein).

At an operation 206, a mapping is obtained between user-selectable inputoptions and a set of prompts that represent words. In some embodiments,operation 206 is performed by a mapping component the same as or similarto mapping component 23 (shown in FIG. 1 and described herein).

At an operation 208, a target sequence of prompts is obtained thatcorresponds to the target personal identification sequence. In someembodiments, operation 208 is performed by a target prompt component thesame as or similar to target prompt component 24 (shown in FIG. 1 anddescribed herein).

At an operation 210, presentation is effectuated of the set of promptsto an unidentified user such that individual ones of the presentedprompts are associated with individual ones of the user-selectable inputoptions in accordance with the obtained mapping. In some embodiments,operation 210 is performed by a presentation component the same as orsimilar to presentation component 25 (shown in FIG. 1 and describedherein).

At an operation 212, one or more audio files comprising sound generatedby an unidentified user are obtained in response to the presentation. Insome embodiments, operation 212 is performed by an audio component thesame as or similar to audio component 26 (shown in FIG. 1 and describedherein).

At an operation 214, a first determination is made whether the obtainedone or more audio files represent a vocalization of the target sequenceof prompts. In some embodiments, operation 214 is performed by a promptauthentication component the same as or similar to prompt authenticationcomponent 27 (shown in FIG. 1 and described herein).

At an operation 216, a second determination is made whether the obtainedone or more audio files match the audio characteristics of soundsgenerated by the speaker. In some embodiments, operation 216 isperformed by a speaker verification component the same as or similar tospeaker verification component 28 (shown in FIG. 1 and describedherein).

At an operation 218, a grant of access is effectuated to theunidentified user responsive to a positive first and seconddetermination. In some embodiments, operation 218 is performed by anaccess component the same as or similar to access component 29 (shown inFIG. 1 and described herein).

Referring to FIG. 4, at an operation 402, a target personalidentification sequence is obtained. The target personal identificationsequence is associated with a known user. The target personalidentification sequence includes a first personal identificationcharacter and a second personal identification character. In someembodiments, operation 402 is performed by a personal identificationcomponent the same as or similar to personal identification component 22(shown in FIG. 1 and described herein).

At an operation 404, a first mapping is obtained between user-selectableinput options and a set of prompts. The set of prompts includes a firstrepresentation of the first personal identification character. The firstmapping includes an individual one of the set of prompts that is mappedto more than one user-selectable input option. In some embodiments,operation 404 is performed by a mapping component the same as or similarto mapping component 23 (shown in FIG. 1 and described herein).

At an operation 406, presentation of the set of prompts is effectuatedto an unidentified user such that individual ones of the presentedprompts are associated with individual ones of the user-selectable inputoptions in accordance with the obtained first mapping. In someembodiments, operation 406 is performed by a presentation component thesame as or similar to presentation component 25 (shown in FIG. 1 anddescribed herein).

At an operation 408, a first user-selectable input option is obtainedfrom the unidentified user in response to the presentation. In someembodiments, operation 408 is performed by an audio component the sameas or similar to audio component 26 (shown in FIG. 1 and describedherein). In some embodiments, the first user-selectable input option maybe received through a non-auditory input mechanism, including but notlimited to a keypad.

At an operation 410, a first determination is made whether the firstuser-selectable input option matches the first personal identificationcharacter in accordance with the obtained first mapping. In someembodiments, operation 410 is performed by a prompt authenticationcomponent the same as or similar to prompt authentication component 27(shown in FIG. 1 and described herein).

At an operation 412, a second mapping is obtained betweenuser-selectable input options and a second set of prompts. The secondset of prompts includes a second representation of the second personalidentification character. The second mapping includes a secondindividual one of the second set of prompts that is mapped to more thanone user-selectable input option. In some embodiments, operation 412 isperformed by a mapping component the same as or similar to mappingcomponent 23 (shown in FIG. 1 and described herein).

At an operation 414, a second presentation of the second set of promptsis effectuated to the unidentified user such that individual ones of thepresented prompts are associated with individual ones of theuser-selectable input options in accordance with the obtained secondmapping. In some embodiments, operation 414 is performed by apresentation component the same as or similar to presentation component25 (shown in FIG. 1 and described herein).

At an operation 416, a second user-selectable input option is obtainedfrom the unidentified user in response to the second presentation. Insome embodiments, operation 416 is performed by an audio component thesame as or similar to audio component 26 (shown in FIG. 1 and describedherein). In some embodiments, the second user-selectable input optionmay be received through a non-auditory input mechanism, including butnot limited to a keypad.

At an operation 418, a second determination is made whether the seconduser-selectable input option matches the second personal identificationcharacter in accordance with the obtained second mapping. In someembodiments, operation 418 is performed by a prompt authenticationcomponent the same as or similar to prompt authentication component 27(shown in FIG. 1 and described herein).

