Class / Patent application number | Description | Number of patent applications / Date published |
704273000 | Security system | 55 |
20080215333 | Embedding Data in Audio and Detecting Embedded Data in Audio - A method of embedding data into an audio signal provides a data sequence for embedding in the audio signal and computes masking thresholds for the audio signal from a frequency domain transform of the audio signal. The masking thresholds correspond to subbands of the audio signal, which are obtained from a masking model used to compress the audio signal. The method applies the masking threshold to the data sequence to produce masked data sequence and inserts the masked data sequence in the audio signal to produce an embedded audio signal. A method of detecting data embedded in an audio signal analyzes the audio signal to estimate the masking threshold used in embedding the data and applies the estimated masking threshold to the audio signal to extract the embedded data. | 09-04-2008 |
20080215334 | METHOD, SYSTEM, AND APPARATUS FOR MONITORING SECURITY EVENTS USING SPEECH RECOGNITION - A method of monitoring for security events using a speech recognition system can include receiving a sound signal within the speech recognition system and determining at least one attribute of the sound signal. The attribute of the sound signal can be compared with one or more acoustic models associated with a security event. The method can further include identifying the sound signal as a security event according to the comparing step. | 09-04-2008 |
20080281600 | DIGITAL PROCESS AND ARRANGEMENT FOR AUTHENTICATING A USER OF A DATABASE - Digital process for authentication of a user of a database for access to protected data or a service reserved for a defined circle of users or for the use of data currently entered by the user, wherein a voice sample currently enunciated during an access attempt by the user is routed to a voice analysis unit and, herein, a current voice profile is computed and this is compared in a voice profile comparison unit against a previously stored initial voice profile and, in response to a positive comparison result, the user is authenticated and a first control signal enabling access, but in response to a negative comparison result a second control signal disabling access or triggering a substitute authentication procedure is generated. | 11-13-2008 |
20090055193 | METHOD, APPARATUS AND COMPUTER CODE FOR SELECTIVELY PROVIDING ACCESS TO A SERVICE IN ACCORDANCE WITH SPOKEN CONTENT RECEIVED FROM A USER - Apparatus, methods and computer-readable medium for authenticating a user and selectively providing access to a computer service are described herein. In some embodiments, a) a user input is solicited; b) a voice response to the input soliciting; is received on or from a client device, c) if a determination is made, in accordance with one or more speech delivery features of the voice response, that the voice response is a live human voice response, the client device is permitted to access a computer service; and d) otherwise, client device access to the computer service is denied. Optionally, the access may be permitted only to a pre-determined gender or a pre-determined age group. | 02-26-2009 |
20090076826 | Blind Watermarking of Audio Signals by Using Phase Modifications - Watermarking of audio signals intends to manipulate the audio signal in a way that the changes in the audio content cannot be recognised by the human auditory system. In order to reduce the audibility of the watermark and to improve the robustness of the watermarking the invention uses phase modification of the audio signal. In the frequency domain, the phase of the audio signal is manipulated by the phase of a reference phase sequence, followed by transform into time domain. Because a change of the audio signal phase over the whole frequency range can be audible, the phase manipulation is carried out with a maximum amount only within one or more small frequency ranges which are located in the higher frequencies and/or in noisy audio signal sections, according to psycho-acoustic principles. Preferably, the allowable amplitude of the phase changes in the remaining frequency ranges is controlled according to psycho-acoustic principles. The watermark is decoded from the watermarked audio signal by correlating it with corresponding inversely transformed candidate reference phase sequences. | 03-19-2009 |
20090112602 | SYSTEM AND METHOD FOR CONTROLLING DEVICES THAT ARE CONNECTED TO A NETWORK - A system, method and computer-readable medium for controlling devices connected to a network. The method includes receiving an utterance from a user for remotely controlling a device in a network; converting the received utterance to text using an automatic speech recognition module; accessing a user profile in the network that governs access to a plurality of devices on the network and identifiers which control a conversion of the text to a device specific control language; identifying based on the text a device to be controlled; converting at least a portion of the text to the device control language; and transmitting the device control language to the identified device, wherein the identified device implements a function based on the transmitted device control language. | 04-30-2009 |
20090125310 | APPARATUS AND METHOD FOR INSERTING/EXTRACTING CAPTURING RESISTANT AUDIO WATERMARK BASED ON DISCRETE WAVELET TRANSFORM, AUDIO RIGHTS PROTECTION SYSTEM USING THE SAME - An apparatus and method for embedding and extracting a capturing-resistant audio watermark based on discrete wavelet transform, and a copyright management system using the same are provided. The apparatus for embedding a wavelet based audio watermark includes: a framing unit for dividing an input audio signal into small signals with a regular length; a discrete wavelet transform unit for calculating an mean value of wavelet coefficients by transforming the small signals based on a discrete wavelet transform; and an embedding unit for changing the calculated mean value according to a watermark where a synchronization signal is inserted and inserting the watermark into the audio signal. | 05-14-2009 |
20090204408 | METHOD AND SYSTEM OF PROVIDING PERSONAL AND BUSINESS INFORMATION - A multi-modal system providing for a single point of contact that can allow users to manage their personal contact information and contact lists, and connect to other users and businesses in a personalized, efficient, location-sensitive and organized manner. By accessing the system using any type of telephony-based device, a user can manage all of their personal and business contacts as well as perform generalized searches in public databases, such as white page and/or yellow page listings, or more personalized searches through databases of their business or personal contacts. A user may also, during a generalized search, go to a personalized search, and vice-versa. The system may also provide users with the opportunity to select certain businesses from their contact lists and allow these businesses to provide them with personalized data, either on demand or based on user-controlled permissions or areas of interest through various technologies including presence technologies. | 08-13-2009 |
20090265174 | ROBUST AND INVARIANT AUDIO PATTERN MATCHING - The present invention provides an innovative technique for rapidly and accurately determining whether two audio samples match, as well as being immune to various kinds of transformations, such as playback speed variation. The relationship between the two audio samples is characterized by first matching certain fingerprint objects derived from the respective samples. A set ( | 10-22-2009 |
20090281809 | Headset Wearer Identity Authentication With Voice Print Or Speech Recognition - A headset includes a voice print match application or speech recognition application. The voice print match application receives a user speech corresponding to a submitted voice print phrase key upon determining a donned condition, where the user speech is compared to the predetermined voice print phrase key to validate an identity of the headset user. The speech recognition application receives a user speech corresponding to a password or PIN and recognizes the password or PIN. The recognized password or PIN is compared to a valid password or PIN to validate the identity of the headset user. | 11-12-2009 |
20090287491 | DATA PROCESSING APPARATUS, SPEECH CONVERSION METHOD, AND SPEECH CONVERSION PROGRAM EMBODIED ON COMPUTER READABLE MEDIUM - In order to limit the range of externally outputable content of externally input speech, an MFP includes: a speech acquiring portion to acquire externally input speech; a speech converting portion to convert the acquired speech into character information; a user extracting portion to extract user identification information for identifying a user from the character information; and an output control portion to output the character information based on the extracted user identification information. | 11-19-2009 |
20100049526 | SYSTEM AND METHOD FOR AUDITORY CAPTCHAS - Disclosed herein are systems, methods, and computer readable-media for performing an audible human verification. The method includes determining that a human verification is needed, presenting an audible challenge to a user which exploits a known issue with automatic speech recognition processes, receiving a response to the audible challenge, and verifying that a human provided the response. The known issue with automatic speech recognition processes can be recognition of a non-word, in which case the user can be asked to spell the recognized non-word. The known issue with automatic speech recognition processes can be differentiation of simultaneous input for multiple audio streams. Multiple audio streams contained in the audible challenge can be provided monaurally. Verifying that a human provided the response can include confirming the contents of one of the multiple audio streams. Audible human verification can be performed in combination with visual human verification. | 02-25-2010 |
