WO2012096901A2 - Natural enrolment process for speaker recognition - Google Patents
Natural enrolment process for speaker recognition Download PDFInfo
- Publication number
- WO2012096901A2 WO2012096901A2 PCT/US2012/020679 US2012020679W WO2012096901A2 WO 2012096901 A2 WO2012096901 A2 WO 2012096901A2 US 2012020679 W US2012020679 W US 2012020679W WO 2012096901 A2 WO2012096901 A2 WO 2012096901A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- biometric
- agent
- verification
- software
- caller
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/04—Training, enrolment or model building
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/487—Arrangements for providing information services, e.g. recorded voice services or time announcements
- H04M3/493—Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals
- H04M3/4936—Speech interaction details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
- H04M3/51—Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
- H04M3/5183—Call or contact centers with computer-telephony arrangements
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/02—Access control comprising means for the enrolment of users
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/41—Electronic components, circuits, software, systems or apparatus used in telephone systems using speaker recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6054—Biometric subscriber identification
Definitions
- the present invention relates generally to a method for biometric authentication, and more particularly, to automating and providing continuous application of algorithms during an interaction, with the use of uncertainty modeling, to minimize the inconvenience of enrolment of users and maximize security of access by securing the entire interaction.
- a range of techniques is used involving one or more criteria to deliver a degree of certainty that an i ndividual is who he c laims t o be.
- Biometric verification of identity requires that first the individual concerned be enrolled so that upon verification one knows the physical attribute that one is attempting to match. Verification typically only occurs at the beginning of an interaction and once achieved is considered as valid for the whole interaction. This does not allow for instances where the validation of the individuals identity can be completed correctly, but the interaction is then taken up by another party. This is a serious potential flaw for those interactions requiring a very high standard of identity verification.
- Using the voice as a biometric attribute has the advantage that the enrolment and verification can be completed over common telephony systems. Also unlike passwords and tokens voice attributes cannot be forgotten or easily stolen. Furthermore, verification can be repeated throughout the interaction preventing an imposter from taking over a verified interaction.
- enrolment of users is viewed as being a cumbersome and time consuming process because to achieve a reliable enrolment requires a substantial amount of speech to be captured. To date this has limited the adoption of voice biometrics as a means of telephone-based authentication.
- U.S. Patent No. 6,078,807 to Dunn et al. discloses a system/method for screening telephone system callers, using speaker-dependent text-independent voice recognition, to either prevent excessive fraudulent use of certain telephone system lines (or radio channels) or to selectively restrict classes of service allowed for different users of a common line.
- the voice recognition process is configured to provide an extent of mismatch indication, between a voice sample taken from a caller currently using the protected line (or channel) and a recorded reference voice sample, which indication corresponds to the probability that the instant caller is not the same as the person who provided the reference sample.
- U.S. Patent No 7,212,613 to Kim et al. discloses a voice biometric authentication system and method wherein an authentication system is provided for authenticating a user of a telephonic device.
- the system includes a setup system for capturing and storing an authentic user voice sample, a comparison system for comparing the authentic user voice sample with an inputted voice sample and generating a comparison result, and a control system for controlling access to the telephonic device.
- the control system analyzes the comparison result for an initial inputted voice sample received when a telephone call is initiated, and periodically reanalyzes comparison results for ongoing inputted voice samples received during the telephone call.
- U.S. Patent No. 7,340,042 to Cluff et al. discloses a system and method of providing voice authentication to institutional customers having consumers or users.
- the system includes an enrollment module, a verification module, and a database.
- Each institutional customer has an authentication profile on the system that includes both instructions indicating which one or more of the voice biometric engines are to be used for a given consumer's enrollment and/or authentication, and also variables for implementing those instructions.
- a given institutional customer may have more than one set of instructions or variables for different classes of users.
- Vocal information is received from a user, and a baseline voiceprint is constructed for enrollment. Subsequently, more vocal information is received from the user to construct a temporary voiceprint. The temporary voiceprint is compared to a corresponding baseline voiceprint in accordance with the institutional customer's authentication profile.
- U.S. Patent No. 7,367,049 to Robinson et al. discloses a system and method of enrolling potential system users for a biometric system for identity verification.
- the potential system user information is entered into the system, either by the user or a system operator, and is stored as a partially-enabled user record.
- the user of a partially- enabled user record fully enables the record by presenting information previously stored in the user record and presenting the remainder of user information necessary to complete record activation.
- Enrollment data is used to authenticate the system user's identity and authorize related transaction accesses in a biometric system for identity verification.
- the described system provides the capability to continually monitor a voice interaction for the purposes of voice biometric enrolment and verification whilst providing feedback to the organizations agent of the current status.
- the design provides for continuous verification of all parties identities throughout the transaction. This will detect if during the transaction any party changes or any unverifiable party should make any utterances. From the perspective of the customer this provides enhanced security. For the organization it also allows verification that an authorized agent is undertaking the interaction. This is of particular value for remotely based agents where the organization may have limited physical control.
- Notification of changes to the verification status would, as appropriate, be made known to the agent or supervisor or both. This could be via visual alarm or whisper or both. As an option the interaction could be terminated.
- Verification scores will be presented to the agent or supervisor or any other party either directly or further processed in accordance with the organizations policies.
- the preferred embodiment uses verification scores that are calculated using the techniques as outlined in copending U.S. Patent application No. 12/663,163 A1 filed Dec 19, 2007 and entitled Confidence levels for Speaker Recognition but may use any other methodology.
- FIGURE 1 is a block diagram illustrating one embodiment of a Natural Enrolment Process, deployed in a variety of environments.
- FIGURE 2 is a flow diagram of an embodiment of the inventive enrolment process wherein no agent intervention is required in the enrolment process.