At an operation 420, a grant of access to the unidentified user iseffectuated responsive to a positive first and second determination. Insome embodiments, operation 420 is performed by an access component thesame as or similar to access component 29 (shown in FIG. 1 and describedherein).

The present invention, in accordance with one or more variousimplementations, is described above in detail with reference to theaccompanying figures. The drawings are provided for purposes ofillustration only and merely depict exemplary implementations. Thesedrawings are provided to facilitate the reader's understanding of thesystems and methods described herein and shall not be consideredlimiting of the breadth, scope, or applicability of any of the claims.

Although the invention has been described in detail for the purpose ofillustration based on what is currently considered to be the mostpractical and preferred embodiments, it is to be understood that suchdetail is solely for that purpose and that the invention is not limitedto the disclosed embodiments, but, on the contrary, is intended to covermodifications and equivalent arrangements that are within the spirit andscope of the appended claims. For example, it is to be understood thatthe present invention contemplates that, to the extent possible, one ormore features of any embodiment and/or claim can be combined with one ormore features of one or more other embodiments and/or claims.

What is claimed is:
 1. A computing system for implementing anauthentication and verification system, the system comprising: physicalstorage media configured to store information that represents audiocharacteristics of sounds generated by a speaker; and one or morephysical processors configured to execute computer program components,wherein the computer program components are configured to: obtain atarget personal identification sequence, wherein the target personalidentification sequence is associated with the speaker; obtain a mappingbetween user-selectable input options and a set of prompts thatrepresent words; obtain a target sequence of prompts that corresponds tothe target personal identification sequence; effectuate presentation ofthe set of prompts to an unidentified user such that individual ones ofthe presented prompts are associated with individual ones of theuser-selectable input options in accordance with the obtained mapping;obtain one or more audio files comprising sound generated by anunidentified user in response to the presentation; make a firstdetermination whether the obtained one or more audio files represent avocalization of the target sequence of prompts; make a seconddetermination whether the obtained one or more audio files match theaudio characteristics of sounds generated by the speaker; effectuate agrant of access to the unidentified user responsive to a positive firstand second determination.
 2. The system of claim 1, wherein the targetpersonal identification sequence includes alphanumeric symbols.
 3. Thesystem of claim 1, wherein the target personal identification sequenceincludes numerical digits in a range from zero to nine.
 4. The system ofclaim 1, wherein the prompts are visual prompts.
 5. The system of claim1, wherein individual ones of the prompts include one or more words. 6.The system of claim 1, wherein the mapping is generated at least in partrandomly, and wherein the mapping is generated prior to the presentationof the set of prompts.
 7. The system of claim 1, wherein the mapping isgenerated at least in part randomly, and wherein the mapping isre-generated in-between obtainment of one or more audio files comprisinga first sound generated by the unidentified user, wherein the firstsound represents a vocalization of a first individual prompt, andobtainment of one or more audio files comprising a second soundgenerated by the unidentified user, wherein the second sound representsa vocalization of a second individual prompt.
 8. The system of claim 1,wherein the user-selectable input options correspond to buttons on akeypad.
 9. The system of claim 1, wherein the presentation of the set ofprompts includes display of the words represented by the set of promptson an electronic display device.
 10. The system of claim 1, wherein theone or more audio files are obtained through a microphone disposed nearthe unidentified user.
 11. The system of claim 1, wherein the firstdetermination is based on speech-recognition techniques.
 12. The systemof claim 1, wherein the second determination is based onspeaker-verification techniques.
 13. The system of claim 1, wherein thegrant of access allows the unidentified user access to restrictedoperations and/or transactions that are provided through the system. 14.The system of claim 1, wherein the grant of access allows theunidentified user physical access to a restricted area.
 15. The systemof claim 1, wherein the computer program components are furtherconfigured to obtain a redirection mapping and effectuate presentationof the redirection mapping to the unidentified user prior to thepresentation of the set of prompts, wherein the first determination isbased on a reversal of a redirection in accordance with the redirectionmapping.
 16. The system of claim 1, wherein the computer programcomponents are further configured to enforce a limited amount of timefor the unidentified user to provide the one or more audio filescomprising the sound.
 17. The system of claim 1, wherein thepresentation includes information to guide pacing of the vocalization.18. The system of claim 1, wherein the mapping includes an individualone of the set of prompts that is mapped to more than oneuser-selectable input option.
 19. The system of claim 1, wherein the setof prompts includes a new prompt that represents a new word, wherein thesounds generated by the speaker do not include a representation of avocalization of the new word.
 20. The system of claim 19, wherein thestored information is altered to incorporate the representation of thevocalization of the new word.
