Knowledge-based strategies applied to N-best lists in automatic speech recognition systems
First Claim
Patent Images
1. A method of recognizing a spoken digit string, comprising:
- (a) receiving the spoken digit string;
(b) analyzing the spoken digit string to generate a list of hypothesized digit strings arranged in ranked order based on a likelihood of matching the spoken digit string;
(c) determining whether individual hypothesized strings of aid list satisfy a given constraint, using a given knowledge based recognition strategy;
(d) selecting the first string in the list satisfying the constraint as the recognized string, if none of the hypothesized digit strings satisfy the constraint, (e) prompting entry of a repeated spoken digit string, which is a an entire repeat of the spoken digit string entered in step (a);
(f) analyzing the repeated spoken digit string to generate a second list of hypothesized digit strings arranged in ranked order based on a likelihood of matching the repeated spoken digit string;
(g) selecting the recognized string in accordance with a comparison of the first and second list if the constraint is satisfied;
(h) using the first list as a first list database to verify one of the hypothesized strings in the second list;
(i) selecting the recognized string in the second list that was verified by the first list;
or (j) if there is no recognized string in the second list verified by the first list, then performing additional verification techniques to determine the correct digit string until the constraint is satisfied, and then subsequently selecting the correct digit string, wherein said additional verification techniques include performing a least one of a checksum approach with the N-best list and a personal identification number, a database match comparison with valid entries, digit positional constraints and fuzzy matching criterion.
4 Assignments
0 Petitions
Accused Products
Abstract
A highly accurate technique for recognizing spoken digit strings is described. A spoken digit string is received and analyzed by a speech recognizer, which generates a list of hypothesized digit strings arranged in ranked order based on a likelihood of matching the spoken digit string. The individual hypothesized strings are then analyzed in order beginning with the hypothesized string having the greatest likelihood of matching the spoken string to determine whether they satisfy a given constraint. The first hypothesized string in the list satisfying the constraint is selected as the recognized string.
108 Citations
10 Claims
-
1. A method of recognizing a spoken digit string, comprising:
-
(a) receiving the spoken digit string;
(b) analyzing the spoken digit string to generate a list of hypothesized digit strings arranged in ranked order based on a likelihood of matching the spoken digit string;
(c) determining whether individual hypothesized strings of aid list satisfy a given constraint, using a given knowledge based recognition strategy;
(d) selecting the first string in the list satisfying the constraint as the recognized string, if none of the hypothesized digit strings satisfy the constraint, (e) prompting entry of a repeated spoken digit string, which is a an entire repeat of the spoken digit string entered in step (a);
(f) analyzing the repeated spoken digit string to generate a second list of hypothesized digit strings arranged in ranked order based on a likelihood of matching the repeated spoken digit string;
(g) selecting the recognized string in accordance with a comparison of the first and second list if the constraint is satisfied;
(h) using the first list as a first list database to verify one of the hypothesized strings in the second list;
(i) selecting the recognized string in the second list that was verified by the first list;
or(j) if there is no recognized string in the second list verified by the first list, then performing additional verification techniques to determine the correct digit string until the constraint is satisfied, and then subsequently selecting the correct digit string, wherein said additional verification techniques include performing a least one of a checksum approach with the N-best list and a personal identification number, a database match comparison with valid entries, digit positional constraints and fuzzy matching criterion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification