Voice print identification portal

a voice authentication and print technology, applied in the field of voice authentication, can solve the problems of increasing the security concerns of the use of computers, the limitations of existing systems, and the difficulty of successfully achieving voice authentication over speech recognition,

Inactive Publication Date: 2008-10-16
VOICEIT TECH
View PDF26 Cites 319 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0014]In an embodiment, a system for securely authenticating a client seeking access to secure information available through a network is described herein. In an embodiment, the system includes a back-end computer system adapted to manage and control access to secure information. In an embodiment, the system includes a front-end interface, adapted to provide the client with access to the back-end computer system. In an embodiment, the system includes a voice analysis computer system, adapted to verify a client's identity based on a voice sample. In an embodiment, the front-end interface is adapted to provide the client with the ability to record a client voice sample and communicate the client's voice sample to the voice analysis computer system. In an embodiment, the voice analysis computer system is adapted to compare the received client's voice sample to at least one voice print and authenticate the client based at least in part on the comparison. In an embodiment, the voice analysis computer system is adapted to communicate an indication of authentication. In an embodiment, the sample voice recording of the client is the only information originating from the client that is used to authenticate the client.

Problems solved by technology

However, voice authentication is much more difficult to successfully achieve than speech recognition.
Second, speaker identification requires matching the speaker to a much larger number of possibilities, because one person must be identified out of many, not just what word they spoke.
Due to these differing requirements, existing systems (including computer hardware, software, or both) have been limited to performing one of these two functions.
Along with the rise of the use of technology to conduct everyday life, security concerns with the use of computers have risen dramatically due to identity theft.
Identity theft typically occurs where personal information such as bank accounts, social security numbers, passwords, identification numbers .
However, when a customer enters in information (before it is transferred) at the front-end side of the transaction, the information is highly vulnerable to theft.
In fact, in most cases of identity theft, personal information is stolen from the front-end side of the transaction.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice print identification portal
  • Voice print identification portal
  • Voice print identification portal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]FIG. 1 illustrates generally a block diagram example of a typical transaction over a network. According to the example of FIG. 1, client 106 seeks to communicate with a business over a network such as the internet. To communicate, client 106 uses a front-end interface 101. Front-end interface 101 may be any means with which a client may access content available over a network. A client may access a front-end interface 101 through any commonly known network access device such as, but not limited to, a computer, a Smartphone, or a PDA. Client 106, through front-end interface 101, communicates with back-end computer system 102. Back-end computer system 102 may include a back-end server 107.

[0032]According to the example illustrated in FIG. 1, front-end interface 101 communicates with back-end computer system 102 through connection 104. A typical transaction usually includes authentication of client 106 by back-end computer system 102. Often, authentication is achieved through cli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems and methods providing for secure voice print authentication over a network are disclosed herein. During an enrollment stage, a client's voice is recorded and characteristics of the recording are used to create and store a voice print. When an enrolled client seeks access to secure information over a network, a sample voice recording is created. The sample voice recording is compared to at least one voice print. If a match is found, the client is authenticated and granted access to secure information.
Systems and methods providing for a dual use voice analysis system are disclosed herein. Speech recognition is achieved by comparing characteristics of words spoken by a speaker to one or more templates of human language words. Speaker identification is achieved by comparing characteristics of a speaker's speech to one or more templates, or voice prints. The system is adapted to increase or decrease matching constraints depending on whether speaker identification or speaker recognition is desired.

Description

RELATED APPLICATIONS[0001]The present invention claims priority to U.S. Provisional Patent Application No. 60 / 894,627, entitled “VOICE PRINT IDENTIFICATION PORTAL,” filed Mar. 13, 2007 which is hereby incorporated by reference.FIELD OF THE INVENTION[0002]The present invention relates generally to system access control based on user identification by biometric acquisition and speech signal processing for word recognition. More particularly, the present invention relates to combining voice based biometric identification for securing various computer related devices and speech recognition for device control and automated entry of information.BACKGROUND[0003]The field of processing voice signals for use within a computerized device has traditionally been split into two distinct fields, speaker identification and speech recognition. These two fields have historically required separate and uniquely designed and configured systems. These systems are often provided by different vendors[0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/00G10L11/00G10L15/26G10L17/00
CPCG06F21/32H04L63/0861G10L17/00G10L15/26G10L17/06
Inventor GROVER, NOEL J.
Owner VOICEIT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products