Methods including receiving a request to access a resource via a user device, receiving a credentials set from a user (the credentials set including candidate credentials and candidate voice stream), determining whether the candidate credentials are valid based on a comparison of the candidate credentials to existing user credentials, in response to determining that the candidate credentials are v