US20080256613A1 - Voice print identification portal - Google Patents
Voice print identification portal Download PDFInfo
- Publication number
- US20080256613A1 US20080256613A1 US12/075,799 US7579908A US2008256613A1 US 20080256613 A1 US20080256613 A1 US 20080256613A1 US 7579908 A US7579908 A US 7579908A US 2008256613 A1 US2008256613 A1 US 2008256613A1
- Authority
- US
- United States
- Prior art keywords
- client
- voice
- recording
- indication
- sample
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 63
- 238000012545 processing Methods 0.000 claims description 9
- 230000009977 dual effect Effects 0.000 abstract description 2
- 230000008569 process Effects 0.000 description 34
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- VXPLXMJHHKHSOA-UHFFFAOYSA-N propham Chemical compound CC(C)OC(=O)NC1=CC=CC=C1 VXPLXMJHHKHSOA-UHFFFAOYSA-N 0.000 description 2
- 230000002207 retinal effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000001755 vocal effect Effects 0.000 description 2
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000003066 decision tree Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 238000013518 transcription Methods 0.000 description 1
- 230000035897 transcription Effects 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/06—Decision making techniques; Pattern matching strategies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/26—Speech to text systems
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Definitions
- the present invention relates generally to system access control based on user identification by biometric acquisition and speech signal processing for word recognition. More particularly, the present invention relates to combining voice based biometric identification for securing various computer related devices and speech recognition for device control and automated entry of information.
- the field of processing voice signals for use within a computerized device has traditionally been split into two distinct fields, speaker identification and speech recognition. These two fields have historically required separate and uniquely designed and configured systems. These systems are often provided by different vendors
- Speech recognition involves recognizing a human language word spoken by a speaker.
- speech recognition is utilized for computerized dictation, where a user speaks into a microphone and her words are recognized and entered into a document.
- Another example of speech recognition is controlling personal electronics, such as a cellular telephone or car stereo, through the use of verbal commands.
- Other applications for speech recognition include: command recognition, dictation, interactive voice response systems, automotive speech recognition, medical transcription, pronunciation teaching, automatic translation, and hands-free computing.
- Speech recognition is typically achieved through comparison characteristic qualities of spoken words, phrases, or sentences to one or more templates.
- a variety of algorithms are known in the art that allow qualification and/or comparison of speech to templates. These algorithms include: hidden Markov models, neural network-based systems, dynamic time warping based systems, frequency estimation, pattern matching algorithms, matrix representation, decision trees, and knowledge based systems. Some systems will employ a combination of these techniques to achieve higher accuracy rates.
- Speaker identification involves the process of identifying or verifying the identity of a specific person based on unique qualities of human speech.
- Human speech is often referred to as a biometric identification mechanism similar to finger prints or retinal scans. Like fingerprints and retinal scans, every individual has a unique voice print that can be analyzed and matched against known voice prints. Like other biometric identification mechanisms, voice prints can be utilized for verification or identification.
- voice authentication is achieved in a similar manner to speech recognition: characteristic qualities of spoken words or phrases are compared to one or more templates. However, voice authentication is much more difficult to successfully achieve than speech recognition.
- speech recognition requires a less stringent match between the spoken word and a speech template. All that must be determined is what word was said, not who said that word based on a specific accent, pitch and tone.
- speaker identification requires matching the speaker to a much larger number of possibilities, because one person must be identified out of many, not just what word they spoke. Whereas it may be acceptable to take up to several seconds to perform voice authentication, speech recognition must be done at a relatively fast pace in order for an interface to be reasonably useable.
- speech to authenticate a user has a variety of advantages over other identification methods.
- TSL Transport Layer Security
- SSL Secure Socket Layer
- a method of securely authenticating a client seeking access to secure information or services available through a network includes an enrollment process.
- the enrollment process may include receiving, at a server, an enrollment request and a voice recording.
- the process further includes processing, at the server, the voice recording to determine identifying characteristics of the client's voice, and creating a voice print identification of the client and storing the voice print identification.
- the method also includes an authentication process.
- the authentication process includes receiving, at the server, a request for authentication of a client with an existing voice print.
- the existing voice print was created according to the enrollment process discussed above.
- the authentication process includes receiving a sample recording of the client's voice.
- the process includes processing the sample recording.
- the process includes comparing characteristics of the sample recording to at least one voice print identification.
- the process includes determining, based at least in part on the comparing, that the client is authenticated.
- the process includes communicating, over the network, an indication that the client is authenticated.
- receiving, at the server, a sample recording of the client's voice is the only information received from the client that is used to determine that the client is authenticated.
- a method of securely authenticating a client seeking access to secure information available through a network includes an enrollment process.
- the enrollment process includes sending, to a server, an enrollment request.
- the enrollment process includes the voice recording of a client.
- the enrollment process includes sending, to a server, the voice recording.
- the enrollment process includes receiving, from the server, an indication that a voice print for the client has been created and stored based on the voice recording.
- the method also includes an authentication process.
- the authentication process includes sending, to the server, a request to authenticate the client.
- the authentication process includes sending, to the server, a sample voice recording of the client.
- the authentication process includes receiving, from the server, an indication that the client is authenticated.
- the authentication process includes permitting the client access to secure information over the network based on the indication that the client is authenticated.
- sending, to the server, a sample voice recording of the client is the only information originating from the client that is used to authenticate the client.
- a system for securely authenticating a client seeking access to secure information available through a network includes a back-end computer system adapted to manage and control access to secure information.
- the system includes a front-end interface, adapted to provide the client with access to the back-end computer system.
- the system includes a voice analysis computer system, adapted to verify a client's identity based on a voice sample.
- the front-end interface is adapted to provide the client with the ability to record a client voice sample and communicate the client's voice sample to the voice analysis computer system.
- the voice analysis computer system is adapted to compare the received client's voice sample to at least one voice print and authenticate the client based at least in part on the comparison. In an embodiment, the voice analysis computer system is adapted to communicate an indication of authentication. In an embodiment, the sample voice recording of the client is the only information originating from the client that is used to authenticate the client.
- a method of operating a voice analysis system includes receiving, by a voice analysis system, at least one parameter indicating whether the system is to operate in a first mode or a second mode.
- the method includes receiving, by the voice analysis system, a voice recording.
- the method includes setting voice analysis constraints to a first level if the parameter indicates the first mode, or setting the voice analysis constraints to a second level if the parameter indicates the second mode.
- the method includes comparing the voice recording to at least one template. In an embodiment, the comparison is based at least in part on the constraints.
- the first mode indicates that the voice analysis system is to perform speaker identification.
- the second mode indicates that the voice analysis system is to perform word recognition. In an embodiment, if the parameter indicates the first mode, an indication of authentication is provided. In an embodiment, if the parameter indicates the second mode, an indication of the textual value of the voice recording is provided.
- FIG. 1 illustrates generally a block diagram example of a typical transaction over a network.
- FIG. 2 a and FIG. 2 b illustrate generally a flow chart example of one embodiment of voiceprint authentication.
- FIG. 3 illustrates generally an embodiment of the use of voice authentication for a client-business transaction over a network.
- FIG. 4 illustrates generally an alternative embodiment of the use of a voice authentication system.
- FIG. 5 illustrates generally one embodiment of an additional security feature.
- FIG. 6 illustrates generally one embodiment of an additional security feature.
- FIG. 7 illustrates generally one embodiment of a voice analysis system adapted to support both speech recognition and speaker identification.
- FIG. 8 illustrates generally a block diagram of one embodiment of an implementation of the system described herein.
- FIG. 9 illustrates generally one example of potential data stored by MySQL databases according to the subject matter described herein.
- FIG. 10 illustrates generally a flowchart example of an applet according to the subject matter described herein.
- FIG. 11 illustrates generally a flowchart example of a JSP application according to the subject matter described herein.
- FIG. 12 illustrates generally a flowchart example of a company administration JSP application according to the subject matter described herein.
- FIG. 13 illustrates generally a flowchart example of a web administration JSP application according to the subject matter described herein.
- FIG. 1 illustrates generally a block diagram example of a typical transaction over a network.
- client 106 seeks to communicate with a business over a network such as the internet.
- client 106 uses a front-end interface 101 .
- Front-end interface 101 may be any means with which a client may access content available over a network.
- a client may access a front-end interface 101 through any commonly known network access device such as, but not limited to, a computer, a Smartphone, or a PDA.
- Client 106 through front-end interface 101 , communicates with back-end computer system 102 .
- Back-end computer system 102 may include a back-end server 107 .
- front-end interface 101 communicates with back-end computer system 102 through connection 104 .
- a typical transaction usually includes authentication of client 106 by back-end computer system 102 . Often, authentication is achieved through client 106 supplying some form of identification to back-end computer system 102 . Some examples of identification are pin numbers and associated passwords. Other examples include personal information such as social security numbers, addresses, telephone numbers, or client's 106 mother's maiden name. Due to the need for personal devices discussed above to be able to connect with a large variety of sources, connection 104 between front-end interface 101 and back-end computer system 102 is typically a less than secure connection. As a result of an insecure connection, the personal information transferred over connection 104 is vulnerable to theft.
- FIG. 2 a and FIG. 2 b illustrate generally a flow chart example of one embodiment of voiceprint authentication according to the subject matter disclosed herein.
- FIG. 2 a illustrates generally one embodiment of an account initialization process.
- a client initiates an account with a provider of voiceprint authentication services (service provider).
- service provider provides a means to record his/her voice and instructions for using those means.
- the client's voice may be recorded by any means known in the art, and in any format known in the art such as mp3 format, wav format, or a proprietary audio format.
- any digital audio format e.g. wav, mp3 formats
- any digital audio format is within the scope of the subject matter discussed herein.
- a proprietary audio format is used to record the client's voice.
- the recording is then transferred to the service provider.
- the service provider analyzes the client's recording and extracts characteristics of the client's voice to create a voiceprint that represents the client's identity.
- the voiceprint is stored by the services provider for later use in authenticating the client.
- FIG. 2 b illustrates generally a voiceprint authentication process according to the subject matter disclosed herein. It is assumed in this embodiment that prior to attempting voiceprint authentication of a client the client has gone through an account initialization process, such as the process discussed in FIG. 2 a .
- the client seeks voice authentication. The client may seek voice authentication for a number of reasons, including: internet website or telephone access to a bank or other commercial service provider, or in person authentication in a direct buyer/seller transaction.
- the client is provided a means to record his/her voice. The client may be provided instructions to use a particular word or phrase, or the client may be allowed to speak any word or phrase for use in authenticating his identity. A recording of the client's voice is created.
- the service provider compares the recording of the client's voice made at step 205 to stored voiceprints.
- the service provider has access to only the client's voice recording, and that recording is compared to all the voiceprints the service provider has access to until a match is found.
- the client's voice recording is provided to the service provider along with a client identification number. This embodiment is advantageous in that the service provider need only make a single comparison, thus decreasing the time and resources needed to authenticate a client.
- the client is authenticated.
- FIG. 3 illustrates generally one embodiment of the use of voice authentication system for a secure access transaction over a network according to the subject matter disclosed herein.
- client 301 seeks access to secure information or services. In order to do so, client 301 uses front-end interface 101 to access webpage 302 that is available over a network such as the internet. Webpage 302 is controlled by back-end computer system 304 . In typical transactions such as described herein, client 301 is required to enter personal information such as an account number and/or password into webpage 302 . As discussed with respect to FIG. 2 , the connection between front-end interface 101 and webpage 302 may be a non-secure connection. Therefore the opportunity for identity theft is present.
- a voiceprint is used to authenticate the client and allow him/her access to secure content on back-end computer system 304 . It is assumed for purposes of this discussion that client 301 has previously initiated an account with the voice authentication service provider (service provider) as discussed in FIG. 2 .
- client 301 visits webpage 302 , the client is offered the ability to, or required to, use voice authentication to access secure information.
- client 301 is provided with means to create a sample voice recording.
- the client is provided an interface through the webpage to record his/her voice.
- the recording (and possibly a user id associated with the service provider as discussed in reference to FIG. 2 ) is communicated to voice analysis computer system 303 .
- Voice analysis computer system 303 then compares the received recording to one or more stored voiceprints, and if a match is found, the client's identity is verified.
- voice analysis computer system 303 communicates, using a secure connection, with back-end computer system 304 to determine whether the particular client 301 has permission to access particular content.
- voice analysis computer system 303 has access to a client security key (and possibly security keys allowing access to back-end computer system 304 itself) that allows access to back-end computer system 304 .
- voice analysis computer system 303 transmits the client security key to back-end computer system 304 .
- back-end computer system 304 may determine whether client 301 should be granted access, and communicates (using a secure connection) authorization of access to voice analysis computer system 303 . Voice analysis computer system 303 may then allow access to secure content through webpage 302 .
- voice analysis computer system 303 does not have access to a client security key to determine permission. Instead, voice analysis computer system 303 attempts to verify the identity of client 301 , and, if successful, communicates success to back-end computer system 304 . According to this embodiment, back-end computer system 304 determines whether client 301 is to be granted permission to access webpage 302 , and back-end computer system 304 itself communicates and allows access to webpage 302 .
- voice analysis computer system 303 verifies permission by reviewing client and business specific information stored on voice analysis computer system 303 .
- voice analysis computer system 303 does not communicate security keys to back-end computer system 304 and receive authorization from back-end computer system 304 . Instead, the entire authentication process is achieved in voice analysis computer system 303 .
- authorized access is communicated to webpage 302 .
- client authentication provides far greater security than previously known systems of client authentication. Because only the client's voice recording, and possibly service provider username, are entered into and/or communicated over accessible networks, it is nearly impossible for anyone to get access to the client's personal information. Identity verification through voice authentication provides a significant advantage in that it is nearly impossible to replicate a person's voice.
- client authentication illustrated in FIG. 3 may be used to authenticate access to content, information, or devices other than webpage 302 .
- Examples of such devices include cellular phones, computers, laptops, or a Personal Digital Assistant (PDA).
- client seeks access to a secure device through voice authentication.
- voice authentication there may or may not be a back-end computer system 304 that controls the device.
- back-end computer system 304 does exist, the system functions identically to the above descriptions, however instead of webpage 302 access, device access is controlled.
- the device is communicatively coupled to voice analysis computer system 303 through a network.
- client 303 is provided means to create a sample voice recording.
- the voice recording is communicated to voice analysis computer system 303 , and the client's 301 voice may or may not be authenticated.
- Voice analysis computer system 303 may have access to unlock, or otherwise provide access to, the device. If authentication is verified, voice analysis computer system 303 communicates with the device and allows client 301 access to the device.
- FIG. 4 illustrates generally an alternative embodiment of a voice authentication system to manage client-business transactions over a network according to the subject matter disclosed herein.
- the embodiment illustrated in FIG. 4 is nearly identical with the embodiment illustrated in FIG. 3 , except voice analysis computer system 403 is embedded within back-end computer system 404 .
- FIG. 5 illustrates generally one embodiment of an additional security feature according to the subject matter disclosed herein.
- the embodiment illustrated in FIG. 5 is nearly identical to FIG. 2 b , except additional security steps are added to the process of voiceprint authentication.
- a client seeks voice authentication to procure secured access.
- the client is provided a means to record his/her voice, and a recording of the client's voice is created.
- the service provider compares the recording of the client's voice made at step 502 to stored voiceprints.
- the voice recording is compared with one or more existing voiceprints to determine if a match exists.
- 5 includes the additional step of, at 505 , comparing the client's voice recording not only to the client's voiceprint, but also to one or more templates of recordings of the client's voice that were previously successful in the authentication process. This additional step ensures against fraudulent behavior in that it prevents someone from using a recording of a person's voice in order to access personal information.
- the client is authenticated.
- the client's voice recording is stored for later comparison.
- FIG. 6 illustrates generally a flow chart of one embodiment of an additional security feature according to the subject matter presented herein.
- audio data may be recorded and/or transmitted by any means known in the art, or by a proprietary format.
- the audio data is further marked in order to provide additional security. Marking includes inserting, in the audio data, one or more indicators. These indicators are readable by systems adapted to utilize the proprietary data format. These indicators provide such systems with the ability to determine whether the audio data has been used previously, and whether the audio data has been used fraudulently. Therefore, the embodiment discussed above provides an additional layer of security to prevent the fraudulent use of audio data to access personal information.
- FIG. 6 at 601 , a client's voice is recorded.
- the client's voice is recorded in a proprietary audio format, or translated to a proprietary audio format, and an audio file is created.
- markers are inserted into the audio file and the audio file is transmitted.
- the audio data is received and processed.
- the audio file and included markers are processed to determine if the audio file is the one sent, and whether or not the audio file has been determined fraudulent.
- the audio file is used for purposes described herein.
- FIG. 7 illustrates generally one embodiment of a speech analysis engine 701 adapted to support both speaker identification and speech recognition.
- dual purpose speech analysis engine 701 is adapted to accept as input a flag 702 designating the desired function of engine 701 .
- Flag 702 indicates to engine 701 whether speech recognition 703 or speaker identification 704 is desired.
- Parameter constraints 705 define the strictness with which speech processor 708 determines a match according to speech characteristics. If speaker identification 704 is required, parameter constraints 705 are set with strict requirements that must be met to find a positive match with a speaker's characteristics. In contrast, if speech recognition 703 is desired, then parameter constraints 705 are set with much lower requirements that a positive match with the characteristics of a particular spoken word is found.
- engine 701 is adapted to return to the voice analysis computer system 303 a positive or negative indication of whether the speaker was identified 706 .
- engine 701 is adapted to return a textual representation of spoken speech 707 .
- FIG. 8 illustrates generally a block diagram of one embodiment of the implementation of a voice analysis system 801 as disclosed herein.
- voice analysis system 801 is implemented such that the system is capable of downloading and executing application software to front-end interface 101 .
- Such capabilities are advantageous to implementation of system 801 because they allow access and control of front-end interface 101 .
- system 801 may be capable of exercising control over microphone capabilities of front-end interface 101 .
- system 801 is implemented using a Java Virtual Machine environment.
- system 101 includes Java Applet 802 .
- Applet 802 is a program with the ability to download and execute software on front-end interface 101 . Applet 802 controls much of the user interface requirements of system 801 , such as microphone functionality.
- System 801 may further include Java JSP application 803 .
- Java JSP application 803 is adapted to run on voice analysis computer system 303 .
- JSP application is further adapted to communicate with applet 802 to receive and transfer commands and information from applet 802 .
- JSP application 803 is adapted to receive a voice recording from applet 802 , and process that voice recording.
- System 801 may further include one or more databases such as MySQL Database(s) 804 .
- JSP application 803 among other applications, may be adapted to store and manage data in Databases 804 .
- system 801 also includes Secure Web Based Administration Pages 805 .
- administration pages 805 provide an interface to create, modify, and configure client users.
- system 801 further includes Web Administration and Company administration JSP applications 806 .
- Web Administration and Company Administration JSP applications 806 provide a web-based interface to configure companies, including companies access to system 801 .
- applet 802 is adapted to run on front-end interface 101
- JSP application 803 is adapted to run on voice analysis computer system 303
- both applet 802 and JSP application 803 are adapted to run on front-end interface 101
- JSP application 803 is adapted to run on back-end computer system 304 .
- FIG. 9 illustrates generally one example of potential data stored in MySQL Database(s) 804 .
- Detailed database schema SQL script source code is included as an appendix to this application.
- FIG. 10 illustrates generally a flow chart diagram of one embodiment of an applet 802 according to the subject matter disclosed herein.
- applet 802 is a Java Applet.
- applet 802 is implemented as a Java Midlet instead of a Java Applet.
- a Java Midlet is preferred when front-end interface 101 is a portable device or an embedded device.
- the term applet as used herein is intended to refer to either a Java Applet or a Java Midlet.
- Applet 802 may be adapted to run on front-end interface 101 .
- applet 802 is adapted to initialize on front-end interface 101 . Initializing may include determining the available sound recording/management hardware and software available to the front-end interface 101 .
- Initializing may further include receiving input parameters that define what actions Applet 802 is to take.
- Input parameters may include: 1) whether enrollment, re-enrollment, authentication, or speech recognition capabilities are desired of applet 802 , and 2) identification information such as a user or company identification indicator.
- Initializing may further include providing a graphical user interface to a user such that the user may select input parameters for applet 802 .
- applet 802 is adapted to capture a client's voice.
- Voice capture may include: 1) providing a user interface to allow the client to record voice, 2) providing instructions to the client, 3) controlling front-end interface 101 in order to record voice (including measuring background noise and setting detection thresholds), 4) verifying that the resultant recording meets requirements for further processing, and 5) preparing the recording for communication.
- the voice recording is communicated using a TCP protocol.
- applet 802 sends the voice recording to JSP application 803 for processing, and verifies that the communication was successful.
- applet 802 sends the voice recording over a secure connection such as an SSL connection.
- JSP application 803 runs on voice analysis computer system 303 .
- applet 802 processes return values from JSP application 803 .
- Applet 802 processes the return values based on what function was desired at 1002 .
- applet 802 provides the user with a results display. In one embodiment, if authentication or enrollment were requested, applet 802 provides the user with an indication that authentication was successful or unsuccessful. In another embodiment, where speech recognition was requested, applet 802 provides the user with a textual indication of the words that were spoken. In a similar embodiment, applet 802 provides the client with a verbal indication of words spoken by the client, or applet 802 may also act in response to words spoken by the client. Once the results have been provided to the user, applet 802 returns to 1002 and allows the client to re-enter parameters.
- FIG. 11 illustrates generally a flow chart diagram of one embodiment of a Java JSP application 803 according to the subject matter disclosed herein.
- Java JSP application 803 is implemented as a Java Servlet.
- JSP application 803 is run on voice analysis computer system 303 .
- JSP application 803 awaits a request from applet 802 . When a request is received, JSP application processes the request. At 1103 , JSP application 803 , based on the request from applet 802 , determines what function is desired of JSP application 803 . JSP application 803 determines whether applet 802 requested: enrollment of a new user, re-enrollment of an existing user, authentication of an enrolled user, or speech recognition.
- JSP application validates the user ID of the user, processes the voice recording, and updates an enrollment template and stores the template in databases 804 .
- data is transferred back to applet 803 .
- authentication of an existing user is requested by applet 802
- the user's user id is validated, the user's voice recording is processed, and the voice recording is compared to existing voice templates to determine whether the client is authenticated. If the client is authenticated, security tokens are prepared for transmission to applet 802 . At 1110 , security tokens and other data are communicated to applet 802 .
- JSP application 803 is adapted to modify (lessen) voice recognition constraints such that JSP application 803 is only adapted to verify a particular word, not a particular client's voice.
- the voice recording is processed and compared to stored voice commands. If a match is found, an identification of a voice command is prepared for communication to applet 802 .
- the identification of a voice command and other data are communicated to applet 802 .
- FIG. 12 illustrates generally one embodiment of a Company Administration JSP Application 1201 as disclosed herein.
- Company Administration JSP Application 1201 provides an interface to create, modify, and configure client user data.
- the client user data consist of the following; UserID, CompanyName, FirstName, LastName, Password, Department, Position, Location, Email, Phone1, Phone2, Phone3, SecurityTokenID's, EnrollmentTemplateID's, and VoiceCommandID's.
- FIG. 13 illustrates generally one embodiment of a Web Administration JSP Application 1301 .
- Web Administration JSP Application 1301 provides a web-based interface to configure companies, and their access to the Voice Print Portal Solution.
- a client who does not have access to a front-end interface 101 that is capable of recording voice.
- a client is provided the ability to select a “Call In” button. When the “Call In” button has been selected, the client is provided an ordinary telephone number. The user may call the number in order to record his/her voice.
- the client does not have any access to a front-end interface 101 or the internet.
- a client is provided with the ability to operate the entire system through ordinary telephone service.
- the client may communicate with and request system 801 functions through voice commands or though dialing numbers on a telephone keypad.
- this telephone only system is implemented using telephony systems such as IPPC or IPPC express offered by Cisco Systems, Inc.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computational Linguistics (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Biomedical Technology (AREA)
- Business, Economics & Management (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Game Theory and Decision Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
Systems and methods providing for secure voice print authentication over a network are disclosed herein. During an enrollment stage, a client's voice is recorded and characteristics of the recording are used to create and store a voice print. When an enrolled client seeks access to secure information over a network, a sample voice recording is created. The sample voice recording is compared to at least one voice print. If a match is found, the client is authenticated and granted access to secure information.
Systems and methods providing for a dual use voice analysis system are disclosed herein. Speech recognition is achieved by comparing characteristics of words spoken by a speaker to one or more templates of human language words. Speaker identification is achieved by comparing characteristics of a speaker's speech to one or more templates, or voice prints. The system is adapted to increase or decrease matching constraints depending on whether speaker identification or speaker recognition is desired.
Description
- The present invention claims priority to U.S. Provisional Patent Application No. 60/894,627, entitled “VOICE PRINT IDENTIFICATION PORTAL,” filed Mar. 13, 2007 which is hereby incorporated by reference.
- The present invention relates generally to system access control based on user identification by biometric acquisition and speech signal processing for word recognition. More particularly, the present invention relates to combining voice based biometric identification for securing various computer related devices and speech recognition for device control and automated entry of information.
- The field of processing voice signals for use within a computerized device has traditionally been split into two distinct fields, speaker identification and speech recognition. These two fields have historically required separate and uniquely designed and configured systems. These systems are often provided by different vendors
- Speech recognition involves recognizing a human language word spoken by a speaker. In one example, speech recognition is utilized for computerized dictation, where a user speaks into a microphone and her words are recognized and entered into a document. Another example of speech recognition is controlling personal electronics, such as a cellular telephone or car stereo, through the use of verbal commands. Other applications for speech recognition include: command recognition, dictation, interactive voice response systems, automotive speech recognition, medical transcription, pronunciation teaching, automatic translation, and hands-free computing. Speech recognition is typically achieved through comparison characteristic qualities of spoken words, phrases, or sentences to one or more templates. A variety of algorithms are known in the art that allow qualification and/or comparison of speech to templates. These algorithms include: hidden Markov models, neural network-based systems, dynamic time warping based systems, frequency estimation, pattern matching algorithms, matrix representation, decision trees, and knowledge based systems. Some systems will employ a combination of these techniques to achieve higher accuracy rates.
- Speaker identification involves the process of identifying or verifying the identity of a specific person based on unique qualities of human speech. Human speech is often referred to as a biometric identification mechanism similar to finger prints or retinal scans. Like fingerprints and retinal scans, every individual has a unique voice print that can be analyzed and matched against known voice prints. Like other biometric identification mechanisms, voice prints can be utilized for verification or identification.
- Verification using a voice print is commonly referred to as voice authentication. Voice authentication is achieved in a similar manner to speech recognition: characteristic qualities of spoken words or phrases are compared to one or more templates. However, voice authentication is much more difficult to successfully achieve than speech recognition. First, speech recognition requires a less stringent match between the spoken word and a speech template. All that must be determined is what word was said, not who said that word based on a specific accent, pitch and tone. Second, speaker identification requires matching the speaker to a much larger number of possibilities, because one person must be identified out of many, not just what word they spoke. Whereas it may be acceptable to take up to several seconds to perform voice authentication, speech recognition must be done at a relatively fast pace in order for an interface to be reasonably useable.
- Traditionally, the use of speech for identification purposes versus speech for recognition purposes has been very segmented. While speech authentication requires complex and demanding comparisons, speech recognition requires real-time performance in order to meet user needs. Due to these differing requirements, existing systems (including computer hardware, software, or both) have been limited to performing one of these two functions.
- The use of speech to authenticate a user has a variety of advantages over other identification methods. First, like fingerprints or iris scans, every human being has an entirely unique speech pattern that can be quantifiably recognized using existing technology. Second, unlike fingerprints or iris scans, the input to a speaker identification system (the spoken word) may be different every time, even where the speaker is saying the same word. Therefore, unlike other methods of human authentication, speech authentication provides the additional advantage of an ability to prevent multiple uses of the same voice print.
- The rise of the computer age has drastically changed the manner in which people interact with each other in both business and personal settings. Along with the rise of the use of technology to conduct everyday life, security concerns with the use of computers have risen dramatically due to identity theft. Identity theft typically occurs where personal information such as bank accounts, social security numbers, passwords, identification numbers . . . etc., or corporate information is accessible when transferred over networks such as the internet, or when personal information or corporate information is entered into a user interface. For typical internet transactions such as consumer purchases, bank account transfers . . . etc, the transaction involves both a business side (back-end) and a customer side (front-end). The customer typically uses a computer, or handheld device such as a Smartphone or Personal Digital Assistant (PDA) to communicate during the transaction. Typically, communications during internet transactions are made very secure by using high security protocols such as Transport Layer Security (TSL) or Secure Socket Layer (SSL). However, when a customer enters in information (before it is transferred) at the front-end side of the transaction, the information is highly vulnerable to theft. In fact, in most cases of identity theft, personal information is stolen from the front-end side of the transaction. Therefore, a need exists to provide an efficient, more secure means of protecting the identity of one who wishes to interact in a secure environment over networks such as the internet. More specifically, a need exists to provide a secure transaction environment in which personal or corporate information is not communicated to the customer front-end in an accessible or repeatable format.
- The invention described herein seeks to remedy the issues discussed above by providing a system and method of voice authentication. In one embodiment, a method of securely authenticating a client seeking access to secure information or services available through a network is disclosed herein. In an embodiment, the method includes an enrollment process. The enrollment process may include receiving, at a server, an enrollment request and a voice recording. The process further includes processing, at the server, the voice recording to determine identifying characteristics of the client's voice, and creating a voice print identification of the client and storing the voice print identification.
- In an embodiment, the method also includes an authentication process. The authentication process includes receiving, at the server, a request for authentication of a client with an existing voice print. In one embodiment, the existing voice print was created according to the enrollment process discussed above. In one embodiment, the authentication process includes receiving a sample recording of the client's voice. In one embodiment, the process includes processing the sample recording. In one embodiment, the process includes comparing characteristics of the sample recording to at least one voice print identification. In one embodiment, the process includes determining, based at least in part on the comparing, that the client is authenticated. In one embodiment, the process includes communicating, over the network, an indication that the client is authenticated. In one embodiment, receiving, at the server, a sample recording of the client's voice is the only information received from the client that is used to determine that the client is authenticated.
- In another embodiment, a method of securely authenticating a client seeking access to secure information available through a network is described here. In an embodiment, the method includes an enrollment process. In an embodiment, the enrollment process includes sending, to a server, an enrollment request. In an embodiment, the enrollment process includes the voice recording of a client. In an embodiment, the enrollment process includes sending, to a server, the voice recording. In an embodiment, the enrollment process includes receiving, from the server, an indication that a voice print for the client has been created and stored based on the voice recording.
- In an embodiment, the method also includes an authentication process. In an embodiment, the authentication process includes sending, to the server, a request to authenticate the client. In an embodiment, the authentication process includes sending, to the server, a sample voice recording of the client. In an embodiment, the authentication process includes receiving, from the server, an indication that the client is authenticated. In an embodiment, the authentication process includes permitting the client access to secure information over the network based on the indication that the client is authenticated. In one embodiment sending, to the server, a sample voice recording of the client is the only information originating from the client that is used to authenticate the client.
- In an embodiment, a system for securely authenticating a client seeking access to secure information available through a network is described herein. In an embodiment, the system includes a back-end computer system adapted to manage and control access to secure information. In an embodiment, the system includes a front-end interface, adapted to provide the client with access to the back-end computer system. In an embodiment, the system includes a voice analysis computer system, adapted to verify a client's identity based on a voice sample. In an embodiment, the front-end interface is adapted to provide the client with the ability to record a client voice sample and communicate the client's voice sample to the voice analysis computer system. In an embodiment, the voice analysis computer system is adapted to compare the received client's voice sample to at least one voice print and authenticate the client based at least in part on the comparison. In an embodiment, the voice analysis computer system is adapted to communicate an indication of authentication. In an embodiment, the sample voice recording of the client is the only information originating from the client that is used to authenticate the client.
- In an embodiment, a method of operating a voice analysis system is described herein. In an embodiment, the method includes receiving, by a voice analysis system, at least one parameter indicating whether the system is to operate in a first mode or a second mode. In an embodiment, the method includes receiving, by the voice analysis system, a voice recording. In an embodiment, the method includes setting voice analysis constraints to a first level if the parameter indicates the first mode, or setting the voice analysis constraints to a second level if the parameter indicates the second mode. In an embodiment, the method includes comparing the voice recording to at least one template. In an embodiment, the comparison is based at least in part on the constraints. In an embodiment, the first mode indicates that the voice analysis system is to perform speaker identification. In an embodiment, the second mode indicates that the voice analysis system is to perform word recognition. In an embodiment, if the parameter indicates the first mode, an indication of authentication is provided. In an embodiment, if the parameter indicates the second mode, an indication of the textual value of the voice recording is provided.
- The invention may be more completely understood in consideration of the following detailed description of various embodiments of the invention in connection with the accompanying drawings, in which:
-
FIG. 1 illustrates generally a block diagram example of a typical transaction over a network. -
FIG. 2 a andFIG. 2 b illustrate generally a flow chart example of one embodiment of voiceprint authentication. -
FIG. 3 illustrates generally an embodiment of the use of voice authentication for a client-business transaction over a network. -
FIG. 4 illustrates generally an alternative embodiment of the use of a voice authentication system. -
FIG. 5 illustrates generally one embodiment of an additional security feature. -
FIG. 6 illustrates generally one embodiment of an additional security feature. -
FIG. 7 illustrates generally one embodiment of a voice analysis system adapted to support both speech recognition and speaker identification. -
FIG. 8 illustrates generally a block diagram of one embodiment of an implementation of the system described herein. -
FIG. 9 illustrates generally one example of potential data stored by MySQL databases according to the subject matter described herein. -
FIG. 10 illustrates generally a flowchart example of an applet according to the subject matter described herein. -
FIG. 11 illustrates generally a flowchart example of a JSP application according to the subject matter described herein. -
FIG. 12 illustrates generally a flowchart example of a company administration JSP application according to the subject matter described herein. -
FIG. 13 illustrates generally a flowchart example of a web administration JSP application according to the subject matter described herein. - While the invention is amenable to various modifications and alternative forms, specifics thereof have been shown by way of example in the drawings and will be described in detail. It should be understood, however, that the intention is not to limit the invention to the particular embodiments described. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims.
-
FIG. 1 illustrates generally a block diagram example of a typical transaction over a network. According to the example ofFIG. 1 ,client 106 seeks to communicate with a business over a network such as the internet. To communicate,client 106 uses a front-end interface 101. Front-end interface 101 may be any means with which a client may access content available over a network. A client may access a front-end interface 101 through any commonly known network access device such as, but not limited to, a computer, a Smartphone, or a PDA.Client 106, through front-end interface 101, communicates with back-end computer system 102. Back-end computer system 102 may include a back-end server 107. - According to the example illustrated in
FIG. 1 , front-end interface 101 communicates with back-end computer system 102 throughconnection 104. A typical transaction usually includes authentication ofclient 106 by back-end computer system 102. Often, authentication is achieved throughclient 106 supplying some form of identification to back-end computer system 102. Some examples of identification are pin numbers and associated passwords. Other examples include personal information such as social security numbers, addresses, telephone numbers, or client's 106 mother's maiden name. Due to the need for personal devices discussed above to be able to connect with a large variety of sources,connection 104 between front-end interface 101 and back-end computer system 102 is typically a less than secure connection. As a result of an insecure connection, the personal information transferred overconnection 104 is vulnerable to theft. -
FIG. 2 a andFIG. 2 b illustrate generally a flow chart example of one embodiment of voiceprint authentication according to the subject matter disclosed herein.FIG. 2 a illustrates generally one embodiment of an account initialization process. At 201, a client initiates an account with a provider of voiceprint authentication services (service provider). At 202, the client is provided a means to record his/her voice and instructions for using those means. The client's voice may be recorded by any means known in the art, and in any format known in the art such as mp3 format, wav format, or a proprietary audio format. In various embodiments, it is to be understood that any digital audio format (e.g. wav, mp3 formats) is within the scope of the subject matter discussed herein. In an alternative embodiment, to ensure greater security, a proprietary audio format is used to record the client's voice. The recording is then transferred to the service provider. At 203, the service provider analyzes the client's recording and extracts characteristics of the client's voice to create a voiceprint that represents the client's identity. At 208, the voiceprint is stored by the services provider for later use in authenticating the client. -
FIG. 2 b illustrates generally a voiceprint authentication process according to the subject matter disclosed herein. It is assumed in this embodiment that prior to attempting voiceprint authentication of a client the client has gone through an account initialization process, such as the process discussed inFIG. 2 a. At 204, the client seeks voice authentication. The client may seek voice authentication for a number of reasons, including: internet website or telephone access to a bank or other commercial service provider, or in person authentication in a direct buyer/seller transaction. At 205, the client is provided a means to record his/her voice. The client may be provided instructions to use a particular word or phrase, or the client may be allowed to speak any word or phrase for use in authenticating his identity. A recording of the client's voice is created. At 206, the service provider compares the recording of the client's voice made atstep 205 to stored voiceprints. In one embodiment, the service provider has access to only the client's voice recording, and that recording is compared to all the voiceprints the service provider has access to until a match is found. In another embodiment, the client's voice recording is provided to the service provider along with a client identification number. This embodiment is advantageous in that the service provider need only make a single comparison, thus decreasing the time and resources needed to authenticate a client. At 207, if a match is found by the service provider, the client is authenticated. -
FIG. 3 illustrates generally one embodiment of the use of voice authentication system for a secure access transaction over a network according to the subject matter disclosed herein. In one embodiment,client 301 seeks access to secure information or services. In order to do so,client 301 uses front-end interface 101 to accesswebpage 302 that is available over a network such as the internet.Webpage 302 is controlled by back-end computer system 304. In typical transactions such as described herein,client 301 is required to enter personal information such as an account number and/or password intowebpage 302. As discussed with respect toFIG. 2 , the connection between front-end interface 101 andwebpage 302 may be a non-secure connection. Therefore the opportunity for identity theft is present. - According to the embodiment illustrated in
FIG. 3 , instead of password and username, a voiceprint is used to authenticate the client and allow him/her access to secure content on back-end computer system 304. It is assumed for purposes of this discussion thatclient 301 has previously initiated an account with the voice authentication service provider (service provider) as discussed inFIG. 2 . - When
client 301visits webpage 302, the client is offered the ability to, or required to, use voice authentication to access secure information. In various embodiments,client 301 is provided with means to create a sample voice recording. In various embodiments, the client is provided an interface through the webpage to record his/her voice. The recording (and possibly a user id associated with the service provider as discussed in reference toFIG. 2 ) is communicated to voiceanalysis computer system 303. Voiceanalysis computer system 303 then compares the received recording to one or more stored voiceprints, and if a match is found, the client's identity is verified. - In one embodiment, voice
analysis computer system 303 communicates, using a secure connection, with back-end computer system 304 to determine whether theparticular client 301 has permission to access particular content. In one embodiment, voiceanalysis computer system 303 has access to a client security key (and possibly security keys allowing access to back-end computer system 304 itself) that allows access to back-end computer system 304. According to this embodiment, voiceanalysis computer system 303 transmits the client security key to back-end computer system 304. In response, back-end computer system 304 may determine whetherclient 301 should be granted access, and communicates (using a secure connection) authorization of access to voiceanalysis computer system 303. Voiceanalysis computer system 303 may then allow access to secure content throughwebpage 302. - In another embodiment, voice
analysis computer system 303 does not have access to a client security key to determine permission. Instead, voiceanalysis computer system 303 attempts to verify the identity ofclient 301, and, if successful, communicates success to back-end computer system 304. According to this embodiment, back-end computer system 304 determines whetherclient 301 is to be granted permission to accesswebpage 302, and back-end computer system 304 itself communicates and allows access towebpage 302. - In another embodiment, voice
analysis computer system 303 verifies permission by reviewing client and business specific information stored on voiceanalysis computer system 303. According to this embodiment, voiceanalysis computer system 303 does not communicate security keys to back-end computer system 304 and receive authorization from back-end computer system 304. Instead, the entire authentication process is achieved in voiceanalysis computer system 303. When a client's identity and permission are verified, authorized access is communicated towebpage 302. - The various embodiments of client authentication illustrated in
FIG. 3 provide far greater security than previously known systems of client authentication. Because only the client's voice recording, and possibly service provider username, are entered into and/or communicated over accessible networks, it is nearly impossible for anyone to get access to the client's personal information. Identity verification through voice authentication provides a significant advantage in that it is nearly impossible to replicate a person's voice. - In various other embodiments, client authentication illustrated in
FIG. 3 may be used to authenticate access to content, information, or devices other thanwebpage 302. Examples of such devices include cellular phones, computers, laptops, or a Personal Digital Assistant (PDA). In one such embodiment, client seeks access to a secure device through voice authentication. According to this embodiment, there may or may not be a back-end computer system 304 that controls the device. In one embodiment, where back-end computer system 304 does exist, the system functions identically to the above descriptions, however instead ofwebpage 302 access, device access is controlled. In another embodiment, where no back-end computer system 304 exists, the device is communicatively coupled to voiceanalysis computer system 303 through a network. According to this embodiment,client 303 is provided means to create a sample voice recording. The voice recording is communicated to voiceanalysis computer system 303, and the client's 301 voice may or may not be authenticated. Voiceanalysis computer system 303 may have access to unlock, or otherwise provide access to, the device. If authentication is verified, voiceanalysis computer system 303 communicates with the device and allowsclient 301 access to the device. -
FIG. 4 illustrates generally an alternative embodiment of a voice authentication system to manage client-business transactions over a network according to the subject matter disclosed herein. The embodiment illustrated inFIG. 4 is nearly identical with the embodiment illustrated inFIG. 3 , except voiceanalysis computer system 403 is embedded within back-end computer system 404. -
FIG. 5 illustrates generally one embodiment of an additional security feature according to the subject matter disclosed herein. The embodiment illustrated inFIG. 5 is nearly identical toFIG. 2 b, except additional security steps are added to the process of voiceprint authentication. Similar toFIG. 2 b, at 501 a client seeks voice authentication to procure secured access. At 502, the client is provided a means to record his/her voice, and a recording of the client's voice is created. At 503, the service provider compares the recording of the client's voice made atstep 502 to stored voiceprints. At 504, the voice recording is compared with one or more existing voiceprints to determine if a match exists. Instead of authentication based primarily on the client's stored voiceprint alone, the embodiment illustrated inFIG. 5 includes the additional step of, at 505, comparing the client's voice recording not only to the client's voiceprint, but also to one or more templates of recordings of the client's voice that were previously successful in the authentication process. This additional step ensures against fraudulent behavior in that it prevents someone from using a recording of a person's voice in order to access personal information. At 505, if a voiceprint match is found, and the voice recording has been determined not to have been used previously, the client is authenticated. At 506, the client's voice recording is stored for later comparison. -
FIG. 6 illustrates generally a flow chart of one embodiment of an additional security feature according to the subject matter presented herein. As previously discussed, audio data may be recorded and/or transmitted by any means known in the art, or by a proprietary format. In one embodiment, where a proprietary format is used, the audio data is further marked in order to provide additional security. Marking includes inserting, in the audio data, one or more indicators. These indicators are readable by systems adapted to utilize the proprietary data format. These indicators provide such systems with the ability to determine whether the audio data has been used previously, and whether the audio data has been used fraudulently. Therefore, the embodiment discussed above provides an additional layer of security to prevent the fraudulent use of audio data to access personal information. Turning now toFIG. 6 , at 601, a client's voice is recorded. At 602, the client's voice is recorded in a proprietary audio format, or translated to a proprietary audio format, and an audio file is created. At 603, markers are inserted into the audio file and the audio file is transmitted. At 604, the audio data is received and processed. At 605, the audio file and included markers are processed to determine if the audio file is the one sent, and whether or not the audio file has been determined fraudulent. At 606, if the audio file is determined to be non-fraudulent, the audio file is used for purposes described herein. -
FIG. 7 illustrates generally one embodiment of aspeech analysis engine 701 adapted to support both speaker identification and speech recognition. According to this embodiment, dual purposespeech analysis engine 701 is adapted to accept as input aflag 702 designating the desired function ofengine 701.Flag 702 indicates toengine 701 whetherspeech recognition 703 orspeaker identification 704 is desired.Parameter constraints 705 define the strictness with whichspeech processor 708 determines a match according to speech characteristics. Ifspeaker identification 704 is required,parameter constraints 705 are set with strict requirements that must be met to find a positive match with a speaker's characteristics. In contrast, ifspeech recognition 703 is desired, thenparameter constraints 705 are set with much lower requirements that a positive match with the characteristics of a particular spoken word is found. Where speaker identification is desired,engine 701 is adapted to return to the voice analysis computer system 303 a positive or negative indication of whether the speaker was identified 706. At 707, if speech recognition is desired,engine 701 is adapted to return a textual representation of spokenspeech 707. -
FIG. 8 illustrates generally a block diagram of one embodiment of the implementation of avoice analysis system 801 as disclosed herein. According to various embodiments,voice analysis system 801 is implemented such that the system is capable of downloading and executing application software to front-end interface 101. Such capabilities are advantageous to implementation ofsystem 801 because they allow access and control of front-end interface 101. For example,system 801 may be capable of exercising control over microphone capabilities of front-end interface 101. In one embodiment,system 801 is implemented using a Java Virtual Machine environment. According to this embodiment,system 101 includesJava Applet 802.Applet 802 is a program with the ability to download and execute software on front-end interface 101.Applet 802 controls much of the user interface requirements ofsystem 801, such as microphone functionality. -
System 801 may further includeJava JSP application 803.Java JSP application 803 is adapted to run on voiceanalysis computer system 303. JSP application is further adapted to communicate withapplet 802 to receive and transfer commands and information fromapplet 802. In one embodiment,JSP application 803 is adapted to receive a voice recording fromapplet 802, and process that voice recording.System 801 may further include one or more databases such as MySQL Database(s) 804.JSP application 803, among other applications, may be adapted to store and manage data inDatabases 804. - In some embodiments,
system 801 also includes Secure Web BasedAdministration Pages 805. In various embodiments, administration pages 805 provide an interface to create, modify, and configure client users. - In some embodiments,
system 801 further includes Web Administration and Companyadministration JSP applications 806. In various embodiments, Web Administration and CompanyAdministration JSP applications 806 provide a web-based interface to configure companies, including companies access tosystem 801. - In one embodiment,
applet 802 is adapted to run on front-end interface 101, whileJSP application 803 is adapted to run on voiceanalysis computer system 303. In an alternative embodiment, bothapplet 802 andJSP application 803 are adapted to run on front-end interface 101. In yet another alternative embodiment,JSP application 803 is adapted to run on back-end computer system 304. -
FIG. 9 illustrates generally one example of potential data stored in MySQL Database(s) 804. Detailed database schema SQL script source code is included as an appendix to this application. -
FIG. 10 illustrates generally a flow chart diagram of one embodiment of anapplet 802 according to the subject matter disclosed herein. In one embodiment,applet 802 is a Java Applet. In an alternative embodiment,applet 802 is implemented as a Java Midlet instead of a Java Applet. A Java Midlet is preferred when front-end interface 101 is a portable device or an embedded device. The term applet as used herein is intended to refer to either a Java Applet or a Java Midlet.Applet 802 may be adapted to run on front-end interface 101. At 1002,applet 802 is adapted to initialize on front-end interface 101. Initializing may include determining the available sound recording/management hardware and software available to the front-end interface 101. Initializing may further include receiving input parameters that define what actions Applet 802 is to take. Input parameters may include: 1) whether enrollment, re-enrollment, authentication, or speech recognition capabilities are desired ofapplet 802, and 2) identification information such as a user or company identification indicator. Initializing may further include providing a graphical user interface to a user such that the user may select input parameters forapplet 802. - At 1003,
applet 802 is adapted to capture a client's voice. Voice capture may include: 1) providing a user interface to allow the client to record voice, 2) providing instructions to the client, 3) controlling front-end interface 101 in order to record voice (including measuring background noise and setting detection thresholds), 4) verifying that the resultant recording meets requirements for further processing, and 5) preparing the recording for communication. - In one embodiment, the voice recording is communicated using a TCP protocol. At 1004, after the user's voice is recorded,
applet 802 sends the voice recording toJSP application 803 for processing, and verifies that the communication was successful. In one embodiment,applet 802 sends the voice recording over a secure connection such as an SSL connection. In one embodiment,JSP application 803 runs on voiceanalysis computer system 303. - At 1005, when
JSP application 803 has completed processing the voice recording,applet 802 processes return values fromJSP application 803.Applet 802 processes the return values based on what function was desired at 1002. Also at 1005,applet 802 provides the user with a results display. In one embodiment, if authentication or enrollment were requested,applet 802 provides the user with an indication that authentication was successful or unsuccessful. In another embodiment, where speech recognition was requested,applet 802 provides the user with a textual indication of the words that were spoken. In a similar embodiment,applet 802 provides the client with a verbal indication of words spoken by the client, orapplet 802 may also act in response to words spoken by the client. Once the results have been provided to the user,applet 802 returns to 1002 and allows the client to re-enter parameters. -
FIG. 11 illustrates generally a flow chart diagram of one embodiment of aJava JSP application 803 according to the subject matter disclosed herein. In one embodiment,Java JSP application 803 is implemented as a Java Servlet. In another preferred embodiment,JSP application 803 is run on voiceanalysis computer system 303. - At 1102,
JSP application 803 awaits a request fromapplet 802. When a request is received, JSP application processes the request. At 1103,JSP application 803, based on the request fromapplet 802, determines what function is desired ofJSP application 803.JSP application 803 determines whetherapplet 802 requested: enrollment of a new user, re-enrollment of an existing user, authentication of an enrolled user, or speech recognition. - At 1104, and 1105, where enrollment of a new user or re-enrollment of an existing user is requested by
applet 802, JSP application validates the user ID of the user, processes the voice recording, and updates an enrollment template and stores the template indatabases 804. At 1110, data is transferred back toapplet 803. - At 1106 and 1107, where authentication of an existing user is requested by
applet 802, the user's user id is validated, the user's voice recording is processed, and the voice recording is compared to existing voice templates to determine whether the client is authenticated. If the client is authenticated, security tokens are prepared for transmission toapplet 802. At 1110, security tokens and other data are communicated toapplet 802. - At 1109, where speech recognition is requested,
JSP application 803 is adapted to modify (lessen) voice recognition constraints such thatJSP application 803 is only adapted to verify a particular word, not a particular client's voice. At 1108, the voice recording is processed and compared to stored voice commands. If a match is found, an identification of a voice command is prepared for communication toapplet 802. At 1110, the identification of a voice command and other data are communicated toapplet 802. -
FIG. 12 illustrates generally one embodiment of a CompanyAdministration JSP Application 1201 as disclosed herein. CompanyAdministration JSP Application 1201, provides an interface to create, modify, and configure client user data. The client user data consist of the following; UserID, CompanyName, FirstName, LastName, Password, Department, Position, Location, Email, Phone1, Phone2, Phone3, SecurityTokenID's, EnrollmentTemplateID's, and VoiceCommandID's. -
FIG. 13 illustrates generally one embodiment of a WebAdministration JSP Application 1301. WebAdministration JSP Application 1301 provides a web-based interface to configure companies, and their access to the Voice Print Portal Solution. - In various embodiments, alternatives are provided for a client who does not have access to a front-
end interface 101 that is capable of recording voice. In one embodiment, a client is provided the ability to select a “Call In” button. When the “Call In” button has been selected, the client is provided an ordinary telephone number. The user may call the number in order to record his/her voice. - In another embodiment, the client does not have any access to a front-
end interface 101 or the internet. According to this embodiment, a client is provided with the ability to operate the entire system through ordinary telephone service. The client may communicate with andrequest system 801 functions through voice commands or though dialing numbers on a telephone keypad. In one embodiment, this telephone only system is implemented using telephony systems such as IPPC or IPPC express offered by Cisco Systems, Inc. - Finally, while the present invention has been described with reference to certain embodiments, those skilled in the art should appreciate that they can readily use the disclosed conception and specific embodiments as a basis for designing or modifying other structures for carrying out the same purposes of the present invention without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (18)
1. A method of securely authenticating a client seeking access to secure information available through a network, comprising:
receiving, at a server, an enrollment request;
receiving, at the server, a voice recording;
processing, at the server, the voice recording to determine identifying characteristics of the speaker's voice;
creating, based on the identifying characteristics, a voice print identification of the speaker;
storing, at the server, the voice print identification;
receiving, at the server, a request for authentication of a client with an existing voice print identification;
receiving, at the server, a sample recording of the client's voice;
processing, at the server, the sample recording of the client's voice;
comparing characteristics of the sample recording to at least one voice print identification;
determining, based at least in part on the comparing, that the client is authenticated; and
communicating, over the network, an indication that the client is authenticated.
2. The method of claim 1 , wherein the communicating an indication that the client is authenticated comprises:
communicating only non-critical information.
3. The method of claim 1 , wherein the communicating an indication that the client is authenticated comprises:
communicating only a positive or negative indication that the client is authenticated.
4. The method of claim 1 , wherein receiving, at the server, a sample recording of the client's voice further comprises:
receiving an indication of the client's identity.
5. The method of claim 1 , wherein determining, based at least in part on the comparing, that the client is authenticated further comprises:
comparing the sample recording of the client's voice to at least one stored indication of characteristics of sample recordings that were previously used to authenticate the client; and
if the sample recording has been previously used to authenticate, not providing an indication that the client is authenticated.
6. The method of claim 1 , wherein receiving, at the server, a sample recording of the client's voice is the only information received from the client used to authenticate the client.
7. A method of securely authenticating a client who seeks access to secure information available through a network, comprising:
sending, to a server, an enrollment request;
recording the voice of a client;
sending, to a server, the voice recording;
receiving, from the server, an indication that a voice print for the client has been created and stored based on the voice recording;
sending, to the server, a request to authenticate the client;
sending, to the server, a sample voice recording of the client;
receiving, from the server, an indication that the client is authenticated; and
permitting the client access to secure information over the network based on the indication that the client is authenticated.
8. The method of claim 7 , wherein the receiving an indication that the client is authenticated comprises:
receiving only non-critical information.
9. The method of claim 7 , wherein the receiving an indication that the client is authenticated comprises:
receiving only a positive or negative indication that the client is authenticated.
10. The method of claim 7 , wherein sending, to the server, a sample voice recording of the client further comprises:
sending an indication of the client's identity.
11. The method of claim 7 , wherein sending, to the server, a sample voice recording of the client is the only information originating from the client that is used to authenticate the client.
12. A system for securely authenticating a client seeking access to secure information available through a network, comprising:
a back-end computer system adapted to manage and control access to secure information;
a front-end interface, adapted to provide the client with access to the back-end computer system;
a voice analysis computer system, adapted to verify a client's identity based on a voice sample;
wherein the front-end interface is adapted to provide the client with the ability to record a client voice sample and communicate the client's voice sample to the voice analysis computer system;
wherein the voice analysis computer system is adapted to compare the received client's voice sample to at least one voice print and authenticate the client based at least in part on the comparison; and
wherein the voice analysis computer system is adapted to communicates an indication of authentication.
