A system and method are disclosed of authenticating a user to a security system based on voice recognition. The method could be implemented in a system including a user with a smartphone device at a security access system connected to a Cloud-based authentication server. The method matches a spoken voice picked up locally by the access system to a registered account on the server. The server could have another registered hardware device such as a smartphone or tablet locally connected to the security system using a mechanism such as Bluetooth, WiFi, etc. that is used to identify the user. The system determines that the user is a privileged account holder on the alarm with the permission being verbally requested. The authentication server then matches this command to a trained voice in an appropriate server record. The system then allows the user to arm or disarm the alarm.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Raffel, Daniel, "System And Method For Authenticating A Speaker Across The Surfaces Of A Security System", Technical Disclosure Commons, (December 19, 2016)