摘要:
A system and method for identifying an individual includes collecting biometric information for an individual attempting to gain access to a system. The biometric information for the individual is scored against pre-trained imposter models. If a score is greater than a threshold, the individual as an imposter is identified as an imposter. Other systems and methods are also disclosed.
摘要:
A system and method for determining and authenticating a person's identity by generating a behavioral profile for that person by presenting that person with various stimulus and measuring that person's response characteristics in an enrollment stage. That person's response profile, once generated is stored. When that user subsequently needs to access a secure resource, that user to be authorized is presented with the stimulus that was presented at the time of generating that person's behavioral profile and the person's responses are detected and compared to his/her behavioral profile. If a match is detected, that user is identified. The user's behavioral response may be in the form of signals as detected by sensor means that detects visual or audible emotional cues or as signals resulting from that person's behavior as detected by polygraph or EEG devices.
摘要:
User interaction management techniques are disclosed. In a first aspect of the invention, an automated technique for managing interaction between a user and a system includes the following steps/operations. A skill level of a user accessing the system is determined. Then, a user interaction profile is modified based on the determined skill level of the user. In a second aspect of the invention, an automated technique for generating a skill level classifier for use in classifying users interacting with a system includes the following steps/operations. Input from multiple users having various skill levels is obtained. Then, a classifier is trained using the obtained input from the multiple users such that the classifier automatically detects in which category of interaction skills a subsequent user belongs. In a third aspect of the invention, an automated technique for adapting a classifier for use in classifying users interacting with a system includes the following steps/operations. One or more behaviors associated with a user are observed as the user interacts with the system. Then, the classifier is adapted based on the one or more observed behaviors of the user.
摘要:
There is provided an apparatus for providing a Text Independent (TI) speaker recognition mode in a Text Dependent (TD) Hidden Markov Model (HMM) speaker recognition system and/or a Text Constrained (TC) HMM speaker recognition system. The apparatus includes a Gaussian Mixture Model (GMM) generator and a Gaussian weight normalizer. The GMM generator is for creating a GMM by pooling Gaussians from a plurality of HMM states. The Gaussian weight normalizer is for normalizing Gaussian weights with respect to the plurality of HMM states.
摘要:
An authentication framework is provided which enables dynamic user authentication that combines multiple authentication objects using a shared context and that permits customizable interaction design to suit varying user preferences and transaction/application requirements. Such a framework provides a high degree of flexibility, accuracy, convenience and robustness. In one illustrative aspect of the invention, an automated technique for user authentication comprises the following steps/operations. First, user input is obtained. At least a portion of the user input is associated with two or more verification objects. Then, the user is verified based on the two or more verification objects in accordance with at least one verification policy operating on a context shared across the two or more verification objects. The user authentication technique of the invention may preferably be implemented in a flexible, distributed architecture comprising at least one client device coupled to at least one verification server. The client device and the verification server may operate together to perform the user authentication techniques of the invention.
摘要:
Methods and apparatus are provided for sequential authentication of a user that employ one or more error rates characterizing each security challenge. According to one aspect of the invention, a user is challenged with at least one knowledge challenge to obtain an intermediate authentication result; and the user challenges continue until a cumulative authentication result satisfies one or more criteria. The intermediate authentication result is based, for example, on one or more of false accept and false reject error probabilities for each knowledge challenge. A false accept error probability describes a probability of a different user answering the knowledge challenge correctly. A false reject error probability describes a probability of a genuine user not answering the knowledge challenge correctly. The false accept and false reject error probabilities can be adapted based on field data or known information about a given challenge.
摘要:
A method and apparatus for remote access to a target application is disclosed where a system administrator may establish telephonic contact with an interactive voice response system and obtain access to the target application by speech communication. The interactive response system may authenticate the system administrator by implementing various measures including biometric measures. Once access is granted, the interactive response system may broker a communication between the target application using text/data and the system administrator using natural language.
摘要:
In large-scale deployments of speaker recognition systems the potential for legacy problems increases as the evolving technology may require configuration changes in the system thus invalidating already existing user voice accounts. Unless the entire database of original speech waveform were stored, users need to reenroll to keep their accounts functional, which, however, may be expensive and commercially not acceptable. Model migration is defined as a conversion of obsolete models to new-configuration models without additional data and waveform requirements. The present disclosure investigates ways to achieve such a migration with minimum loss of system accuracy.
摘要:
Methods and arrangements for assessing the identity of an individual. Input is accepted from an individual, and at least one user group is attributed to the individual. This attributing is repeated until the identity of the individual is assessed.
摘要:
A method, system and program storage device are provided for machine diagnostics, detection and profiling using pressure waves, the method including profiling known sources, acquiring pressure wave data, analyzing the acquired pressure wave data, and detecting if the analyzed pressure wave data matches a profiled known source; the system including a processor, a pressure wave transducer in signal communication with the processor, a pressure wave analysis unit in signal communication with the processor, and a source or threat detection unit in signal communication with the processor; and the program storage device including program steps for profiling known sources, acquiring pressure wave data, analyzing the acquired pressure wave data, and detecting if the analyzed pressure wave data matches a profiled known source.