Data network with voice verification means
    261.
    发明公开
    Data network with voice verification means 失效
    具有语音验证手段的数据网络

    公开(公告)号:EP0823701A3

    公开(公告)日:1998-09-30

    申请号:EP97305924.9

    申请日:1997-08-05

    Abstract: A technique for verifying a user's voice prior to permitting the user to conduct a business transaction over a data network is disclosed. An order is received via the data network, and a voice verification unit is contacted to (i) access a prestored voice print, (ii) obtain a present voice sample from the consumer desiring the transaction and compare said present voice sample to the prestored voice sample, and (iii) issue a signal indicating whether or not the voice correctly verifies or not.

    Abstract translation: 公开了一种在允许用户通过数据网络进行商业交易之前验证用户语音的技术。 通过数据网络接收订单,并且联系话音验证单元以(i)访问预先存储的声纹,(ii)从期望交易的消费者处获得当前声音采样,并将所述当前声音采样与预存储的声音进行比较 样本,并且(iii)发出指示语音是否正确验证的信号。

    METHODS AND SYSTEMS FOR AUTOMATIC DISCOVERY OF FRAUDULENT CALLS USING SPEAKER RECOGNITION

    公开(公告)号:US20240195905A1

    公开(公告)日:2024-06-13

    申请号:US18581804

    申请日:2024-02-20

    CPC classification number: H04M1/67 G10L17/00 H04M3/385 H04M2201/41

    Abstract: A method for determining potentially undesirable voices, in embodiments, includes: receiving audio recordings comprising voices associated with undesirable activity, and determining audio components of each of the audio recordings. The method may further comprise generating a multi-dimensional vector of the audio components for each of the plurality of audio recordings, and comparing audio components between the multi-dimensional vectors to determine clusters of multi-dimensional vectors, each cluster comprising two or more of the multi-dimensional vectors of audio components, wherein each cluster corresponds to a blacklisted voice. The method may further comprise receiving an audio recording or audio stream, and determining whether the audio recording or audio stream is associated with a voice associated with undesirable activity based on a comparison to the clusters.

    Voice command security and authorization in user computing devices

    公开(公告)号:US11757871B1

    公开(公告)日:2023-09-12

    申请号:US17374381

    申请日:2021-07-13

    Inventor: Darshan Shah

    Abstract: Techniques described herein include receiving, authorizing, and processing voice commands to control computing devices and perform various device capabilities. In some examples, a user computing device may implement voice command functionality using multiple independent components, with shared security credentials established between different combinations of components. An intermediate voice authorization component may receive and compare voice input data received from a user interface component with voice template data stored securely by a voice data component, to protect against a component becoming compromised by malware or exposure to an untrusted system. Voice commands may be used to execute, disable, or enable various capabilities on the user device, including different device applications and features, and may be authorized by different users with various security and authorization techniques.

Patent Agency Ranking