20100076770 | System and Method for Improving the Performance of Voice Biometrics - A System and Method for Improving the Performance of Voice biometrics is provided wherein a digitized audio signal originating from at least one input client device is compressed (standards-based or proprietary) or uncompressed, the signal optionally being passed to a network which then passes the uncompressed signal to at least a voice biometrics engine and the compressed signal to a voice recorder. The signal is compressed using a compressor utilizing CELP-based technology such as MASC® technology and then sends the compressed signal optionally to a voice recorder where the signal is stored. The compressed signal is then sent to a decompressor which decompresses the signal and forwards the decompressed signal to a voice biometrics engine before being processed with or without a signal processing filter. The voice biometrics engine receives the signal and upon performing the enrollment and/or authentication/verification functions on the signal, thereby outputting one or more voice prints, a verification score, and a confidence score. | 03-25-2010 |
20100094636 | SYSTEM AND METHOD FOR OPERATING A SECURITY SYSTEM - A system and method for operating a security system include a device control module configured for electronic communication with a plurality of devices and a user interface coupled in electronic communication with the device control module. The user interface includes a voice memory and a first speaker. The user interface is configured to receive a first system event from the device control module identifying a first condition detected by the security system. The user interface is further configured to retrieve a voice message from the voice memory corresponding to the first system event and transmit the voice message via the first speaker. | 04-15-2010 |
20100121644 | ADAPTIVE TUNING OF BIOMETRIC ENGINES - A method for adaptively tuning a biometric engine comprises the step of generating a database having a plurality of enrollments. Each enrollment corresponds to one or more of a plurality of operation characteristics. The method further comprises the step of comparing, with the biometric engine, enrollments from the database to generate test results including, for each of a plurality of sets of operation characteristics, error rates for a plurality of sensitivity settings and/or confidence score threshold values. The method further comprises the step of analyzing the test results to determine optimized sensitivity settings and/or confidence score threshold values for each set of operation characteristics. | 05-13-2010 |
20100131279 | METHOD AND ARRANGEMENT FOR CONTROLLING USER ACCESS - Method for controlling user access to a service available in a data network and/or to information stored in a user database, in order to protect stored user data from unauthorized access, such that the method comprises the following: input of a user's speech sample to a user data terminal, processing of the user's speech sample in order to obtain a prepared speech sample as well as a current voice profile of the user, comparison of the current voice profile with an initial voice profile stored in an authorization database, and output of an access-control signal to either permit or refuse access, taking into account the result of the comparison step, such that the comparison step includes a quantitative similarity evaluation of the current and the stored voice profiles as well as a threshold-value discrimination of a similarity measure thereby derived, and an access-control signal that initiates permission of access is generated only if a prespecified similarity measure is not exceeded. | 05-27-2010 |
20100145709 | SYSTEM AND METHOD FOR VOICE AUTHENTICATION - Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, performing a comparison of the received speech sample to a previously established speech profile associated with the user, transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold, and transmitting a denial to the network client if the comparison is less than the certainty threshold. | 06-10-2010 |
20100161338 | METHOD FOR CREATING A VIRTUAL FENCE USING A DEVICE WITH VOICE SIGNATURE PROCESSING AND GEOGRAPHIC LOCATOR CAPABILITY - A client device for creating a virtual fence includes a locator that determines a location of the client device. The client device includes a receiver that receives speech data and transmits the speech data to a speech processor that isolates an individual voice signature from the speech data. The client device includes a profile storage that stores profile information of a user of the client device. The client device includes an alarm generator that generates an alarm based on the isolated individual voice signature and the location of the client device. | 06-24-2010 |
20120078638 | CENTRALIZED BIOMETRIC AUTHENTICATION - A communications system includes a receiver and at least one transmitter. The receiver receives, from different intermediate systems, biometric samples from parties attempting to obtain services from the intermediate systems and information characterizing the expected identifies of the parties. The at least one transmitter transmits, to the intermediate systems, verification that the biometric samples match pre-registered biometric information obtained from a storage device such that the expected identities of the parties is verified as the identities of the parties. | 03-29-2012 |
20120078639 | System and Method for Voice Authentication Over a Computer Network - Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, performing a comparison of the received speech sample to a previously established speech profile associated with the user, transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold, and transmitting a denial to the network client if the comparison is less than the certainty threshold. | 03-29-2012 |
