AU8125198A - Access-controlled computer system with automatic speech recognition - Google Patents
Access-controlled computer system with automatic speech recognition Download PDFInfo
- Publication number
- AU8125198A AU8125198A AU81251/98A AU8125198A AU8125198A AU 8125198 A AU8125198 A AU 8125198A AU 81251/98 A AU81251/98 A AU 81251/98A AU 8125198 A AU8125198 A AU 8125198A AU 8125198 A AU8125198 A AU 8125198A
- Authority
- AU
- Australia
- Prior art keywords
- user
- specific
- speech
- identification
- computer system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000012795 verification Methods 0.000 claims description 59
- 238000000034 method Methods 0.000 claims description 34
- 230000006978 adaptation Effects 0.000 claims description 9
- 238000012986 modification Methods 0.000 claims description 5
- 230000004048 modification Effects 0.000 claims description 5
- 239000003112 inhibitor Substances 0.000 claims 2
- 238000012544 monitoring process Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 8
- 230000001419 dependent effect Effects 0.000 description 6
- 238000013475 authorization Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/16—Sound input; Sound output
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
Description
WO 99/00719 PCT/IB98/01110 ACCESS-CONTROLLED COMPUTER SYSTEM WITH AUTOMATIC SPEECH RECOGNITION 5 Technical Field The present invention relates to access-controlled computer systems, and more particularly to such systems with automatic speech recognition. 10 Summary of the Invention In accordance with a preferred embodiment of the present invention, there is provided a computer system for operation based on text inputs derived from automatic recognition of speech of a plurality of users providing spoken inputs. In this embodiment the system has a plurality of speech 15 enabled terminals, each terminal for receiving speech from a user. An identification comparator compares a non-keyboard user identification provided by a specific user with data stored in a user identification data base to determine if the specific user is an authorized user. Additionally, an automatic speech recognizer derives text from speech provided by the specific 20 user at a given one of the speech-enabled terminals. A profile loader is provided to load a user-specific profile pertinent to the specific user into the automatic speech recognizer; and, finally, a system access provider provides computing access to the specific user if determined to be authorized by the identification comparator. 25 In further embodiments, the non-keyboard user identification is spoken by the specific user or alternatively contained in a digitally encoded card presented by the specific user. When the user identification is spoken, the user identification database may contain voice prints of authorized users, and 1 WO 99/00719 PCT/IB98/01110 the identification comparator compares a voice print derived from the spoken user identification with voice prints in the user identification database. Alternatively, or in addition, the user identification database may contain passwords of authorized users and the spoken user identification is a 5 password; the user identification database may optionally store the passwords as text derived from utterances using automatic speech recognition. In a further embodiment, each speech-enabled terminal is coupled to a telephone line permitting a user to access the computer system by telephone. Alternatively, or in addition, each speech-enabled terminal is associated with a 10 separate local processor and a local automatic speech recognizer. Also in a further embodiment, the system may additionally include a user verification comparator for comparing a user verification provided by the specific user with data stored in a user verification data base to verify the identity of the specific user as an authorized user. In this embodiment, the 15 system access provider provides computing access to the specific user only if the identity of the specific user has been verified as an authorized user by the verification comparator. The user verification may be spoken by the specific user, or alternatively may, for example, be entered by means of a keyboard or by other non-keyboard means. 20 In accordance with another embodiment of the present invention, there is provided a method for providing access to a computer system that has an automatic speech recognizer and operates based on text inputs derived from automatic recognition of speech from a plurality of users provided via a plurality of speech-enabled terminals. In this embodiment, the access is 25 provided to a specific user at a given one of the speech-enabled terminals. The method includes the following steps: a. receiving a non-keyboard user identification provided by the specific user; 2 WO 99/00719 PCT/IB98/01110 b. comparing the user identification with data stored in a user identification data base to determine whether the specific user is an authorized user; and c. if the specific user has been determined to be an authorized user, 5 i. loading a user-specific profile into the automatic speech recognizer that is pertinent to the specific user; and ii. providing access to the system to the specific user via the given speech-enabled terminal. Further and related embodiments include the steps of receiving a user verification provided by the specific user and 10 comparing the user verification with data stored in a user verification data base to verify the identity of the specific user as an authorized user. In this embodiment, the step of providing access to the system to the specific user is performed only if the identity of the specific user has been verified as an authorized user. The user identification and the user verification may be 15 implemented as discussed above. In another embodiment of the present invention, there is provided a method for providing access by a plurality of users to a computer system having automatic recognition of speech provided at a plurality of speech enabled terminals. The method includes the steps of 20 a. generating a prompt for a spoken user identification over one of the plurality of speech-enabled terminals; b. comparing the spoken user identification with data stored in a user identification data base to determine if the user is an authorized user; c. providing an automatic speech recognizer for deriving text from 25 speech provided at a speech-enabled terminal; d. loading user-specific profiles pertinent to a user who has been determined to be authorized into the automatic speech recognizer; and 3 WO 99/00719 PCT/IB98/01110 e. providing access to the system to a user who has been determined to be authorized. Brief Description of the Drawings 5 The foregoing aspects of the invention will be more readily understood by reference to the following detailed description taken with the accompanying drawings in which: Fig. 1 is a block diagram of a system to which the present invention is applicable; 10 Fig. 2 is a block diagram of a method in accordance with a preferred embodiment of the invention; Fig. 3 is a block diagram of a method, similar to that of Fig. 2, but also providing user verification; and Fig. 4 is a block diagram of a preferred embodiment of a system in 15 accordance with a preferred embodiment of the invention corresponding generally to the method of Fig. 3. Detailed Description of Specific Embodiments Fig. 1 is a block diagram of a system to which the present invention is 20 applicable. A computer system 11 has a plurality of speech-enabled terminals 131, 132, ... 133 to accommodate up to an arbitrary number n of users. The computer system includes an automatic speech recognizer 12. The speech recognizer may be hard wired or it may be implemented as a process running in the computer system 11. The computer system may include a general 25 purpose computer in which the process is defined by a computer program loaded into the computer. Each of the speech-enabled terminals 131, 132, .. 133 may be associated with a separate local processor; in such a configuration, each local processor may be associated with a local automatic speech 4 WO 99/00719 PCT/IB98/01110 recognizer. The local automatic speech recognizer may, but need not necessarily, be implemented as a process running in the local processor. Each of the speech-enabled terminals 131, 132, ... 133 may also (or alternatively) be coupled to a telephone line permitting a user to access the computer 5 system by telephone. Fig. 2 is a block diagram of a method, in accordance with a preferred embodiment of the invention, for providing access by a plurality of users to a computer system having automatic recognition of speech provided at a plurality of speech-enabled terminals. In accordance with step 21, a non 10 keyboard user identification is provided over one of the speech-enabled terminals 131, 132, ... 133 of Fig. 1. The user identification may, for example, be spoken via microphone or be contained in a digitally encoded card presented by the user to a card reader. In accordance with step 22, the user identification is compared with data stored in a user identification data base 15 to determine if the user is an authorized user. In one embodiment, the user identification database contains voice prints of authorized users, and in step 22, the comparison is between a voice print derived from the spoken user identification with voice prints in the user identification database. Alternatively, or in addition, the user identification database contains 20 passwords of authorized users and the spoken user identification is a password; in such a case, the spoken input may be processed initially by a speech recognizer associated with the system. If in step 23, the comparison shows that there is not a match, and if in step 24 the match has not failed three times, the method permits the receipt of a new user identification in 25 step 21, and the comparison of step 22 is reinitiated. If in step 24 the match has failed three times, the method terminates in step 27. If there is a match, then in step 25, a user-specific profile is loaded for automatic speech recognition of the user who has been determined to be authorized. In step 26, 5 WO 99/00719 PCT/IB98/01110 access to the system is provided to the user who has been determined to be authorized. It will be appreciated that the level of access to the system may be controlled on a user-by-user basis in accordance with standard techniques known in the art for computer networks; thus the level of access by a user to 5 the system may be subject to control, and the user will be given the level of access for which the system has been configured to provide to such user. Fig. 3 is a block diagram of a method, similar to that of Fig. 2, but also providing user verification. Steps 31, 32, 33, 34, 35, 36 and 37 of Fig. 3 are comparable to steps 21, 22, 23, 24, 25, 26, and 27 of Fig. 2 previously 10 discussed. However, if a user identification has been matched as a result of the comparison step 32, the method next proceeds with a user verification procedure. In step 381, the user verification is received. Such a verification may be spoken, or alternatively may be entered by keyboard, or may be provided by other non-keyboard arrangements. In step 382, the user 15 verification is compared with data in a user verification data base. If there is a match in step 383, then the user-specific profile for automatic speech recognition is loaded into the recognizer (step 35), and computing access is provided to the user at the level for which the user is authorized (step 36). If there is no match, in step 384, the method tests to determine whether there 20 have been three consecutive failed matches, and if so, the method terminates; otherwise processing is repeated back at step 31. Fig. 4 is a block diagram of a preferred embodiment of a system in accordance with a preferred embodiment of the invention corresponding generally to the method of Fig. 3. The system includes speech-enabled 25 terminals 41 from which may be received a spoken user identification. An automatic speech recognizer 46 has two modes of operation. In a first mode, the recognizer can operate in speaker-independent fashion to recognize a spoken user identification, which is fed to the identification comparator 42, 6 WO 99/00719 PCT/IB98/01110 and a user verification, which is fed to verification comparator 43. In a second mode, the recognizer can operate in speaker-dependent fashion, utilizing additional information in the form of a user-specific profile for a user that has been identified by the identification comparator 42. (Alternatively, an 5 applicable one of the user-specific profiles can be loaded after an unverified user identification has been made by the identification comparator 42, and the recognizer can operate in a speaker-dependent mode when feeding text to the verification comparator.) The comparators 42 and 43 may in fact be implemented in an integrated arrangement. For example, a user speaking his 10 name (or a password uniquely identifying him) can provide a basis for both identification as well as verification using speaker-dependent templates. Further material on speech recognizer design may be found, for example, in Rabiner and Juang, Fundamentals of Speech Recognition, 1993, which is hereby incorporated herein by reference. 15 In operation, a user identification is received by the identification comparator 42. As described above in connection with previous figures, the identification can take many forms, including speech (which is here converted to text by the recognizer 46 to furnish an input to the comparator 42) or a digitally encoded card that is read by a card reader. A user identification that 20 has been received by the identification comparator is stored in storage region 421. Thereafter identification comparator 42 compares the user identification that is stored in storage region 421 with user identification data in the identification data base that is stored in storage region 422. If the comparator 42 makes a successful match, then operation of the verification comparator 43 25 is triggered. Here the verification comparator receives a text input from the recognizer 46, and the input is stored in region 431 and compared with data in the verification data base that is stored in region 432. 7 WO 99/00719 PCT/IB98/01110 If the verification comparator 43 determines that a match exists, then the profile loader 44 is caused to access and load one of the user-specific profiles (corresponding to the user who was matched by the comparators 42 and 43) stored in region 441 into the recognizer 46. In this fashion there is 5 provided enhanced recognition of speech of the user who has been determined to be authorized. Finally, system access provider 45 is caused to provide access to the system to a user who has been determined to be authorized in accordance with the user authorization levels stored in region 451. It is contemplated that the identification comparator 42, the 10 verification comparator 43, the automatic speech recognition user-specific profile loader 44, and the system access provider 45 may (but need not necessarily) be implemented as processes running in a general purpose computer. Indeed, the processes need not be running on the same computer. For example, some or all of the system access provider 45 may be 15 implemented on a server handling system access for all users of the system. The present invention is also applicable to any speech recognition system, capable of speaker adaptation, that has more than one user. Each user of such a system has a potentially unique user-specific profile resulting from speaker adaptation. In a multi-user environment, such a profile is subject to 20 the risk of undesirable modification as a result of adaptation to the speech of a person other than the user. An embodiment of the present invention prevents undesirable modification of a user-specific profile for speech recognition by requiring user identification before at least one of modifying a user-specific profile (for example, at the beginning of an adaptation session) or 25 saving a modification of a user-specific profile (for example, at the end of an adaptation session). As shown in Fig. 4, such an embodiment has a speech profile adaptor 442 in communication with the automatic speech recognizer 46, for 8 WO 99/00719 PCT/IB98/01110 modifying the user-specific profiles 441. An adaptation controller 443 responsive to the identification comparator 42 controls the speech profile adaptor 442. When an authorized user has been identified by the identification comparator 42, the adaptation controller 443 enables operation 5 of the speech profile adaptor 442 to permit updating of the user-specific profile. In a further embodiment, both user and