13. The system of claim 12 , wherein the voice analysis computer system is adapted to communicate the indication of authentication to the front-end interface, and wherein the front-end interface is adapted to allow the client access to secure information.
14. The system of claim 12 , wherein the voice analysis computer system is adapted to communicate the indication of authentication to the back-end computer system, and wherein the back-end computer system is adapted to allow the client access to secure information.
15. The system of claim 12 , wherein the voice analysis computer system is adapted to allow the client access to secure information.
16. The system of claim 12 , wherein the front-end interface is adapted to provide the client with the ability to record a client voice sample and communicate the clients voice sample to the voice analysis computer system along with an indication of the client's identity.
17. The system of claim 12 , wherein the sample voice recording of the client is the only information originating from the client that is used to authenticate the client.
18. A method of operating a voice analysis system, comprising:
receiving, by a voice analysis system, at least one parameter indicating whether the system is to operate in a first mode or a second mode;
receiving, by the voice analysis system, a voice recording;
setting voice analysis constraints to a first level if the parameter indicates the first mode, or setting the voice analysis constraints to a second level if the parameter indicates the second mode; and
comparing the voice recording to at least one template, wherein the comparison is based at least in part on the constraints, wherein the first mode indicates that the voice analysis system is to perform speaker identification, wherein the second mode indicates that the voice analysis system is to perform word recognition; and
wherein if the parameter indicates the first mode, providing an indication of authentication, and wherein the if the parameter indicates the second mode, providing an indication of the textual value of the voice recording.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/075,799 US20080256613A1 (en) | 2007-03-13 | 2008-03-13 | Voice print identification portal |
US14/263,572 US9799338B2 (en) | 2007-03-13 | 2014-04-28 | Voice print identification portal |
US15/790,996 US20180047397A1 (en) | 2007-03-13 | 2017-10-23 | Voice print identification portal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US89462707P | 2007-03-13 | 2007-03-13 | |
US12/075,799 US20080256613A1 (en) | 2007-03-13 | 2008-03-13 | Voice print identification portal |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/263,572 Division US9799338B2 (en) | 2007-03-13 | 2014-04-28 | Voice print identification portal |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080256613A1 true US20080256613A1 (en) | 2008-10-16 |
Family
ID=39854992
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/075,799 Abandoned US20080256613A1 (en) | 2007-03-13 | 2008-03-13 | Voice print identification portal |
US14/263,572 Active US9799338B2 (en) | 2007-03-13 | 2014-04-28 | Voice print identification portal |
US15/790,996 Abandoned US20180047397A1 (en) | 2007-03-13 | 2017-10-23 | Voice print identification portal |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/263,572 Active US9799338B2 (en) | 2007-03-13 | 2014-04-28 | Voice print identification portal |
US15/790,996 Abandoned US20180047397A1 (en) | 2007-03-13 | 2017-10-23 | Voice print identification portal |
Country Status (1)
Country | Link |
---|---|
US (3) | US20080256613A1 (en) |
Cited By (209)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080167868A1 (en) * | 2007-01-04 | 2008-07-10 | Dimitri Kanevsky | Systems and methods for intelligent control of microphones for speech recognition applications |
US20090089065A1 (en) * | 2007-10-01 | 2009-04-02 | Markus Buck | Adjusting or setting vehicle elements through speech control |
US7684556B1 (en) | 2009-07-17 | 2010-03-23 | International Business Machines Corporation | Conversational biometric coupled with speech recognition in passive mode during call hold to affect call routing |
US20110260832A1 (en) * | 2010-04-27 | 2011-10-27 | Joe Ross | Secure voice biometric enrollment and voice alert delivery system |
US20110275348A1 (en) * | 2008-12-31 | 2011-11-10 | Bce Inc. | System and method for unlocking a device |
US20120245941A1 (en) * | 2011-03-21 | 2012-09-27 | Cheyer Adam J | Device Access Using Voice Authentication |
CN103685205A (en) * | 2012-09-24 | 2014-03-26 | 联想(北京)有限公司 | Client, server and information processing method applied for the same |
US8819793B2 (en) | 2011-09-20 | 2014-08-26 | Csidentity Corporation | Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository |
US8892446B2 (en) | 2010-01-18 | 2014-11-18 | Apple Inc. | Service orchestration for intelligent automated assistant |
US20140350932A1 (en) * | 2007-03-13 | 2014-11-27 | Voicelt Technologies, LLC | Voice print identification portal |
US20150025888A1 (en) * | 2013-07-22 | 2015-01-22 | Nuance Communications, Inc. | Speaker recognition and voice tagging for improved service |
US8977255B2 (en) | 2007-04-03 | 2015-03-10 | Apple Inc. | Method and system for operating a multi-function portable electronic device using voice-activation |
US20150078134A1 (en) * | 2013-09-13 | 2015-03-19 | Hsu-Yung YU | Sonar type object detection system and its implementing method |
US20150078132A1 (en) * | 2013-09-13 | 2015-03-19 | Hsu-Yung YU | Sonar Type Object Detection System and its Implementing Method |
US9190062B2 (en) | 2010-02-25 | 2015-11-17 | Apple Inc. | User profiling for voice input processing |
US20150348545A1 (en) * | 2014-05-27 | 2015-12-03 | International Business Machines Corporation | Voice focus enabled by predetermined triggers |
US9235728B2 (en) | 2011-02-18 | 2016-01-12 | Csidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
US20160012446A1 (en) * | 2014-07-10 | 2016-01-14 | Datalogic ADC, Inc. | Authorization of transactions based on automated validation of customer speech |
US20160048667A1 (en) * | 2014-08-12 | 2016-02-18 | At&T Intellectual Property I, Lp | Method and device for managing authentication using an identity avatar |
US9300784B2 (en) | 2013-06-13 | 2016-03-29 | Apple Inc. | System and method for emergency calls initiated by voice command |
US9330720B2 (en) | 2008-01-03 | 2016-05-03 | Apple Inc. | Methods and apparatus for altering audio output signals |
US9338493B2 (en) | 2014-06-30 | 2016-05-10 | Apple Inc. | Intelligent automated assistant for TV user interactions |
US9368114B2 (en) | 2013-03-14 | 2016-06-14 | Apple Inc. | Context-sensitive handling of interruptions |
US20160232921A1 (en) * | 2014-03-21 | 2016-08-11 | International Business Machines Corporation | Dynamically providing to a person feedback pertaining to utterances spoken or sung by the person |
US9430463B2 (en) | 2014-05-30 | 2016-08-30 | Apple Inc. | Exemplar-based natural language processing |
US9431006B2 (en) | 2009-07-02 | 2016-08-30 | Apple Inc. | Methods and apparatuses for automatic speech recognition |
US9483461B2 (en) | 2012-03-06 | 2016-11-01 | Apple Inc. | Handling speech synthesis of content for multiple languages |
US9495129B2 (en) | 2012-06-29 | 2016-11-15 | Apple Inc. | Device, method, and user interface for voice-activated navigation and browsing of a document |
US9502031B2 (en) | 2014-05-27 | 2016-11-22 | Apple Inc. | Method for supporting dynamic grammars in WFST-based ASR |
CN106162641A (en) * | 2016-07-25 | 2016-11-23 | 福建富士通信息软件有限公司 | A kind of safe and efficient public's WiFi authentication method and system |
US9535906B2 (en) | 2008-07-31 | 2017-01-03 | Apple Inc. | Mobile device having human language translation capability with positional feedback |
US9563992B2 (en) | 2014-12-01 | 2017-02-07 | Honeywell International Inc. | System and method of associating, assigning, and authenticating users with personal protective equipment using biometrics |
US9576574B2 (en) | 2012-09-10 | 2017-02-21 | Apple Inc. | Context-sensitive handling of interruptions by intelligent digital assistant |
US9582608B2 (en) | 2013-06-07 | 2017-02-28 | Apple Inc. | Unified ranking with entropy-weighted information for phrase-based semantic auto-completion |
US9620104B2 (en) | 2013-06-07 | 2017-04-11 | Apple Inc. | System and method for user-specified pronunciation of words for speech synthesis and recognition |
US9620105B2 (en) | 2014-05-15 | 2017-04-11 | Apple Inc. | Analyzing audio input for efficient speech and music recognition |
US9626955B2 (en) | 2008-04-05 | 2017-04-18 | Apple Inc. | Intelligent text-to-speech conversion |
US9633004B2 (en) | 2014-05-30 | 2017-04-25 | Apple Inc. | Better resolution when referencing to concepts |
US9633674B2 (en) | 2013-06-07 | 2017-04-25 | Apple Inc. | System and method for detecting errors in interactions with a voice-based digital assistant |
US9646614B2 (en) | 2000-03-16 | 2017-05-09 | Apple Inc. | Fast, language-independent method for user authentication by voice |
US9646609B2 (en) | 2014-09-30 | 2017-05-09 | Apple Inc. | Caching apparatus for serving phonetic pronunciations |
US9668121B2 (en) | 2014-09-30 | 2017-05-30 | Apple Inc. | Social reminders |
US9697822B1 (en) | 2013-03-15 | 2017-07-04 | Apple Inc. | System and method for updating an adaptive speech recognition model |
US9697820B2 (en) | 2015-09-24 | 2017-07-04 | Apple Inc. | Unit-selection text-to-speech synthesis using concatenation-sensitive neural networks |
US9711141B2 (en) | 2014-12-09 | 2017-07-18 | Apple Inc. | Disambiguating heteronyms in speech synthesis |
US9715875B2 (en) | 2014-05-30 | 2017-07-25 | Apple Inc. | Reducing the need for manual start/end-pointing and trigger phrases |
US9721566B2 (en) | 2015-03-08 | 2017-08-01 | Apple Inc. | Competing devices responding to voice triggers |
US9734193B2 (en) | 2014-05-30 | 2017-08-15 | Apple Inc. | Determining domain salience ranking from ambiguous words in natural speech |
US9733821B2 (en) | 2013-03-14 | 2017-08-15 | Apple Inc. | Voice control to diagnose inadvertent activation of accessibility features |
US9760559B2 (en) | 2014-05-30 | 2017-09-12 | Apple Inc. | Predictive text input |
US9785630B2 (en) | 2014-05-30 | 2017-10-10 | Apple Inc. | Text prediction using combined word N-gram and unigram language models |
US9798393B2 (en) | 2011-08-29 | 2017-10-24 | Apple Inc. | Text correction processing |
US9818400B2 (en) | 2014-09-11 | 2017-11-14 | Apple Inc. | Method and apparatus for discovering trending terms in speech requests |
US9842101B2 (en) | 2014-05-30 | 2017-12-12 | Apple Inc. | Predictive conversion of language input |
US9842105B2 (en) | 2015-04-16 | 2017-12-12 | Apple Inc. | Parsimonious continuous-space phrase representations for natural language processing |
US9858925B2 (en) | 2009-06-05 | 2018-01-02 | Apple Inc. | Using context information to facilitate processing of commands in a virtual assistant |
US9865280B2 (en) | 2015-03-06 | 2018-01-09 | Apple Inc. | Structured dictation using intelligent automated assistants |
US9886953B2 (en) | 2015-03-08 | 2018-02-06 | Apple Inc. | Virtual assistant activation |
US9886432B2 (en) | 2014-09-30 | 2018-02-06 | Apple Inc. | Parsimonious handling of word inflection via categorical stem + suffix N-gram language models |
US9899019B2 (en) | 2015-03-18 | 2018-02-20 | Apple Inc. | Systems and methods for structured stem and suffix language models |
US9922642B2 (en) | 2013-03-15 | 2018-03-20 | Apple Inc. | Training an at least partial voice command system |
US9934775B2 (en) | 2016-05-26 | 2018-04-03 | Apple Inc. | Unit-selection text-to-speech synthesis based on predicted concatenation parameters |
US9953088B2 (en) | 2012-05-14 | 2018-04-24 | Apple Inc. | Crowd sourcing information to fulfill user requests |
US9959870B2 (en) | 2008-12-11 | 2018-05-01 | Apple Inc. | Speech recognition involving a mobile device |
US9966068B2 (en) | 2013-06-08 | 2018-05-08 | Apple Inc. | Interpreting and acting upon commands that involve sharing information with remote devices |
US9966065B2 (en) | 2014-05-30 | 2018-05-08 | Apple Inc. | Multi-command single utterance input method |
US9971774B2 (en) | 2012-09-19 | 2018-05-15 | Apple Inc. | Voice-based media searching |
US9972304B2 (en) | 2016-06-03 | 2018-05-15 | Apple Inc. | Privacy preserving distributed evaluation framework for embedded personalized systems |
US9977779B2 (en) | 2013-03-14 | 2018-05-22 | Apple Inc. | Automatic supplementation of word correction dictionaries |
US10043516B2 (en) | 2016-09-23 | 2018-08-07 | Apple Inc. | Intelligent automated assistant |
US10049663B2 (en) | 2016-06-08 | 2018-08-14 | Apple, Inc. | Intelligent automated assistant for media exploration |
US10049668B2 (en) | 2015-12-02 | 2018-08-14 | Apple Inc. | Applying neural network language models to weighted finite state transducers for automatic speech recognition |
US10057736B2 (en) | 2011-06-03 | 2018-08-21 | Apple Inc. | Active transport based notifications |
US10067938B2 (en) | 2016-06-10 | 2018-09-04 | Apple Inc. | Multilingual word prediction |
US10074360B2 (en) | 2014-09-30 | 2018-09-11 | Apple Inc. | Providing an indication of the suitability of speech recognition |
US10078631B2 (en) | 2014-05-30 | 2018-09-18 | Apple Inc. | Entropy-guided text prediction using combined word and character n-gram language models |
US10079014B2 (en) | 2012-06-08 | 2018-09-18 | Apple Inc. | Name recognition system |
US10078487B2 (en) | 2013-03-15 | 2018-09-18 | Apple Inc. | Context-sensitive handling of interruptions |
US10083688B2 (en) | 2015-05-27 | 2018-09-25 | Apple Inc. | Device voice control for selecting a displayed affordance |
US10089072B2 (en) | 2016-06-11 | 2018-10-02 | Apple Inc. | Intelligent device arbitration and control |
US10101822B2 (en) | 2015-06-05 | 2018-10-16 | Apple Inc. | Language input correction |
CN108694947A (en) * | 2018-06-27 | 2018-10-23 | Oppo广东移动通信有限公司 | Sound control method, device, storage medium and electronic equipment |
US10115079B1 (en) | 2011-06-16 | 2018-10-30 | Consumerinfo.Com, Inc. | Authentication alerts |
US10127220B2 (en) | 2015-06-04 | 2018-11-13 | Apple Inc. | Language identification from short strings |
US10127911B2 (en) | 2014-09-30 | 2018-11-13 | Apple Inc. | Speaker identification and unsupervised speaker adaptation techniques |
US10134385B2 (en) | 2012-03-02 | 2018-11-20 | Apple Inc. | Systems and methods for name pronunciation |
US10134392B2 (en) | 2013-01-10 | 2018-11-20 | Nec Corporation | Terminal, unlocking method, and program |
US10169761B1 (en) | 2013-03-15 | 2019-01-01 | ConsumerInfo.com Inc. | Adjustment of knowledge-based authentication |
US10170123B2 (en) | 2014-05-30 | 2019-01-01 | Apple Inc. | Intelligent assistant for home automation |
US10176167B2 (en) | 2013-06-09 | 2019-01-08 | Apple Inc. | System and method for inferring user intent from speech inputs |
US10185542B2 (en) | 2013-06-09 | 2019-01-22 | Apple Inc. | Device, method, and graphical user interface for enabling conversation persistence across two or more instances of a digital assistant |
US10186254B2 (en) | 2015-06-07 | 2019-01-22 | Apple Inc. | Context-based endpoint detection |
CN109273009A (en) * | 2018-08-02 | 2019-01-25 | 平安科技(深圳)有限公司 | Access control method, device, computer equipment and storage medium |
US10192552B2 (en) | 2016-06-10 | 2019-01-29 | Apple Inc. | Digital assistant providing whispered speech |
US10199051B2 (en) | 2013-02-07 | 2019-02-05 | Apple Inc. | Voice trigger for a digital assistant |
CN109325771A (en) * | 2018-09-20 | 2019-02-12 | 北京得意音通技术有限责任公司 | Auth method, device, computer program, storage medium and electronic equipment |
US20190050545A1 (en) * | 2017-08-09 | 2019-02-14 | Nice Ltd. | Authentication via a dynamic passphrase |
US10223066B2 (en) | 2015-12-23 | 2019-03-05 | Apple Inc. | Proactive assistance based on dialog communication between devices |
US10241644B2 (en) | 2011-06-03 | 2019-03-26 | Apple Inc. | Actionable reminder entries |
US10241752B2 (en) | 2011-09-30 | 2019-03-26 | Apple Inc. | Interface for a virtual digital assistant |
US10249300B2 (en) | 2016-06-06 | 2019-04-02 | Apple Inc. | Intelligent list reading |
US10255907B2 (en) | 2015-06-07 | 2019-04-09 | Apple Inc. | Automatic accent detection using acoustic models |
US10269345B2 (en) | 2016-06-11 | 2019-04-23 | Apple Inc. | Intelligent task discovery |
US10276170B2 (en) | 2010-01-18 | 2019-04-30 | Apple Inc. | Intelligent automated assistant |
US10289433B2 (en) | 2014-05-30 | 2019-05-14 | Apple Inc. | Domain specific language for encoding assistant dialog |
US10297253B2 (en) | 2016-06-11 | 2019-05-21 | Apple Inc. | Application integration with a digital assistant |
US10296160B2 (en) | 2013-12-06 | 2019-05-21 | Apple Inc. | Method for extracting salient dialog usage from live data |
US10303715B2 (en) | 2017-05-16 | 2019-05-28 | Apple Inc. | Intelligent automated assistant for media exploration |
US10311144B2 (en) | 2017-05-16 | 2019-06-04 | Apple Inc. | Emoji word sense disambiguation |
US10318871B2 (en) | 2005-09-08 | 2019-06-11 | Apple Inc. | Method and apparatus for building an intelligent automated assistant |
US10332518B2 (en) | 2017-05-09 | 2019-06-25 | Apple Inc. | User interface for correcting recognition errors |