20120084088 | SYSTEM AND METHOD FOR COMPUTERIZED PSYCHOLOGICAL CONTENT ANALYSIS OF COMPUTER AND MEDIA GENERATED COMMUNICATIONS TO PRODUCE COMMUNICATIONS MANAGEMENT SUPPORT, INDICATIONS AND WARNINGS OF DANGEROUS BEHAVIOR, ASSESSMENT OF MEDIA IMAGES, AND PERSONNEL SELECTION SUPPORT - At least one computer-mediated communication produced by or received by an author is collected and parsed to identify categories of information within it. The categories of information are processed with at least one analysis to quantify at least one type of information in each category. A first output communication is generated regarding the at least one computer-mediated communication, describing the psychological state, attitudes or characteristics of the author of the communication. A second output communication is generated when a difference between the quantification of at least one type of information for at least one category and a reference for the at least one category is detected involving a psychological state, attitude or characteristic of the author to which a responsive action should be taken. | 04-05-2012 |
20120123786 | Method for identifying and protecting information - A method for identifying and authenticating a user and protecting information. The identification process is enabled by using a mobile device such as a smartphone, laptop, or thin client device. A user speaks a phrase to create an audio voiceprint while a camera streams video images and creates a video print. The video data is converted to a color band calculated pattern to numbers. The audio voiceprint, video print, and color band are registered in a database as a digital fingerprint. Processing of all audio and video input occurs on a human key system server so there is not usage by the thin client systems used by the user to access the human key server for authentication and verification. When a user registers an audio and video fingerprint is created and stored in the database as reference to identify that individual for the purpose of verification. | 05-17-2012 |
20120232907 | System and Method for Delivering a Human Interactive Proof to the Visually Impaired by Means of Semantic Association of Objects - A system and method for delivering a Human Interactive Proof, or reverse Turing test to the visually impaired; said test comprising a method for restricting access to a computer system, resource, or network to live persons, and for preventing the execution of automated scripts via an interface intended for human interaction. | 09-13-2012 |
20130006642 | SYSTEM AND METHOD FOR VOICE BASED DIGITAL SIGNATURE SERVICE - Methods and systems for providing a voice-based digital signature service are disclosed. The method includes a first user sending a document to a second user for signature, and the first user also sending a PIN to the second user and to a voice verification authority. The second user sending, to the voice verification authority, a voice recording comprising the PIN along with consent of the second user to the PIN. The voice verification authority comparing the voice recording with a predefined voice sample of the second user, and the PIN received from the first user with the PIN received from the second user. The voice verification authority then sending a notification to a signing entity based on the comparison. The signing entity signing the PIN of the document with a private key associated with the second user and sends an acknowledgement to the first user and the second user. | 01-03-2013 |
20130132091 | Dynamic Pass Phrase Security System (DPSS) - There is disclosed an n-dimensional biometric security system as well as a method of identifying and validating a user through the use of a automated random one-time passphrase generation. The use of tailored templates to generate one-time phase phrase text as well as the use of update subscriptions of templates ensures a high level of security. A verification session preferably uses short, text-independent one-time pass phrases and secure audio tokens with master audio generated from an internal text-to-speech security processor. An automated enrollment process may be implemented in an ongoing and seamless fashion with a user's interactions with the system. Various calibration and tuning techniques are also disclosed. | 05-23-2013 |
20130132092 | METHOD, APPARATUS, AND PROGRAM FOR CERTIFYING A VOICE PROFILE WHEN TRANSMITTING TEXT MESSAGES FOR SYNTHESIZED SPEECH - A mechanism is provided for authenticating and using a personal voice profile. The voice profile may be issued by a trusted third party, such as a certification authority. The personal voice profile may include information for generating a digest or digital signature for text messages. A speech synthesis system may speak the text message using the voice characteristics, such as prosodic characteristics, only if the voice profile is authenticated and the text message is valid and free of tampering. | 05-23-2013 |
