摘要:
A method, system and program storage device are provided for machine diagnostics, detection and profiling using pressure waves, the method including profiling known sources, acquiring pressure wave data, analyzing the acquired pressure wave data, and detecting if the analyzed pressure wave data matches a profiled known source; the system including a processor, a pressure wave transducer in signal communication with the processor, a pressure wave analysis unit in signal communication with the processor, and a source or threat detection unit in signal communication with the processor; and the program storage device including program steps for profiling known sources, acquiring pressure wave data, analyzing the acquired pressure wave data, and detecting if the analyzed pressure wave data matches a profiled known source.
摘要:
Methods and apparatus are provided for sequential authentication of a user that employ one or more error rates characterizing each security challenge. According to one aspect of the invention, a user is challenged with at least one knowledge challenge to obtain an intermediate authentication result; and the user challenges continue until a cumulative authentication result satisfies one or more criteria. The intermediate authentication result is based, for example, on one or more of false accept and false reject error probabilities for each knowledge challenge. A false accept error probability describes a probability of a different user answering the knowledge challenge correctly. A false reject error probability describes a probability of a genuine user not answering the knowledge challenge correctly. The false accept and false reject error probabilities can be adapted based on field data or known information about a given challenge.
摘要:
A method and system for speaker recognition and identification includes transforming features of a speaker utterance in a first condition state to match a second condition state and provide a transformed utterance. A discriminative criterion is used to generate a transform that maps an utterance to obtain a computed result. The discriminative criterion is maximized over a plurality of speakers to obtain a best transform for recognizing speech and/or identifying a speaker under the second condition state. Speech recognition and speaker identity may be determined by employing the best transform for decoding speech to reduce channel mismatch.
摘要:
There is provided an apparatus for providing a Text Independent (TI) speaker recognition mode in a Text Dependent (TD) Hidden Markov Model (HMM) speaker recognition system and/or a Text Constrained (TC) HMM speaker recognition system. The apparatus includes a Gaussian Mixture Model (GMM) generator and a Gaussian weight normalizer. The GMM generator is for creating a GMM by pooling Gaussians from a plurality of HMM states. The Gaussian weight normalizer is for normalizing Gaussian weights with respect to the plurality of HMM states.
摘要:
Methods and arrangements for assessing the identity of an individual. Input is accepted from an individual, and at least one user group is attributed to the individual. This attributing is repeated until the identity of the individual is assessed.
摘要:
A system and method for determining and authenticating a person's identity by generating a behavioral profile for that person by presenting that person with various stimulus and measuring that person's response characteristics in an enrollment stage. That person's response profile, once generated is stored. When that user subsequently needs to access a secure resource, that user to be authorized is presented with the stimulus that was presented at the time of generating that person's behavioral profile and the person's responses are detected and compared to his/her behavioral profile. If a match is detected, that user is identified. The user's behavioral response may be in the form of signals as detected by sensor means that detects visual or audible emotional cues or as signals resulting from that person's behavior as detected by polygraph or EEG devices.
摘要:
In large-scale deployments of speaker recognition systems the potential for legacy problems increases as the evolving technology may require configuration changes in the system thus invalidating already existing user voice accounts. Unless the entire database of original speech waveform were stored, users need to reenroll to keep their accounts functional, which, however, may be expensive and commercially not acceptable. Model migration is defined as a conversion of obsolete models to new-configuration models without additional data and waveform requirements. The present disclosure investigates ways to achieve such a migration with minimum loss of system accuracy.
摘要:
A method and apparatus for remote access to a target application is disclosed where a system administrator may establish telephonic contact with an interactive voice response system and obtain access to the target application by speech communication. The interactive response system may authenticate the system administrator by implementing various measures including biometric measures. Once access is granted, the interactive response system may broker a communication between the target application using text/data and the system administrator using natural language.
摘要:
A system and method for identifying an individual includes collecting biometric information for an individual attempting to gain access to a system. The biometric information for the individual is scored against pre-trained imposter models. If a score is greater than a threshold, the individual as an imposter is identified as an imposter. Other systems and methods are also disclosed.
摘要:
A system, method and computer program product for performing blind change detection audio segmentation that combines hypothesized boundaries from several segmentation algorithms to achieve the final segmentation of the audio stream. Automatic segmentation of the audio streams according to the system and method of the invention may be used for many applications like speech recognition, speaker recognition, audio data mining, online audio indexing, and information retrieval systems, where the actual boundaries of the audio segments are required.