EP0991990A1 - Access-controlled computer system with automatic speech recognition - Google Patents

Access-controlled computer system with automatic speech recognition

Info

Publication number
EP0991990A1
EP0991990A1 EP98930984A EP98930984A EP0991990A1 EP 0991990 A1 EP0991990 A1 EP 0991990A1 EP 98930984 A EP98930984 A EP 98930984A EP 98930984 A EP98930984 A EP 98930984A EP 0991990 A1 EP0991990 A1 EP 0991990A1
Authority
EP
European Patent Office
Prior art keywords
user
specific
speech
identification
specific user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP98930984A
Other languages
German (de)
French (fr)
Inventor
Dirk Van Compernolle
Scott Garlick
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lernout and Hauspie Speech Products NV
Original Assignee
Lernout and Hauspie Speech Products NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lernout and Hauspie Speech Products NV filed Critical Lernout and Hauspie Speech Products NV
Publication of EP0991990A1 publication Critical patent/EP0991990A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/16Sound input; Sound output
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification

Definitions

  • the present invention relates to access-controlled computer systems, and more particularly to such systems with automatic speech recognition.
  • a computer system for operation based on text inputs derived from automatic recognition of speech of a plurality of users providing spoken inputs.
  • the system has a plurality of speech - enabled terminals, each terminal for receiving speech from a user.
  • An identification comparator compares a non-keyboard user identification provided by a specific user with data stored in a user identification data base to determine if the specific user is an authorized user.
  • an automatic speech recognizer derives text from speech provided by the specific user at a given one of the speech-enabled terminals.
  • a profile loader is provided to load a user-specific profile pertinent to the specific user into the automatic speech recognizer; and, finally, a system access provider provides computing access to the specific user if determined to be authorized by the identification comparator.
  • the non-keyboard user identification is spoken by the specific user or alternatively contained in a digitally encoded card presented by the specific user.
  • the user identification database may contain voice prints of authorized users, and the identification comparator compares a voice print derived from the spoken user identification with voice prints in the user identification database.
  • the user identification database may contain passwords of authorized users and the spoken user identification is a password; the user identification database may optionally store the passwords as text derived from utterances using automatic speech recognition.
  • each speech-enabled terminal is coupled to a telephone line permitting a user to access the computer system by telephone.
  • each speech-enabled terminal is associated with a separate local processor and a local automatic speech recognizer.
  • the system may additionally include a user verification comparator for comparing a user verification provided by the specific user with data stored in a user verification data base to verify the identity of the specific user as an authorized user.
  • the system access provider provides computing access to the specific user only if the identity of the specific user has been verified as an authorized user by the verification comparator.
  • the user verification may be spoken by the specific user, or alternatively may, for example, be entered by means of a keyboard or by other non-keyboard means .
  • a method for providing access to a computer system that has an automatic speech recognizer and operates based on text inputs derived from automatic recognition of speech from a plurality of users provided via a plurality of speech-enabled terminals.
  • the access is provided to a specific user at a given one of the speech-enabled terminals.
  • the method includes the following steps: a. receiving a non-keyboard user identification provided by the specific user; b. comparing the user identification with data stored in a user identification data base to determine whether the specific user is an authorized user; and c. if the specific user has been determined to be an authorized user, i.
  • Further and related embodiments include the steps of receiving a user verification provided by the specific user and comparing the user verification with data stored in a user verification data base to verify the identity of the specific user as an authorized user.
  • the step of providing access to the system to the specific user is performed only if the identity of the specific user has been verified as an authorized user.
  • the user identification and the user verification may be implemented as discussed above.
  • a method for providing access by a plurality of users to a computer system having automatic recognition of speech provided at a plurality of speech- enabled terminals includes the steps of a. generating a prompt for a spoken user identification over one of the plurality of speech-enabled terminals; b. comparing the spoken user identification with data stored in a user identification data base to determine if the user is an authorized user; c. providing an automatic speech recognizer for deriving text from speech provided at a speech-enabled terminal; d. loading user-specific profiles pertinent to a user who has been determined to be authorized into the automatic speech recognizer; and e. providing access to the system to a user who has been determined to be authorized.
  • Fig. 1 is a block diagram of a system to which the present invention is applicable;
  • Fig. 2 is a block diagram of a method in accordance with a preferred embodiment of the invention;
  • Fig. 3 is a block diagram of a method, similar to that of Fig. 2, but also providing user verification;
  • Fig. 4 is a block diagram of a preferred embodiment of a system in accordance with a preferred embodiment of the invention corresponding generally to the method of Fig. 3.