20130132093 | System and Method for Generating Challenge Items for CAPTCHAs - Challenge items for an audible based electronic challenge system are generated using a variety of techniques to identify optimal candidates. The challenge items are intended for use in a computing system that discriminates between humans and text to speech (TTS) system. | 05-23-2013 |
20130191131 | ELECTRONIC BOOK WITH VOICE EMULATION FEATURES - A method and system for providing text-to-audio conversion of an electronic book displayed on a viewer. A user selects a portion of displayed text and converts it into audio. The text-to-audio conversion may be performed via a header file and pre-recorded audio for each electronic book, via text-to-speech conversion, or other available means. The user may select manual or automatic text-to audio conversion. The automatic text-to-audio conversion may be performed by automatically turning the pages of the electronic book or by the user manually turning the pages. The user may also select to convert the entire electronic book, or portions of it, into audio. The user may also select an option to receive an audio definition of a particular word in the electronic book. The present invention allows a user to control the system by selecting options from a screen or by entering voice commands. | 07-25-2013 |
20130218571 | SYSTEM AND METHOD FOR IDENTIFYING AND/OR AUTHENTICATING A SOURCE OF RECEIVED ELECTRONIC DATA BY DIGITAL SIGNAL PROCESSING AND/OR VOICE AUTHENTICATION - A method for verifying and identifying users, and for verifying users' identity, by means of an authentication device capable of transmitting, receiving and recording audio or ultrasonic signals, and capable of converting the signals into digital data, and performing digital signal processing. Voice pattern(s) and user(s) information of one or more authorized user(s) are recorded and stored on the authentication device. User(s) identification is verified by inputting to the authentication device a vocal identification signal from a user, and comparing the voice pattern of the vocal identification signal with the recorded voice pattern(s) of the authorized user(s), and if a match is detected issuing an indication that the user is identified as an authorized user. | 08-22-2013 |
20130226586 | DEVICE, SYSTEM, AND METHOD FOR AUTHENTICATING USER USING VOICE RECOGNITION - A user authentication device to authenticate a user by voice recognition includes: an operating unit for performing authentication by comparing a audio signal input for voice recognition with voice information of an authorized user; a noise output unit to combine a noise signal with the input audio signal; and a noise cancellation unit to combine a negative noise signal corresponding to the noise signal with the audio signal with the noise signal, and to provide the mixed signal to the operating unit. Accordingly, by using the noise signal as an encryption signal, the security of user authentication using voice recognition may be improved. | 08-29-2013 |
20130226587 | Lip-password Based Speaker Verification System - A lip-based speaker verification system for identifying a speaker using a modality of lip motions; wherein an identification key of the speaker comprising one or more passwords; wherein the one or more passwords are embedded into lip motions of the speaker; wherein the speaker is verified by underlying dynamic characteristics of the lip motions; and wherein the speaker is required to match the one or more passwords embedded in the lip motions with registered information in a database. That is, in the case where the target speaker saying the wrong password or even in the case where an impostor knowing and saying the correct password, the nonconformities will be detected and the authentications/accesses will be denied. | 08-29-2013 |
20130289999 | DUAL MICROPHONE VOICE AUTHENTICATION FOR MOBILE DEVICE - A method of authenticating a user of a mobile device having a first microphone and a second microphone, the method comprising receiving voice input from the user at the first and second microphones, determining a position of the user relative to the mobile device based on the voice input received by the first and second microphones, and authenticating the user based on the position of the user. | 10-31-2013 |
20130304478 | SPEAKER AUTHENTICATION METHODS AND RELATED METHODS AND ELECTRONIC DEVICES - An embodiment of the invention provides a method of preparing for speaker authentication. The method includes: receiving speech data that represents an utterance made by a user; extracting side information; examining the side information to determine whether to allow speaker model training using the speech data; and generating a feedback message for the user based on the side information if speaker model training using the speech data is not allowed. | 11-14-2013 |
20130311191 | METHOD, DEVICE, AND SYSTEM FOR VOICE APPROVAL - Embodiments of the present invention provide a method for voice approval, where the method includes: receiving voice approval request information sent by an enterprise application server; establishing a voice communication connection with the terminal according to the contact information of the approver terminal; sending approval content audio information corresponding to the voice approval request information to the approver terminal; receiving feedback information, and obtaining approval result information according to the feedback information; and sending the approval result information to the enterprise application server. Embodiments of the present invention also provide a device and system for voice approval. In the embodiments of the present invention, the enterprise application server and the enterprise gateway are combined and improved to enable an approver to approve, in voice mode, an approval request raised by an applicant, thereby increasing the approval efficiency. | 11-21-2013 |
20130317827 | VOICE CONTROL METHOD AND COMPUTER-IMPLEMENTED SYSTEM FOR DATA MANAGEMENT AND PROTECTION - A computer-implemented system includes one or multiple application devices and a voice-controlled storage device. Multiple voice commands may be issued to multiple application devices simultaneously or separately, or to the same application device separately. The voice-controlled storage device is configured to perform content identification and voiceprint recognition on the voice commands. Therefore, each requestor may be allowed to operate the voice-controlled storage device in a corresponding operation mode according to respective authorization level. | 11-28-2013 |
20140012586 | DETERMINING HOTWORD SUITABILITY - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for determining hotword suitability. In one aspect, a method includes receiving speech data that encodes a candidate hotword spoken by a user, evaluating the speech data or a transcription of the candidate hotword, using one or more predetermined criteria, generating a hotword suitability score for the candidate hotword based on evaluating the speech data or a transcription of the candidate hotword, using one or more predetermined criteria, and providing a representation of the hotword suitability score for display to the user. | 01-09-2014 |
20140032220 | Method and Apparatus for Responding to a Query at a Dialog System - A dialog system is accessed by a remote user and is typically configured to receive a natural language query from the user and return a natural language answer to the user. Dialog systems can be copied without authorization or can become an out-of-date version. A dialog system with a signature, referred to herein as a “signed” dialog system, can indicate the signature without affecting usage by users who are unaware that the dialog system contains the signature. The signed dialog system can respond to input such that only the designer of the dialog system knows the signature is embedded in the dialog system. The response is a way to check the source or other characteristics of the dialog system. A designer of signed dialog systems can prove whether an unauthorized copy of the signed dialog system is used by a third party by using publically-available user interfaces. | 01-30-2014 |
20140039897 | SYSTEM AND METHOD FOR AUTOMATED ADAPTATION AND IMPROVEMENT OF SPEAKER AUTHENTICATION IN A VOICE BIOMETRIC SYSTEM ENVIRONMENT - A system for automated adaptation and improvement of speaker authentication in a voice biometric system environment, comprising a speech sample collector, a target selector, a voice analyzer, a voice data modifier, and a call flow creator. The speech sample collector retrieves speech samples from a database of enrolled participants in a speaker authentication system. The target selector selects target users that will be used to test the speaker authentication system. The voice analyzer extracts a speech component data set from each of the speech samples. The call flow creator creates a plurality of call flows for testing the speaker authentication system, each call flow being either an impostor call flow or a legitimate call flow. The call flows created by the call flow creator are used to test the speaker authentication system. | 02-06-2014 |
20140095169 | VOICE AUTHENTICATION SYSTEM AND METHODS - A method for enrolling a user with a voice authentication system comprises obtaining a voice sample which has been used to authenticate a user using a first authentication process. The voice sample is subsequently utilised to enroll the user with an authentication system implementing a second authentication process. | 04-03-2014 |
20140172430 | SYSTEM AND METHOD FOR VOICE AUTHENTICATION - Embodiments of the invention provide for secure voice authentication through a communication device or access device. Certain embodiments allow for providing a word string to a communication device or authentication device. The communication or authentication device plays a supplemental signal that is unique to a transaction. The communication device or authentication device concurrently records an audio segment originating from the user and the supplemental signal. The audio segment is an attempt by the user to vocally reproduce the word string. The communication device or authentication device sends the concurrently recorded audio segment and supplemental signal, to a computer, where the computer authenticates the user. | 06-19-2014 |
20140188481 | SYSTEM AND METHOD FOR AUTOMATED ADAPTATION AND IMPROVEMENT OF SPEAKER AUTHENTICATION IN A VOICE BIOMETRIC SYSTEM ENVIRONMENT - A system for automated adaptation and improvement of speaker authentication in a voice biometric system environment, comprising a speech sample collector, a target selector, a voice analyzer, a voice data modifier, and a call flow creator. The speech sample collector retrieves speech samples from a database of enrolled participants in a speaker authentication system. The target selector selects target users that will be used to test the speaker authentication system. The voice analyzer extracts a speech component data set from each of the speech samples. The call flow creator creates a plurality of call flows for testing the speaker authentication system, each call flow being either an impostor call flow or a legitimate call flow. The call flows created by the call flow creator are used to test the speaker authentication system. | 07-03-2014 |
20140303983 | AUTHENTICATION FOR RECOGNITION SYSTEMS - Embodiments include a method, apparatus, and computer program product for authentication for speech recognition. The method can include sensing an authentication device with a target device. One or more decoded voice commands can be processed after verification of the authentication device by the target device. Further, one or more decoded voice commands can be executed by the target device. | 10-09-2014 |
20140330568 | SYSTEM AND METHOD FOR AUDITORY CAPTCHAS - Disclosed herein are systems, methods, and computer readable-media for performing an audible human verification. The method includes determining that a human verification is needed, presenting an audible challenge to a user which exploits a known issue with automatic speech recognition processes, receiving a response to the audible challenge, and verifying that a human provided the response. The known issue with automatic speech recognition processes can be recognition of a non-word, in which case the user can be asked to spell the recognized non-word. The known issue with automatic speech recognition processes can be differentiation of simultaneous input for multiple audio streams. Multiple audio streams contained in the audible challenge can be provided monaurally. Verifying that a human provided the response can include confirming the contents of one of the multiple audio streams. Audible human verification can be performed in combination with visual human verification. | 11-06-2014 |
20140365224 | ONE WAY SOUND - A method and a system for identity authentication are presented. In one example embodiment, audio data (e.g. a sound wave) may be received from a user. The audio data may be used to establish an identity of an entity to the user. The audio data may be stored at a storage location; and be presented to the user to establish the identity of the entity when the entity participates in an electronic communication with the user. In another example embodiment, a server (e.g., a web client or client application server) may present a plurality of audio files to a user; receive a user selection of selected audio data from the plurality of audio files; responsive to the user selection, the server may communicate, via a network, the selected audio data to another server. The selected audio data may be used as an identity authentication. | 12-11-2014 |
20140372127 | VOICE-CONTROLLED COMPUTER SYSTEM - A voice-controlled computer system comprising a headset with a heads up display (HUD). When the system requires a user to verbally enter a character of an alphanumeric security code the system presents to the user on the HUD a plurality of different pairs of alphanumeric characters each containing a first character and an associated (pseudo) randomly generated second character. The first character of one pair is the code character to be entered, but for security reasons the user is required to verbally enter the second character associated with the code character, not the code character itself. The system deciphers verbal entry of the associated second character as equivalent to entry of the first character. | 12-18-2014 |
20140372128 | SPEECH TRANSACTION PROCESSING - Embodiments of the invention are directed to systems and methods for speech transaction processing. A location of a device associated with a user may be determined. A reference to a voice model associated with the user stored within a database may be retrieved, based at least in part on the location. A voice segment may be received from the user. Using the reference, the voice segment may be compared to the voice model stored within the database. A determination may be made whether the user is authenticated for the transaction based on the comparing step. | 12-18-2014 |
20150039315 | System & Method for Controlling Access to Resources with a Spoken CAPTCHA Test - Systems and methods for controlling access to resources using spoken Completely Automatic Public Turing Tests To Tell Humans And Computers Apart (CAPTCHA) tests are disclosed. In these systems and methods, entities seeking access to resources are required to produce an input utterance that contains at least some audio. That utterance is compared with voice reference data for human and machine entities, and a determination is made as to whether the entity requesting access is a human or a machine. Access is then permitted or refused based on that determination. | 02-05-2015 |