identification and verification are required to enable the speech profile adaptor 442. The identification may be by the keyboard, or, as in the embodiments described previously, the identification may be a non-keyboard identification, as by 10 speech or digitally encoded card. The embodiments previously discussed for both identification and verification assume explicit actions taken by the user. More specifically, in the case of speech, the access control system uses voice print matching of user provided speech. In practice, such voice print matching can employ either 15 text dependent verification, or text independent verification. Text dependent verification is the use of passwords and associated voice prints already described. Text independent verification operates with freely selected user speech input during normal use of the automatic speech recognition system. In a preferred embodiment, this implicit verification is implemented as a 20 safeguard mechanism in combination with the explicit text dependent password and voice print technique. With respect to Fig. 4, the text independent verification (i.e., implicit verification) occurs in the background during system use as spoken text input progresses. Thus, after the user access system has recognized an authorized 25 user and enabled system access as previously described, the identification comparator 42 and verification comparator 43 continue to monitor the operation of the automatic speech recognizer 46. As the recognizer 46 recognizes input speech as text within its recognition vocabulary, the 9 WO 99/00719 PCT/IB98/01110 identification comparator 42 and/or verification comparator 43 compares the incoming speech signal associated with the recognized text to stored user identification data 422 and/or stored user verification data 432. If the characteristics of the incoming speech fail to match the stored characteristics 5 for the recognized user within an acceptability threshold, the identification comparator 42 and/or verification comparator 43 then disables the system access provider 45. In addition (or as a consequence of disabling the system access provider 45), the speech profile adaptor 442 is prevented from modifying the user-specific speech profiles 441. Then, the automatic speech 10 recognizer 46 operates only to perform the user verification and access method previously described. This embodiment is especially useful in a situation where an authorized user has accessed the system and momentarily walks away. Text independent verification running in the application background prevents another, possibly 15 unfriendly, user from invoking or altering the authorized user's speech profile. This effectively prevents use of the system by such an unauthorized person. 10
Claims (32)
1. A computer system, for operation based on text inputs derived from automatic recognition of speech of a plurality of users providing spoken 5 inputs, the system comprising: a. a plurality of speech-enabled terminals, each having an input for receiving speech from a user; b. an identification comparator for comparing a non-keyboard user identification provided by a specific user with data stored in a user 10 identification data base to determine if the specific user is an authorized user; c. an automatic speech recognizer for deriving text from speech provided by the specific user at a given one of the speech-enabled terminals; d. a profile loader for loading a user-specific profile pertinent to the specific user into the automatic speech recognizer; and 15 e. a system access provider for providing computing access, via the automatic speech recognizer, to the specific user if determined to be authorized by the identification comparator.
2. A computer system according to claim 1, wherein the non 20 keyboard user identification is spoken by the specific user.
3. A computer system according to claim 1, wherein the non keyboard user identification is contained in a digitally encoded card presented by the specific user. 25
4. A computer system according to claim 2, wherein the user identification database contains voice prints of authorized users, and the 11 WO 99/00719 PCT/IB98/01110 identification comparator compares a voice print derived from the spoken user identification with voice prints in the user identification database.
5. A computer system according to claim 2, wherein the user identification database contains passwords of authorized users and the spoken 5 user identification is a password.
6. A computer system according to claim 5, wherein the user identification database stores the passwords as text derived from utterances using automatic speech recognition. 10
7. A computer system according to claim 1, further comprising a user verification comparator for comparing a user verification provided by the specific user with data stored in a user verification data base to verify the identity of the specific user as an authorized user, 15 wherein the system access provider provides computing access to the specific user only if the identity of the specific user has been verified as an authorized user by the verification comparator.
8. A computer system according to claim 2, 20 further comprising a user verification comparator for comparing a user verification provided by the specific user with data stored in a user verification data base to verify the identity of the specific user as an authorized user, wherein the system access provider provides computing access to the specific user only if the identity of the specific user has been verified as an 25 authorized user by the verification comparator.
