. . . . "For instance, a user may enter a PIN into a user device (e.g., a microphone comprised in the device) by speaking each of the letters, numbers, and symbols of a PIN or other code." .