白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Passive authentication through voice data analysis

專利號(hào)
US10867612B1
公開日期
2020-12-15
申請(qǐng)人
United Services Automobile Association (USAA)(US TX San Antonio)
發(fā)明人
Jeffrey Neal Pollack; Michael E'shawn Weaver; Andrew L. Anaruk
IPC分類
G10L17/22; G06F21/32; H04L9/32; G10L17/02; H04L29/06; G10L15/26; G06K9/00; G10L15/02
技術(shù)領(lǐng)域
speech,user,or,data,may,pa,device,cui,in,be
地域: TX TX San Antonio

摘要

Techniques are described for passive authentication based at least partly on collected voice data of a user. During a speech interaction between a user and a personal assistant (PA) device, the user's speech may be analyzed to authenticate the user. The authentication of the user may be a passive authentication, in which the user is not explicitly asked to provide authenticating credentials. Instead, the speech data of the user is collected during the user's interactions with the PA device, and the collected speech data is compared to a previously developed model of the user's speech. The user is successfully authenticated based on determining that there is sufficient correspondence between the collected speech data and the model of the user's speech. After the user is authenticated passively during the conversation, they may be able to access sensitive data or services that may not be otherwise inaccessible without authentication.

說明書

The details of one or more implementations of the present disclosure are set forth in the accompanying drawings and the description below. Other features and advantages of the present disclosure will be apparent from the description and drawings, and from the claims.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 depicts an example system for user authentication, according to implementations of the present disclosure.

FIG. 2 depicts an example speech interaction between a user and a personal assistant device, according to implementations of the present disclosure.

FIG. 3 depicts a flow diagram of an example process for authenticating a user, according to implementations of the present disclosure.

FIG. 4 depicts an example computing system, according to implementations of the present disclosure.

DETAILED DESCRIPTION

權(quán)利要求

1
微信群二維碼
意見反饋