$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for establishing identity of a speaker 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G10L-005/06
  • H04M-011/04
출원번호 US-0971552 (1997-11-17)
발명자 / 주소
  • Talmor Rita,ILX
  • Talmor Eli,ILX
대리인 / 주소
    Friedman
인용정보 피인용 횟수 : 72  인용 특허 : 29

초록

A system for establishing an identity of a speaker including a computerized system which includes at least two voice authentication algorithms. Each of the at least two voice authentication algorithms is different from one another and serves for independently analyzing a voice of the speaker for obt

대표청구항

[ What is claimed is:] [1.] A method for establishing an identity of a speaker comprising the steps of:(a) providing a computerized system including at least two hardware installations employing at least two voice authentication algorithms, each of said at least two voice authentication algorithms b

이 특허에 인용된 특허 (29)

  1. Cheng Jane (Spring Valley Rockland NY) Martinez Edgar (East White Plains NY) Naik Jayant (Stamford Fairfield CT), Apparatus and accompanying methods for preventing toll fraud through use of centralized caller voice verification.
  2. Ruddle Ian (80 Park Ave. ; Apt. 19N New York NY 10016), Controller for managing data communication with a host computer for the purpose of user verification by voice processing.
  3. Lin Qiguang (Highland Park NJ) Flanagan James L. (Warren NJ) Jan Ea-Ee (Piscataway NJ), Method and apparatus for speaker recognition using selected spectral information.
  4. Kanevsky Dimitri ; Yung Marcel Mordechay ; Zadrozny Wlodek Wlodzimierz, Method and apparatus utilizing dynamic questioning to provide secure access control.
  5. Scott Brian L. (Denton TX) Wagers ; Jr. William D. (Denton TX), Process of human-machine interactive educational instruction using voice response verification.
  6. Hunt Alan K. (Carrollton TX) Schalk Thomas B. (Dallas TX), Simultaneous speaker-independent voice recognition and verification over a telephone network.
  7. Hunt Alan K. (Carrollton TX) Schalk Thomas B. (Dallas TX), Simultaneous speaker-independent voice recognition and verification over a telephone network.
  8. Hunt Alan K. (Carrollton TX) Schalk Thomas B. (Dallas TX), Simultaneous voice recognition and verification to allow access to telephone network services.
  9. Ueno Eizi (Saitama JPX) Takayama Masami (Saitama JPX), Space diversity receiving system.
  10. Nishimura Shingo (Ibaraki JPX) Miyakawa Masashi (Ibaraki JPX) Umino Masayuki (Ibaraki JPX) Nonaka Shigenobu (Ibaraki JPX), Speaker recognition system using neural network.
  11. Goldberg Randy G. (Princeton NJ) Lynch Gerard P. (Wall NJ) Rosinski Richard R. (Middletown NJ), Speaker verification, speech recognition and channel normalization through dynamic time/frequency warping.
  12. Taubkin Vladimir L.,RUX ; Galoonov Valery I.,RUX, Speech analysis method of protecting a vehicle from unauthorized accessing and controlling.
  13. Sloan Paul (Croton NY) Tuai Gregory (Seattle WA) Jimenez Julio (New City NY) Jimenez Raymond (New City NY), Surveillance system having a voice verification unit.
  14. Bahler Lawrence G. (San Diego CA) Higgins Alan L. (San Diego CA), System and method for passive voice verification in a telephone network.
  15. McNair Bruce E. (Holmdel NJ), Technique for voice-based security systems.
  16. Hunt Alan K. (Carrollton TX) Schalk Thomas B. (Dallas TX), Telephone network voice recognition and verification using selectively-adjustable signal thresholds.
  17. Zwern Arthur L. (170 S. Morrison Ave. San Jose CA 95126), User-programmable voice notification device for security alarm systems.
  18. Bassenyemukasa Charles S. (Tinton Falls NJ) Pilc Randolph J. (Toms River NJ), Using voice signal analysis to identify authorized users of a telephone system.
  19. Mallory John (Mississauga CAX) Burgmann Thomas A. D. (Mississauga CAX) Lennartz Gary (Rexdale CAX), Voice interactive security system.
  20. Kousa Paavo T. (Campbell CA), Voice network security system.
  21. Branscome Kenneth M. (Dallas TX) Feath William M. (Irving TX) Goode George E. (Richardson TX) Heizer Kenneth W. (Dallas TX) Morgan Barrie O. (Dallas TX), Voice security method and system.
  22. Branscome Kenneth M. (Dallas TX) Feath William M. (Irving TX) Goode George E. (Richardson TX) Heizer Kenneth W. (Dallas TX) Morgan Barrie O. (Dallas TX), Voice security method and system.
  23. Branscome Kenneth M. (Irving Dallas TX) Feath William M. (Irving Richardson TX) Goode George E. (Richardson TX) Heizer Kenneth W. (Dallas TX) Morgan Barrie O. (Dallas TX), Voice security method and system.
  24. Naik Jayant M. (Dallas TX) Netsch Lorin P. (Allen TX) Doddington George R. (Richardson TX), Voice verification circuit for validating the identity of an unknown person.
  25. Naik Jayant M. (Dallas TX) Netsch Lorin P. (Allen TX) Doddington George R. (Richardson TX), Voice verification circuit for validating the identity of telephone calling card customers.
  26. Suzuki ; Matsumi ; Kitamoto ; Saburo ; Morino ; Tetsuro, Voice verification system based on word pronunciation.
  27. Feilchenfeld Michal M. (Pittsburgh PA), Voice-recognition elevator security system.
  28. Feilchenfeld Michal M. (Pittsburgh PA) Byford Roger G. (Washington Township ; Armstrong County PA) Quan Wing C. (Waldwick NJ), Voice-recognition elevator security system.
  29. Logsdon Duane (1708 Calavera Dr. Fullerton CA 92631), Washing machine connection boxes.

이 특허를 인용한 특허 (72)

  1. Vicki St. John, 69voice authentication system and method for regulating border crossing.
  2. Burger, Michael, Adjustment of knowledge-based authentication.
  3. Kanevsky, Dimitri; Maes, Stephane Herman, Apparatus and method for speaker verification/identification/classification employing non-acoustic and/or acoustic models and databases.
  4. Asokan, Nadarajah; Krishnamurthi, Govind; Chan, Tat, Authenticating security parameters.
  5. Burger, Michael; Dean, Michael John; Kapczynski, Mark Joseph; Yu, Nelson, Authentication alerts.
  6. Wuelly, Richard A., Automated mass audience telecommunications database creation method.
  7. Goldberg Randy G., Check-sum based method and apparatus for performing speech recognition.
  8. Brown, Deborah W.; Goldberg, Randy G.; Marcus, Stephen Michael; Rosinski, Richard R., Concise dynamic grammars using N-best selection.
  9. Brown, Deborah W.; Goldberg, Randy G.; Marcus, Stephen Michael; Rosinski, Richard R., Concise dynamic grammars using N-best selection.
  10. Brown, Deborah W.; Goldberg, Randy G.; Marcus, Stephen Michael; Rosinski, Richard R., Concise dynamic grammars using N-best selection.
  11. Goldberg Randy G., Confusion matrix based method and system for correcting misrecognized words appearing in documents generated by an optical character recognition technique.
  12. Brown Deborah W. ; Goldberg Randy G. ; Modi Piyush C. ; Rosinski Richard R., Confusion set-base method and apparatus for pruning a predetermined arrangement of indexed identifiers.
  13. Petrushin, Valery A., Detecting emotion in voice signals in a call center.
  14. Petrushin, Valery A., Detecting emotions using voice signal analysis.
  15. Petrushin,Valery A., Detecting emotions using voice signal analysis.
  16. Nagata, Ayako, Elevator device.
  17. Lux, James Paul; Chow, Edward; McKee, Michael Ray; Haque, Salman-ul Mohammed; Tkacenko, Andre, HERMA—heartbeat microwave authentication.
  18. Felsher, David Paul, Information record infrastructure, system and method.
  19. Kuppuswamy, Raja; Mumm, Marc, Method and apparatus for controlling the access of a user to a service provided in a data network.
  20. Brown Deborah W. ; Goldberg Randy G. ; Haszto Edward Dennis ; Marcus Stephen Michael ; Rosinski Richard R., Method and apparatus for performing a grammar-pruning operation.
  21. Goldberg Randy G., Method and apparatus for performing an automatic correction of misrecognized words produced by an optical character recognition technique by using a Hidden Markov Model based algorithm.
  22. Bakis Raimo ; Kanevsky Dimitri ; Maes Stephane Herman, Method and apparatus for recognizing identity of individuals employing synchronized biometrics.
  23. Wohlsen, Robert C; McNeill, Sue, Method and system for identifying a user by voice.
  24. Heck,Larry Paul, Method and system for improving robustness in a speech system.
  25. Runge,Fred; Mueller,Christel; Trinkel,Marian; Ziem,Thomas, Method for the voice-operated identification of the user of a telecommunications line in a telecommunications network in the course of a dialog with a voice-operated dialog system.
  26. Blouet, Raphael, Methods and systems for splitting a digital signal.
  27. Takehiko Kuita JP, Mobile terminal provided with speech recognition function for dial locking.
  28. Loghmani,Masoud; Hazard,Timothy, Multi-modal voice-enabled content access and delivery system.
  29. Loghmani, Masoud S, Multi-modal, multi-path user interface for simultaneous access to internet data over multiple media.
  30. Gainsboro, Jay; Weinstein, Lee Davis; Sinclair, Ken; Barrasso, Charles, Multi-party conversation analyzer and logger.
  31. Gainsboro, Jay; Weinstein, Lee; Barrasso, Charles, Multi-party conversation analyzer and logger.
  32. Gainsboro, Jay; Weinstein, Lee; Barrasso, Charles; Sinclair, Ken, Multi-party conversation analyzer and logger.
  33. Gainsboro, Jay; Weinstein, Lee; Barrasso, Charles; Sinclair, Ken, Multi-party conversation analyzer and logger.
  34. Hoffberg, Steven M., Multifactorial optimization system and method.
  35. Chaudhari,Upendra V.; Ramaswamy,Ganesh N., Policy analysis framework for conversational biometrics.
  36. Jochumson, Christopher S., Processing packets of encoded speech using a plurality of processing levels based on values transmitted over a network.
  37. Jochumson, Christopher S., Processing speech transmitted through a network using a plurality of processing levels.
  38. Junqua,Jean Claude; Contolini,Matteo, Speaker authentication by fusion of voiceprint match attempt results with additional information.
  39. Moser, Thomas; Van Kommer, Robert, Speaker verification method.
  40. Brown Deborah W. ; Goldberg Randy G. ; Marcus Stephen Michael ; Rosinski Richard R. ; Stern Benjamin J., Statistical database correction of alphanumeric account numbers for speech recognition and touch-tone recognition.
  41. Deborah W. Brown ; Randy G. Goldberg ; Stephen Michael Marcus ; Richard R. Rosinski ; Benjamin J. Stern, Statistical database correction of alphanumeric identifiers for speech recognition and touch-tone recognition.
  42. Goldberg Randy G., Statistical option generator for alpha-numeric pre-database speech recognition correction.
  43. Manish Sharma ; Richard J. Mammone, System and method for detecting a recorded voice.
  44. Hoffberg, Steven M., System and method for determining contingent relevance.
  45. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  46. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  47. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  48. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  49. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  50. Ellingson, John F., System and method for verification of identity.
  51. Kumar, Saurabh, System and method for voice authentication over a computer network.
  52. Kumar, Saurabh, System and method for voice authentication over a computer network.
  53. Kumar, Saurabh, System and method for voice authentication over a computer network.
  54. Kumar, Saurabh, System and method for voice authentication over a computer network.
  55. Cluff,Wayne P.; Randol,Jeffrey D.; Jurbala,Daryl G.; Soufleris,Peter J., System and method of subscription identity authentication utilizing multiple factors.
  56. Gottschalk, Jr., Harold E.; Caldwell, Michael; Carleton, Joel, System and methods for identifying compromised personally identifiable information on the internet.
  57. Gottschalk, Jr., Harold E.; Caldwell, Michael; Carleton, Joel, System and methods for identifying compromised personally identifiable information on the internet.
  58. Gottschalk, Jr., Harold E.; Caldwell, Michael; Carleton, Joel, System and methods for identifying compromised personally identifiable information on the internet.
  59. Loghmani, Masoud, System for providing multi-phased, multi-modal access to content through voice and data devices.
  60. Loghmani,Masoud, System for providing multi-phased, multi-modal access to content through voice and data devices.
  61. Valery A. Petrushin, System, method and article of manufacture for a voice analysis system that detects nervousness for preventing fraud.
  62. Valery A. Petrushin, System, method and article of manufacture for an emotion detection system improving emotion recognition.
  63. Pertrushin Valery A., System, method and article of manufacture for detecting emotion in voice signals through analysis of a plurality of voice signal parameters.
  64. Gottschalk Jr., Harold E., Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository.
  65. Gottschalk, Jr., Harold E., Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository.
  66. Loghmani, Masoud; Korangy, Fred F., Telephony-data application interface apparatus and method for multi-modal access to data applications.
  67. Brown,Michael Wayne; McIntyre,Joseph Herbert; Paolini,Michael A.; Weaver,James Mark; Winters,Scott Lee, Time based regulation of access to callees.
  68. Primeaux David ; Sundar Doraiswamy ; Robinson ; Jr. Willard L., Usage pattern based user authenticator.
  69. Su, Huan-yu; Assaleh, Khaled, User configurable levels of security for a speaker verification system.
  70. Petrushin, Valery A., Voice messaging system that organizes voice messages based on detected emotion.
  71. St. John, Vicki, Voice recognition system for navigating on the internet.
  72. Chaudhari,Upendra V.; Maes,Stephane H.; Navratil,Jiri, Weight based background discriminant functions in authentication systems.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로