Method and apparatus for enrolling a user for voice recognition

Data processing: speech signal processing – linguistics – language – Speech signal processing – Recognition

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C704S273000

Reexamination Certificate

active

06681205

ABSTRACT:

FIELD OF THE INVENTION
The present invention is related to computer software and more specifically to computer software for voice recognition.
BACKGROUND OF THE INVENTION
Many computer systems allow access based on a password. A user of the system identifies himself or herself as having an account on the computer system using a user identifier, such as an account number, and a password. If the user does not enter the correct password for the account, access to the system is denied. Passwords can work well for systems to which a user is connected using a keyboard or keypad. However, because passwords can be surreptitiously obtained by unauthorized users, passwords cannot completely prevent access by unauthorized users, particularly where interception of such passwords is possible.
Conventional speech recognition techniques may be employed to identify a user of a computer system in a manner that can be more secure than passwords entered from a keyboard or keypad of a telephone. The user of the system can speak or enter an account number on a touch-tone telephone keypad and speak a password. Speaker dependent voice recognition techniques can be used in place of a keyed-in password to verify the caller's identity. The spoken password is matched against a database of spoken passwords to identify if the way the user spoke the password matches the way that user spoke that password during an enrollment process in which the user's identity was verified.
However, speaking a password makes people feel uncomfortable. First, the user may feel uncomfortable speaking the password with others present. Users tend to reuse passwords from one system to another. Even though someone intercepting the password would find it difficult to use it to gain access to the system that verifies the user's voice using voice recognition, the same password could be used to gain entry using another non-voice-verified application. The user could select a password that he or she does not use on other systems, but passwords in general are frequently forgotten, and such a password would be even more likely to be forgotten.
One alternative to voice verification of a password is to use a challenge and response system. After the user enters his or her account number, the system randomly selects a word or phrase that the user is prompted to speak. This allows the system to verify the user's identity without requiring a user to speak an otherwise secret password or even remember any password. However, to properly verify the identity of a user, a lengthy enrollment procedure is often required to allow the user to speak all of the sounds that he or she could be required to speak when responding to a challenge phrase. Users often find such enrollment cumbersome, especially where the words are not logically connected. Without requiring a sufficiently thorough enrollment procedure, accuracy of verification or security of the system can be compromised.
Where it is possible to have multiple users sharing a single account, speaker verification enrollment techniques are further complicated by requiring the user to identify himself or herself using an identifier that is in addition to the account number. For example, if a husband and wife share a brokerage account, during enrollment, each could be prompted to key into a touch-tone telephone keypad the account number and his or her own social security number. However, this would lengthen an enrollment process that for some users is too lengthy no matter how long it is.
What is needed is a method and apparatus that can enroll a user for an accurate and secure voice recognition speaker verification system that does not require the user to remember or speak a secret password and uses a short enrollment process, even for accounts with multiple users.
SUMMARY OF INVENTION
A method and apparatus enrolls a user for a challenge and response speaker verification system by first requesting the user speak or enter an account number, then requesting the user to speak a number that is known to the user, such as a social security number or other identifier. The spoken social security number can be recognized using speaker independent voice recognition to distinguish between multiple users sharing the same account number. In addition, the spoken social security number is used to extract a voiceprint for the user. The user is prompted to speak a set of additional sequences of numbers generated so that the social security number already spoken and the set of additional sequences includes all of the decimal digits 0-9 a minimum number of times (e.g. three) to provide a complete enrollment record of how a user speaks each decimal digit. A challenge and response procedure can then use a string of decimal digits to provide secure and accurate speaker verification.


REFERENCES:
patent: 5897616 (1999-04-01), Kanevsky et al.
Dr. Bruno Beek et al.; Speaker Authentication and Voice Data Entry; pp. 266-273; 1978.*
“Hands on with . . . Glenview State Bank,”VoiceID Quarterly, Jul. 1998, pp. 1&5. v. 2, Issue 3.
“Rapid Fire,”VoiceID Quarterly, Jul. 1999, pp. 1-7, v. 3, Issue 3.
“Notes: Speaker Verification at InTrust Bank,” May 22, 1998.
Betsy Wexler, “Notes from Glenview State Bank.”
Randy Goldberg, “Automated Speaker Verification,” presented of AT&T Laboratories—Applied Speech Technology Group to Charles Schwab, Oct. 5, 1998, pp. 1-6.
Telematics Applications Programme, “Cave,” May 29, 1998, http://guagua.echo.lu/langeng/en/le1/cave, pp. 1 &1-7.
“Voice Venders Design Systems for Customers Banking on Security,”Voice Technology&Service News, Dec. 9, 1997, pp. 4-5.
“In Touch introduces telecommunications assistant,”Speech Recognition Update, Dec. 1997, p. 5.
Nuance Communications, “Nuance Verifier,” May 13, 1998, pp. 2-10.
T-Netix, Inc., “T-Netix,” May 14, 1998, http://www.ctaonline.com/tnetix.htm#aa, pp. 1-33.
Tami Luhby, “In Apparent First, Bank to ID Customers by Voice,”American Banker, Jul. 10, 1997.
Richard Mammone, “Your Voiceprint Will Be Your Key,”Speech Technology On Line, 01-Feb. 1998, http://www.speechtechmag.com/st11/voicekey.htm, pp. 1-7.
T.C. Phipps & R.A. King, “Biometric in Less Than 40 Bytes,”Speech Technology On Line, 10-Nov. 1997, http://www.speechtechmag.com/st10/40bytes.htm, pp. 1-6.
“Knock, Knock: Who's There?”Speech Technology On Line, Aug. 9, 1997, http://www.speechtechmag.com/st09/knckknck.htm, pp. 1-4.
Frank Smead, “Know the Difference Between Recognition and Verification,”Speech Technology On Line, Jun. 7, 1998, http://www.speechtechmag.com/st08/knowdiff.htm, p. 1.
“New Speaker Verification API is Announced,”Speech Technology On Line, Jun. 7, 1997, http://www.speechtechmag.com/st08/svapi.htm, pp. 1-2.
Elizabeth Boyle, “Why Your Bank Needs to Hear Your Voice,”Speech Technology On Line, Jun. 7, 1997, http://www.speechtechmag.com/st08/bankhear.htm, pp. 1-3.
Graeme Kinsey, “Voice Verifies Your Money is Safe,”Speech Technology On Line, Oct. 11, 1996, http://www.sppechtechmag.com/st05/voicverf.htm, pp. 1-5.
T-Netix, Inc., “Performance Practicalities,” 1998, pp. 109, 145-169, 178a-e, 299-308.
Maarten Willems, “Telephones Present a New Face,”Speech Technology, Jun. 7, 1998, pp. 16, 18-24.
Judith Markowitz,“Surveying the Territory,”Speech Technology, Aug. 9, 1998, pp. 24.
“IBM Talks Up New ViaVoice Technologies”,Wall Street&Technology, May 1999, p. 16.
Laure Edwards, “Its Listens, and Understands,”Wall Street&Technology, Nov. 1998, pp. 22-23.
Jennifer Tomaro, “Timemac Selects Integrated EIC/Nuance Solution,”Computer Telephony, Dec. 20, 1999, http://www.telecomlibrary.com/content
ews/122099.timemac.html, pp. 1-2.
“Edify Releases Electronic Workforce 6.1,”Computer Telephony, Jul. 30, 1999, http://www.telecomlibrary.com/content
ews/edify5.html, pp. 1-2.
Brandon Friesen & John Jainschigg, “Business Neurology 101,”Computer Telephony, Jun. 1999, http://www.telecomlibrary.com/db_area/archives/ComputerTelepho . . . /Business_1_2072.ht, pp. 1-14.
Ellen Muraskin, “Speech Rec,”Computer Telephony, May 1999, http://www.telecomlibrary.com/db_area/archives/ComputerTelephon

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for enrolling a user for voice recognition does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for enrolling a user for voice recognition, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for enrolling a user for voice recognition will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3243466

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.