  • FIG. 1 is a block diagram of a system to which the present invention is applicable.
  • a computer system 11 has a plurality of speech-enabled terminals 131 , 132, ... 133 to accommodate up to an arbitrary number n of users.
  • the computer system includes an automatic speech recognizer 12.
  • the speech recognizer may be hard wired or it may be implemented as a process running in the computer system 1 1.
  • the computer system may include a general purpose computer in which the process is defined by a computer program loaded into the computer.
  • Each of the speech-enabled terminals 131 , 132, ... 133 may be associated with a separate local processor; in such a configuration, each local processor may be associated with a local automatic speech recognizer.
  • the local automatic speech recognizer may, but need not necessarily, be implemented as a process running in the local processor.
  • Each of the speech-enabled terminals 131 , 132, ... 133 may also (or alternatively) be coupled to a telephone line permitting a user to access the computer system by telephone.
  • Fig. 2 is a block diagram of a method, in accordance with a preferred embodiment of the invention, for providing access by a plurality of users to a computer system having automatic recognition of speech provided at a plurality of speech-enabled terminals.
  • a non- keyboard user identification is provided over one of the speech-enabled terminals 131, 132, ... 133 of Fig. 1.
  • the user identification may, for example, be spoken via microphone or be contained in a digitally encoded card presented by the user to a card reader.
  • the user identification is compared with data stored in a user identification data base to determine if the user is an authorized user.
  • the user identification database contains voice prints of authorized users, and in step 22, the comparison is between a voice print derived from the spoken user identification with voice prints in the user identification database.
  • the user identification database contains passwords of authorized users and the spoken user identification is a password; in such a case, the spoken input may be processed initially by a speech recognizer associated with the system. If in step 23, the comparison shows that there is not a match, and if in step 24 the match has not failed three times, the method permits the receipt of a new user identification in step 21 , and the comparison of step 22 is reinitiated. If in step 24 the match has failed three times, the method terminates in step 27.
  • step 25 a user-specific profile is loaded for automatic speech recognition of the user who has been determined to be authorized.
  • step 26 access to the system is provided to the user who has been determined to be authorized.
  • the level of access to the system may be controlled on a user-by-user basis in accordance with standard techniques known in the art for computer networks; thus the level of access by a user to the system may be subject to control, and the user will be given the level of access for which the system has been configured to provide to such user.
  • Fig. 3 is a block diagram of a method, similar to that of Fig. 2, but also providing user verification. Steps 31 , 32, 33, 34, 35, 36 and 37 of Fig. 3 are comparable to steps 21 , 22, 23, 24, 25, 26, and 27 of Fig. 2 previously discussed. However, if a user identification has been matched as a result of the comparison step 32, the method next proceeds with a user verification procedure. In step 381 , the user verification is received. Such a verification may be spoken, or alternatively may be entered by keyboard, or may be provided by other non-keyboard arrangements. In step 382, the user verification is compared with data in a user verification data base.
  • step 383 If there is a match in step 383, then the user-specific profile for automatic speech recognition is loaded into the recognizer (step 35), and computing access is provided to the user at the level for which the user is authorized (step 36). If there is no match, in step 384, the method tests to determine whether there have been three consecutive failed matches, and if so, the method terminates; otherwise processing is repeated back at step 31.
  • Fig. 4 is a block diagram of a preferred embodiment of a system in accordance with a preferred embodiment of the invention corresponding generally to the method of Fig. 3.
  • the system includes speech-enabled terminals 41 from which may be received a spoken user identification.
  • An automatic speech recognizer 46 has two modes of operation. In a first mode, the recognizer can operate in speaker-independent fashion to recognize a spoken user identification, which is fed to the identification comparator 42, and a user verification, which is fed to verification comparator 43. In a second mode, the recognizer can operate in speaker-dependent fashion, utilizing additional information in the form of a user-specific profile for a user that has been identified by the identification comparator 42.
  • an applicable one of the user-specific profiles can be loaded after an unverified user identification has been made by the identification comparator 42, and the recognizer can operate in a speaker-dependent mode when feeding text to the verification comparator.
