Systems and methods for cluster-based voice verification
First Claim
Patent Images
1. A method comprising:
- receiving, by a processor of an authentication server, audio data including speech of a user;
analyzing, by the processor, the audio data to identify at least one characteristic of the speech of the user;
associating, by the processor, the at least one characteristic to a cluster based on a comparison with a plurality of known characteristics, each known characteristic being associated with at least one cluster;
receiving, by the processor, data indicative of a purported identity of the user;
comparing, by the processor, the data indicative of the purported identity to data indicative of the at least one cluster; and
identifying, by the processor, the user as at least one of;
likely having the purported identity in response to determining the data indicative of the purported identity matches the data indicative of the at least one cluster, andunlikely to have the purported identity in response to determining the data indicative of the purported identity matches data indicative of a different cluster.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems for caller identification and authentication may include an authentication server. The authentication server may be configured to receive audio data including speech of a plurality of telephone calls, use audio data for at least a subset of the plurality of telephone calls to store a plurality of known characteristics each associated with a specific demographic, and/or use audio data for at least one of the plurality of telephone calls to identify the telephone caller making the telephone call based on determining a most similar known characteristic of the plurality of known characteristics to the audio data of the caller.
108 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a processor of an authentication server, audio data including speech of a user; analyzing, by the processor, the audio data to identify at least one characteristic of the speech of the user; associating, by the processor, the at least one characteristic to a cluster based on a comparison with a plurality of known characteristics, each known characteristic being associated with at least one cluster; receiving, by the processor, data indicative of a purported identity of the user; comparing, by the processor, the data indicative of the purported identity to data indicative of the at least one cluster; and identifying, by the processor, the user as at least one of; likely having the purported identity in response to determining the data indicative of the purported identity matches the data indicative of the at least one cluster, and unlikely to have the purported identity in response to determining the data indicative of the purported identity matches data indicative of a different cluster. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for user authentication, the system comprising:
-
a recorder configured to record audio data of speech spoken by a user; an authentication server comprising a processor and a non-transitory memory, the memory storing instructions that, when executed by the processor, cause the processor to perform processing comprising; receiving audio data including speech of a plurality of users; using audio data for at least a subset of the plurality of users to store a plurality of known characteristics, each known characteristic being associated with at least one cluster, the storing comprising; for each of the subsets of the plurality of users, determining identifying data for each user, and analyzing the audio data to identify at least one characteristic of the speech of the user, and storing the at least one characteristic of the speech of each user included in the plurality of users based on the identifying data for the user as the known characteristic; and using audio data for at least one of the plurality of users to identify the user, the identifying comprising; analyzing the audio data to identify at least one characteristic of the speech of the user, associating the at least one characteristic to a cluster based on a comparison with a plurality of known characteristics, each known characteristic being associated with at least one cluster, receiving data indicative of a purported identity of the user, and identifying the user as; likely having the purported identity in response to determining the data indicative of the purported identity matches the data indicative of the at least one of the plurality of users, or unlikely to have the purported identity in response to determining the data indicative of the purported identity matches data indicative of a different at least one of the plurality of users. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium storing instructions that, when executed by a processor, cause the processor to perform processing comprising:
-
receiving audio data including speech of a user; analyzing the audio data to identify at least one characteristic of the speech of the user; associating the at least one characteristic to a cluster based on a comparison with a plurality of known characteristics, each known characteristic being associated with at least one cluster; receiving data indicative of a purported identity of the user; comparing the data indicative of the purported identity to data indicative of the at least one cluster; and identifying the user as at least one of; likely having the purported identity in response to determining the data indicative of the purported identity matches the data indicative of the at least one cluster, and unlikely to have the purported identity in response to determining the data indicative of the purported identity matches data indicative of a different cluster. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification