1460927696-6d7ab70a-de36-429f-bec5-13f0032f4329

1. A method of securely authenticating a client seeking access to secure information available through a network, comprising:
receiving, at a server, an enrollment request;
receiving, at the server, a voice recording;
processing, at the server, the voice recording to determine identifying characteristics of the speaker’s voice;
creating, based on the identifying characteristics, a voice print identification of the speaker;
storing, at the server, the voice print identification;
receiving, at the server, a request for authentication of a client with an existing voice print identification;
receiving, at the server, a sample recording of the client’s voice;
processing, at the server, the sample recording of the client’s voice;
comparing characteristics of the sample recording to at least one voice print identification;
determining, based at least in part on the comparing, that the client is authenticated; and
communicating, over the network, an indication that the client is authenticated.
2. The method of claim 1, wherein the communicating an indication that the client is authenticated comprises:
communicating only non-critical information.
3. The method of claim 1, wherein the communicating an indication that the client is authenticated comprises:
communicating only a positive or negative indication that the client is authenticated.
4. The method of claim 1, wherein receiving, at the server, a sample recording of the client’s voice further comprises:
receiving an indication of the client’s identity.
5. The method of claim 1, wherein determining, based at least in part on the comparing, that the client is authenticated further comprises:
comparing the sample recording of the client’s voice to at least one stored indication of characteristics of sample recordings that were previously used to authenticate the client; and
if the sample recording has been previously used to authenticate, not providing an indication that the client is authenticated.
6. The method of claim 1, wherein receiving, at the server, a sample recording of the client’s voice is the only information received from the client used to authenticate the client.
7. A method of securely authenticating a client who seeks access to secure information available through a network, comprising:
sending, to a server, an enrollment request;
recording the voice of a client;
sending, to a server, the voice recording;
receiving, from the server, an indication that a voice print for the client has been created and stored based on the voice recording;
sending, to the server, a request to authenticate the client;
sending, to the server, a sample voice recording of the client;
receiving, from the server, an indication that the client is authenticated; and
permitting the client access to secure information over the network based on the indication that the client is authenticated.
8. The method of claim 7, wherein the receiving an indication that the client is authenticated comprises:
receiving only non-critical information.
9. The method of claim 7, wherein the receiving an indication that the client is authenticated comprises:
receiving only a positive or negative indication that the client is authenticated.
10. The method of claim 7, wherein sending, to the server, a sample voice recording of the client further comprises:
sending an indication of the client’s identity.
11. The method of claim 7, wherein sending, to the server, a sample voice recording of the client is the only information originating from the client that is used to authenticate the client.
12. A system for securely authenticating a client seeking access to secure information available through a network, comprising:
a back-end computer system adapted to manage and control access to secure information;
a front-end interface, adapted to provide the client with access to the back-end computer system;
a voice analysis computer system, adapted to verify a client’s identity based on a voice sample;
wherein the front-end interface is adapted to provide the client with the ability to record a client voice sample and communicate the client’s voice sample to the voice analysis computer system;
wherein the voice analysis computer system is adapted to compare the received client’s voice sample to at least one voice print and authenticate the client based at least in part on the comparison; and
wherein the voice analysis computer system is adapted to communicates an indication of authentication.
13. The system of claim 12, wherein the voice analysis computer system is adapted to communicate the indication of authentication to the front-end interface, and wherein the front-end interface is adapted to allow the client access to secure information.
14. The system of claim 12, wherein the voice analysis computer system is adapted to communicate the indication of authentication to the back-end computer system, and wherein the back-end computer system is adapted to allow the client access to secure information.
15. The system of claim 12, wherein the voice analysis computer system is adapted to allow the client access to secure information.
16. The system of claim 12, wherein the front-end interface is adapted to provide the client with the ability to record a client voice sample and communicate the clients voice sample to the voice analysis computer system along with an indication of the client’s identity.
17. The system of claim 12, wherein the sample voice recording of the client is the only information originating from the client that is used to authenticate the client.
18. A method of operating a voice analysis system, comprising:
receiving, by a voice analysis system, at least one parameter indicating whether the system is to operate in a first mode or a second mode;
receiving, by the voice analysis system, a voice recording;
setting voice analysis constraints to a first level if the parameter indicates the first mode, or setting the voice analysis constraints to a second level if the parameter indicates the second mode; and
comparing the voice recording to at least one template, wherein the comparison is based at least in part on the constraints, wherein the first mode indicates that the voice analysis system is to perform speaker identification, wherein the second mode indicates that the voice analysis system is to perform word recognition; and
wherein if the parameter indicates the first mode, providing an indication of authentication, and wherein the if the parameter indicates the second mode, providing an indication of the textual value of the voice recording.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

What is claimed is:

1. A device for activating user-specific settings,
comprising at least one fingerprint sensor (10), whose sensor signal (12) is compared by a signal analysis (14) for user identification to at least one reference information (U1REF, U2REF, UNREF),
at least one setting (E1, E2) of an adjustable component (24) being assigned to at least one user,
and at least one control (20) which activates the adjustable component (24) along the lines of the setting (E1, E2) assigned to the recognized user,
wherein detection means (10, 14) are provided which detect the presence or proximity of a finger on the fingerprint sensor (10), the adjustable component (24) being activated depending on whether the presence of the finger is detected.
2. The device as recited in claim 1,
wherein the activation of the adjustable component (24) along the lines of the setting (E1, E2) assigned to the user is stopped as soon as the finger is no longer detected as being present on or in the proximity of the fingerprint sensor (10).
3. The device as recited in one of the preceding claims,
wherein the detection means (10, 14) accesses the evaluation of the sensor signal (12) of the fingerprint sensor (10).
4. The device as recited in one of the preceding claims,
wherein a capacitive sensor is used as the detection means (10).
5. The device as recited in one of the preceding claims,
wherein a switching element that is actuatable by a finger is used as detection means.
6. The device as recited in one of the preceding claims,
wherein the switching element is integrated in the fingerprint sensor (10).
7. The device as recited in one of the preceding claims,
wherein a plurality of reference information (U1REF, U2REF, UNREF) is provided.
8. The device as recited in one of the preceding claims,
wherein that reference information (U1REF, U2REF, UNREF), which first conformed with the sensor signal (12) during a preceding comparison, is first compared with the sensor signal (12).
9. The device as recited in one of the preceding claims,
wherein that reference information (U1REF, U2REF, UNREF), which most frequently conformed with the sensor signal (12) during a preceding comparison with the sensor signal (12), is first compared with the sensor signal (12).