Abstract

This document describes a technique for processing voice commands received by a voice activated computing system to identify one or more tasks or actions to be performed based on the voice commands. The system determines the type of tasks or actions identified, and based on their type determines whether execution of those tasks or action requires user authentication. If user authentication is required, the system pauses the tasks or actions and executes one or more authentication actions that can authenticate the user. If the user authentication is successful, the system can continue to execute the paused tasks or actions. However, if the authentication fails, the system can terminate or disable the tasks or actions.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS