摘要:
A biometrics security method and apparatus are disclosed that restrict the ability of a user to access a device or facility using a portion of biometric data to validate the user's identity. Upon a user request to access a secure device or facility, the central biometric security system initially sends a first request for a specific sample of a portion of the user's biometric information. The specific sample may be identified, for example, using a set of image coordinates. A second request is also sent to retrieve the biometric prototype from a database of registered users. The central biometric security system then compares the user biometrics portion with the corresponding biometrics prototype portions. The user receives access to the requested device if the user biometrics portion(s) matches the corresponding biometrics prototype portions. In one variation, the biometric security system transmits a security agent to the user's computing device upon a user request to access a remote device. The security agent serves to extract user biometric portions in accordance with the sampling request from the central biometric security system. In another variation, a local recognition is performed before a remote recognition to reduce the risk of a failed server side recognition due to a poor biometrics feature.
摘要:
A method and apparatus for securing access to a service or facility employing automatic speech recognition, text-independent speaker identification, natural language understanding techniques and additional dynamic and static features. The method includes the steps of receiving and decoding speech containing indicia of the speaker such as a name, address or customer number; accessing a database containing information on candidate speakers; questioning the speaker based on the information; receiving, decoding and verifying an answer to the question; obtaining a voice sample of the speaker and verifying the voice sample against a model; generating a score based on the answer and the voice sample; and granting access if the score is equal to or greater than a threshold. Alternatively, the method includes the steps of receiving and decoding speech containing indicia of the speaker; generating a sub-list of speaker candidates having indicia substantially matching the speaker; activating databases containing information about the speaker candidates in the sub-list; performing voice classification analysis; eliminating speaker candidates based on the voice classification analysis; questioning the speaker regarding the information; eliminating speaker candidates based on the answer; and iteratively repeating prior steps until one speaker candidate (in which case the speaker is granted access), or no speaker candidate remains (in which case the speaker is not granted access).
摘要:
Methods and apparatus are disclosed for transmitting data, such as biometric data or Internet telephone data, in a packet network Packets are split and interchanged prior to transmission across a packet network, such that packets that reach their destination may be processed, even in the presence of lost or delayed packets. Packets of biometric data, such as fingerprints, retinal scans or voice characteristics, or sampled voice packets are split, and optionally interchanged prior to transmission If some packets are lost or delayed, while some of the packets reach their destination and provide sufficient data for user identification, then the user may be authenticated without requesting the retransmission of the lost or delayed data If some packets are lost or delayed, while some packets reach their destination, then the received speech samples may be reproduced without requesting the retransmission of the lost or delayed data
摘要:
A global positioning system (GPS)-based access control method and apparatus are disclosed for limiting access to a device or secure facility by verifying the location of an authorized user. The GPS-based access control system confirms that the user requesting access to a device or secure location is physically present at the location of the device or secure location. Upon an access control request, the location of the user is obtained using an individual GPS system carried by each user on a portable device, such as a pocket token, computer-readable card, cellular telephone or watch. If the location of a person making an access control request does not coincide with the coordinates of the individual GPS that is being worn by the authorized user associated with the password, then the person requesting access is unauthorized.
摘要:
A method of controlling access of a speaker to one of a service and a facility, the method comprising the steps of: (a) receiving first spoken utterances of the speaker, the first spoken utterances containing indicia of the speaker;(b) decoding the first spoken utterances; (c) accessing a database corresponding to the decoded first spoken utterances, the database containing information attributable to a speaker candidate having indicia substantially similar to the speaker; (d) querying the speaker with at least one question based on the information contained in the accessed database; (e) receiving second spoken utterances of the speaker, the second spoken utterances being representative of at least one answer to the at least one question; (f) decoding the second spoken utterances; (g) verifying the accuracy of the decoded answer against the information contained in the accessed database serving as the basis for the question; (h) taking a voice sample from the utterances of the speaker and processing the voice sample against an acoustic model attributable to the speaker candidate; (i) generating a score corresponding to the accuracy of the decoded answer and the closeness of the match between the voice sample and the model; and (j) comparing the score to a predetermined threshold value and if the score is one of substantially equivalent to and above the threshold value, then permitting speaker access to one of the service and the facility.
摘要:
A method for recognizing an individual based on attributes associated with the individual comprises the steps of: pre-storing at least two distinctive attributes of the individual during at least one enrollment session; contemporaneously extracting the at least two distinctive attributes from the individual during a common recognition session; segmenting the pre-stored attributes and the extracted attributes according to a sequence of segmentation units; indexing the segmented pre-stored and extracted attributes so that the segmented pre-stored and extracted attributes corresponding to an identical segmentation unit in the sequence of segmentation units are associated to an identical index; and respectively comparing the segmented pre-stored and extracted attributes associated to the identical index to each other to recognize the individual.
摘要:
A telephone voice mail messaging system for performing recognition of characters included in a telephone message left by a caller includes: speaker recognition means, responsive to the telephone message, for extracting a voice model of the caller from the telephone message and comparing the voice model of the caller against a plurality of pre-obtained voice model's respectively associated with a plurality of potential callers to find a pre-obtained voice model from among the plurality of pre-obtained voice models that matches the voice model of the caller and, if the matching pre-obtained voice model is found, then the speaker recognition means identifying at least one pre-obtained set of characters attributed to a potential caller from among the plurality of potential callers associated with the matching pre-obtained voice model; character spotting means, responsive to the telephone message, for identifying sets of characters in the telephone message; and comparator means for comparing characters of the at least one pre-obtained set of characters identified by the speaker recognition means against characters of a set of characters identified by the character spotting means and, if the characters match, then outputting the characters of the at least one pre-obtained set of characters as representing the set of characters left by the caller as part of the telephone message.
摘要:
A method of controlling access of a speaker to one of a service and a facility, the method comprising the steps of: (a) receiving first spoken utterances of the speaker, the first spoken utterances containing indicia of the speaker; (b) decoding the first spoken utterances; (c) accessing a database corresponding to the decoded first spoken utterances, the database containing information attributable to a speaker candidate having indicia substantially similar to the speaker; (d) querying the speaker with at least one question based on the information contained in the accessed database; (e) receiving second spoken utterances of the speaker, the second spoken utterances being representative of at least one answer to the at least one question; (f) decoding the second spoken utterances; (g) verifying the accuracy of the decoded answer against the information contained in the accessed database serving as the basis for the question; (h) taking a voice sample from the utterances of the speaker and processing the voice sample against an acoustic model attributable to the speaker candidate; (i) generating a score corresponding to the accuracy of the decoded answer and the closeness of the match between the voice sample and the model; and (j) comparing the score to a predetermined threshold value and if the score is one of substantially equivalent to and above the threshold value, then permitting speaker access to one of the service and the facility.
摘要:
Apparatus for providing repetitive enrollment in a plurality of biometric recognition systems based on an initial enrollment is provided. The apparatus includes an extractor for extracting a biometric attribute from a user. Further, a server is included, operatively coupled to the extractor, for interfacing with the plurality of biometric recognition systems to receive requests for biometric attributes therefrom and transmit biometric attributes thereto. The server has a memory device for storing the biometric attribute.
摘要:
A portable speech signal preprocessing (SSP) device having a microphone for receiving spoken speech and background noise, a digital signal processor (DSP) for processing the received noise into feature vectors, a coupler for coupling to a communication device and for transmission over a communication channel. An automatic speech/speaker recognition (ASSR) server receives over the communication channel the preprocessed speech data and recognizes the spoken speech/speaker. A system having the portable SSP device and the ASSR server can be used to remotely activate, reset, or change PIN codes in smartcards, magnetic cards, or electronic money cards.