  • the comparators 42 and 43 may in fact be implemented in an integrated arrangement. For example, a user speaking his name (or a password uniquely identifying him) can provide a basis for both identification as well as verification using speaker-dependent templates. Further material on speech recognizer design may be found, for example, in Rabiner and Juang, Fundamentals of Speech Recognition, 1993, which is hereby incorporated herein by reference. In operation, a user identification is received by the identification comparator 42.
  • the identification can take many forms, including speech (which is here converted to text by the recognizer 46 to furnish an input to the comparator 42) or a digitally encoded card that is read by a card reader.
  • a user identification that has been received by the identification comparator is stored in storage region 421.
  • identification comparator 42 compares the user identification that is stored in storage region 421 with user identification data in the identification data base that is stored in storage region 422. If the comparator 42 makes a successful match, then operation of the verification comparator 43 is triggered.
  • the verification comparator receives a text input from the recognizer 46, and the input is stored in region 431 and compared with data in the verification data base that is stored in region 432.
  • the profile loader 44 is caused to access and load one of the user-specific profiles (corresponding to the user who was matched by the comparators 42 and 43) stored in region 441 into the recognizer 46. In this fashion there is provided enhanced recognition of speech of the user who has been determined to be authorized.
  • system access provider 45 is caused to provide access to the system to a user who has been determined to be authorized in accordance with the user authorization levels stored in region 451. It is contemplated that the identification comparator 42, the verification comparator 43, the automatic speech recognition user-specific profile loader 44, and the system access provider 45 may (but need not necessarily) be implemented as processes running in a general purpose computer. Indeed, the processes need not be running on the same computer.
  • the system access provider 45 may be implemented on a server handling system access for all users of the system.
  • the present invention is also applicable to any speech recognition system, capable of speaker adaptation, that has more than one user. Each user of such a system has a potentially unique user-specific profile resulting from speaker adaptation. In a multi-user environment, such a profile is subject to the risk of undesirable modification as a result of adaptation to the speech of a person other than the user.
  • An embodiment of the present invention prevents undesirable modification of a user-specific profile for speech recognition by requiring user identification before at least one of modifying a user-specific profile (for example, at the beginning of an adaptation session) or saving a modification of a user-specific profile (for example, at the end of an adaptation session).
  • such an embodiment has a speech profile adaptor 442 in communication with the automatic speech recognizer 46, for modifying the user-specific profiles 441.
  • An adaptation controller 443 responsive to the identification comparator 42 controls the speech profile adaptor 442.
  • the adaptation controller 443 enables operation of the speech profile adaptor 442 to permit updating of the user-specific profile.
  • both user and identification and verification are required to enable the speech profile adaptor 442.
  • the identification may be by the keyboard, or, as in the embodiments described previously, the identification may be a non-keyboard identification, as by speech or digitally encoded card.
  • the access control system uses voice print matching of user provided speech.
  • voice print matching can employ either text dependent verification, or text independent verification.
  • Text dependent verification is the use of passwords and associated voice prints already described.
  • Text independent verification operates with freely selected user speech input during normal use of the automatic speech recognition system.
  • this implicit verification is implemented as a safeguard mechanism in combination with the explicit text dependent password and voice print technique.
  • the text independent verification occurs in the background during system use as spoken text input progresses.
  • the identification comparator 42 and verification comparator 43 continue to monitor the operation of the automatic speech recognizer 46.
  • the identification comparator 42 and/or verification comparator 43 compares the incoming speech signal associated with the recognized text to stored user identification data 422 and/or stored user verification data 432. If the characteristics of the incoming speech fail to match the stored characteristics for the recognized user within an acceptability threshold, the identification comparator 42 and/or verification comparator 43 then disables the system access provider 45.
  • the speech profile adaptor 442 is prevented from modifying the user-specific speech profiles 441. Then, the automatic speech recognizer 46 operates only to perform the user verification and access method previously described.
  • This embodiment is especially useful in a situation where an authorized user has accessed the system and momentarily walks away.
  • Text independent verification running in the application background prevents another, possibly unfriendly, user from invoking or altering the authorized user's speech profile. This effectively prevents use of the system by such an unauthorized person.

Abstract

An access control system for a computer system uses text inputs derived from automatic recognition of spoken inputs to provide computing access to authorized users. A plurality of speech-enabled terminals each receive speech from a user. An automatic speech recognizer derives text from speech provided by the specific user at a given one of the speech-enabled terminals. An identification comparator compares a non-keyboard user identification provided by a specific user with data stored in a user identification data base to determine if the specific user is an authorized user. A profile loader is provided to load a user-specific profile pertinent to the specific user into the automatic speech recognizer; and, finally, a system access provider.

Description

ACCESS-CONTROLLED COMPUTER SYSTEM WITH AUTOMATIC SPEECH RECOGNITION
Technical Field The present invention relates to access-controlled computer systems, and more particularly to such systems with automatic speech recognition.
Summary of the Invention
In accordance with a preferred embodiment of the present invention, there is provided a computer system for operation based on text inputs derived from automatic recognition of speech of a plurality of users providing spoken inputs. In this embodiment the system has a plurality of speech - enabled terminals, each terminal for receiving speech from a user. An identification comparator compares a non-keyboard user identification provided by a specific user with data stored in a user identification data base to determine if the specific user is an authorized user. Additionally, an automatic speech recognizer derives text from speech provided by the specific user at a given one of the speech-enabled terminals. A profile loader is provided to load a user-specific profile pertinent to the specific user into the automatic speech recognizer; and, finally, a system access provider provides computing access to the specific user if determined to be authorized by the identification comparator. In further embodiments, the non-keyboard user identification is spoken by the specific user or alternatively contained in a digitally encoded card presented by the specific user. When the user identification is spoken, the user identification database may contain voice prints of authorized users, and the identification comparator compares a voice print derived from the spoken user identification with voice prints in the user identification database. Alternatively, or in addition, the user identification database may contain passwords of authorized users and the spoken user identification is a password; the user identification database may optionally store the passwords as text derived from utterances using automatic speech recognition.
In a further embodiment, each speech-enabled terminal is coupled to a telephone line permitting a user to access the computer system by telephone. Alternatively, or in addition, each speech-enabled terminal is associated with a separate local processor and a local automatic speech recognizer.
Also in a further embodiment, the system may additionally include a user verification comparator for comparing a user verification provided by the specific user with data stored in a user verification data base to verify the identity of the specific user as an authorized user. In this embodiment, the system access provider provides computing access to the specific user only if the identity of the specific user has been verified as an authorized user by the verification comparator. The user verification may be spoken by the specific user, or alternatively may, for example, be entered by means of a keyboard or by other non-keyboard means . In accordance with another embodiment of the present invention, there is provided a method for providing access to a computer system that has an automatic speech recognizer and operates based on text inputs derived from automatic recognition of speech from a plurality of users provided via a plurality of speech-enabled terminals. In this embodiment, the access is provided to a specific user at a given one of the speech-enabled terminals. The method includes the following steps: a. receiving a non-keyboard user identification provided by the specific user; b. comparing the user identification with data stored in a user identification data base to determine whether the specific user is an authorized user; and c. if the specific user has been determined to be an authorized user, i. loading a user-specific profile into the automatic speech recognizer that is pertinent to the specific user; and ii. providing access to the system to the specific user via the given speech-enabled terminal. Further and related embodiments include the steps of receiving a user verification provided by the specific user and comparing the user verification with data stored in a user verification data base to verify the identity of the specific user as an authorized user. In this embodiment, the step of providing access to the system to the specific user is performed only if the identity of the specific user has been verified as an authorized user. The user identification and the user verification may be implemented as discussed above.
In another embodiment of the present invention, there is provided a method for providing access by a plurality of users to a computer system having automatic recognition of speech provided at a plurality of speech- enabled terminals. The method includes the steps of a. generating a prompt for a spoken user identification over one of the plurality of speech-enabled terminals; b. comparing the spoken user identification with data stored in a user identification data base to determine if the user is an authorized user; c. providing an automatic speech recognizer for deriving text from speech provided at a speech-enabled terminal; d. loading user-specific profiles pertinent to a user who has been determined to be authorized into the automatic speech recognizer; and e. providing access to the system to a user who has been determined to be authorized.
Brief Description of the Drawings The foregoing aspects of the invention will be more readily understood by reference to the following detailed description taken with the accompanying drawings in which:
Fig. 1 is a block diagram of a system to which the present invention is applicable; Fig. 2 is a block diagram of a method in accordance with a preferred embodiment of the invention;
Fig. 3 is a block diagram of a method, similar to that of Fig. 2, but also providing user verification; and
Fig. 4 is a block diagram of a preferred embodiment of a system in accordance with a preferred embodiment of the invention corresponding generally to the method of Fig. 3.
Detailed Description of Specific Embodiments Fig. 1 is a block diagram of a system to which the present invention is applicable. A computer system 11 has a plurality of speech-enabled terminals 131 , 132, ... 133 to accommodate up to an arbitrary number n of users. The computer system includes an automatic speech recognizer 12. The speech recognizer may be hard wired or it may be implemented as a process running in the computer system 1 1. The computer system may include a general purpose computer in which the process is defined by a computer program loaded into the computer. Each of the speech-enabled terminals 131 , 132, ... 133 may be associated with a separate local processor; in such a configuration, each local processor may be associated with a local automatic speech recognizer. The local automatic speech recognizer may, but need not necessarily, be implemented as a process running in the local processor. Each of the speech-enabled terminals 131 , 132, ... 133 may also (or alternatively) be coupled to a telephone line permitting a user to access the computer system by telephone.
Fig. 2 is a block diagram of a method, in accordance with a preferred embodiment of the invention, for providing access by a plurality of users to a computer system having automatic recognition of speech provided at a plurality of speech-enabled terminals. In accordance with step 21 , a non- keyboard user identification is provided over one of the speech-enabled terminals 131, 132, ... 133 of Fig. 1. The user identification may, for example, be spoken via microphone or be contained in a digitally encoded card presented by the user to a card reader. In accordance with step 22, the user identification is compared with data stored in a user identification data base to determine if the user is an authorized user. In one embodiment, the user identification database contains voice prints of authorized users, and in step 22, the comparison is between a voice print derived from the spoken user identification with voice prints in the user identification database. Alternatively, or in addition, the user identification database contains passwords of authorized users and the spoken user identification is a password; in such a case, the spoken input may be processed initially by a speech recognizer associated with the system. If in step 23, the comparison shows that there is not a match, and if in step 24 the match has not failed three times, the method permits the receipt of a new user identification in step 21 , and the comparison of step 22 is reinitiated. If in step 24 the match has failed three times, the method terminates in step 27. If there is a match, then in step 25, a user-specific profile is loaded for automatic speech recognition of the user who has been determined to be authorized. In step 26, access to the system is provided to the user who has been determined to be authorized. It will be appreciated that the level of access to the system may be controlled on a user-by-user basis in accordance with standard techniques known in the art for computer networks; thus the level of access by a user to the system may be subject to control, and the user will be given the level of access for which the system has been configured to provide to such user.
Fig. 3 is a block diagram of a method, similar to that of Fig. 2, but also providing user verification. Steps 31 , 32, 33, 34, 35, 36 and 37 of Fig. 3 are comparable to steps 21 , 22, 23, 24, 25, 26, and 27 of Fig. 2 previously discussed. However, if a user identification has been matched as a result of the comparison step 32, the method next proceeds with a user verification procedure. In step 381 , the user verification is received. Such a verification may be spoken, or alternatively may be entered by keyboard, or may be provided by other non-keyboard arrangements. In step 382, the user verification is compared with data in a user verification data base. If there is a match in step 383, then the user-specific profile for automatic speech recognition is loaded into the recognizer (step 35), and computing access is provided to the user at the level for which the user is authorized (step 36). If there is no match, in step 384, the method tests to determine whether there have been three consecutive failed matches, and if so, the method terminates; otherwise processing is repeated back at step 31.