US10339527B1 (en) | 2014-10-31 | 2019-07-02 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US10354011B2 (en) | 2016-06-09 | 2019-07-16 | Apple Inc. | Intelligent automated assistant in a home environment |
US10356243B2 (en) | 2015-06-05 | 2019-07-16 | Apple Inc. | Virtual assistant aided communication with 3rd party service in a communication session |
US10366158B2 (en) | 2015-09-29 | 2019-07-30 | Apple Inc. | Efficient word encoding for recurrent neural network language models |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US10380332B2 (en) * | 2015-03-20 | 2019-08-13 | Baidu Online Network Technology (Beijing) Co., Ltd. | Voiceprint login method and apparatus based on artificial intelligence |
US10395654B2 (en) | 2017-05-11 | 2019-08-27 | Apple Inc. | Text normalization based on a data-driven learning network |
US10403278B2 (en) | 2017-05-16 | 2019-09-03 | Apple Inc. | Methods and systems for phonetic matching in digital assistant services |
US10403283B1 (en) | 2018-06-01 | 2019-09-03 | Apple Inc. | Voice interaction at a primary device to access call functionality of a companion device |
US10410637B2 (en) | 2017-05-12 | 2019-09-10 | Apple Inc. | User-specific acoustic models |
US10417266B2 (en) | 2017-05-09 | 2019-09-17 | Apple Inc. | Context-aware ranking of intelligent response suggestions |
US10446141B2 (en) | 2014-08-28 | 2019-10-15 | Apple Inc. | Automatic speech recognition based on user feedback |
US10446143B2 (en) | 2016-03-14 | 2019-10-15 | Apple Inc. | Identification of voice inputs providing credentials |
US10445429B2 (en) | 2017-09-21 | 2019-10-15 | Apple Inc. | Natural language understanding using vocabularies with compressed serialized tries |
US10453159B2 (en) | 2013-05-23 | 2019-10-22 | Consumerinfo.Com, Inc. | Digital identity |
CN110428844A (en) * | 2019-07-31 | 2019-11-08 | 歌尔科技有限公司 | Speech verification method, electronic equipment, audio frequency apparatus and the medium of electronic equipment |
US10474753B2 (en) | 2016-09-07 | 2019-11-12 | Apple Inc. | Language identification using recurrent neural networks |
US10482874B2 (en) | 2017-05-15 | 2019-11-19 | Apple Inc. | Hierarchical belief states for digital assistants |
US10490187B2 (en) | 2016-06-10 | 2019-11-26 | Apple Inc. | Digital assistant providing automated status report |
US10496705B1 (en) | 2018-06-03 | 2019-12-03 | Apple Inc. | Accelerated task performance |
US10496753B2 (en) | 2010-01-18 | 2019-12-03 | Apple Inc. | Automatically adapting user interfaces for hands-free interaction |
US10509862B2 (en) | 2016-06-10 | 2019-12-17 | Apple Inc. | Dynamic phrase expansion of language input |
US10521466B2 (en) | 2016-06-11 | 2019-12-31 | Apple Inc. | Data driven natural language event detection and classification |
US10553209B2 (en) | 2010-01-18 | 2020-02-04 | Apple Inc. | Systems and methods for hands-free notification summaries |
US10552013B2 (en) | 2014-12-02 | 2020-02-04 | Apple Inc. | Data detection |
US10567477B2 (en) | 2015-03-08 | 2020-02-18 | Apple Inc. | Virtual assistant continuity |
US10572476B2 (en) | 2013-03-14 | 2020-02-25 | Apple Inc. | Refining a search based on schedule items |
US10587594B1 (en) * | 2014-09-23 | 2020-03-10 | Amazon Technologies, Inc. | Media based authentication |
US10592095B2 (en) | 2014-05-23 | 2020-03-17 | Apple Inc. | Instantaneous speaking of content on touch devices |
US10592604B2 (en) | 2018-03-12 | 2020-03-17 | Apple Inc. | Inverse text normalization for automatic speech recognition |
US10593346B2 (en) | 2016-12-22 | 2020-03-17 | Apple Inc. | Rank-reduced token representation for automatic speech recognition |
US10593334B2 (en) | 2014-10-10 | 2020-03-17 | Alibaba Group Holding Limited | Method and apparatus for generating voiceprint information comprised of reference pieces each used for authentication |
US10592982B2 (en) | 2013-03-14 | 2020-03-17 | Csidentity Corporation | System and method for identifying related credit inquiries |
US10636424B2 (en) | 2017-11-30 | 2020-04-28 | Apple Inc. | Multi-turn canned dialog |
US10643611B2 (en) | 2008-10-02 | 2020-05-05 | Apple Inc. | Electronic devices with voice command and contextual data processing capabilities |
US10642574B2 (en) | 2013-03-14 | 2020-05-05 | Apple Inc. | Device, method, and graphical user interface for outputting captions |
US10652394B2 (en) | 2013-03-14 | 2020-05-12 | Apple Inc. | System and method for processing voicemail |
US10657328B2 (en) | 2017-06-02 | 2020-05-19 | Apple Inc. | Multi-task recurrent neural network architecture for efficient morphology handling in neural language modeling |
US10659851B2 (en) | 2014-06-30 | 2020-05-19 | Apple Inc. | Real-time digital assistant knowledge updates |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US10671428B2 (en) | 2015-09-08 | 2020-06-02 | Apple Inc. | Distributed personal assistant |
US10672399B2 (en) | 2011-06-03 | 2020-06-02 | Apple Inc. | Switching between text data and audio data based on a mapping |
US10679605B2 (en) | 2010-01-18 | 2020-06-09 | Apple Inc. | Hands-free list-reading by intelligent automated assistant |
US10684703B2 (en) | 2018-06-01 | 2020-06-16 | Apple Inc. | Attention aware virtual assistant dismissal |
US10691473B2 (en) | 2015-11-06 | 2020-06-23 | Apple Inc. | Intelligent automated assistant in a messaging environment |
US10699028B1 (en) | 2017-09-28 | 2020-06-30 | Csidentity Corporation | Identity security architecture systems and methods |
US10706373B2 (en) | 2011-06-03 | 2020-07-07 | Apple Inc. | Performing actions associated with task items that represent tasks to perform |
US10705794B2 (en) | 2010-01-18 | 2020-07-07 | Apple Inc. | Automatically adapting user interfaces for hands-free interaction |
US10726832B2 (en) | 2017-05-11 | 2020-07-28 | Apple Inc. | Maintaining privacy of personal information |
US10733375B2 (en) | 2018-01-31 | 2020-08-04 | Apple Inc. | Knowledge-based framework for improving natural language understanding |
US10733993B2 (en) | 2016-06-10 | 2020-08-04 | Apple Inc. | Intelligent digital assistant in a multi-tasking environment |
US10733982B2 (en) | 2018-01-08 | 2020-08-04 | Apple Inc. | Multi-directional dialog |
US10748529B1 (en) | 2013-03-15 | 2020-08-18 | Apple Inc. | Voice activated device for use with a voice-based digital assistant |
US10747498B2 (en) | 2015-09-08 | 2020-08-18 | Apple Inc. | Zero latency digital assistant |
US10755051B2 (en) | 2017-09-29 | 2020-08-25 | Apple Inc. | Rule-based natural language processing |
US10755703B2 (en) | 2017-05-11 | 2020-08-25 | Apple Inc. | Offline personal assistant |
US10762293B2 (en) | 2010-12-22 | 2020-09-01 | Apple Inc. | Using parts-of-speech tagging and named entity recognition for spelling correction |
CN111699528A (en) * | 2018-02-09 | 2020-09-22 | 三星电子株式会社 | Electronic device and method for executing functions of electronic device |
US10789041B2 (en) | 2014-09-12 | 2020-09-29 | Apple Inc. | Dynamic thresholds for always listening speech trigger |
US10789959B2 (en) | 2018-03-02 | 2020-09-29 | Apple Inc. | Training speaker recognition models for digital assistants |
US10789945B2 (en) | 2017-05-12 | 2020-09-29 | Apple Inc. | Low-latency intelligent automated assistant |
US10791216B2 (en) | 2013-08-06 | 2020-09-29 | Apple Inc. | Auto-activating smart responses based on activities from remote devices |
US10791176B2 (en) | 2017-05-12 | 2020-09-29 | Apple Inc. | Synchronization and task delegation of a digital assistant |
US10810274B2 (en) | 2017-05-15 | 2020-10-20 | Apple Inc. | Optimizing dialogue policy decisions for digital assistants using implicit feedback |
US10818288B2 (en) | 2018-03-26 | 2020-10-27 | Apple Inc. | Natural assistant interaction |
US10892996B2 (en) | 2018-06-01 | 2021-01-12 | Apple Inc. | Variable latency device coordination |
US10896472B1 (en) | 2017-11-14 | 2021-01-19 | Csidentity Corporation | Security and identity verification system and architecture |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US10909617B2 (en) | 2010-03-24 | 2021-02-02 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US10909331B2 (en) | 2018-03-30 | 2021-02-02 | Apple Inc. | Implicit identification of translation payload with neural machine translation |
US10928918B2 (en) | 2018-05-07 | 2021-02-23 | Apple Inc. | Raise to speak |
US10984780B2 (en) | 2018-05-21 | 2021-04-20 | Apple Inc. | Global semantic word embeddings using bi-directional recurrent neural networks |
US11010550B2 (en) | 2015-09-29 | 2021-05-18 | Apple Inc. | Unified language modeling framework for word prediction, auto-completion and auto-correction |
US11023513B2 (en) | 2007-12-20 | 2021-06-01 | Apple Inc. | Method and apparatus for searching using an active ontology |
US11025565B2 (en) | 2015-06-07 | 2021-06-01 | Apple Inc. | Personalized prediction of responses for instant messaging |
US11023570B2 (en) * | 2019-01-28 | 2021-06-01 | EMC IP Holding Company LLC | User authentication with acoustic fingerprinting |
US11030562B1 (en) | 2011-10-31 | 2021-06-08 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US11076043B2 (en) * | 2019-10-04 | 2021-07-27 | Red Box Recorders Limited | Systems and methods of voiceprint generation and use in enforcing compliance policies |
US11145294B2 (en) | 2018-05-07 | 2021-10-12 | Apple Inc. | Intelligent automated assistant for delivering content from user experiences |
US11151899B2 (en) | 2013-03-15 | 2021-10-19 | Apple Inc. | User training by intelligent digital assistant |
US11151468B1 (en) | 2015-07-02 | 2021-10-19 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
US11157872B2 (en) | 2008-06-26 | 2021-10-26 | Experian Marketing Solutions, Llc | Systems and methods for providing an integrated identifier |
US11204988B2 (en) | 2018-04-20 | 2021-12-21 | Spotify Ab | Association via voice |
US11204787B2 (en) | 2017-01-09 | 2021-12-21 | Apple Inc. | Application integration with a digital assistant |
US11217255B2 (en) | 2017-05-16 | 2022-01-04 | Apple Inc. | Far-field extension for digital assistant services |
US11231904B2 (en) | 2015-03-06 | 2022-01-25 | Apple Inc. | Reducing response latency of intelligent automated assistants |
US11263624B2 (en) * | 2017-10-24 | 2022-03-01 | Visa International Service Association | System, method, and apparatus for automatically encoding data in an electronic communication |
US11281993B2 (en) | 2016-12-05 | 2022-03-22 | Apple Inc. | Model and ensemble compression for metric learning |
US11301477B2 (en) | 2017-05-12 | 2022-04-12 | Apple Inc. | Feedback analysis of a digital assistant |
EP4002900A1 (en) * | 2020-11-13 | 2022-05-25 | Deutsche Telekom AG | Method and device for multi-factor authentication with voice based authentication |
US11386266B2 (en) | 2018-06-01 | 2022-07-12 | Apple Inc. | Text correction |
US11436309B2 (en) | 2020-07-09 | 2022-09-06 | Bank Of America Corporation | Dynamic knowledge-based voice authentication |
US11495218B2 (en) | 2018-06-01 | 2022-11-08 | Apple Inc. | Virtual assistant operation in multi-device environments |
US11587559B2 (en) | 2015-09-30 | 2023-02-21 | Apple Inc. | Intelligent device identification |
US11689585B2 (en) | 2017-10-11 | 2023-06-27 | PCI-PAL (U.K.) Limited | Processing sensitive information over VoIP |
US11757870B1 (en) * | 2017-10-31 | 2023-09-12 | Wells Fargo Bank, N.A. | Bi-directional voice authentication |
US20240054195A1 (en) * | 2022-08-09 | 2024-02-15 | Soundhound, Inc. | Authorization of Action by Voice Identification |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9203835B2 (en) * | 2013-03-01 | 2015-12-01 | Paypal, Inc. | Systems and methods for authenticating a user based on a biometric model associated with the user |
US20160293167A1 (en) * | 2013-10-10 | 2016-10-06 | Google Inc. | Speaker recognition using neural networks |
CN105357006A (en) * | 2014-08-20 | 2016-02-24 | 中兴通讯股份有限公司 | Method and equipment for performing security authentication based on voiceprint feature |
GB2525464B (en) * | 2015-01-13 | 2016-03-16 | Validsoft Uk Ltd | Authentication method |
CN105094808B (en) * | 2015-06-26 | 2018-04-10 | 努比亚技术有限公司 | A kind of control device and method |
US10044710B2 (en) | 2016-02-22 | 2018-08-07 | Bpip Limited Liability Company | Device and method for validating a user using an intelligent voice print |
US10607148B1 (en) * | 2016-12-21 | 2020-03-31 | Facebook, Inc. | User identification with voiceprints on online social networks |
WO2019055020A1 (en) * | 2017-09-14 | 2019-03-21 | Hewlett-Packard Development Company, L.P. | Print job printing based on human voice activity |
CN109495636A (en) * | 2018-10-23 | 2019-03-19 | 慈中华 | information interaction method and device |
CN110198317A (en) * | 2019-05-31 | 2019-09-03 | 烽火通信科技股份有限公司 | A kind of portal authentication method and system based on port |
Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5615277A (en) * | 1994-11-28 | 1997-03-25 | Hoffman; Ned | Tokenless security system for authorizing access to a secured computer system |
USRE36478E (en) * | 1985-03-18 | 1999-12-28 | Massachusetts Institute Of Technology | Processing of acoustic waveforms |
US6226605B1 (en) * | 1991-08-23 | 2001-05-01 | Hitachi, Ltd. | Digital voice processing apparatus providing frequency characteristic processing and/or time scale expansion |
US6256737B1 (en) * | 1999-03-09 | 2001-07-03 | Bionetrix Systems Corporation | System, method and computer program product for allowing access to enterprise resources using biometric devices |
US6493669B1 (en) * | 2000-05-16 | 2002-12-10 | Delphi Technologies, Inc. | Speech recognition driven system with selectable speech models |
US20030095525A1 (en) * | 2000-04-13 | 2003-05-22 | Daniel Lavin | Navigation control unit for a wireless computer resource access device, such as a wireless web content access device |
US20030217276A1 (en) * | 2002-05-15 | 2003-11-20 | Lacous Mira Kristina | Match template protection within biometric security systems |
US20040059953A1 (en) * | 2002-09-24 | 2004-03-25 | Arinc | Methods and systems for identity management |
US20040121812A1 (en) * | 2002-12-20 | 2004-06-24 | Doran Patrick J. | Method of performing speech recognition in a mobile title line communication device |
US6799163B2 (en) * | 2002-06-05 | 2004-09-28 | Vas International, Inc. | Biometric identification system |
US20040232221A1 (en) * | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | Method and system for voice recognition biometrics on a fob |
US6859777B2 (en) * | 1994-11-14 | 2005-02-22 | Siemens Aktiengesellschaft | Hypertext navigation system controlled by spoken words |
US20050065791A1 (en) * | 1999-08-30 | 2005-03-24 | Samsung Electronics Co., Ltd. | Apparatus and method for voice recognition and displaying of characters in mobile telecommunication system |
US6891932B2 (en) * | 2001-12-11 | 2005-05-10 | Cisco Technology, Inc. | System and methodology for voice activated access to multiple data sources and voice repositories in a single session |
US6931374B2 (en) * | 2003-04-01 | 2005-08-16 | Microsoft Corporation | Method of speech recognition using variational inference with switching state space models |
US20050218215A1 (en) * | 2004-04-02 | 2005-10-06 | Lauden Gary A | Biometric identification system |
US20050238214A1 (en) * | 2003-01-28 | 2005-10-27 | Fujitsu Limited | Biometric information registration apparatus, biometric information verification apparatus, biometric information registration/verification system, and biometric information registration program |
US6961700B2 (en) * | 1996-09-24 | 2005-11-01 | Allvoice Computing Plc | Method and apparatus for processing the output of a speech recognition engine |
US20060041755A1 (en) * | 2000-09-05 | 2006-02-23 | Netlabs.Com,Inc. | Multichannel device utilizing a centralized out-of-band authentication system (COBAS) |
US20060056662A1 (en) * | 2002-08-20 | 2006-03-16 | Michael Thieme | Method of multiple algorithm processing of biometric data |
US7020609B2 (en) * | 1995-04-10 | 2006-03-28 | Texas Instruments Incorporated | Voice activated apparatus for accessing information on the World Wide Web |
US7035799B1 (en) * | 1997-11-21 | 2006-04-25 | Siemens Aktiengesellschaft | Method and device for voice recognition |
US20060277043A1 (en) * | 2005-06-06 | 2006-12-07 | Edward Tomes | Voice authentication system and methods therefor |
US20070165911A1 (en) * | 2005-12-23 | 2007-07-19 | International Business Machines Corporation | Method and system for biometric authentication |
US20080101658A1 (en) * | 2005-12-22 | 2008-05-01 | James Ahern | Biometric authentication system |
Family Cites Families (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4087630A (en) * | 1977-05-12 | 1978-05-02 | Centigram Corporation | Continuous speech recognition apparatus |
US4181821A (en) * | 1978-10-31 | 1980-01-01 | Bell Telephone Laboratories, Incorporated | Multiple template speech recognition system |
US4348550A (en) * | 1980-06-09 | 1982-09-07 | Bell Telephone Laboratories, Incorporated | Spoken word controlled automatic dialer |
US4363102A (en) * | 1981-03-27 | 1982-12-07 | Bell Telephone Laboratories, Incorporated | Speaker identification system using word recognition templates |
US4415767A (en) * | 1981-10-19 | 1983-11-15 | Votan | Method and apparatus for speech recognition and reproduction |
