白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Passive authentication through voice data analysis

專利號(hào)
US10867612B1
公開日期
2020-12-15
申請(qǐng)人
United Services Automobile Association (USAA)(US TX San Antonio)
發(fā)明人
Jeffrey Neal Pollack; Michael E'shawn Weaver; Andrew L. Anaruk
IPC分類
G10L17/22; G06F21/32; H04L9/32; G10L17/02; H04L29/06; G10L15/26; G06K9/00; G10L15/02
技術(shù)領(lǐng)域
speech,user,or,data,may,pa,device,cui,in,be
地域: TX TX San Antonio

摘要

Techniques are described for passive authentication based at least partly on collected voice data of a user. During a speech interaction between a user and a personal assistant (PA) device, the user's speech may be analyzed to authenticate the user. The authentication of the user may be a passive authentication, in which the user is not explicitly asked to provide authenticating credentials. Instead, the speech data of the user is collected during the user's interactions with the PA device, and the collected speech data is compared to a previously developed model of the user's speech. The user is successfully authenticated based on determining that there is sufficient correspondence between the collected speech data and the model of the user's speech. After the user is authenticated passively during the conversation, they may be able to access sensitive data or services that may not be otherwise inaccessible without authentication.

說(shuō)明書

In some implementations, the model 128 for a user's speech and/or appearance may be trained or otherwise developed using one or more suitable machine learning (ML) techniques. In such implementations, the successful or unsuccessful passive authentication of the user, and/or the successful or unsuccessful action authentication of the user, may be used for further train and/or otherwise refine the model to provide a more accurate result. For example, if the user is successfully actively authenticated following an unsuccessful attempt at passive authentication, the model may be refined to incorporate the speech data and/or video data characteristics that were previously provided and led to the unsuccessful passive attempt. Accordingly, the model may, during subsequent authentication attempts, be more likely to successfully passively authenticate the user if the same or similar speech data and/or video data is provided during the subsequent attempts. In this way, the model for a user may be retrained and/or refined over time to provide a more accurate determination of the user's identity. Moreover, the retraining of the model over time may account for changes in the user's speech and/or appearance with age, season of the year, time of day, and so forth.

權(quán)利要求

1
微信群二維碼
意見反饋