 21. A computer-implemented method forimplementing an authentication and verification system including one ormore physical processors and physical storage media, the methodcomprising: storing information that represents audio characteristics ofsounds generated by a speaker; obtaining a target personalidentification sequence, wherein the target personal identificationsequence is associated with the speaker; obtaining a mapping betweenuser-selectable input options and a set of prompts that represent words;obtaining a target sequence of prompts that corresponds to the targetpersonal identification sequence; effectuating presentation of the setof prompts to an unidentified user such that individual ones of thepresented prompts are associated with individual ones of theuser-selectable input options in accordance with the obtained mapping;obtaining one or more audio files comprising sound generated by theunidentified user in response to the presentation; making a firstdetermination whether the obtained one or more audio files represent avocalization of the target sequence of prompts; making a seconddetermination whether the obtained one or more audio files match theaudio characteristics of sounds generated by the speaker; andeffectuating a grant of access to the unidentified user responsive to apositive first and second determination.
 22. The method of claim 21,wherein the target personal identification sequence includesalphanumeric symbols.
 23. The method of claim 21, wherein the targetpersonal identification sequence includes numerical digits in a rangefrom zero to nine.
 24. The method of claim 21, wherein the prompts arevisual prompts.
 25. The method of claim 21, wherein individual ones ofthe prompts include one or more words.
 26. The method of claim 21,wherein obtaining the mapping includes generating the mapping at leastin part randomly, and wherein the mapping is generated prior to thepresentation of the set of prompts.
 27. The method of claim 21, whereinobtaining the mapping includes generating the mapping at least in partrandomly, and wherein obtaining the mapping further includesre-generating the mapping in-between obtaining one or more audio filescomprising a first sound generated by the unidentified user, wherein thefirst sound represents a vocalization of a first individual prompt, andobtaining one or more audio files comprising a second sound generated bythe unidentified user, wherein the second sound represents avocalization of a second individual prompt.
 28. The method of claim 21,wherein the user-selectable input options correspond to buttons on akeypad.
 29. The method of claim 21, wherein the presentation of the setof prompts includes display of the words represented by the set ofprompts on an electronic display device.
 30. The method of claim 21,wherein obtaining the one or more audio files is accomplished through amicrophone disposed near the unidentified user.
 31. The method of claim21, wherein the first determination is based on speech-recognitiontechniques.
 32. The method of claim 21, wherein the second determinationis based on speaker-verification techniques.
 33. The method of claim 21,wherein the grant of access allows the unidentified user access torestricted operations and/or transactions.
 34. The method of claim 21,wherein the grant of access allows the unidentified user physical accessto a restricted area.
 35. The method of claim 21, wherein the grant ofaccess pertains to financial transactions involving the speaker.
 36. Themethod of claim 21, further comprising: enforcing a limited amount oftime for obtaining the one or more audio files comprising the sound. 37.The method of claim 21, wherein effectuating the presentation includeseffectuating presentation of information to guide pacing of thevocalization.
 38. The method of claim 21, wherein the mapping includesan individual one of the set of prompts that is mapped to more than oneuser-selectable input option.
 39. The method of claim 21, wherein theset of prompts includes a new prompt that represents a new word, whereinthe sounds generated by the speaker do not include a representation of avocalization of the new word.
 40. The method of claim 39, furthercomprising: altering the stored information to incorporate therepresentation of the vocalization of the new word.
 41. Acomputer-implemented method for implementing an authentication andverification system including one or more physical processors andphysical storage media, the method comprising: obtaining a targetpersonal identification sequence, wherein the target personalidentification sequence is associated with a known user, and wherein thetarget personal identification sequence includes a first personalidentification character and a second personal identification character;obtaining a first mapping between user-selectable input options and aset of prompts, wherein the set of prompts includes a firstrepresentation of the first personal identification character, andwherein the first mapping includes an individual one of the set ofprompts that is mapped to more than one user-selectable input option;effectuating presentation of the set of prompts to an unidentified usersuch that individual ones of the presented prompts are associated withindividual ones of the user-selectable input options in accordance withthe obtained first mapping; obtaining a first user-selectable inputoption from the unidentified user in response to the presentation;making a first determination whether the first user-selectable inputoption matches the first personal identification character in accordancewith the obtained first mapping; obtaining a second mapping betweenuser-selectable input options and the second set of prompts, wherein thesecond set of prompts includes a second representation of the secondpersonal identification character, and wherein the second mappingincludes a second individual one of the second set of prompts that ismapped to more than one user-selectable input option; effectuating asecond presentation of the second set of prompts to the unidentifieduser such that individual ones of the presented prompts are associatedwith individual ones of the user-selectable input options in accordancewith the obtained second mapping; obtaining a second user-selectableinput option from the unidentified user in response to the secondpresentation; making a second determination whether the seconduser-selectable input option matches the second personal identificationcharacter in accordance with the obtained second mapping; andeffectuating a grant of access to the unidentified user responsive to apositive first and second determination.