Utilizing voice biometrics to address coercion of an authorized user of a secure device by a nefarious actor
Abstract:
A system comprising a secure computer system, a network-enabled secure end-user device, and a coercion security system. The secure computer system can host secure services and/or sensitive data. The secure end-user device can utilize a secure device architecture that requires biometric authentication of an authorized user for access. The coercion security system can have an application running on the secure end-user device. The coercion security system can be configured to capture and analyze verbal communication proximate to the secure end-user device to address coercion of the authorized user by a nefarious actor to access the secure computer system and/or the secure end-user device. Without coercion of the authorized user, the nefarious actor can be unable to access the secure end-user device and/or the secure computer system. The coercion security system can executes one or more security commands upon the secure end-user device in response to detected coercion.
Information query
Patent Agency Ranking
0/0