Voice authentication method and system utilizing same
First Claim
1. A system for authorizing a user to a secure site, the system comprising:
- (a) a memory unit for storing information including a stored voice print and an identity of each of a plurality of individuals having access to the secured site, said stored voice print of each of said plurality of individuals being generated from a corresponding voice data thereof;
(b) a first input device for inputting user information for verifying that the user identifies him- or herself as a specific individual among said plurality of individuals;
(c) a second input device for inputting temporary voice data of the user;
(d) a first processing unit for generating a temporary voice print from said temporary voice data received from said second input device; and
(e) a second processing unit for comparing said temporary voice print to said stored voice print of each of at least a portion of said plurality of individuals to provide a distortion level between said temporary voice print and each said stored voice print of each said individual in said at least a portion of said plurality of individuals, at least said portion of said plurality of individuals including said specific individual, whereby said distortion level is smallest when the user and said specific individual are the same person and less than said distortion level between said temporary voice print and said stored voice print of all other individuals of at least said portion of said plurality of individuals, the user being granted access to the secured site based on said smallest distortion level;
wherein said comparing is effected by a voice authentication algorithm selected from the group consisting of a text-dependent and a text-independent voice authentication algorithm.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for authorizing user access to a secure site includes a memory unit, first and second input devices, and first and second processing devices. The memory unit stores voice prints and identities of the set of individuals that have access to the secure site. The first input device is for inputting information that identifies the user as a member of the set. The second input device is for inputting temporary user voice data. The first processing device is for generating a temporary voice print from the temporary data. The second processing device is for comparing the temporary voice print to the stored voice prints. Access is granted only if the temporary voice print is most similar to the voice print of the individual that the user claims to be.
-
Citations
36 Claims
-
1. A system for authorizing a user to a secure site, the system comprising:
-
(a) a memory unit for storing information including a stored voice print and an identity of each of a plurality of individuals having access to the secured site, said stored voice print of each of said plurality of individuals being generated from a corresponding voice data thereof;
(b) a first input device for inputting user information for verifying that the user identifies him- or herself as a specific individual among said plurality of individuals;
(c) a second input device for inputting temporary voice data of the user;
(d) a first processing unit for generating a temporary voice print from said temporary voice data received from said second input device; and
(e) a second processing unit for comparing said temporary voice print to said stored voice print of each of at least a portion of said plurality of individuals to provide a distortion level between said temporary voice print and each said stored voice print of each said individual in said at least a portion of said plurality of individuals, at least said portion of said plurality of individuals including said specific individual, whereby said distortion level is smallest when the user and said specific individual are the same person and less than said distortion level between said temporary voice print and said stored voice print of all other individuals of at least said portion of said plurality of individuals, the user being granted access to the secured site based on said smallest distortion level;
wherein said comparing is effected by a voice authentication algorithm selected from the group consisting of a text-dependent and a text-independent voice authentication algorithm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of authorizing a user access to a secure site, the method comprising the steps of:
-
(a) providing a memory unit for storing information including a stored voice print and an identity of each of a plurality of individuals having access to the secured site, said stored voice print of each of said plurality of individuals being generated from a corresponding voice data thereof;
(b) collecting user information, provided by the user, for verifying that the user identifies him- or herself as a specific individual among said plurality of individuals;
(c) processing temporary voice data collected from the user into a temporary voice print;
(d) comparing said temporary voice print with said stored voice print of each of at least a portion of said plurality of individuals to provide a distortion level between said temporary voice print and each said stored voice print of each said individual in said at least a portion of said plurality of individuals, at least said portion of said plurality of individuals including said specific individual, said distortion level being smallest when the user and said specific individual are the same person, and less than said distortion level between said temporary voice print and said stored voice print of all other individuals of at least said portion of said plurality of individuals; and
(e) identifying said smallest distortion level and granting the user access to the secure site based on said identification;
wherein said comparing is effected by a voice authentication algorithm selected from the group consisting of a text-dependent and a text-independent voice authentication algorithm. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A system for authorizing a user to a secure site, the system comprising:
-
(a) a memory unit for storing information including a stored voice print and an identity of each of a plurality of individuals having access to the secured site, said stored voice print of each of said plurality of individuals being generated from a corresponding voice data thereof;
(b) a first input device for inputting user information for verifying that the user identifies him- or herself as a specific individual among said plurality of individuals;
(c) a second input device for inputting temporary voice data of the user;
(d) a first processing unit for generating a temporary voice print from said temporary voice data received from said second input device; and
(e) a second processing unit for comparing said temporary voice print to said stored voice print of each of at least a portion of said plurality of individuals to provide a distortion level between said temporary voice print and each said stored voice print of each said individual in said at least portion of said plurality of individuals including said specific individual, access of the user to the secure site being contingent on said distortion level between said temporary voice print and said stored voice print of said specific individual being less than any other said distortion level;
wherein said comparing is effected by a voice authentication algorithm selected from the group consisting of a text-dependent and a text-independent voice authentication algorithm.
-
-
36. A method of authorizing a user access to a secure site, the method comprising the steps of:
-
(a) storing information including a stored voice print and an identity of each of a plurality of individuals having access to the secure site, said stored voice print of each of said plurality of individuals being generated from a corresponding voice data thereof;
(b) collecting user information, provided by the user, for verifying that he user identifies him- or herself as a specific individual among said plurality of individuals;
(c) processing temporary voice data collected from the user into a temporary voice print;
(d) comparing said temporary voice print with said stored voice print of each of at least a portion of said plurality of individuals to provide a distortion level between said temporary voice print and each said stored voice print of each said individual in said at least portion of said plurality of individuals, said at least portion of said plurality of individuals including said specific individual; and
(e) granting the user access to the secure site only if said distortion level between said temporary voice print and said stored voice print of said specific individual being less than any other said distortion level;
wherein said comparing is effected by a voice authentication algorithm selected from the group consisting of a text-dependent and a text-independent voice authentication algorithm.
-
Specification