Abstract: Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
Abstract: In detection systems, such as speaker verification systems, for a given operating point range, with an associated detection “cost”, the detection cost is preferably reduced by essentially trading off the system error in the area of interest with areas essentially “outside” that interest. Among the advantages achieved thereby are higher optimization gain and better generalization. From a measurable Detection Error Tradeoff (DET) curve of the given detection system, a criterion is preferably derived, such that its minimization provably leads to detection cost reduction in the area of interest. The criterion allows for selective access to the slope and offset of the DET curve (a line in case of normally distributed detection scores, a curve approximated by mixture of Gaussians in case of other distributions). By modifying the slope of the DET curve, the behavior of the detection system is changed favorably with respect to the given area of interest.
Type:
Application
Filed:
September 8, 2008
Publication date:
January 1, 2009
Applicant:
International Business Machines Corporation
Abstract: Systems and methods providing for secure voice print authentication over a network are disclosed herein. During an enrollment stage, a client's voice is recorded and characteristics of the recording are used to create and store a voice print. When an enrolled client seeks access to secure information over a network, a sample voice recording is created. The sample voice recording is compared to at least one voice print. If a match is found, the client is authenticated and granted access to secure information. Systems and methods providing for a dual use voice analysis system are disclosed herein. Speech recognition is achieved by comparing characteristics of words spoken by a speaker to one or more templates of human language words. Speaker identification is achieved by comparing characteristics of a speaker's speech to one or more templates, or voice prints. The system is adapted to increase or decrease matching constraints depending on whether speaker identification or speaker recognition is desired.
Abstract: A speech control apparatus and a method thereof are provided. The speech control apparatus logs the user in an application software according to a speech signal of a user. The speech control apparatus is connected to a password bank comprising a plurality of accounts and passwords. The speech control apparatus comprises a speech process module, a start module, a first receive module, an identity recognition module, a selection module, and a login module. The speech process module determines a meaning of the speech signal. The start module starts the application software according to the meaning of the speech signal. The first receiving module receives the biometrics feature of the user. The identity recognition module identifies the user as authorized according to the biometrics feature. The selection module selects a login set of account and password from the password bank according to the speech signal and the biometrics feature.
Type:
Application
Filed:
June 19, 2007
Publication date:
September 11, 2008
Applicant:
Arachnoid Biometrics Identification Group Corp
Abstract: A telephonic authentication system, method and program product. An authentication system is provided for authenticating a user of a telephonic device that includes a setup system for capturing and storing an authentic user speech pattern sample; a comparison system that compares the authentic user speech pattern sample with an inputted speech pattern sample and generates a comparison result; and a control system for controlling access to the telephonic device. The control system analyzes the comparison result for an initial inputted speech pattern sample received when a telephone call is initiated and periodically analyzes comparison results for ongoing inputted speech pattern samples received during the telephone call.
Type:
Application
Filed:
February 8, 2007
Publication date:
August 14, 2008
Inventors:
Jonghae Kim, Moon J. Kim, Eric T. C. Yee
Abstract: A method with an information processing system manages a user transaction request associated with a domain name based on an authentication status of a user. The method comprises receiving a request from a user for a transaction associated with a domain name. A voice confirmation user interface is presented to the user and user authentication information, such as spoken user authentication information from the user, is collected. The user authentication information is communicated to an information processing system. An authentication status associated with the user is received from the information processing system. The method also includes determining to allow the request from the user for the transaction associated with the domain name based at least in part on the received authentication status.
Abstract: The invention is a system and method for accessing premises utilizing speech recognition technology. By presenting an audible set of options, recognizing words, phrases, or numbers, from a first speech source and then presenting an audible set of options until a final command has been recognized, a wired or wireless conversation may be established. The conversation may be between the first speech source and a second speech source originating within the premises or from a remote location, wherein the second speech source may send a command, generating an opening signal to a movable barrier operator via said communication, granting access to the premises.