20150051913 | UNLOCK METHOD USING NATURAL LANGUAGE PROCESSING AND TERMINAL FOR PERFORMING SAME - The present description relates to an unlock method and to a terminal for performing same, the unlock method being performed by a terminal that provides a lock function, the unlock method comprising: a step of displaying a voice input screen on a lock screen of the terminal; a step of taking, as an input, voice from a user; a step of performing natural language processing on the voice to acquire an object constituting the voice; a step of determining whether or not the object contains a passphrase for unlocking; and a step of unlocking the terminal or maintaining the terminal in the locked state depending on the result of the determination of whether the object contains the passphrase. | 02-19-2015 |
20150066512 | Method and Apparatus for Detecting Synthesized Speech - Computer systems employing speaker verification as a security approach to prevent un-authorized access by intruders may be tricked by a synthetic speech with voice characteristics similar to those of an authorized user of the computer system. According to at least one example embodiment, a method and corresponding apparatus for detecting a synthetic speech signal include extracting a plurality of speech features from multiple segments of the speech signal; analyzing the plurality of speech features to determine whether the plurality of speech features exhibit periodic variation behavior; and determining whether the speech signal is a synthetic speech signal or a natural speech signal based on whether or not a periodic variation behavior of the plurality of speech features is detected. The embodiments of synthetic speech detection result in security enhancement of the computer system employing speaker verification. | 03-05-2015 |
20150073807 | SYSTEM AND METOD FOR VOICE AUTHENTICATION OVER A COMPUTER NETWORK - Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, transmitting an authentication request to an authentication server, which compares the speech sample to a previously established speech profile associated with the user, receiving a response from the authentication server, and providing access to the restricted access resource based on the response. | 03-12-2015 |
20150302856 | METHOD AND APPARATUS FOR PERFORMING FUNCTION BY SPEECH INPUT - A method for performing a function in an electronic device is disclosed. The method may include receiving an input sound stream including a speech command indicative of the function and identifying the function from the speech command in the input sound stream. Further, the method may determine a security level associated with the speech command. It may be verified whether the input sound stream is indicative of a user authorized to perform the function based on the security level. In response to verifying that the input sound stream is indicative of the user, the function may be performed. | 10-22-2015 |
20160125884 | Utilizing Voice Biometrics - Methods, systems, computer-readable media, and apparatuses for utilizing voice biometrics to prevent unauthorized access are presented. In some embodiments, a computing device may receive a voice sample. Subsequently, the computing device may determine a voice biometric confidence score based on the voice sample. The computing device then may evaluate the voice biometric confidence score in combination with one or more other factors to identify an attempt to access an account without authorization. | 05-05-2016 |
20160148453 | VEHICLE ELECTRONIC KEY SYSTEM - A vehicle electronic key system for unlocking a vehicle includes an electronic key and a vehicle controlling device. The electronic key includes a first controller, a signal transmitting module configured to collet and transmit speech signals, and a wireless charging receiving coil configured to transmit electromagnetic signals to the first controller. The vehicle controlling device includes a second controller configured to authenticate the speech signals and unlock the vehicle, a signal receiving module configured to receive speech signals sent by the signal transmitting module and send the speech signals to the second controller, and a wireless charging transmitting coil configured to transmit the electromagnetic signals to the wireless charging receiving coil. The second controller is further configured to drive the wireless charging transmitting coil. The first controller is configured to convert the electromagnetic signals to electric energy and send the electric energy to the signal transmitting module. | 05-26-2016 |
20160254000 | Automated Digital Agreement Attestation & Electronic Signature Execution via Speech-Recognition | 09-01-2016 |
20160379644 | Voiceprint authentication method and apparatus - The present disclosure provides a voiceprint authentication method and a voiceprint authentication apparatus. The method includes: displaying a first character string to a user, in which the first character string includes a predilection character preset by the user, and the predilection character is displayed as a symbol corresponding to the predilection character in the first character string; obtaining a speech of the first character string read by the user; obtaining a first voiceprint identity vector of the speech of the first character string; comparing the first voiceprint identity vector with a second voiceprint identity vector registered by the user to determine a result of a voiceprint authentication. | 12-29-2016 |