Biometric identification system
First Claim
1. A method for identity verification comprising the steps of:
- (a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of travel data against a second stored voice print of the user speaking said piece of travel data; and
(c) determining if the user is a given individual based the results of step (a) and step (b).
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment the present invention provides a method for identity verification comprising the steps of: (a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data; (b) comparing at least one second spoken voice print of the user speaking at least one piece of travel data against a second stored voice print of the user speaking said piece of travel data; and (c) determining if the user is a given individual based the results of step (a) and step (b). In other embodiments, the present invention provides a method for controlling the use of an object or service comprising the steps of: (a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data; (b) comparing at least one second spoken voice print of the user speaking at least one piece of object identification data or service identification data against a second stored voice print of the user speaking said piece of object identification data; and (c) determining if the user is allowed to use said object or service based on the results of steps (a) and (b).
115 Citations
80 Claims
-
1. A method for identity verification comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of travel data against a second stored voice print of the user speaking said piece of travel data; and
(c) determining if the user is a given individual based the results of step (a) and step (b). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
(d) comparing at least one third spoken voice print of the user speaking at least one piece of alias data against a stored voice print of the user speaking said piece of alias data, wherein step (c) further comprises determining if the user is a given individual based on step (d).
-
-
5. The method of claim 4, wherein step (d) comprises comparing first spoken voice prints of at least two pieces of alias data against respective stored voice prints of the user speaking each of said pieces of alias data.
-
6. The method of claim 1, further comprising sending out an alert if the user is determined not to be a given individual in step (c).
-
7. The method of claim 1, further comprising informing the user to proceed with the user'"'"'s travel plans if the user is determined to be a given individual in step (c).
-
8. The method of claim 1, further comprising informing the user to proceed with the user'"'"'s travel plans if the user is determined to be a given individual in step (c).
-
9. The method of claim 1, further comprising informing the user to proceed to a boarding area, if the user is determined to be a given individual in step (c).
-
10. The method of claim 1, further comprising informing the user to board if the user is determined to be a given individual in step (c).
-
11. The method of claim 1, wherein said method is implemented in a computer system.
-
12. A machine readable medium storing instructions that, if executed by a computer system, causes the computer system to perform a set of operations comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of travel data against a second stored voice print of the user speaking said piece of travel data; and
(c) determining if the user is a given individual based the results of step (a) and step (b). - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
(d) comparing at least one third spoken voice print of the user speaking at least one piece of alias data against a stored voice print of the user speaking said piece of alias data, wherein step (c) further comprises determining if the user is a given individual based on step (d).
-
-
16. The machine readable medium of claim 15, wherein step (d) comprises comparing first spoken voice prints of at least two pieces of alias data against respective stored voice prints of the user speaking each of said pieces of alias data.
-
17. The machine readable medium of claim 12, wherein said set of instructions further comprises sending out an alert if the user is determined not to be a given individual in step (c).
-
18. The machine readable medium of claim 12, wherein said set of instructions further comprises informing the user to proceed with the user'"'"'s travel plans if the user is determined to be a given individual in step (c).
-
19. The machine readable medium of claim 12, wherein said set of instructions further comprises informing the user to proceed with the user'"'"'s travel plans if the user is determined to be a given individual in step (c).
-
20. The machine readable medium of claim 12, wherein said set of instructions further comprises informing the user to proceed to a boarding area, if the user is determined to be a given individual in step (c).
-
21. The machine readable medium of claim 12, wherein said set of instructions further comprises informing the user to board if the user is determined to be a given individual in step (c).
-
22. A computer system implementing a method for identity verification comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of travel data against a second stored voice print of the user speaking said piece of travel data; and
(c) determining if the user is a given individual based the results of step (a) and step (b). - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
(d) comparing at least one third spoken voice print of the user speaking at least one piece of alias data against a stored voice print of the user speaking said piece of alias data, wherein step (c) further comprises determining if the user is a given individual based on step (d).
-
-
26. The computer system of claim 25, wherein step (d) comprises comparing first spoken voice prints of at least two pieces of alias data against respective stored voice prints of the user speaking each of said pieces of alias data.
-
27. The computer system of claim 22, wherein said method further comprises sending out an alert if the user is determined not to be a given individual in step (c).
-
28. The computer system of claim 22, wherein said method further comprises informing the user to proceed with the user'"'"'s travel plans if the user is determined to be a given individual in step (c).
-
29. The computer system of claim 22, wherein said method further comprises informing the user to proceed with the user'"'"'s travel plans if the user is determined to be a given individual in step (c).
-
30. The computer system of claim 22, wherein said method further comprises informing the user to proceed to a boarding area, if the user is determined to be a given individual in step (c).
-
31. The computer system of claim 22, wherein said method further comprises informing the user to board if the user is determined to be a given individual in step (c).
-
32. A method for controlling the use of an object comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of object identification data against a second stored voice print of the user speaking said piece of object identification data; and
(c) determining if the user is allowed to use said object based on the results of steps (a) and (b). - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A machine readable medium storing instructions that, if executed by a computer system, causes the computer system to perform a set of operations comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of object identification data against a second stored voice print of the user speaking said piece of object identification data; and
(c) determining if the user is allowed to use said object based on the results of steps (a) and (b). - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A computer system implementing a method for controlling access to an object comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of object identification data against a second stored voice print of the user speaking said piece of object identification data; and
(c) determining if the user is allowed to use said object based on the results of steps (a) and (b). - View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62, 63, 64)
-
-
65. A method for controlling the use of a service comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of service identification data against a second stored voice print of the user speaking said piece of service identification data; and
(c) determining if the user is allowed to use said service based on the results of steps (a) and (b). - View Dependent Claims (66, 67, 68, 69, 70)
-
-
71. A machine readable medium storing instructions that, if executed by a computer system, causes the computer system to perform a set of operations comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of service identification data against a second stored voice print of the user speaking said piece of service identification data; and
(c) determining if the user is allowed to use said service based on the results of steps (a) and (b). - View Dependent Claims (72, 73, 74, 75)
-
-
76. A computer system implementing a method for controlling access to a portable electronic device comprising the steps of:
-
(a) comparing at least one first spoken voice print of a user speaking at least one piece of personal data against a first stored voice print of the user speaking said at least one piece of personal data;
(b) comparing at least one second spoken voice print of the user speaking at least one piece of service identification data against a second stored voice print of the user speaking said piece of service identification data; and
(c) determining if the user is allowed to use said service based on the results of steps (a) and (b). - View Dependent Claims (77, 78, 79, 80)
-
Specification