9. A computer system according to claim 7, wherein the user verification is spoken by the specific user. 12 WO 99/00719 PCT/IB98/01110
10. A computer system according to claim 1, wherein each speech enabled terminal is coupled to a telephone line permitting a user to access the computer system by telephone. 5
11. A computer system according to claim 1, wherein each speech enabled terminal is associated with a separate local processor and a local automatic speech recognizer.
12. A computer system according to claim 11, wherein each speech 10 enabled terminal is coupled to a telephone line permitting a user to access the computer system by telephone.
13. A computer system according to claim 1, wherein: the identification comparator further includes a text-independent 15 comparator coupled to the automatic speech recognizer and to the system access provider for determining whether characteristics of the speech provided by the specific user fail to match characteristics of the data stored in the user identification database for the specific user within an acceptability threshold, and in the event of a determination of acceptable match, causing the system 20 access provider to preclude computing access to the specific user.
14. A computer system according to claim 7, wherein: the user verification comparator further includes a text-independent comparator coupled to the automatic speech recognizer and to the system 25 access provider for determining whether characteristics of the speech provided by the specific user fail to match characteristics of the data stored in the user identification database for the specific user within an acceptability threshold, 13 WO 99/00719 PCT/IB98/01110 and in the event of a determination of acceptable match, causing the system access provider to preclude computing access to the specific user.
15. A method for providing access to a computer system that has an 5 automatic speech recognizer and operates based on text inputs derived from automatic recognition of speech from a plurality of users provided via a plurality of speech-enabled terminals, the access provided to a specific user at a given one of the speech-enabled terminals, the method comprising: a. receiving a non-keyboard user identification provided by the specific 10 user; b. comparing the user identification with data stored in a user identification data base to determine whether the specific user is an authorized user; and c. if the specific user has been determined to be an authorized user, 15 i. loading a user-specific profile into the automatic speech recognizer that is pertinent to the specific user; and ii. providing access to the system to the specific user via the given speech-enabled terminal. 20
16. A method according to claim 15, further comprising before substep (ii) of step (c), i. receiving a user verification provided by the specific user and ii. comparing the user verification with data stored in a user verification data base to verify the identity of the specific user as an 25 authorized user; and wherein substep (ii) of step (c) is performed only if the identity of the specific user has been verified as an authorized user. 14 WO 99/00719 PCT/IB98/01110
17. A method according to claim 15, wherein the non-keyboard user identification is spoken by the specific user.
18. A method according to claim 16, wherein the non-keyboard user 5 identification is spoken by the specific user.
19. A method according to claim 15, wherein the non-keyboard user identification is contained in a digitally encoded card presented by the specific user. 10
20. A method according to claim 16, wherein the non-keyboard user identification is contained in a digitally encoded card presented by the specific user.
21. A method according to claim 16, wherein the user verification is 15 spoken by the specific user.
22. A method according to claim 15, further comprising: d. monitoring operation of the automatic speech recognizer; and e. if characteristics of the speech provided by the specific user fail to 20 match characteristics of the data stored in the user identification database for the specific user within an acceptability threshold, disabling the automatic speech recognizer.
23. A computer system, for operation based on text inputs derived 25 from automatic recognition of speech of a plurality of users providing spoken inputs, the system comprising: a. a speech-enabled terminal, having an input for receiving speech from a user; 15 WO 99/00719 PCT/IB98/01110 b. an identification comparator for comparing a non-keyboard user identification provided by a specific user with data stored in a user identification data base to determine if the specific user is an authorized user; c. an automatic speech recognizer for deriving text from speech 5 provided by the specific user at the speech-enabled terminal; d. a speaker adaptor for modifying a user-specific profile, pertinent to the specific user, that is used with the automatic speech recognizer; and e. an adaptation inhibitor for preventing at least one of modifying the user-specific profile or saving a modification of the user-specific profile unless 10 the specific user is determined to be authorized by the identification comparator.
24. A computer system according to claim 23, wherein the non keyboard user identification is spoken by the specific user. 15
25. A computer system according to claim 23, wherein the non keyboard user identification is contained in a digitally encoded card presented by the specific user. 20
26. A computer system according to claim 24, wherein the user identification database contains voice prints of authorized users, and the identification comparator compares a voice print derived from the spoken user identification with voice prints in the user identification database. 25
27. A computer system according to claim 24, wherein the user identification database contains passwords of authorized users and the spoken user identification is a password. 16 WO 99/00719 PCT/IB98/01110
28. A computer system according to claim 27, wherein the user identification database stores the passwords as text derived from utterances using automatic speech recognition. 5
29. A computer system according to claim 23, further comprising a user verification comparator for comparing a user verification provided by the specific user with data stored in a user verification data base to verify the identity of the specific user as an authorized user, wherein the adaptation inhibitor prevents at least one of modifying the 10 user-specific profile or saving a modification of the user-specific profile unless the identity of the specific user has been verified as an authorized user by the verification comparator.
30. A computer system according to claim 23, wherein: 15 the identification comparator further includes a text-independent comparator coupled to the automatic speech recognizer and to the system access provider for determining whether characteristics of the speech provided by the specific user fail to match characteristics of the data stored in the user identification database for the specific user within an acceptability threshold, 20 and in the event of a determination of acceptable match, performing at least one of causing the system access provider to preclude computing access to the specific user and preventing the speaker adaptor from modifying the user specific profile. 25
31. A computer system according to claim 29, wherein: the user verification comparator further includes a text-independent comparator coupled to the automatic speech recognizer and to the system access provider for determining whether characteristics of the speech provided 17 WO 99/00719 PCT/IB98/01110 by the specific user fail to match characteristics of the data stored in the user identification database for the specific user within an acceptability threshold, and in the event of a determination of acceptable match, performing at least one of causing the system access provider to preclude computing access to the 5 specific user and preventing the speaker adaptor from modifying the user specific profile.
32. A method, for providing access by a plurality of users to a computer system having automatic recognition of speech provided at a 10 plurality of spoken inputs, the method comprising: a. generating a prompt for a spoken user identification over one of the plurality of spoken inputs; b. comparing the spoken user identification with data stored in a user identification data base to determine if the user is an authorized user; 15 c. providing an automatic speech recognizer for deriving text from speech provided at a speech-enabled terminal; d. loading user-specific profiles pertinent to a user who has been determined to be authorized into the automatic speech recognizer; and e. providing access to the system to a user who has been determined to 20 be authorized. 18
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US5102597P | 1997-06-27 | 1997-06-27 | |
US60051025 | 1997-06-27 | ||
PCT/IB1998/001110 WO1999000719A1 (en) | 1997-06-27 | 1998-06-25 | Access-controlled computer system with automatic speech recognition |
Publications (1)
Publication Number | Publication Date |
---|---|
AU8125198A true AU8125198A (en) | 1999-01-19 |
Family
ID=21968901
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU81251/98A Abandoned AU8125198A (en) | 1997-06-27 | 1998-06-25 | Access-controlled computer system with automatic speech recognition |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP0991990A1 (en) |
JP (1) | JP2002507298A (en) |
AU (1) | AU8125198A (en) |
CA (1) | CA2288183A1 (en) |
WO (1) | WO1999000719A1 (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ATE253764T1 (en) * | 1999-06-21 | 2003-11-15 | Palux Ag | DEVICE FOR CONTROLLING VENDING MACHINES |
US8355912B1 (en) * | 2000-05-04 | 2013-01-15 | International Business Machines Corporation | Technique for providing continuous speech recognition as an alternate input device to limited processing power devices |
EP1164576B1 (en) * | 2000-06-15 | 2006-02-22 | Swisscom Fixnet AG | Speaker authentication method and system from speech models |
CN1302455C (en) * | 2001-04-13 | 2007-02-28 | 皇家菲利浦电子有限公司 | Speaker verification in spoken dialogue system |
US6744868B2 (en) | 2001-05-31 | 2004-06-01 | Alcatel | Call party profile presentation service in a multimedia-capable network |
US20020188725A1 (en) * | 2001-05-31 | 2002-12-12 | Mani Babu V. | User verification service in a multimedia-capable network |
EP1363271A1 (en) | 2002-05-08 | 2003-11-19 | Sap Ag | Method and system for processing and storing of dialogue speech data |
DE10220524B4 (en) | 2002-05-08 | 2006-08-10 | Sap Ag | Method and system for processing voice data and recognizing a language |
AU2003283742A1 (en) * | 2002-12-16 | 2004-07-09 | Koninklijke Philips Electronics N.V. | Method of creating an acoustic model for a speech recognition system |
DE102007043254A1 (en) * | 2007-09-11 | 2009-03-12 | Siemens Ag | Data base accessing method for hospital information system, involves identifying speaker assigned to language data, determining whether identified speaker is having right to access, and allowing requested access to database |
US10613826B2 (en) | 2014-12-25 | 2020-04-07 | Maxell, Ltd. | Head-mounted display system and operating method for head-mounted display device |
CN106710593B (en) * | 2015-11-17 | 2020-07-14 | 腾讯科技(深圳)有限公司 | A method, terminal and server for adding account |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5430827A (en) * | 1993-04-23 | 1995-07-04 | At&T Corp. | Password verification system |
US5677989A (en) * | 1993-04-30 | 1997-10-14 | Lucent Technologies Inc. | Speaker verification system and process |
US6081782A (en) * | 1993-12-29 | 2000-06-27 | Lucent Technologies Inc. | Voice command control and verification system |
DE19515123C1 (en) * | 1995-04-25 | 1996-08-22 | Orga Kartensysteme Gmbh | Smart card access control security protection system |
-
1998
- 1998-06-25 AU AU81251/98A patent/AU8125198A/en not_active Abandoned
- 1998-06-25 CA CA002288183A patent/CA2288183A1/en not_active Abandoned
- 1998-06-25 WO PCT/IB1998/001110 patent/WO1999000719A1/en not_active Application Discontinuation
- 1998-06-25 EP EP98930984A patent/EP0991990A1/en not_active Withdrawn
- 1998-06-25 JP JP50540299A patent/JP2002507298A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
CA2288183A1 (en) | 1999-01-07 |
JP2002507298A (en) | 2002-03-05 |
EP0991990A1 (en) | 2000-04-12 |
WO1999000719A1 (en) | 1999-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6073101A (en) | Text independent speaker recognition for transparent command ambiguity resolution and continuous access control | |
US7240007B2 (en) | Speaker authentication by fusion of voiceprint match attempt results with additional information | |
EP0621532B1 (en) | Password verification system | |
US6119084A (en) | Adaptive speaker verification apparatus and method including alternative access control | |
US9799338B2 (en) | Voice print identification portal | |
US20030074201A1 (en) | Continuous authentication of the identity of a speaker | |
US20080154599A1 (en) | Spoken free-form passwords for light-weight speaker verification using standard speech recognition engines | |
US20080059805A1 (en) | Biometrics authentication apparatus | |
EP1019904B1 (en) | Model enrollment method for speech or speaker recognition | |
US5832063A (en) | Methods and apparatus for performing speaker independent recognition of commands in parallel with speaker dependent recognition of names, words or phrases | |
US5717743A (en) | Transparent telephone access system using voice authorization | |
US20050273333A1 (en) | Speaker verification for security systems with mixed mode machine-human authentication | |
EP0892388B1 (en) | Method and apparatus for providing speaker authentication by verbal information verification using forced decoding | |
US5832429A (en) | Method and system for enrolling addresses in a speech recognition database | |
US8433569B2 (en) | Method of accessing a dial-up service | |
US6246987B1 (en) | System for permitting access to a common resource in response to speaker identification and verification | |
AU8125198A (en) | Access-controlled computer system with automatic speech recognition | |
US20080071538A1 (en) | Speaker verification method | |
EP0762709B1 (en) | Method and system for enrolling addresses in a speech recognition database | |
US20120095763A1 (en) | Digital method and arrangement for authenticating a person | |
JPH10173644A (en) | Identity authentication method | |
US9978373B2 (en) | Method of accessing a dial-up service | |
EP1758351B1 (en) | Method and system for enrolling addresses in a speech recognition database | |
JPH02149900A (en) | Voice recognizing and answering device | |
JPH0567244A (en) | Information processor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MK1 | Application lapsed section 142(2)(a) - no request for examination in relevant period |