- FIGURE 3 is a flow diagram of an embodiment of the inventive enrolment process wherein a live agent participates in the verification of a previously enrolled user aided by the enrolment widget.
- FIGURE 4 is a flow diagram of an embodiment of the inventive enrolment process used for verification purposes wherein the system handles the verification of a previously enrolled user (although a live agent may participate in the judgment of a questionable case).
- FIGURE 5 is a flow diagram of an embodiment of the inventive enrolment process used for verification purposes wherein a live agent participates in the verification of a previously enrolled user aided by the enrolment widget.
- one embodiment of the Natural Enrolment Process interfaces between multiple telecommunications and computing networks including, but not limited to, the Public Switched Telephone Network (PSTN), IP-based networks such as the Internet, mobile cellular networks and multimedia-oriented high speed networks including, but not limited to, cable TV, IP TV, and satellite networks.
- PSTN Public Switched Telephone Network
- IP-based networks such as the Internet
- mobile cellular networks and multimedia-oriented high speed networks including, but not limited to, cable TV, IP TV, and satellite networks.
- the Enrollee Aspect is comprised of a User 105 Terminal Device 1 0 such as a PSTN 115 and/or alternately a SIPA/olP (voice over IP) network 120.
- the Enrollee Caller 105 initiates either an enrollment transaction or a verification transaction by making a phone call to a system which employs a Biometric Complex 600, 700, 800.
- the User 105 initiates an enrolment or verification transaction by using a telephone instrument or Terminal Device 110; however, this device is not be limited to a telephonic device but may also include a microphone in combination with another terminal device that would forward recorded voice utterances over an IP or telephone network to the Biometric Engine 600.
- the user 105 makes a phone call using the Terminal Device 110 over the PSTN.
- the user 105 may use a VoIP enabled device 110 to initiate the transaction over an IP based network.
- the overlay complex is comprised of a VoIP Gateway 125 and/or Session Border Controller 130 and an Optional Preamble Engine 200.
- the phone call from the User 105 terminates on a common VoIP gateway.
- Such gateways are available from vendors such as CISCO, Sangoma and Audiocodes.
- an IP signal would be processed by the Optional Preamble Engine 200.
- the IP based telephone call from the User 105 will terminate on a Session Border Controller which is a commonly available device. Such devices are available from vendors such as CISCO and ACME Packets.
- the purpose of the Session Border Controller is to provide security and firewall functions for incoming and outgoing IP based telephone calls.
- any phone call from the User 105 regardless as to its conveyance from a Gateway 125 or a Session Border Controller 130 may be further processed in a preferred embodiment of the invention a simple "drop and insert” function can be achieved with the Preamble Engine.
- a simple "drop and insert” function can be built using the apparatus described in US Patent No. 5,046,088 entitled “Converter for in-band routing and/or origination information”.
- the IP based voice communication coming from the User 105 can be discretely recorded and analyzed in real time by the Biometric Complex 600, 700, 800. This establishes a method for analyzing individual voice print data whilst allowing intervention of a live agent 505 at the same time.
- an Optional Preamble Engine 200 can be used as a switched resource behind a switching point 310 or 320 as pictured at 310 and 320.
- signaling schemes such as Verizon Businesses ECR or CISCO'S ICM can be used to share Preamble Engine resources only during those portions of the call where the Biometric Complex needs to be evoked.
- the original phone call propagates from the Optional Preamble Engine 200 and continues to the Primary Preamble System 300.
- This Primary Preamble System may be an existing i nteractive voice response (IVR) system either collocated or network based.
- IVR i nteractive voice response
- the Optional Preamble Engine 200 along with its ability to record and analyze the User 105 voice in real time would be combined with the Primary PS 300.
- the preamble engine 200 may stand alone if an existing IVR system cannot be changed.
- the original IP based call continues to propagate into the Primary Preamble System 300 in the same fashion as the PSTN based call.
- the original PSTN phone call exits the Primary Preamble System 300 and terminates on auto call distributor/private branch exchange (ACD/PABX) 400.
- ACD/PABX auto call distributor/private branch exchange
- Such a transfer between Primary Preamble System 300 and ACD/PABX 400 is well known by one of ordinary skill in the art of contact center systems. For example, this transfer may happen using regular telephony signaling using a direct connection between the Primary Preamble System 300 and the ACD/PABX 400. Alternately this transfer may be facilitated via the use of a network based switching system such as those employed by Verizon Business (ECR) or CISCO (ICM).
- ECR Verizon Business
- ICM CISCO
- IP based calls exits the Primary Preamble System 300 and terminates on the ACD/PABX 400.
- IP based calls may be switched using common methods such as SIP (session initiation protocol) redirect or SIP re-invite as specified in the SIP RFC 3261 promulgated by the IETF Network Working Group
- the telephone calls are processed by the ACD or PABX in which the determination of the best suited and available agent is made.
- ACD or PABX the determination of the best suited and available agent is made.
- One of ordinary skill in the art of contact centers will recognize the use of commonly available systems to achieve this agent selection and routing result.
- vendors such as Avaya Aspect and Alcatel manufacture telephone systems that can route calls to agents who are either local or remote using both PSTN and/or IP based facilities.
- the original PSTN telephone call exits the ACD/PABX 400 and terminates on a telephone device 510.
- the original IP based telephone call terminates on a computer 550 with the use of a so called softphone or alternately on an IP based instrument 510.
- t he enroller aspect point 550 may house an enrolment widget.
- the enrolment widget will be implemented using a common computer language such as javascript, adobe flex or adobe AIR.
- javascript adobe flex
- adobe AIR a common computer language
- Anyone of ordinary skill in the art of desktop software will be able to communicate with the biometric application gateway RESTIet 700 via HTTP.