US4831551A (en) * | 1983-01-28 | 1989-05-16 | Texas Instruments Incorporated | Speaker-dependent connected speech word recognizer |
DE3733659A1 (en) * | 1986-10-03 | 1988-04-21 | Ricoh Kk | METHOD FOR COMPARISONING PATTERNS |
US5583961A (en) * | 1993-03-25 | 1996-12-10 | British Telecommunications Public Limited Company | Speaker recognition using spectral coefficients normalized with respect to unequal frequency bands |
US5895447A (en) * | 1996-02-02 | 1999-04-20 | International Business Machines Corporation | Speech recognition using thresholded speaker class model selection or model adaptation |
US6088669A (en) * | 1997-01-28 | 2000-07-11 | International Business Machines, Corporation | Speech recognition with attempted speaker recognition for speaker model prefetching or alternative speech modeling |
US6092192A (en) | 1998-01-16 | 2000-07-18 | International Business Machines Corporation | Apparatus and methods for providing repetitive enrollment in a plurality of biometric recognition systems based on an initial enrollment |
US6107935A (en) | 1998-02-11 | 2000-08-22 | International Business Machines Corporation | Systems and methods for access filtering employing relaxed recognition constraints |
US7158871B1 (en) * | 1998-05-07 | 2007-01-02 | Art - Advanced Recognition Technologies Ltd. | Handwritten and voice control of vehicle components |
RU2223554C2 (en) * | 1998-09-09 | 2004-02-10 | Асахи Касеи Кабусики Кайся | Speech recognition device |
US6766295B1 (en) * | 1999-05-10 | 2004-07-20 | Nuance Communications | Adaptation of a speech recognition system across multiple remote sessions with a speaker |
US8648692B2 (en) * | 1999-07-23 | 2014-02-11 | Seong Sang Investments Llc | Accessing an automobile with a transponder |
US7689416B1 (en) * | 1999-09-29 | 2010-03-30 | Poirier Darrell A | System for transferring personalize matter from one computer to another |
US6356868B1 (en) | 1999-10-25 | 2002-03-12 | Comverse Network Systems, Inc. | Voiceprint identification system |
US8812319B2 (en) * | 2001-01-31 | 2014-08-19 | Ibiometrics, Inc. | Dynamic pass phrase security system (DPSS) |
US7805310B2 (en) * | 2001-02-26 | 2010-09-28 | Rohwer Elizabeth A | Apparatus and methods for implementing voice enabling applications in a converged voice and data network environment |
US20020169604A1 (en) * | 2001-03-09 | 2002-11-14 | Damiba Bertrand A. | System, method and computer program product for genre-based grammars and acoustic models in a speech recognition framework |
KR100406307B1 (en) * | 2001-08-09 | 2003-11-19 | 삼성전자주식회사 | Voice recognition method and system based on voice registration method and system |
US7324947B2 (en) * | 2001-10-03 | 2008-01-29 | Promptu Systems Corporation | Global speech user interface |
US20030144846A1 (en) * | 2002-01-31 | 2003-07-31 | Denenberg Lawrence A. | Method and system for modifying the behavior of an application based upon the application's grammar |
US7693720B2 (en) * | 2002-07-15 | 2010-04-06 | Voicebox Technologies, Inc. | Mobile systems and methods for responding to natural language speech utterance |
US7333798B2 (en) | 2002-08-08 | 2008-02-19 | Value Added Communications, Inc. | Telecommunication call management and monitoring system |
US7299177B2 (en) * | 2003-05-30 | 2007-11-20 | American Express Travel Related Services Company, Inc. | Speaker recognition in a multi-speaker environment and comparison of several voice prints to many |
WO2005013263A1 (en) * | 2003-07-31 | 2005-02-10 | Fujitsu Limited | Voice authentication system |
US7664639B2 (en) * | 2004-01-14 | 2010-02-16 | Art Advanced Recognition Technologies, Inc. | Apparatus and methods for speech recognition |
JP2005202014A (en) * | 2004-01-14 | 2005-07-28 | Sony Corp | Audio signal processor, audio signal processing method, and audio signal processing program |
US8831894B2 (en) * | 2004-06-14 | 2014-09-09 | Wanda G. Papadimitriou | Autonomous remaining useful life estimation |
US7240010B2 (en) * | 2004-06-14 | 2007-07-03 | Papadimitriou Wanda G | Voice interaction with and control of inspection equipment |
CN100562925C (en) * | 2005-09-29 | 2009-11-25 | 华为技术有限公司 | The method that the voice of limited range are discerned automatically |
US20070219801A1 (en) * | 2006-03-14 | 2007-09-20 | Prabha Sundaram | System, method and computer program product for updating a biometric model based on changes in a biometric feature of a user |
JP2008197229A (en) * | 2007-02-09 | 2008-08-28 | Konica Minolta Business Technologies Inc | Speech recognition dictionary construction device and program |
US20080256613A1 (en) * | 2007-03-13 | 2008-10-16 | Grover Noel J | Voice print identification portal |
CN102044246B (en) * | 2009-10-15 | 2012-05-23 | 华为技术有限公司 | Audio signal detection method and device |
US8682667B2 (en) * | 2010-02-25 | 2014-03-25 | Apple Inc. | User profiling for selecting user specific voice input processing information |
WO2011106797A1 (en) * | 2010-02-28 | 2011-09-01 | Osterhout Group, Inc. | Projection triggering through an external marker in an augmented reality eyepiece |
US8756062B2 (en) * | 2010-12-10 | 2014-06-17 | General Motors Llc | Male acoustic model adaptation based on language-independent female speech data |
GB2514943A (en) * | 2012-01-24 | 2014-12-10 | Auraya Pty Ltd | Voice authentication and speech recognition system and method |
KR101971697B1 (en) * | 2012-02-24 | 2019-04-23 | 삼성전자주식회사 | Method and apparatus for authenticating user using hybrid biometrics information in a user device |
US9042867B2 (en) * | 2012-02-24 | 2015-05-26 | Agnitio S.L. | System and method for speaker recognition on mobile devices |
US9646610B2 (en) * | 2012-10-30 | 2017-05-09 | Motorola Solutions, Inc. | Method and apparatus for activating a particular wireless communication device to accept speech and/or voice commands using identification data consisting of speech, voice, image recognition |
-
2008
- 2008-03-13 US US12/075,799 patent/US20080256613A1/en not_active Abandoned
-
2014
- 2014-04-28 US US14/263,572 patent/US9799338B2/en active Active
-
2017
- 2017-10-23 US US15/790,996 patent/US20180047397A1/en not_active Abandoned
Patent Citations (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE36478E (en) * | 1985-03-18 | 1999-12-28 | Massachusetts Institute Of Technology | Processing of acoustic waveforms |
US6226605B1 (en) * | 1991-08-23 | 2001-05-01 | Hitachi, Ltd. | Digital voice processing apparatus providing frequency characteristic processing and/or time scale expansion |
US6859777B2 (en) * | 1994-11-14 | 2005-02-22 | Siemens Aktiengesellschaft | Hypertext navigation system controlled by spoken words |
US5615277A (en) * | 1994-11-28 | 1997-03-25 | Hoffman; Ned | Tokenless security system for authorizing access to a secured computer system |
US7020609B2 (en) * | 1995-04-10 | 2006-03-28 | Texas Instruments Incorporated | Voice activated apparatus for accessing information on the World Wide Web |
US6961700B2 (en) * | 1996-09-24 | 2005-11-01 | Allvoice Computing Plc | Method and apparatus for processing the output of a speech recognition engine |
US7035799B1 (en) * | 1997-11-21 | 2006-04-25 | Siemens Aktiengesellschaft | Method and device for voice recognition |
US6256737B1 (en) * | 1999-03-09 | 2001-07-03 | Bionetrix Systems Corporation | System, method and computer program product for allowing access to enterprise resources using biometric devices |
US20050065791A1 (en) * | 1999-08-30 | 2005-03-24 | Samsung Electronics Co., Ltd. | Apparatus and method for voice recognition and displaying of characters in mobile telecommunication system |
US6917917B1 (en) * | 1999-08-30 | 2005-07-12 | Samsung Electronics Co., Ltd | Apparatus and method for voice recognition and displaying of characters in mobile telecommunication system |
US20030095525A1 (en) * | 2000-04-13 | 2003-05-22 | Daniel Lavin | Navigation control unit for a wireless computer resource access device, such as a wireless web content access device |
US6493669B1 (en) * | 2000-05-16 | 2002-12-10 | Delphi Technologies, Inc. | Speech recognition driven system with selectable speech models |
US20060041755A1 (en) * | 2000-09-05 | 2006-02-23 | Netlabs.Com,Inc. | Multichannel device utilizing a centralized out-of-band authentication system (COBAS) |
US20040232221A1 (en) * | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | Method and system for voice recognition biometrics on a fob |
US6891932B2 (en) * | 2001-12-11 | 2005-05-10 | Cisco Technology, Inc. | System and methodology for voice activated access to multiple data sources and voice repositories in a single session |
US20030217276A1 (en) * | 2002-05-15 | 2003-11-20 | Lacous Mira Kristina | Match template protection within biometric security systems |
US6799163B2 (en) * | 2002-06-05 | 2004-09-28 | Vas International, Inc. | Biometric identification system |
US20060056662A1 (en) * | 2002-08-20 | 2006-03-16 | Michael Thieme | Method of multiple algorithm processing of biometric data |
US20040059953A1 (en) * | 2002-09-24 | 2004-03-25 | Arinc | Methods and systems for identity management |
US20040121812A1 (en) * | 2002-12-20 | 2004-06-24 | Doran Patrick J. | Method of performing speech recognition in a mobile title line communication device |
US20050238214A1 (en) * | 2003-01-28 | 2005-10-27 | Fujitsu Limited | Biometric information registration apparatus, biometric information verification apparatus, biometric information registration/verification system, and biometric information registration program |
US6931374B2 (en) * | 2003-04-01 | 2005-08-16 | Microsoft Corporation | Method of speech recognition using variational inference with switching state space models |
US20050218215A1 (en) * | 2004-04-02 | 2005-10-06 | Lauden Gary A | Biometric identification system |
US20060277043A1 (en) * | 2005-06-06 | 2006-12-07 | Edward Tomes | Voice authentication system and methods therefor |
US20080101658A1 (en) * | 2005-12-22 | 2008-05-01 | James Ahern | Biometric authentication system |
US20070165911A1 (en) * | 2005-12-23 | 2007-07-19 | International Business Machines Corporation | Method and system for biometric authentication |
Cited By (330)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9646614B2 (en) | 2000-03-16 | 2017-05-09 | Apple Inc. | Fast, language-independent method for user authentication by voice |
US10318871B2 (en) | 2005-09-08 | 2019-06-11 | Apple Inc. | Method and apparatus for building an intelligent automated assistant |
US8942986B2 (en) | 2006-09-08 | 2015-01-27 | Apple Inc. | Determining user intent based on ontologies of domains |
US8930191B2 (en) | 2006-09-08 | 2015-01-06 | Apple Inc. | Paraphrasing of user requests and results by automated digital assistant |
US9117447B2 (en) | 2006-09-08 | 2015-08-25 | Apple Inc. | Using event alert text as input to an automated assistant |
US20080167868A1 (en) * | 2007-01-04 | 2008-07-10 | Dimitri Kanevsky | Systems and methods for intelligent control of microphones for speech recognition applications |
US8140325B2 (en) * | 2007-01-04 | 2012-03-20 | International Business Machines Corporation | Systems and methods for intelligent control of microphones for speech recognition applications |
US9799338B2 (en) * | 2007-03-13 | 2017-10-24 | Voicelt Technology | Voice print identification portal |
US20140350932A1 (en) * | 2007-03-13 | 2014-11-27 | Voicelt Technologies, LLC | Voice print identification portal |
US8977255B2 (en) | 2007-04-03 | 2015-03-10 | Apple Inc. | Method and system for operating a multi-function portable electronic device using voice-activation |
US10568032B2 (en) | 2007-04-03 | 2020-02-18 | Apple Inc. | Method and system for operating a multi-function portable electronic device using voice-activation |
US9580028B2 (en) * | 2007-10-01 | 2017-02-28 | Harman Becker Automotive Systems Gmbh | Adjusting or setting vehicle elements through speech control |
US20090089065A1 (en) * | 2007-10-01 | 2009-04-02 | Markus Buck | Adjusting or setting vehicle elements through speech control |
US11023513B2 (en) | 2007-12-20 | 2021-06-01 | Apple Inc. | Method and apparatus for searching using an active ontology |
US10381016B2 (en) | 2008-01-03 | 2019-08-13 | Apple Inc. | Methods and apparatus for altering audio output signals |
US9330720B2 (en) | 2008-01-03 | 2016-05-03 | Apple Inc. | Methods and apparatus for altering audio output signals |
US9865248B2 (en) | 2008-04-05 | 2018-01-09 | Apple Inc. | Intelligent text-to-speech conversion |
US9626955B2 (en) | 2008-04-05 | 2017-04-18 | Apple Inc. | Intelligent text-to-speech conversion |
US11157872B2 (en) | 2008-06-26 | 2021-10-26 | Experian Marketing Solutions, Llc | Systems and methods for providing an integrated identifier |
US11769112B2 (en) | 2008-06-26 | 2023-09-26 | Experian Marketing Solutions, Llc | Systems and methods for providing an integrated identifier |
US12205076B2 (en) | 2008-06-26 | 2025-01-21 | Experian Marketing Solutions, Llc | Systems and methods for providing an integrated identifier |
US10108612B2 (en) | 2008-07-31 | 2018-10-23 | Apple Inc. | Mobile device having human language translation capability with positional feedback |
US9535906B2 (en) | 2008-07-31 | 2017-01-03 | Apple Inc. | Mobile device having human language translation capability with positional feedback |
US11348582B2 (en) | 2008-10-02 | 2022-05-31 | Apple Inc. | Electronic devices with voice command and contextual data processing capabilities |
US10643611B2 (en) | 2008-10-02 | 2020-05-05 | Apple Inc. | Electronic devices with voice command and contextual data processing capabilities |
US9959870B2 (en) | 2008-12-11 | 2018-05-01 | Apple Inc. | Speech recognition involving a mobile device |
US9059991B2 (en) * | 2008-12-31 | 2015-06-16 | Bce Inc. | System and method for unlocking a device |
US20110275348A1 (en) * | 2008-12-31 | 2011-11-10 | Bce Inc. | System and method for unlocking a device |
US9858925B2 (en) | 2009-06-05 | 2018-01-02 | Apple Inc. | Using context information to facilitate processing of commands in a virtual assistant |
US10795541B2 (en) | 2009-06-05 | 2020-10-06 | Apple Inc. | Intelligent organization of tasks items |
US10475446B2 (en) | 2009-06-05 | 2019-11-12 | Apple Inc. | Using context information to facilitate processing of commands in a virtual assistant |
US11080012B2 (en) | 2009-06-05 | 2021-08-03 | Apple Inc. | Interface for a virtual digital assistant |
US9431006B2 (en) | 2009-07-02 | 2016-08-30 | Apple Inc. | Methods and apparatuses for automatic speech recognition |
US10283110B2 (en) | 2009-07-02 | 2019-05-07 | Apple Inc. | Methods and apparatuses for automatic speech recognition |
US7684556B1 (en) | 2009-07-17 | 2010-03-23 | International Business Machines Corporation | Conversational biometric coupled with speech recognition in passive mode during call hold to affect call routing |
US10679605B2 (en) | 2010-01-18 | 2020-06-09 | Apple Inc. | Hands-free list-reading by intelligent automated assistant |
US12087308B2 (en) | 2010-01-18 | 2024-09-10 | Apple Inc. | Intelligent automated assistant |
US8892446B2 (en) | 2010-01-18 | 2014-11-18 | Apple Inc. | Service orchestration for intelligent automated assistant |
US10705794B2 (en) | 2010-01-18 | 2020-07-07 | Apple Inc. | Automatically adapting user interfaces for hands-free interaction |
US8903716B2 (en) | 2010-01-18 | 2014-12-02 | Apple Inc. | Personalized vocabulary for digital assistant |
US10276170B2 (en) | 2010-01-18 | 2019-04-30 | Apple Inc. | Intelligent automated assistant |
US11423886B2 (en) | 2010-01-18 | 2022-08-23 | Apple Inc. | Task flow identification based on user intent |
US10706841B2 (en) | 2010-01-18 | 2020-07-07 | Apple Inc. | Task flow identification based on user intent |
US9548050B2 (en) | 2010-01-18 | 2017-01-17 | Apple Inc. | Intelligent automated assistant |
US10496753B2 (en) | 2010-01-18 | 2019-12-03 | Apple Inc. | Automatically adapting user interfaces for hands-free interaction |
US10553209B2 (en) | 2010-01-18 | 2020-02-04 | Apple Inc. | Systems and methods for hands-free notification summaries |
US9318108B2 (en) | 2010-01-18 | 2016-04-19 | Apple Inc. | Intelligent automated assistant |
US10049675B2 (en) | 2010-02-25 | 2018-08-14 | Apple Inc. | User profiling for voice input processing |
US9190062B2 (en) | 2010-02-25 | 2015-11-17 | Apple Inc. | User profiling for voice input processing |
US9633660B2 (en) | 2010-02-25 | 2017-04-25 | Apple Inc. | User profiling for voice input processing |
US10692504B2 (en) | 2010-02-25 | 2020-06-23 | Apple Inc. | User profiling for voice input processing |
US10909617B2 (en) | 2010-03-24 | 2021-02-02 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US20110260832A1 (en) * | 2010-04-27 | 2011-10-27 | Joe Ross | Secure voice biometric enrollment and voice alert delivery system |
US10762293B2 (en) | 2010-12-22 | 2020-09-01 | Apple Inc. | Using parts-of-speech tagging and named entity recognition for spelling correction |
US9235728B2 (en) | 2011-02-18 | 2016-01-12 | Csidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
US9558368B2 (en) | 2011-02-18 | 2017-01-31 | Csidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
US9710868B2 (en) | 2011-02-18 | 2017-07-18 | Csidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
US10593004B2 (en) | 2011-02-18 | 2020-03-17 | Csidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
US10417405B2 (en) | 2011-03-21 | 2019-09-17 | Apple Inc. | Device access using voice authentication |
US10102359B2 (en) | 2011-03-21 | 2018-10-16 | Apple Inc. | Device access using voice authentication |
AU2012231142B2 (en) * | 2011-03-21 | 2016-01-28 | Apple Inc. | Device access using voice authentication |
US20120245941A1 (en) * | 2011-03-21 | 2012-09-27 | Cheyer Adam J | Device Access Using Voice Authentication |
US9262612B2 (en) * | 2011-03-21 | 2016-02-16 | Apple Inc. | Device access using voice authentication |
US10241644B2 (en) | 2011-06-03 | 2019-03-26 | Apple Inc. | Actionable reminder entries |
US10672399B2 (en) | 2011-06-03 | 2020-06-02 | Apple Inc. | Switching between text data and audio data based on a mapping |
US10057736B2 (en) | 2011-06-03 | 2018-08-21 | Apple Inc. | Active transport based notifications |
US11120372B2 (en) | 2011-06-03 | 2021-09-14 | Apple Inc. | Performing actions associated with task items that represent tasks to perform |
US10706373B2 (en) | 2011-06-03 | 2020-07-07 | Apple Inc. | Performing actions associated with task items that represent tasks to perform |
US11350253B2 (en) | 2011-06-03 | 2022-05-31 | Apple Inc. | Active transport based notifications |
US11954655B1 (en) | 2011-06-16 | 2024-04-09 | Consumerinfo.Com, Inc. | Authentication alerts |
US10685336B1 (en) | 2011-06-16 | 2020-06-16 | Consumerinfo.Com, Inc. | Authentication alerts |
US11232413B1 (en) | 2011-06-16 | 2022-01-25 | Consumerinfo.Com, Inc. | Authentication alerts |
US10115079B1 (en) | 2011-06-16 | 2018-10-30 | Consumerinfo.Com, Inc. | Authentication alerts |
US10719873B1 (en) | 2011-06-16 | 2020-07-21 | Consumerinfo.Com, Inc. | Providing credit inquiry alerts |
US9798393B2 (en) | 2011-08-29 | 2017-10-24 | Apple Inc. | Text correction processing |
US9237152B2 (en) | 2011-09-20 | 2016-01-12 | Csidentity Corporation | Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository |
US8819793B2 (en) | 2011-09-20 | 2014-08-26 | Csidentity Corporation | Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository |
US10241752B2 (en) | 2011-09-30 | 2019-03-26 | Apple Inc. | Interface for a virtual digital assistant |
US11568348B1 (en) | 2011-10-31 | 2023-01-31 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US12045755B1 (en) | 2011-10-31 | 2024-07-23 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US11030562B1 (en) | 2011-10-31 | 2021-06-08 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US11069336B2 (en) | 2012-03-02 | 2021-07-20 | Apple Inc. | Systems and methods for name pronunciation |
US10134385B2 (en) | 2012-03-02 | 2018-11-20 | Apple Inc. | Systems and methods for name pronunciation |
US9483461B2 (en) | 2012-03-06 | 2016-11-01 | Apple Inc. | Handling speech synthesis of content for multiple languages |
US9953088B2 (en) | 2012-05-14 | 2018-04-24 | Apple Inc. | Crowd sourcing information to fulfill user requests |
US10079014B2 (en) | 2012-06-08 | 2018-09-18 | Apple Inc. | Name recognition system |
US9495129B2 (en) | 2012-06-29 | 2016-11-15 | Apple Inc. | Device, method, and user interface for voice-activated navigation and browsing of a document |
US9576574B2 (en) | 2012-09-10 | 2017-02-21 | Apple Inc. | Context-sensitive handling of interruptions by intelligent digital assistant |
US9971774B2 (en) | 2012-09-19 | 2018-05-15 | Apple Inc. | Voice-based media searching |
CN103685205A (en) * | 2012-09-24 | 2014-03-26 | 联想(北京)有限公司 | Client, server and information processing method applied for the same |
US10134392B2 (en) | 2013-01-10 | 2018-11-20 | Nec Corporation | Terminal, unlocking method, and program |
US10147420B2 (en) * | 2013-01-10 | 2018-12-04 | Nec Corporation | Terminal, unlocking method, and program |
US10978090B2 (en) | 2013-02-07 | 2021-04-13 | Apple Inc. | Voice trigger for a digital assistant |
US10199051B2 (en) | 2013-02-07 | 2019-02-05 | Apple Inc. | Voice trigger for a digital assistant |
US10652394B2 (en) | 2013-03-14 | 2020-05-12 | Apple Inc. | System and method for processing voicemail |
US9977779B2 (en) | 2013-03-14 | 2018-05-22 | Apple Inc. | Automatic supplementation of word correction dictionaries |
US10642574B2 (en) | 2013-03-14 | 2020-05-05 | Apple Inc. | Device, method, and graphical user interface for outputting captions |
US10592982B2 (en) | 2013-03-14 | 2020-03-17 | Csidentity Corporation | System and method for identifying related credit inquiries |
US10572476B2 (en) | 2013-03-14 | 2020-02-25 | Apple Inc. | Refining a search based on schedule items |
US9733821B2 (en) | 2013-03-14 | 2017-08-15 | Apple Inc. | Voice control to diagnose inadvertent activation of accessibility features |
US9368114B2 (en) | 2013-03-14 | 2016-06-14 | Apple Inc. | Context-sensitive handling of interruptions |
US11388291B2 (en) | 2013-03-14 | 2022-07-12 | Apple Inc. | System and method for processing voicemail |
US10169761B1 (en) | 2013-03-15 | 2019-01-01 | ConsumerInfo.com Inc. | Adjustment of knowledge-based authentication |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US10740762B2 (en) | 2013-03-15 | 2020-08-11 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US9922642B2 (en) | 2013-03-15 | 2018-03-20 | Apple Inc. | Training an at least partial voice command system |
US10078487B2 (en) | 2013-03-15 | 2018-09-18 | Apple Inc. | Context-sensitive handling of interruptions |
US11151899B2 (en) | 2013-03-15 | 2021-10-19 | Apple Inc. | User training by intelligent digital assistant |
US10748529B1 (en) | 2013-03-15 | 2020-08-18 | Apple Inc. | Voice activated device for use with a voice-based digital assistant |
US11790473B2 (en) | 2013-03-15 | 2023-10-17 | Csidentity Corporation | Systems and methods of delayed authentication and billing for on-demand products |
US11164271B2 (en) | 2013-03-15 | 2021-11-02 | Csidentity Corporation | Systems and methods of delayed authentication and billing for on-demand products |
US12190327B1 (en) | 2013-03-15 | 2025-01-07 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US11288677B1 (en) | 2013-03-15 | 2022-03-29 | Consumerlnfo.com, Inc. | Adjustment of knowledge-based authentication |
US11775979B1 (en) | 2013-03-15 | 2023-10-03 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US9697822B1 (en) | 2013-03-15 | 2017-07-04 | Apple Inc. | System and method for updating an adaptive speech recognition model |
US10453159B2 (en) | 2013-05-23 | 2019-10-22 | Consumerinfo.Com, Inc. | Digital identity |
US11803929B1 (en) | 2013-05-23 | 2023-10-31 | Consumerinfo.Com, Inc. | Digital identity |
US11120519B2 (en) | 2013-05-23 | 2021-09-14 | Consumerinfo.Com, Inc. | Digital identity |
US9633674B2 (en) | 2013-06-07 | 2017-04-25 | Apple Inc. | System and method for detecting errors in interactions with a voice-based digital assistant |
US9582608B2 (en) | 2013-06-07 | 2017-02-28 | Apple Inc. | Unified ranking with entropy-weighted information for phrase-based semantic auto-completion |
US9966060B2 (en) | 2013-06-07 | 2018-05-08 | Apple Inc. | System and method for user-specified pronunciation of words for speech synthesis and recognition |
US9620104B2 (en) | 2013-06-07 | 2017-04-11 | Apple Inc. | System and method for user-specified pronunciation of words for speech synthesis and recognition |
US10657961B2 (en) | 2013-06-08 | 2020-05-19 | Apple Inc. | Interpreting and acting upon commands that involve sharing information with remote devices |
US9966068B2 (en) | 2013-06-08 | 2018-05-08 | Apple Inc. | Interpreting and acting upon commands that involve sharing information with remote devices |
US10176167B2 (en) | 2013-06-09 | 2019-01-08 | Apple Inc. | System and method for inferring user intent from speech inputs |
US10185542B2 (en) | 2013-06-09 | 2019-01-22 | Apple Inc. | Device, method, and graphical user interface for enabling conversation persistence across two or more instances of a digital assistant |
US11048473B2 (en) | 2013-06-09 | 2021-06-29 | Apple Inc. | Device, method, and graphical user interface for enabling conversation persistence across two or more instances of a digital assistant |
US10769385B2 (en) | 2013-06-09 | 2020-09-08 | Apple Inc. | System and method for inferring user intent from speech inputs |
US9300784B2 (en) | 2013-06-13 | 2016-03-29 | Apple Inc. | System and method for emergency calls initiated by voice command |
US20150025888A1 (en) * | 2013-07-22 | 2015-01-22 | Nuance Communications, Inc. | Speaker recognition and voice tagging for improved service |
US10791216B2 (en) | 2013-08-06 | 2020-09-29 | Apple Inc. | Auto-activating smart responses based on activities from remote devices |
US20150078132A1 (en) * | 2013-09-13 | 2015-03-19 | Hsu-Yung YU | Sonar Type Object Detection System and its Implementing Method |
US20150078134A1 (en) * | 2013-09-13 | 2015-03-19 | Hsu-Yung YU | Sonar type object detection system and its implementing method |
US11314370B2 (en) | 2013-12-06 | 2022-04-26 | Apple Inc. | Method for extracting salient dialog usage from live data |
US10296160B2 (en) | 2013-12-06 | 2019-05-21 | Apple Inc. | Method for extracting salient dialog usage from live data |
US9779761B2 (en) * | 2014-03-21 | 2017-10-03 | International Business Machines Corporation | Dynamically providing to a person feedback pertaining to utterances spoken or sung by the person |
US11189301B2 (en) | 2014-03-21 | 2021-11-30 | International Business Machines Corporation | Dynamically providing to a person feedback pertaining to utterances spoken or sung by the person |
US20160232921A1 (en) * | 2014-03-21 | 2016-08-11 | International Business Machines Corporation | Dynamically providing to a person feedback pertaining to utterances spoken or sung by the person |
US10395671B2 (en) | 2014-03-21 | 2019-08-27 | International Business Machines Corporation | Dynamically providing to a person feedback pertaining to utterances spoken or sung by the person |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US11074641B1 (en) | 2014-04-25 | 2021-07-27 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US11587150B1 (en) | 2014-04-25 | 2023-02-21 | Csidentity Corporation | Systems and methods for eligibility verification |
US9620105B2 (en) | 2014-05-15 | 2017-04-11 | Apple Inc. | Analyzing audio input for efficient speech and music recognition |
US10592095B2 (en) | 2014-05-23 | 2020-03-17 | Apple Inc. | Instantaneous speaking of content on touch devices |
US9502031B2 (en) | 2014-05-27 | 2016-11-22 | Apple Inc. | Method for supporting dynamic grammars in WFST-based ASR |
US9508343B2 (en) * | 2014-05-27 | 2016-11-29 | International Business Machines Corporation | Voice focus enabled by predetermined triggers |
US9514745B2 (en) * | 2014-05-27 | 2016-12-06 | International Business Machines Corporation | Voice focus enabled by predetermined triggers |
US20150348545A1 (en) * | 2014-05-27 | 2015-12-03 | International Business Machines Corporation | Voice focus enabled by predetermined triggers |
US9760559B2 (en) | 2014-05-30 | 2017-09-12 | Apple Inc. | Predictive text input |
US10078631B2 (en) | 2014-05-30 | 2018-09-18 | Apple Inc. | Entropy-guided text prediction using combined word and character n-gram language models |
US10083690B2 (en) | 2014-05-30 | 2018-09-25 | Apple Inc. | Better resolution when referencing to concepts |
US9966065B2 (en) | 2014-05-30 | 2018-05-08 | Apple Inc. | Multi-command single utterance input method |
US10657966B2 (en) | 2014-05-30 | 2020-05-19 | Apple Inc. | Better resolution when referencing to concepts |
US9430463B2 (en) | 2014-05-30 | 2016-08-30 | Apple Inc. | Exemplar-based natural language processing |
US10289433B2 (en) | 2014-05-30 | 2019-05-14 | Apple Inc. | Domain specific language for encoding assistant dialog |
US9842101B2 (en) | 2014-05-30 | 2017-12-12 | Apple Inc. | Predictive conversion of language input |
US11133008B2 (en) | 2014-05-30 | 2021-09-28 | Apple Inc. | Reducing the need for manual start/end-pointing and trigger phrases |
US10497365B2 (en) | 2014-05-30 | 2019-12-03 | Apple Inc. | Multi-command single utterance input method |
US10170123B2 (en) | 2014-05-30 | 2019-01-01 | Apple Inc. | Intelligent assistant for home automation |
US10417344B2 (en) | 2014-05-30 | 2019-09-17 | Apple Inc. | Exemplar-based natural language processing |
US9785630B2 (en) | 2014-05-30 | 2017-10-10 | Apple Inc. | Text prediction using combined word N-gram and unigram language models |
US9715875B2 (en) | 2014-05-30 | 2017-07-25 | Apple Inc. | Reducing the need for manual start/end-pointing and trigger phrases |
US10169329B2 (en) | 2014-05-30 | 2019-01-01 | Apple Inc. | Exemplar-based natural language processing |
US9734193B2 (en) | 2014-05-30 | 2017-08-15 | Apple Inc. | Determining domain salience ranking from ambiguous words in natural speech |
US10714095B2 (en) | 2014-05-30 | 2020-07-14 | Apple Inc. | Intelligent assistant for home automation |
US11257504B2 (en) | 2014-05-30 | 2022-02-22 | Apple Inc. | Intelligent assistant for home automation |
US9633004B2 (en) | 2014-05-30 | 2017-04-25 | Apple Inc. | Better resolution when referencing to concepts |
US10699717B2 (en) | 2014-05-30 | 2020-06-30 | Apple Inc. | Intelligent assistant for home automation |
US10904611B2 (en) | 2014-06-30 | 2021-01-26 | Apple Inc. | Intelligent automated assistant for TV user interactions |
US9338493B2 (en) | 2014-06-30 | 2016-05-10 | Apple Inc. | Intelligent automated assistant for TV user interactions |
US10659851B2 (en) | 2014-06-30 | 2020-05-19 | Apple Inc. | Real-time digital assistant knowledge updates |
US9668024B2 (en) | 2014-06-30 | 2017-05-30 | Apple Inc. | Intelligent automated assistant for TV user interactions |
US20160012446A1 (en) * | 2014-07-10 | 2016-01-14 | Datalogic ADC, Inc. | Authorization of transactions based on automated validation of customer speech |
US10956907B2 (en) * | 2014-07-10 | 2021-03-23 | Datalogic Usa, Inc. | Authorization of transactions based on automated validation of customer speech |
US10318719B2 (en) | 2014-08-12 | 2019-06-11 | At&T Intellectual Property I, L.P. | Identity avatar |
US10942997B2 (en) | 2014-08-12 | 2021-03-09 | At&T Intellectual Property I, L.P. | Multi-factor authentication |
US20160048667A1 (en) * | 2014-08-12 | 2016-02-18 | At&T Intellectual Property I, Lp | Method and device for managing authentication using an identity avatar |
US10032011B2 (en) * | 2014-08-12 | 2018-07-24 | At&T Intellectual Property I, L.P. | Method and device for managing authentication using an identity avatar |
US10446141B2 (en) | 2014-08-28 | 2019-10-15 | Apple Inc. | Automatic speech recognition based on user feedback |
US9818400B2 (en) | 2014-09-11 | 2017-11-14 | Apple Inc. | Method and apparatus for discovering trending terms in speech requests |
US10431204B2 (en) | 2014-09-11 | 2019-10-01 | Apple Inc. | Method and apparatus for discovering trending terms in speech requests |
US10789041B2 (en) | 2014-09-12 | 2020-09-29 | Apple Inc. | Dynamic thresholds for always listening speech trigger |
US10587594B1 (en) * | 2014-09-23 | 2020-03-10 | Amazon Technologies, Inc. | Media based authentication |
US10453443B2 (en) | 2014-09-30 | 2019-10-22 | Apple Inc. | Providing an indication of the suitability of speech recognition |
US9646609B2 (en) | 2014-09-30 | 2017-05-09 | Apple Inc. | Caching apparatus for serving phonetic pronunciations |
US10390213B2 (en) | 2014-09-30 | 2019-08-20 | Apple Inc. | Social reminders |
US10438595B2 (en) | 2014-09-30 | 2019-10-08 | Apple Inc. | Speaker identification and unsupervised speaker adaptation techniques |
US9886432B2 (en) | 2014-09-30 | 2018-02-06 | Apple Inc. | Parsimonious handling of word inflection via categorical stem + suffix N-gram language models |
US10074360B2 (en) | 2014-09-30 | 2018-09-11 | Apple Inc. | Providing an indication of the suitability of speech recognition |
US10127911B2 (en) | 2014-09-30 | 2018-11-13 | Apple Inc. | Speaker identification and unsupervised speaker adaptation techniques |
US9986419B2 (en) | 2014-09-30 | 2018-05-29 | Apple Inc. | Social reminders |
US9668121B2 (en) | 2014-09-30 | 2017-05-30 | Apple Inc. | Social reminders |
US10593334B2 (en) | 2014-10-10 | 2020-03-17 | Alibaba Group Holding Limited | Method and apparatus for generating voiceprint information comprised of reference pieces each used for authentication |
US10990979B1 (en) | 2014-10-31 | 2021-04-27 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US11436606B1 (en) | 2014-10-31 | 2022-09-06 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US11941635B1 (en) | 2014-10-31 | 2024-03-26 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US10339527B1 (en) | 2014-10-31 | 2019-07-02 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US9563992B2 (en) | 2014-12-01 | 2017-02-07 | Honeywell International Inc. | System and method of associating, assigning, and authenticating users with personal protective equipment using biometrics |
US11556230B2 (en) | 2014-12-02 | 2023-01-17 | Apple Inc. | Data detection |
US10552013B2 (en) | 2014-12-02 | 2020-02-04 | Apple Inc. | Data detection |
US9711141B2 (en) | 2014-12-09 | 2017-07-18 | Apple Inc. | Disambiguating heteronyms in speech synthesis |
US11231904B2 (en) | 2015-03-06 | 2022-01-25 | Apple Inc. | Reducing response latency of intelligent automated assistants |
US9865280B2 (en) | 2015-03-06 | 2018-01-09 | Apple Inc. | Structured dictation using intelligent automated assistants |
US9886953B2 (en) | 2015-03-08 | 2018-02-06 | Apple Inc. | Virtual assistant activation |
US10311871B2 (en) | 2015-03-08 | 2019-06-04 | Apple Inc. | Competing devices responding to voice triggers |
US10529332B2 (en) | 2015-03-08 | 2020-01-07 | Apple Inc. | Virtual assistant activation |
US11087759B2 (en) | 2015-03-08 | 2021-08-10 | Apple Inc. | Virtual assistant activation |
US10567477B2 (en) | 2015-03-08 | 2020-02-18 | Apple Inc. | Virtual assistant continuity |
US9721566B2 (en) | 2015-03-08 | 2017-08-01 | Apple Inc. | Competing devices responding to voice triggers |
US9899019B2 (en) | 2015-03-18 | 2018-02-20 | Apple Inc. | Systems and methods for structured stem and suffix language models |
US10380332B2 (en) * | 2015-03-20 | 2019-08-13 | Baidu Online Network Technology (Beijing) Co., Ltd. | Voiceprint login method and apparatus based on artificial intelligence |
US9842105B2 (en) | 2015-04-16 | 2017-12-12 | Apple Inc. | Parsimonious continuous-space phrase representations for natural language processing |
US10083688B2 (en) | 2015-05-27 | 2018-09-25 | Apple Inc. | Device voice control for selecting a displayed affordance |
US11127397B2 (en) | 2015-05-27 | 2021-09-21 | Apple Inc. | Device voice control |
US10127220B2 (en) | 2015-06-04 | 2018-11-13 | Apple Inc. | Language identification from short strings |
US10356243B2 (en) | 2015-06-05 | 2019-07-16 | Apple Inc. | Virtual assistant aided communication with 3rd party service in a communication session |
US10101822B2 (en) | 2015-06-05 | 2018-10-16 | Apple Inc. | Language input correction |
US11025565B2 (en) | 2015-06-07 | 2021-06-01 | Apple Inc. | Personalized prediction of responses for instant messaging |
US10255907B2 (en) | 2015-06-07 | 2019-04-09 | Apple Inc. | Automatic accent detection using acoustic models |
US10186254B2 (en) | 2015-06-07 | 2019-01-22 | Apple Inc. | Context-based endpoint detection |
US12099940B1 (en) | 2015-07-02 | 2024-09-24 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
US11151468B1 (en) | 2015-07-02 | 2021-10-19 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
US11500672B2 (en) | 2015-09-08 | 2022-11-15 | Apple Inc. | Distributed personal assistant |
US10671428B2 (en) | 2015-09-08 | 2020-06-02 | Apple Inc. | Distributed personal assistant |
US10747498B2 (en) | 2015-09-08 | 2020-08-18 | Apple Inc. | Zero latency digital assistant |
US9697820B2 (en) | 2015-09-24 | 2017-07-04 | Apple Inc. | Unit-selection text-to-speech synthesis using concatenation-sensitive neural networks |
US11010550B2 (en) | 2015-09-29 | 2021-05-18 | Apple Inc. | Unified language modeling framework for word prediction, auto-completion and auto-correction |
US10366158B2 (en) | 2015-09-29 | 2019-07-30 | Apple Inc. | Efficient word encoding for recurrent neural network language models |
US11587559B2 (en) | 2015-09-30 | 2023-02-21 | Apple Inc. | Intelligent device identification |
US10691473B2 (en) | 2015-11-06 | 2020-06-23 | Apple Inc. | Intelligent automated assistant in a messaging environment |
US11526368B2 (en) | 2015-11-06 | 2022-12-13 | Apple Inc. | Intelligent automated assistant in a messaging environment |
US10049668B2 (en) | 2015-12-02 | 2018-08-14 | Apple Inc. | Applying neural network language models to weighted finite state transducers for automatic speech recognition |
US10354652B2 (en) | 2015-12-02 | 2019-07-16 | Apple Inc. | Applying neural network language models to weighted finite state transducers for automatic speech recognition |
US10223066B2 (en) | 2015-12-23 | 2019-03-05 | Apple Inc. | Proactive assistance based on dialog communication between devices |
US10446143B2 (en) | 2016-03-14 | 2019-10-15 | Apple Inc. | Identification of voice inputs providing credentials |
US9934775B2 (en) | 2016-05-26 | 2018-04-03 | Apple Inc. | Unit-selection text-to-speech synthesis based on predicted concatenation parameters |
US9972304B2 (en) | 2016-06-03 | 2018-05-15 | Apple Inc. | Privacy preserving distributed evaluation framework for embedded personalized systems |
US10249300B2 (en) | 2016-06-06 | 2019-04-02 | Apple Inc. | Intelligent list reading |
US11069347B2 (en) | 2016-06-08 | 2021-07-20 | Apple Inc. | Intelligent automated assistant for media exploration |
US10049663B2 (en) | 2016-06-08 | 2018-08-14 | Apple, Inc. | Intelligent automated assistant for media exploration |
US10354011B2 (en) | 2016-06-09 | 2019-07-16 | Apple Inc. | Intelligent automated assistant in a home environment |
US11037565B2 (en) | 2016-06-10 | 2021-06-15 | Apple Inc. | Intelligent digital assistant in a multi-tasking environment |
US10509862B2 (en) | 2016-06-10 | 2019-12-17 | Apple Inc. | Dynamic phrase expansion of language input |
US10733993B2 (en) | 2016-06-10 | 2020-08-04 | Apple Inc. | Intelligent digital assistant in a multi-tasking environment |
US10490187B2 (en) | 2016-06-10 | 2019-11-26 | Apple Inc. | Digital assistant providing automated status report |
US10067938B2 (en) | 2016-06-10 | 2018-09-04 | Apple Inc. | Multilingual word prediction |
US10192552B2 (en) | 2016-06-10 | 2019-01-29 | Apple Inc. | Digital assistant providing whispered speech |
US10580409B2 (en) | 2016-06-11 | 2020-03-03 | Apple Inc. | Application integration with a digital assistant |
US10521466B2 (en) | 2016-06-11 | 2019-12-31 | Apple Inc. | Data driven natural language event detection and classification |
US10089072B2 (en) | 2016-06-11 | 2018-10-02 | Apple Inc. | Intelligent device arbitration and control |
US10269345B2 (en) | 2016-06-11 | 2019-04-23 | Apple Inc. | Intelligent task discovery |
US10297253B2 (en) | 2016-06-11 | 2019-05-21 | Apple Inc. | Application integration with a digital assistant |
US11152002B2 (en) | 2016-06-11 | 2021-10-19 | Apple Inc. | Application integration with a digital assistant |
US10942702B2 (en) | 2016-06-11 | 2021-03-09 | Apple Inc. | Intelligent device arbitration and control |
CN106162641A (en) * | 2016-07-25 | 2016-11-23 | 福建富士通信息软件有限公司 | A kind of safe and efficient public's WiFi authentication method and system |
US10474753B2 (en) | 2016-09-07 | 2019-11-12 | Apple Inc. | Language identification using recurrent neural networks |
US10553215B2 (en) | 2016-09-23 | 2020-02-04 | Apple Inc. | Intelligent automated assistant |
US10043516B2 (en) | 2016-09-23 | 2018-08-07 | Apple Inc. | Intelligent automated assistant |
US11281993B2 (en) | 2016-12-05 | 2022-03-22 | Apple Inc. | Model and ensemble compression for metric learning |
US10593346B2 (en) | 2016-12-22 | 2020-03-17 | Apple Inc. | Rank-reduced token representation for automatic speech recognition |
US11204787B2 (en) | 2017-01-09 | 2021-12-21 | Apple Inc. | Application integration with a digital assistant |
US10332518B2 (en) | 2017-05-09 | 2019-06-25 | Apple Inc. | User interface for correcting recognition errors |
US10417266B2 (en) | 2017-05-09 | 2019-09-17 | Apple Inc. | Context-aware ranking of intelligent response suggestions |
US10395654B2 (en) | 2017-05-11 | 2019-08-27 | Apple Inc. | Text normalization based on a data-driven learning network |
US10726832B2 (en) | 2017-05-11 | 2020-07-28 | Apple Inc. | Maintaining privacy of personal information |
US10755703B2 (en) | 2017-05-11 | 2020-08-25 | Apple Inc. | Offline personal assistant |
US10847142B2 (en) | 2017-05-11 | 2020-11-24 | Apple Inc. | Maintaining privacy of personal information |
US11301477B2 (en) | 2017-05-12 | 2022-04-12 | Apple Inc. | Feedback analysis of a digital assistant |
US10410637B2 (en) | 2017-05-12 | 2019-09-10 | Apple Inc. | User-specific acoustic models |
US11405466B2 (en) | 2017-05-12 | 2022-08-02 | Apple Inc. | Synchronization and task delegation of a digital assistant |
US10791176B2 (en) | 2017-05-12 | 2020-09-29 | Apple Inc. | Synchronization and task delegation of a digital assistant |
US10789945B2 (en) | 2017-05-12 | 2020-09-29 | Apple Inc. | Low-latency intelligent automated assistant |
US10482874B2 (en) | 2017-05-15 | 2019-11-19 | Apple Inc. | Hierarchical belief states for digital assistants |
US10810274B2 (en) | 2017-05-15 | 2020-10-20 | Apple Inc. | Optimizing dialogue policy decisions for digital assistants using implicit feedback |
US10311144B2 (en) | 2017-05-16 | 2019-06-04 | Apple Inc. | Emoji word sense disambiguation |
US10303715B2 (en) | 2017-05-16 | 2019-05-28 | Apple Inc. | Intelligent automated assistant for media exploration |
US10403278B2 (en) | 2017-05-16 | 2019-09-03 | Apple Inc. | Methods and systems for phonetic matching in digital assistant services |
US11217255B2 (en) | 2017-05-16 | 2022-01-04 | Apple Inc. | Far-field extension for digital assistant services |
US10657328B2 (en) | 2017-06-02 | 2020-05-19 | Apple Inc. | Multi-task recurrent neural network architecture for efficient morphology handling in neural language modeling |
US20190050545A1 (en) * | 2017-08-09 | 2019-02-14 | Nice Ltd. | Authentication via a dynamic passphrase |
US11625467B2 (en) | 2017-08-09 | 2023-04-11 | Nice Ltd. | Authentication via a dynamic passphrase |
US10592649B2 (en) * | 2017-08-09 | 2020-03-17 | Nice Ltd. | Authentication via a dynamic passphrase |
US11062011B2 (en) | 2017-08-09 | 2021-07-13 | Nice Ltd. | Authentication via a dynamic passphrase |
US11983259B2 (en) | 2017-08-09 | 2024-05-14 | Nice Inc. | Authentication via a dynamic passphrase |
US10445429B2 (en) | 2017-09-21 | 2019-10-15 | Apple Inc. | Natural language understanding using vocabularies with compressed serialized tries |
US10699028B1 (en) | 2017-09-28 | 2020-06-30 | Csidentity Corporation | Identity security architecture systems and methods |
US11580259B1 (en) | 2017-09-28 | 2023-02-14 | Csidentity Corporation | Identity security architecture systems and methods |
US11157650B1 (en) | 2017-09-28 | 2021-10-26 | Csidentity Corporation | Identity security architecture systems and methods |
US10755051B2 (en) | 2017-09-29 | 2020-08-25 | Apple Inc. | Rule-based natural language processing |
US11870822B2 (en) | 2017-10-11 | 2024-01-09 | PCI-PAL (U.K.) Limited | Processing sensitive information over VoIP |
US11689585B2 (en) | 2017-10-11 | 2023-06-27 | PCI-PAL (U.K.) Limited | Processing sensitive information over VoIP |
US11263624B2 (en) * | 2017-10-24 | 2022-03-01 | Visa International Service Association | System, method, and apparatus for automatically encoding data in an electronic communication |
US11757870B1 (en) * | 2017-10-31 | 2023-09-12 | Wells Fargo Bank, N.A. | Bi-directional voice authentication |
US10896472B1 (en) | 2017-11-14 | 2021-01-19 | Csidentity Corporation | Security and identity verification system and architecture |
US10636424B2 (en) | 2017-11-30 | 2020-04-28 | Apple Inc. | Multi-turn canned dialog |
US10733982B2 (en) | 2018-01-08 | 2020-08-04 | Apple Inc. | Multi-directional dialog |
US10733375B2 (en) | 2018-01-31 | 2020-08-04 | Apple Inc. | Knowledge-based framework for improving natural language understanding |
CN111699528A (en) * | 2018-02-09 | 2020-09-22 | 三星电子株式会社 | Electronic device and method for executing functions of electronic device |
US10789959B2 (en) | 2018-03-02 | 2020-09-29 | Apple Inc. | Training speaker recognition models for digital assistants |
US10592604B2 (en) | 2018-03-12 | 2020-03-17 | Apple Inc. | Inverse text normalization for automatic speech recognition |
US10818288B2 (en) | 2018-03-26 | 2020-10-27 | Apple Inc. | Natural assistant interaction |
US10909331B2 (en) | 2018-03-30 | 2021-02-02 | Apple Inc. | Implicit identification of translation payload with neural machine translation |
US11204988B2 (en) | 2018-04-20 | 2021-12-21 | Spotify Ab | Association via voice |
US10928918B2 (en) | 2018-05-07 | 2021-02-23 | Apple Inc. | Raise to speak |
US11145294B2 (en) | 2018-05-07 | 2021-10-12 | Apple Inc. | Intelligent automated assistant for delivering content from user experiences |
US10984780B2 (en) | 2018-05-21 | 2021-04-20 | Apple Inc. | Global semantic word embeddings using bi-directional recurrent neural networks |
US10984798B2 (en) | 2018-06-01 | 2021-04-20 | Apple Inc. | Voice interaction at a primary device to access call functionality of a companion device |
US10892996B2 (en) | 2018-06-01 | 2021-01-12 | Apple Inc. | Variable latency device coordination |
US10684703B2 (en) | 2018-06-01 | 2020-06-16 | Apple Inc. | Attention aware virtual assistant dismissal |
US11495218B2 (en) | 2018-06-01 | 2022-11-08 | Apple Inc. | Virtual assistant operation in multi-device environments |
US11009970B2 (en) | 2018-06-01 | 2021-05-18 | Apple Inc. | Attention aware virtual assistant dismissal |
US11386266B2 (en) | 2018-06-01 | 2022-07-12 | Apple Inc. | Text correction |
US10403283B1 (en) | 2018-06-01 | 2019-09-03 | Apple Inc. | Voice interaction at a primary device to access call functionality of a companion device |
US10944859B2 (en) | 2018-06-03 | 2021-03-09 | Apple Inc. | Accelerated task performance |
US10504518B1 (en) | 2018-06-03 | 2019-12-10 | Apple Inc. | Accelerated task performance |
US10496705B1 (en) | 2018-06-03 | 2019-12-03 | Apple Inc. | Accelerated task performance |
US12132837B2 (en) | 2018-06-22 | 2024-10-29 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US11588639B2 (en) | 2018-06-22 | 2023-02-21 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
WO2020001165A1 (en) * | 2018-06-27 | 2020-01-02 | Oppo广东移动通信有限公司 | Voice control method and apparatus, and storage medium and electronic device |
CN108694947A (en) * | 2018-06-27 | 2018-10-23 | Oppo广东移动通信有限公司 | Sound control method, device, storage medium and electronic equipment |
CN109273009A (en) * | 2018-08-02 | 2019-01-25 | 平安科技(深圳)有限公司 | Access control method, device, computer equipment and storage medium |
CN109325771A (en) * | 2018-09-20 | 2019-02-12 | 北京得意音通技术有限责任公司 | Auth method, device, computer program, storage medium and electronic equipment |
US11023570B2 (en) * | 2019-01-28 | 2021-06-01 | EMC IP Holding Company LLC | User authentication with acoustic fingerprinting |
CN110428844A (en) * | 2019-07-31 | 2019-11-08 | 歌尔科技有限公司 | Speech verification method, electronic equipment, audio frequency apparatus and the medium of electronic equipment |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US11076043B2 (en) * | 2019-10-04 | 2021-07-27 | Red Box Recorders Limited | Systems and methods of voiceprint generation and use in enforcing compliance policies |
US11436309B2 (en) | 2020-07-09 | 2022-09-06 | Bank Of America Corporation | Dynamic knowledge-based voice authentication |
EP4002900A1 (en) * | 2020-11-13 | 2022-05-25 | Deutsche Telekom AG | Method and device for multi-factor authentication with voice based authentication |
US20240054195A1 (en) * | 2022-08-09 | 2024-02-15 | Soundhound, Inc. | Authorization of Action by Voice Identification |
Also Published As
Publication number | Publication date |
---|---|
US20180047397A1 (en) | 2018-02-15 |
US20140350932A1 (en) | 2014-11-27 |
US9799338B2 (en) | 2017-10-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9799338B2 (en) | Voice print identification portal | |
US10867021B1 (en) | Systems and methods for continuous biometric authentication | |
US20030163739A1 (en) | Robust multi-factor authentication for secure application environments | |
US10818299B2 (en) | Verifying a user using speaker verification and a multimodal web-based interface | |
US20140343943A1 (en) | Systems, Computer Medium and Computer-Implemented Methods for Authenticating Users Using Voice Streams | |
US8095372B2 (en) | Digital process and arrangement for authenticating a user of a database | |
US20190243956A1 (en) | Remote usage of locally stored biometric authentication data | |
US20060277043A1 (en) | Voice authentication system and methods therefor | |
US20140090039A1 (en) | Secure System Access Using Mobile Biometric Devices | |
US20130132091A1 (en) | Dynamic Pass Phrase Security System (DPSS) | |
US20130006626A1 (en) | Voice-based telecommunication login | |
US20030149881A1 (en) | Apparatus and method for securing information transmitted on computer networks | |
US20120296651A1 (en) | User authentication by combining speaker verification and reverse turing test | |
US20160292408A1 (en) | Continuously authenticating a user of voice recognition services | |
US11665153B2 (en) | Voice biometric authentication in a virtual assistant | |
US6246987B1 (en) | System for permitting access to a common resource in response to speaker identification and verification | |
CN104104664A (en) | Method, server, client and system for verifying verification code | |
US20060085189A1 (en) | Method and apparatus for server centric speaker authentication | |
CN112201254B (en) | Non-inductive voice authentication method, device, equipment and storage medium | |
US20140095169A1 (en) | Voice authentication system and methods | |
CN112417412A (en) | Bank account balance inquiry method, device and system | |
WO2006130958A1 (en) | Voice authentication system and methods therefor | |
KR20130059999A (en) | Authentication system and method based by voice | |
US11289080B2 (en) | Security tool | |
US20240232308A1 (en) | Virtual agent transparent user authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: VOICEIT TECHNOLOGY, MINNESOTA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GROVER, NOEL J.;REEL/FRAME:022280/0112 Effective date: 20080404 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |