Voice print identification portal
First Claim
1. A method of securely authenticating a client seeking access to secure information available through a network, comprising:
- receiving, at a server, an enrollment request;
receiving, at the server, a voice recording;
processing, at the server, the voice recording to determine identifying characteristics of the speaker'"'"'s voice;
creating, based on the identifying characteristics, a voice print identification of the speaker;
storing, at the server, the voice print identification;
receiving, at the server, a request for authentication of a client with an existing voice print identification;
receiving, at the server, a sample recording of the client'"'"'s voice;
processing, at the server, the sample recording of the client'"'"'s voice;
comparing characteristics of the sample recording to at least one voice print identification;
determining, based at least in part on the comparing, that the client is authenticated; and
communicating, over the network, an indication that the client is authenticated.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods providing for secure voice print authentication over a network are disclosed herein. During an enrollment stage, a client'"'"'s voice is recorded and characteristics of the recording are used to create and store a voice print. When an enrolled client seeks access to secure information over a network, a sample voice recording is created. The sample voice recording is compared to at least one voice print. If a match is found, the client is authenticated and granted access to secure information.
Systems and methods providing for a dual use voice analysis system are disclosed herein. Speech recognition is achieved by comparing characteristics of words spoken by a speaker to one or more templates of human language words. Speaker identification is achieved by comparing characteristics of a speaker'"'"'s speech to one or more templates, or voice prints. The system is adapted to increase or decrease matching constraints depending on whether speaker identification or speaker recognition is desired.
-
Citations
18 Claims
-
1. A method of securely authenticating a client seeking access to secure information available through a network, comprising:
-
receiving, at a server, an enrollment request; receiving, at the server, a voice recording; processing, at the server, the voice recording to determine identifying characteristics of the speaker'"'"'s voice; creating, based on the identifying characteristics, a voice print identification of the speaker; storing, at the server, the voice print identification; receiving, at the server, a request for authentication of a client with an existing voice print identification; receiving, at the server, a sample recording of the client'"'"'s voice; processing, at the server, the sample recording of the client'"'"'s voice; comparing characteristics of the sample recording to at least one voice print identification; determining, based at least in part on the comparing, that the client is authenticated; and communicating, over the network, an indication that the client is authenticated. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of securely authenticating a client who seeks access to secure information available through a network, comprising:
-
sending, to a server, an enrollment request; recording the voice of a client; sending, to a server, the voice recording; receiving, from the server, an indication that a voice print for the client has been created and stored based on the voice recording; sending, to the server, a request to authenticate the client; sending, to the server, a sample voice recording of the client; receiving, from the server, an indication that the client is authenticated; and permitting the client access to secure information over the network based on the indication that the client is authenticated. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A system for securely authenticating a client seeking access to secure information available through a network, comprising:
-
a back-end computer system adapted to manage and control access to secure information; a front-end interface, adapted to provide the client with access to the back-end computer system; a voice analysis computer system, adapted to verify a client'"'"'s identity based on a voice sample; wherein the front-end interface is adapted to provide the client with the ability to record a client voice sample and communicate the client'"'"'s voice sample to the voice analysis computer system; wherein the voice analysis computer system is adapted to compare the received client'"'"'s voice sample to at least one voice print and authenticate the client based at least in part on the comparison; and wherein the voice analysis computer system is adapted to communicates an indication of authentication. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A method of operating a voice analysis system, comprising:
-
receiving, by a voice analysis system, at least one parameter indicating whether the system is to operate in a first mode or a second mode; receiving, by the voice analysis system, a voice recording; setting voice analysis constraints to a first level if the parameter indicates the first mode, or setting the voice analysis constraints to a second level if the parameter indicates the second mode; and comparing the voice recording to at least one template, wherein the comparison is based at least in part on the constraints, wherein the first mode indicates that the voice analysis system is to perform speaker identification, wherein the second mode indicates that the voice analysis system is to perform word recognition; and wherein if the parameter indicates the first mode, providing an indication of authentication, and wherein the if the parameter indicates the second mode, providing an indication of the textual value of the voice recording.
-
Specification