Dynamic threshold for speaker verification
First Claim
1. A computer-implemented method comprising:
- receiving, by a computing device that uses voice-based speaker identification, data identifying a user;
prompting the user to confirm whether a previously received utterance was properly identified, properly rejected, falsely identified, or falsely rejected using voice-based speaker identification;
receiving, from the user, data indicating that the previously received utterance was properly identified, properly rejected, falsely identified, or falsely rejected; and
in response to receiving the data indicating that the previously received utterance was properly identified, properly rejected, falsely identified, or falsely rejected, using audio data corresponding to the previously received utterance to perform voice-based speaker identification on subsequently received utterances.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a dynamic threshold for speaker verification are disclosed. In one aspect, a method includes the actions of receiving, for each of multiple utterances of a hotword, a data set including at least a speaker verification confidence score, and environmental context data. The actions further include selecting from among the data sets, a subset of the data sets that are associated with a particular environmental context. The actions further include selecting a particular data set from among the subset of data sets based on one or more selection criteria. The actions further include selecting, as a speaker verification threshold for the particular environmental context, the speaker verification confidence score. The actions further include providing the speaker verification threshold for use in performing speaker verification of utterances that are associated with the particular environmental context.
38 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, by a computing device that uses voice-based speaker identification, data identifying a user; prompting the user to confirm whether a previously received utterance was properly identified, properly rejected, falsely identified, or falsely rejected using voice-based speaker identification; receiving, from the user, data indicating that the previously received utterance was properly identified, properly rejected, falsely identified, or falsely rejected; and in response to receiving the data indicating that the previously received utterance was properly identified, properly rejected, falsely identified, or falsely rejected, using audio data corresponding to the previously received utterance to perform voice-based speaker identification on subsequently received utterances. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
one or more computers and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; receiving, by a computing device that uses voice-based speaker identification, data identifying a user; prompting the user to confirm whether a previously received utterance was properly identified, properly rejected, falsely identified, or falsely rejected using voice-based speaker identification; receiving, from the user, data indicating that the previously received utterance was properly identified, properly rejected, falsely identified, or falsely rejected; and in response to receiving the data indicating that the previously received utterance was properly identified, properly rejected, falsely identified, or falsely rejected, using audio data corresponding to the previously received utterance to perform voice-based speaker identification on subsequently received utterances. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium storing software comprising instructions executable by one or more computers which, upon such execution, cause the one or more computers to perform operations comprising:
-
receiving, by a computing device that uses voice-based speaker identification, data identifying a user; prompting the user to confirm whether a previously received utterance was properly identified, properly rejected, falsely identified, or falsely rejected using voice-based speaker identification; receiving, from the user, data indicating that the previously received utterance was properly identified, properly rejected, falsely identified, or falsely rejected; and in response to receiving the data indicating that the previously received utterance was properly identified, properly rejected, falsely identified, or falsely rejected, using audio data corresponding to the previously received utterance to perform voice-based speaker identification on subsequently received utterances.
-
Specification