- the purpose of the enrolment widget is to allow the enroller/agent 505 to verify the identity of the caller and match that verification to the biometric key of the caller.
- the widget may be employed such that the biometric application gateway RESTIet 700 can send messages to the enroller agent 505 indicating the score of automated verification of a particular caller.
- the biometric complex is comprised of the biometric engine 600, the biometric application RESTIet 700 and the biometric application database 800.
- the biometric engine houses a highly specialized speech algorithm and scoring mechanism with which stored biometric keys (biometric verbal fingerprints) are matched in order to ascertain the identity of the caller.
- biometric engine may be deployed using commonly available software.
- One of ordinary skill in the art may deploy biometric engine technology offered by vendors such as Nuance, Persay or Validvoice, for example.
- a software state controller for the biometric engine 600 and for the natural enrolment process is resident.
- This biometric application gateway may use a variety of computer applications and languages such as C++ or Java for example.
- the Biometric Application Gateway 700 uses a secure RESTIet in order to process commands to and from the Biometric Engine 600 the Optional Preamble Engine 200; the Primary Preamble Server 300, the Enrolment/Verification Widget 550, and the Biometric Database 800.
- a variety of protocols may be used to communicate between the Biometric Application Gateway 700 and related components.
- the link between the Biometric Engine 60) and the Biometric Application Gateway 700 may be TCP/IP, HTTP or MRCP (media resource control protocol).
- the protocol between Biometric Application Gateway 700 and the Optional Preamble Engine 200 and the Primary Preamble Server 300 m ay be HTTP, TCP/IP or MRCP.
- the protocol connecting the Biometric Application Gateway 700 with the Enrolment/Verification Widget 550 may be HTTP, TCP/IP or some variety of web services.
- the Biometric Application Gateway (700) may communicate with the Biometric Application Database 800 using protocols such as JDBC or SQL Query.
- biometric complex may be implemented as a monolithic application encapsulated in a single computer, or it may be implemented as separate logical systems, distributed over a network although acting as a whole.
- voiceprints and associated scoring data are stored in a biometric database which acts as a secure repository for voiceprints captured from Enrollee/Caller 105.
- biometric keys are used to compare subsequent utterances (ostensibly verbalized by a caller whom one wishes to verify) in order to ascertain a correct match between a stored biometric key versus a real time utterance from an Enrollee/Caller 105 who claims to be the individual who had previously and successfully been enrolled or verified.
- the Conventional Automated Enrolment Process begins.
- a caller who has yet to enroll calls the telephone number associated with the Interactive Voice Response system or ACD representing the target enterprise.
- the telephone call is connected to the Optional Preamble Engine 200 or the Primary Preamble Server 300 depending on whether or not the linkage to the Biometric Complex 600, 700, 800 is achieved in a distributed fashion (with the Optional Preamble Engine sitting in front of the Primary Preamble Server) or incorporated as a function of the Primary Preamble Server.
- access to the Biometric Complex 600, 700, 800 may be achieved with a variety of methods including but not limited to the Optional Preamble Engine 200 being used as a passive listening device in front of the Primary Preamble Server 200 or as a shared resource in front of the Primary Preamble Server 300 or behind the Primary Preamble Server 300 as described in FIG. 1. This may also be achieved by providing access to the Biometric Complex 600, 700, 800 via non telephonic access methods (such as a computer microphone and VoIP arrangement) as described under the Enrollee Aspect 100 in FIG. 1.
- non telephonic access methods such as a computer microphone and VoIP arrangement
- step 2020 serves the function of collecting the voiceprint of the caller so that it can be digitized and stored as a Biometric Key inside the Biometric Complex 600, 700, 800.
- the Primary Preamble System 300 collects the standard Personal Identification Number (or customer or user number) (PIN) as typified by the majority of self-service systems currently deployed.
- PIN Personal Identification Number
- This PIN number which is used as a first stage identification may be spoken or entered via touch tone digits as will be appreciated by one of ordinary skill in the art of interactive voice response.
- this PIN number is used to compare the customer record in a standard database to ascertain whether or not the calling party has already enrolled.
- the step of collecting the PIN may optionally be skipped if it is possible to collect a biometric sample from a caller to verify the previous enrolment of the identity of the caller using a match to his stored biometric key.
- the determination of whether or not the caller has previously enrolled is made. If the person is not enrolled "a not enrolled status flag" is stored in memory. This is then used to determine the appropriate call flow to be used by the IVR. If it is ascertained that the caller has already enrolled, the system executes a verification process as outlined in either FIGs. 4 or 5 or some other appropriate process.
- step 2050 the algorithms in the PABX or ACD processes the caller as appropriate to complete enrolment. Should the user already be enrolled then step 2060 is used to process a verification of the user.
- the IVR asks the first enrolment question and collects the user response.
- the data will be updated in the Biometric Database and the call optionally passed to an Agent at 2130 should a further transaction be required by the User. Alternately control could be passed back to the top level IVR menu to allow the user to select a transaction. Alternately the call could be terminated if the only requirement was to complete enrolment.
- the Primary Preamble System 300 will have forwarded the agent identity to the Biometric Application Gateway RESTIet 700 by extracting same via common CTI data path from the ACD/PABX 400.
- the Optional Preamble Engine 200 may have a CTI data link to the ACD in order to extract chosen agent information.
- the Biometric Application Gateway RESTIet 700 may extract the chosen agent identity information via common CTI links. It is important to note that there are a variety of methods for extracting from an ACD or PABX the chosen agent information.
- the Biometric Database 800 as described in FIG. 1 could be used as a shared repository where the ACD, PABX, or CTI application gateway could deposit chosen agent data in real time. Such data may be extracted using a third party data proxy such as those supplied by Oracle Corporation.
- real time agent selection data may also be transmitted from a CTI application gateway to the Biometric Application Gateway RESTIet 700 via real time HTTP/REST or web service commands.
- the Biometric Complex 600, 700, 800 could be used to analyze the agent's voice in order for the system to identify who the agent is who answered the phone to obviate completely the need for CTI data.
- all of the enterprise agent's will have enrolled themselves in order to record a Biometric Key in the Biometric Complex 600, 700, 800.
- this Biometric Key will be associated in the Biometric Database 800 with agent name, employee number, extension number and other data to establish an agent record in the database. In this fashion an inline verification of who the agent is may be achieved without the use of CTI and without the use of extracting any data from the legacy IVR or ACD currently installed.
- the agent answers the phone and the Agent Enrolment/Verification Widget 550 is synchronized.
- the synchronization occurs either by the CTI method described above or the agent themselves biometrically verifying so that the Biometric Application Gateway RESTIet 700 knows to which Biometric Enrolment/Verification Widget 550 to send the caller data.
- the Optional Preamble Engine 200 or one of its equivalents described above is used to idle the transmit timeslot on the telephone connection so that the caller does not hear what the agent needs to say in order for the agent to complete biometric verification. While the agent is verifying the Optional Preamble Engine 200 may be equipped with sound files to play out to the caller such as call progress tones and in this particular instance call ring back. Once the agent biometric routing has been accomplished the ring back tone will cease and both parties will be able to hear each other.
- the Agent Assisted Natural Enrolment Process begins.
- a caller who has yet to enroll calls the telephone number associated with the Interactive Voice Response system or ACD representing the target enterprise.
- the telephone call is connected to the Optional Preamble Engine 200 or the Primary Preamble Server 300 depending on whether or not the linkage to the Biometric Complex 600, 700, 800 is achieved in a distributed fashion (with the Optional Preamble Engine sitting in front of the Primary Preamble Server) or incorporated as a function of the Primary Preamble Server.
- access to the Biometric Complex 600, 700, 800 may be achieved with a variety of methods including but not limited to the Optional Preamble Engine 200 being used as a passive listening device in front of the Primary Preamble Server 200 or as a shared resource in front of the Primary Preamble Server 300 or behind the Primary Preamble Server 300 as described in FIG. 1. This may also be achieved by providing access to the Biometric Complex 600, 700, 800 via non telephonic access methods (such as a computer microphone and VoIP arrangement) as described under the Enrollee Aspect 100 in FIG. 1.
- non telephonic access methods such as a computer microphone and VoIP arrangement
- step 3020 serves the function of collecting the voiceprint of the caller so that it can be digitized and stored as a Biometric Key inside the Biometric Complex 600, 700, 800.
- the Primary Preamble System 300 collects the standard Personal Identification Number (or customer or user number) (PIN) as typified by the majority of self-service systems currently deployed.
- PIN Personal Identification Number
- This PIN number which is used as a first stage identification may be spoken or entered via touch tone digits as is commonly achieved by any one of ordinary skill in the art of interactive voice response.
- this PIN number is used to compare the customer record in a standard database to ascertain whether or not the calling party has already enrolled.
- the step of collecting the PIN may be optionally skipped if it is possible to collect a biometric sample from a caller to ascertain the previous enrolment of the identity of the caller using a match to his stored biometric key.
- the determination of whether or not the caller has previously enrolled is made. If the person is not enrolled "a not enrolled status flag" is stored in memory and will be used later in the sequence to push that flag to the appropriate agent's Agent Enrolment/Verification Widget 550 in order to alert that agent that full Agent Assisted Natural Enrolment will be required. If it is ascertained that the caller has enrolled, the system will store the confidence score of the current utterances in order to alert the agent via the desktop widget whether subsequent live verification is appropriate.
- Such utterances will be solicited as part of a regular IVR process either by the Optional Preamble Engine 200 or the Primary Preamble System 300; regardless the Optional Preamble Engine 200 function will be listening and forwarding the recorded speech data to the Biometric Complex 600, 700, 800.
- the algorithms in the PABX or ACD will route the caller to the appropriate agent at the same time any data that was stored relative to the caller having already been enrolled or scores of a current utterance will be forwarded to the appropriate Agent Enrollmen erification Widget 550. These data are conveyed to the Agent EnrolmentA erification Widget 550 via the Biometric Application Gateway RESTIet 700 as described in FIG. 1.
- the Primary Preamble System 300 will have forwarded the agent identity to the Biometric Application Gateway RESTIet 700 by extracting same via common CTI data path from the ACD/PABX 400.
- the Optional Preamble Engine 200 may have a CTI data link to the ACD in order to extract chosen agent information.
- the Biometric Application Gateway RESTIet 700 may extract the chosen agent identity information via common CTI links. It is important to note that there are a variety of methods for extracting from an ACD or PABX the chosen agent information.
- the Biometric Database 800 as described in FIG. 1 could be used as a shared repository where the ACD, PABX, or CTI application gateway could deposit chosen agent data in real time. Such data may be extracted using a third party data proxy such as those supplied by Oracle Corporation.
- real time agent selection data may also be transmitted from a CTI application gateway to the Biometric Application Gateway RESTIet 700 via real time HTTP/REST or web service commands.
- the Biometric Complex 600, 700, 800 could be used to analyze the agent's voice in order for the system to identify who the agent is who answered the phone to obviate completely the need for CTI data.
- all of the enterprise agent's will have enrolled themselves in order to record Biometric Keys in the Biometric Complex 600, 700, 800.
- this Biometric Key will be associated in the Biometric Database 800 with agent name, employee number, extension number and other data to establish an agent record in the database. In this fashion an inline verification of who the agent is may be achieved without the use of CTI and without the use of extracting any data from the legacy IVR or ACD currently installed.
- the agent answers the phone and the Agent EnrolmentA erification Widget 550 is synchronized.
- the synchronization occurs either by the CTI method described above or the agent themselves being biometrically verified so that the Biometric Application Gateway RESTIet 700 knows to which Biometric Enrolment/Verification Widget (550) to send the caller data.
- the Optional Preamble Engine 200 or one of its equivalents described above shall be used to idle the transmit timeslot on the telephone connection so that the caller does not hear what the agent needs to say in order for the agent to perform biometric verification. While the agent is verifying, the Optional Preamble Engine 200 may be equipped with sound files to play out to the caller such as call progress tones and in this particular instance a call ring back tone. Once the agent biometric routing has been accomplished the ring back tone will cease and both parties will be able to hear each other.
- the agent is prepared to begin asking verification questions, the caller's answers to which may be used to compare the caller biometric key with the stored one (assuming the caller has already enrolled), or in the case of an already enrolled caller whose biometric score is low the agent will be prepared to capture additional samples to bolster the confidence score of the biometric engine.
- the Agent Enrolment/Verification Widget 550 may be equipped with a button that allows the agents to mute themselves after asking the questions so the Biometric Complex 600, 700, 800 is recording only voice print samples from a caller.
- the agent makes a determination of the scoring at that point in time.
- the agent will ask an additional verification question if in the normal course of live verification another question is required based on the business rules of that enterprise or if more voiceprint data are required to complete the enrolment.
- the agent makes a determination of the scoring at that point in time.
- the agent will ask an additional verification question if in the normal course of live verification another question is required based on the business rules of that enterprise or if more voiceprint data is required to complete the enrolment.
- the agent is able to make a judgment based on the answers to the verification steps as to whether or not the caller is who they claim to be. The agent is then able to select a pass or fail button on the Agent Verification/Enrolment Widget 550 which subsequently communicates with the Biometric Application Gateway RESTIet 700 that the caller has passed or failed.
- the Biometric Application Gateway RESTIet 700 accesses the Biometric Database 800 in order to set the Enrolment Verification pass/fail flag in the caller record.
- the agent will be able to use the standard process established by that enterprise of resetting the PIN as described in step 3030. This is to ensure that a fraudulent caller who may have an intention to steal the identity of the true caller will not be able to use the PIN that gave him access at the beginning of the process 3000.
- the Conventional Automated Verification Process begins.
- a caller who has already enrolled calls the telephone number associated with the Interactive Voice Response system or ACD representing the target enterprise.
- the telephone call is connected to the Optional Preamble Engine 200 or the Primary Preamble Server 300 depending on whether or not the linkage to the Biometric Complex 600, 700, 800 is achieved in a distributed fashion (with the Optional Preamble Engine sitting in front of the Primary Preamble Server) or incorporated as a function of the Primary Preamble Server.
- access to the Biometric Complex 600, 700, 800 may be achieved with a variety of methods including but not limited to the Optional Preamble Engine 200 being used as a passive listening device in front of the Primary Preamble Server 200 or as a shared resource in front of the Primary Preamble Server 300 or behind the Primary Preamble Server 300 as described in FIG. 1. This may also be achieved by providing access to the Biometric Complex 600, 700, 800 via non telephonic access methods (such as a computer microphone and VoIP arrangement) as described under the Enrollee Aspect 100 in FIG. 1.
- non telephonic access methods such as a computer microphone and VoIP arrangement
- step 4020 serves the function of collecting the voiceprint of the caller so that it can be digitized and stored as a Biometric Key inside the Biometric Complex 600, 700, 800.
- the Primary Preamble System 300 collects the standard Personal Identification Number (or customer or user number) (PIN) as typified by the majority of self-service systems currently deployed.
- PIN Personal Identification Number
- This PIN number which is used as a first stage identification may be spoken or entered via touch tone digits as is commonly achieved by one of ordinary skill in the art of interactive voice response.
- this PIN number will be used to compare the customer record in a standard database to ascertain whether or not the calling party has already enrolled.
- the step of collecting the PIN may be skipped if it is possible to collect a biometric sample from a caller to ascertain the previous enrolment of the identity of the caller using a match to their stored biometric key.
- the determination of whether or not the caller has previously enrolled is made. If the person is not enrolled "a not enrolled status flag" is stored in memory. This is then used to determine the appropriate call flow to be used by the IVR. If it is ascertained that the caller has not enrolled, the system executes an Enrolment process as outlined in either FIG. 2 or 3 or some other appropriate process.
- the IVR asks the first verification question and collects the user response.
- Agent Enrolment/Verification Widget 550 via the Biometric Application Gateway RESTIet 700 as described in FIG 1.
- the agent may then choose to assist the user/enrollee perhaps with a process similar to that outlined in FIG. 3.
- the Primary Preamble System 300 will have forwarded the agent identity to the Biometric Application Gateway RESTIet 700 by extracting same via common CTI data path from the ACD/PABX 40).
- the Optional Preamble Engine 200 may have a CTI data link to the ACD in order to extract chosen agent information.
- the Biometric Application Gateway RESTIet 700 may extract the chosen agent identity information via common CTI links. It is important to note that there are a variety of methods for extracting from an ACD or PABX the chosen agent information.
- the Biometric Database 800 as described in FIG. 1 could be used as a shared repository where the ACD, PABX, or CTI application gateway could deposit chosen agent data in real time. Such data may be extracted using a third party data proxy such as those supplied by Oracle Corporation.
- real time agent selection data may also be transmitted from a CTI application gateway to the Biometric Application Gateway RESTIet 700 via real time HTTP/REST or web service commands.
- the Biometric Complex 600, 700,800 could be used to analyze the agent's voice in order for the system to identify the agent who answered the phone to obviate completely the need for CTI data.
- all of the enterprise agent's will have enrolled themselves in order to record a Biometric Key in the Biometric Complex 600, 700, 800.
- this Biometric Key will be associated in the Biometric Database 800 with agent name, employee number, extension number and other data to establish an agent record in the database. In this fashion an inline verification of the agent's identity can be achieved without the use of CTI and without the use of extracting any data from the legacy IVR or ACD currently installed.
- the agent answers the phone and the Agent Enrolment/Verification Widget 550 is synchronized.
- the synchronization occurs either by the CTI method described above or by the agents themselves being biometrically verified so that the Biometric Application Gateway RESTIet 700 knows to which Biometric Enrolment/ Verification Widget 550 to send the caller data.
- the Optional Preamble Engine 200 or one of its equivalents described above is used to idle the transmit timeslot on the telephone connection so that the caller does not hear what the agent needs to say in order for the agent to complete biometric verification. While the agent is verifying, the Optional Preamble Engine 200 may be equipped with sound files to play to the caller such as call progress tones and in this particular instance a ring back tone. Once the agent biometric routing has been accomplished the ring back tone will be cease and the parties will be able to hear each other.
- Agent assisted verification process Figure 5.
- the Live Agent Assisted Verification Process begins.
- a caller who has already Enrolled calls the telephone number associated with the Interactive Voice Response system or ACD representing the target enterprise.
- the telephone call is connected to the Optional Preamble Engine 200 or the Primary Preamble Server 300 depending on whether or not the linkage to the Biometric Complex 600, 700, 800 is achieved in a distributed fashion (with the Optional Preamble Engine sitting in front of the Primary Preamble Server) or incorporated as a function of the Primary Preamble Server.
- access to the Biometric Complex 600, 700, 800 may be achieved by means of a variety of methods including but not limited to the Optional Preamble Engine 200 being used as a passive listening device in front of the Primary Preamble Server 200 or as a shared resource in front of the Primary Preamble Server 300 or behind the Primary Preamble Server 300 as described in FIG. 1. This may also be achieved by providing access to the Biometric Complex 600, 700, 800 via non telephonic access methods (such as a computer microphone and VoIP arrangement) as described under the Enrollee Aspect 100 in FIG. 1.
- non telephonic access methods such as a computer microphone and VoIP arrangement
- the Primary Preamble System 300 collects the standard Personal Identification Number (or customer or user number) (PIN) as typified by the majority of self-service systems currently deployed.
- PIN Personal Identification Number
- This PIN number which is used as a first stage identification may be spoken or entered via touch tone digits as is apparent to any one of ordinary skill in the art of interactive voice response.
- this PIN number will be used to compare the customer record in a standard database to ascertain whether or not the calling party has already enrolled.
- the step of collecting the PIN may be optionally skipped if it is possible to collect a biometric sample from a caller to ascertain the previous enrolment of the identity of the caller using a match to their stored biometric key.
- the determination of whether or not the caller has previously enrolled is made. If the person is not enrolled "a not enrolled status flag" is stored in memory and at 5045 control is passed to the process as outlined in FIG. 3 from step 3050 where the flag will be used later in the sequence to push that flag to the appropriate agent's Agent Enrolmen erification Widget 550 in order to alert that agent that full Agent Assisted Natural Enrolment will be required. If it is ascertained that the caller has already enrolled, the system will store the confidence score of the current utterances in order to alert the agent via the desktop widget whether subsequent live verification is appropriate.
- Such utterances will be solicited as part of a regular IVR process either by the Optional Preamble Engine 200 or the Primary Preamble System 300; in either case the Optional Preamble Engine 200 function will be listening and forwarding the recorded speech data to the Biometric Complex 600, 700, 800.
- the algorithms in the PABX or ACD will route the caller to the appropriate agent at the same time any data that was stored relative to the caller having already been enrolled or scores of a current utterance will be forwarded to the appropriate Agent Enrollment/Verification Widget 550. These data are conveyed to the Agent Enrolment/Verification Widget 550 via the Biometric Application Gateway RESTIet 700 as described in FIG. 1.
- the Primary Preamble System 300 will have forwarded the agent identity to the Biometric Application Gateway RESTIet 700 by extracting same via common CTI data path from the ACD/PABX 400.
- the Optional Preamble Engine 200 may have a CTI data link to the ACD in order to extract chosen agent information.
- the Biometric Application Gateway RESTIet 700 may extract the chosen agent identity information via common CTI links. It is important to note that there are a variety of methods for extracting from an ACD or PABX the chosen agent information.
- the Biometric Database 800 as described in FIG. 1 could be used as a shared repository where the ACD, PABX, or CTI application gateway could deposit chosen agent data in real time. Such data may be extracted using a third party data proxy such as those supplied by Oracle Corporation.
- real time agent selection data may also be transmitted from a CTI application gateway to the Biometric Application Gateway RESTIet 700 via real time HTTP/REST or web service commands.
- the Biometric Complex 600, 700, 800 could be used to analyze the agent's voice in order for the system to identify the agent who answered the phone to obviate completely the need for CTI data.
- all of the enterprise agent's will have enrolled themselves in order to record a Biometric Key in the Biometric Complex 600, 700, 800.
- this Biometric Key will be associated in the Biometric Database 800 with agent name, employee number, extension number and other data to establish an agent record in the database. In this fashion an inline verification of agent identity can be achieved without the use of CTI and without the use of extracting any data from the legacy IVR or ACD currently installed.
- the agent answers the phone and the Agent EnrolmentA erification Widget 550 is synchronized.
- the synchronization occurs either by the CTI method described above or the agents biometrically verifying themselves so that the Biometric Application Gateway RESTIet 700 knows to which Biometric Enrolment/Verification Widget 550 to send the caller data.
- the Optional Preamble Engine 200 or one of its equivalents described above shall be used to idle the transmit timeslot on the telephone connection so that the caller does not hear what the agent needs to say in order for the agent to achieve biometric verification. While the agent is verifying, the Optional Preamble Engine (200) may be equipped with sound files to play to the caller such as call progress tones and in this particular instance ring back tones. Once the agent biometric routing has been accomplished the ring back tone will cease and the parties will be able to hear each other.
- the agent is prepared to begin asking verification questions, the caller's answers to which may be used to compare the caller biometric key with the stored one (assuming the caller has already enrolled), or in the case of an already enrolled caller whose biometric score is low the agent will be prepared to capture additional samples to bolster the confidence score of the biometric engine.
- the Agent EnrolmentA erification widget 550 may be equipped with a button that allows the agent to mute them self after asking the question so the Biometric Complex 600, 700, 800 is only recording voice print samples from a caller.
- the agent makes a determination of the scoring at that point in time.
- the agent will ask another verification question if in the normal course of live verification another question is required based on the business rules of that enterprise or if more voiceprint data are required to complete the enrolment.
- the agent makes a determination of the scoring at that point in time.
- the agent will ask another verification question if in the normal course of live verification another question is required based on the business rules of that enterprise or if more voiceprint data are required to complete the enrolment.
- the agent is able to make a judgment based on the answers to the verification steps as to whether or not the caller is who they claim to be. The agent is then able to select a pass or fail button on the Agent Verification/Enrolment Widget 550 which subsequently communicates with the Biometric Application Gateway RESTIet 700 that the caller has passed or failed.
- the Biometric Application Gateway RESTIet 700 accesses the Biometric Database 800 in order to set the Enrolment/Verification pass/fail flag in the caller record.
- the agent will be able to use the standard process established by that enterprise of resetting the PIN as described in step 5030. This is to ensure that a fraudulent caller who may have an intention to steal the identity of the true caller will not be able to use the PIN that gave him access at the beginning of the process 5000.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Marketing (AREA)
- Telephonic Communication Services (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
Description
Claims
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CA2823577A CA2823577A1 (en) | 2011-01-10 | 2012-01-09 | Natural enrolment process for speaker recognition |
| KR1020137020351A KR101626302B1 (en) | 2011-01-10 | 2012-01-09 | Natural enrolment process for speaker recognition |
| EP12734541.1A EP2663977A4 (en) | 2011-01-10 | 2012-01-09 | NATURAL REGISTRATION TREATMENT FOR SPEAKER RECOGNITION |
| AU2012205747A AU2012205747B9 (en) | 2011-01-10 | 2012-01-09 | Natural enrolment process for speaker recognition |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201161431402P | 2011-01-10 | 2011-01-10 | |
| US61/431,402 | 2011-01-10 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2012096901A2 true WO2012096901A2 (en) | 2012-07-19 |
| WO2012096901A3 WO2012096901A3 (en) | 2012-10-26 |
Family
ID=46507628
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2012/020679 Ceased WO2012096901A2 (en) | 2011-01-10 | 2012-01-09 | Natural enrolment process for speaker recognition |
Country Status (5)
| Country | Link |
|---|---|
| EP (1) | EP2663977A4 (en) |
| KR (1) | KR101626302B1 (en) |
| AU (1) | AU2012205747B9 (en) |
| CA (1) | CA2823577A1 (en) |
| WO (1) | WO2012096901A2 (en) |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2913822A1 (en) * | 2014-02-28 | 2015-09-02 | Nokia Technologies OY | Speaker recognition method |
| CN108074577A (en) * | 2016-11-09 | 2018-05-25 | 上海诺悦智能科技有限公司 | Identity identifying method and identity authorization system |
| CN109102810A (en) * | 2017-06-21 | 2018-12-28 | 北京搜狗科技发展有限公司 | Method for recognizing sound-groove and device |
| CN114270301A (en) * | 2019-08-27 | 2022-04-01 | 索尼集团公司 | Agent providing system, agent providing method and recording medium |
| WO2022072655A1 (en) * | 2020-10-01 | 2022-04-07 | Pindrop Security, Inc. | Enrollment and authentication over a phone call in call centers |
| US11983259B2 (en) * | 2017-08-09 | 2024-05-14 | Nice Inc. | Authentication via a dynamic passphrase |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2545534B (en) * | 2016-08-03 | 2019-11-06 | Cirrus Logic Int Semiconductor Ltd | Methods and apparatus for authentication in an electronic device |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6078807A (en) | 1997-08-26 | 2000-06-20 | International Business Machines Corporation | Telephony fraud detection using voice recognition techniques |
| US20030046083A1 (en) | 1996-11-22 | 2003-03-06 | Edward J. Devinney | User validation for information system access and transaction processing |
| US20060106605A1 (en) | 2004-11-12 | 2006-05-18 | Saunders Joseph M | Biometric record management |
| US7212613B2 (en) | 2003-09-18 | 2007-05-01 | International Business Machines Corporation | System and method for telephonic voice authentication |
| US20070106517A1 (en) | 2005-10-21 | 2007-05-10 | Cluff Wayne P | System and method of subscription identity authentication utilizing multiple factors |
| US7367049B1 (en) | 2001-09-21 | 2008-04-29 | Pay By Touch Checking Resources, Inc. | System and method for enrolling in a biometric system |
| US20100204993A1 (en) | 2006-12-19 | 2010-08-12 | Robert Vogt | Confidence levels for speaker recognition |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6092192A (en) * | 1998-01-16 | 2000-07-18 | International Business Machines Corporation | Apparatus and methods for providing repetitive enrollment in a plurality of biometric recognition systems based on an initial enrollment |
| US7054811B2 (en) * | 2002-11-06 | 2006-05-30 | Cellmax Systems Ltd. | Method and system for verifying and enabling user access based on voice parameters |
| US7254383B2 (en) * | 2004-07-30 | 2007-08-07 | At&T Knowledge Ventures, L.P. | Voice over IP based biometric authentication |
| JP4679919B2 (en) * | 2005-02-10 | 2011-05-11 | Kddi株式会社 | Distributed speaker verification device, distributed speaker verification terminal device, and computer program |
| US20060277043A1 (en) * | 2005-06-06 | 2006-12-07 | Edward Tomes | Voice authentication system and methods therefor |
| US8010367B2 (en) * | 2006-12-22 | 2011-08-30 | Nuance Communications, Inc. | Spoken free-form passwords for light-weight speaker verification using standard speech recognition engines |
-
2012
- 2012-01-09 KR KR1020137020351A patent/KR101626302B1/en active Active
- 2012-01-09 CA CA2823577A patent/CA2823577A1/en not_active Abandoned
- 2012-01-09 AU AU2012205747A patent/AU2012205747B9/en active Active
- 2012-01-09 WO PCT/US2012/020679 patent/WO2012096901A2/en not_active Ceased
- 2012-01-09 EP EP12734541.1A patent/EP2663977A4/en not_active Withdrawn
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030046083A1 (en) | 1996-11-22 | 2003-03-06 | Edward J. Devinney | User validation for information system access and transaction processing |
| US6078807A (en) | 1997-08-26 | 2000-06-20 | International Business Machines Corporation | Telephony fraud detection using voice recognition techniques |
| US7367049B1 (en) | 2001-09-21 | 2008-04-29 | Pay By Touch Checking Resources, Inc. | System and method for enrolling in a biometric system |
| US7212613B2 (en) | 2003-09-18 | 2007-05-01 | International Business Machines Corporation | System and method for telephonic voice authentication |
| US20060106605A1 (en) | 2004-11-12 | 2006-05-18 | Saunders Joseph M | Biometric record management |
| US20070106517A1 (en) | 2005-10-21 | 2007-05-10 | Cluff Wayne P | System and method of subscription identity authentication utilizing multiple factors |
| US20100204993A1 (en) | 2006-12-19 | 2010-08-12 | Robert Vogt | Confidence levels for speaker recognition |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP2663977A4 |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2913822A1 (en) * | 2014-02-28 | 2015-09-02 | Nokia Technologies OY | Speaker recognition method |
| CN108074577A (en) * | 2016-11-09 | 2018-05-25 | 上海诺悦智能科技有限公司 | Identity identifying method and identity authorization system |
| CN109102810A (en) * | 2017-06-21 | 2018-12-28 | 北京搜狗科技发展有限公司 | Method for recognizing sound-groove and device |
| US11983259B2 (en) * | 2017-08-09 | 2024-05-14 | Nice Inc. | Authentication via a dynamic passphrase |
| CN114270301A (en) * | 2019-08-27 | 2022-04-01 | 索尼集团公司 | Agent providing system, agent providing method and recording medium |
| US12277636B2 (en) | 2019-08-27 | 2025-04-15 | Sony Group Corporation | Agent providing system, agent providing method, and recording medium |
| WO2022072655A1 (en) * | 2020-10-01 | 2022-04-07 | Pindrop Security, Inc. | Enrollment and authentication over a phone call in call centers |
| US11783839B2 (en) | 2020-10-01 | 2023-10-10 | Pindrop Security, Inc. | Enrollment and authentication over a phone call in call centers |
| US12159633B2 (en) | 2020-10-01 | 2024-12-03 | Pindrop Security, Inc. | Enrollment and authentication over a phone call in call centers |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2012096901A3 (en) | 2012-10-26 |
| EP2663977A4 (en) | 2016-12-28 |
| AU2012205747B2 (en) | 2015-01-15 |
| AU2012205747B9 (en) | 2015-02-12 |
| CA2823577A1 (en) | 2012-07-19 |
| AU2012205747A1 (en) | 2013-07-18 |
| EP2663977A2 (en) | 2013-11-20 |
| KR101626302B1 (en) | 2016-06-01 |
| KR20130133828A (en) | 2013-12-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7340042B2 (en) | System and method of subscription identity authentication utilizing multiple factors | |
| US11210461B2 (en) | Real-time privacy filter | |
| AU2012205747B2 (en) | Natural enrolment process for speaker recognition | |
| US8014496B2 (en) | Systems and methods for providing network-based voice authentication | |
| US8812319B2 (en) | Dynamic pass phrase security system (DPSS) | |
| US10122712B2 (en) | Voice over IP based biometric authentication | |
| US9837078B2 (en) | Methods and apparatus for identifying fraudulent callers | |
| US8626513B2 (en) | Centralized biometric authentication | |
| US20090259470A1 (en) | Bio-Phonetic Multi-Phrase Speaker Identity Verification | |
| US10511712B2 (en) | Caller identification in a secure environment using voice biometrics | |
| US20250365372A1 (en) | Secure call routing system | |
| US20250365281A1 (en) | One time voice passphrase to protect against man-in-the-middle attack | |
| EP4002900A1 (en) | Method and device for multi-factor authentication with voice based authentication | |
| Fogel | A Commercial Implementation of a Free-Speech Speaker Verification System in a Call Center | |
| WO2018046945A1 (en) | Providing a trusted telephone number | |
| HK1237158A1 (en) | Method and system for filtering undesirable incoming telephone calls |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12734541 Country of ref document: EP Kind code of ref document: A2 |
|
| DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
| ENP | Entry into the national phase |
Ref document number: 2823577 Country of ref document: CA |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2012205747 Country of ref document: AU Date of ref document: 20120109 Kind code of ref document: A |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2012734541 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 20137020351 Country of ref document: KR Kind code of ref document: A |