Fig. 4 is a block diagram of a preferred embodiment of a system in accordance with a preferred embodiment of the invention corresponding generally to the method of Fig. 3. The system includes speech-enabled terminals 41 from which may be received a spoken user identification. An automatic speech recognizer 46 has two modes of operation. In a first mode, the recognizer can operate in speaker-independent fashion to recognize a spoken user identification, which is fed to the identification comparator 42, and a user verification, which is fed to verification comparator 43. In a second mode, the recognizer can operate in speaker-dependent fashion, utilizing additional information in the form of a user-specific profile for a user that has been identified by the identification comparator 42. (Alternatively, an applicable one of the user-specific profiles can be loaded after an unverified user identification has been made by the identification comparator 42, and the recognizer can operate in a speaker-dependent mode when feeding text to the verification comparator.) The comparators 42 and 43 may in fact be implemented in an integrated arrangement. For example, a user speaking his name (or a password uniquely identifying him) can provide a basis for both identification as well as verification using speaker-dependent templates. Further material on speech recognizer design may be found, for example, in Rabiner and Juang, Fundamentals of Speech Recognition, 1993, which is hereby incorporated herein by reference. In operation, a user identification is received by the identification comparator 42. As described above in connection with previous figures, the identification can take many forms, including speech (which is here converted to text by the recognizer 46 to furnish an input to the comparator 42) or a digitally encoded card that is read by a card reader. A user identification that has been received by the identification comparator is stored in storage region 421. Thereafter identification comparator 42 compares the user identification that is stored in storage region 421 with user identification data in the identification data base that is stored in storage region 422. If the comparator 42 makes a successful match, then operation of the verification comparator 43 is triggered. Here the verification comparator receives a text input from the recognizer 46, and the input is stored in region 431 and compared with data in the verification data base that is stored in region 432. If the verification comparator 43 determines that a match exists, then the profile loader 44 is caused to access and load one of the user-specific profiles (corresponding to the user who was matched by the comparators 42 and 43) stored in region 441 into the recognizer 46. In this fashion there is provided enhanced recognition of speech of the user who has been determined to be authorized. Finally, system access provider 45 is caused to provide access to the system to a user who has been determined to be authorized in accordance with the user authorization levels stored in region 451. It is contemplated that the identification comparator 42, the verification comparator 43, the automatic speech recognition user-specific profile loader 44, and the system access provider 45 may (but need not necessarily) be implemented as processes running in a general purpose computer. Indeed, the processes need not be running on the same computer. For example, some or all of the system access provider 45 may be implemented on a server handling system access for all users of the system. The present invention is also applicable to any speech recognition system, capable of speaker adaptation, that has more than one user. Each user of such a system has a potentially unique user-specific profile resulting from speaker adaptation. In a multi-user environment, such a profile is subject to the risk of undesirable modification as a result of adaptation to the speech of a person other than the user. An embodiment of the present invention prevents undesirable modification of a user-specific profile for speech recognition by requiring user identification before at least one of modifying a user-specific profile (for example, at the beginning of an adaptation session) or saving a modification of a user-specific profile (for example, at the end of an adaptation session).
As shown in Fig. 4, such an embodiment has a speech profile adaptor 442 in communication with the automatic speech recognizer 46, for modifying the user-specific profiles 441. An adaptation controller 443 responsive to the identification comparator 42 controls the speech profile adaptor 442. When an authorized user has been identified by the identification comparator 42, the adaptation controller 443 enables operation of the speech profile adaptor 442 to permit updating of the user-specific profile. In a further embodiment, both user and identification and verification are required to enable the speech profile adaptor 442. The identification may be by the keyboard, or, as in the embodiments described previously, the identification may be a non-keyboard identification, as by speech or digitally encoded card.
The embodiments previously discussed for both identification and verification assume explicit actions taken by the user. More specifically, in the case of speech, the access control system uses voice print matching of user provided speech. In practice, such voice print matching can employ either text dependent verification, or text independent verification. Text dependent verification is the use of passwords and associated voice prints already described. Text independent verification operates with freely selected user speech input during normal use of the automatic speech recognition system. In a preferred embodiment, this implicit verification is implemented as a safeguard mechanism in combination with the explicit text dependent password and voice print technique.
With respect to Fig. 4, the text independent verification (i.e., implicit verification) occurs in the background during system use as spoken text input progresses. Thus, after the user access system has recognized an authorized user and enabled system access as previously described, the identification comparator 42 and verification comparator 43 continue to monitor the operation of the automatic speech recognizer 46. As the recognizer 46 recognizes input speech as text within its recognition vocabulary, the identification comparator 42 and/or verification comparator 43 compares the incoming speech signal associated with the recognized text to stored user identification data 422 and/or stored user verification data 432. If the characteristics of the incoming speech fail to match the stored characteristics for the recognized user within an acceptability threshold, the identification comparator 42 and/or verification comparator 43 then disables the system access provider 45. In addition (or as a consequence of disabling the system access provider 45), the speech profile adaptor 442 is prevented from modifying the user-specific speech profiles 441. Then, the automatic speech recognizer 46 operates only to perform the user verification and access method previously described.
This embodiment is especially useful in a situation where an authorized user has accessed the system and momentarily walks away. Text independent verification running in the application background prevents another, possibly unfriendly, user from invoking or altering the authorized user's speech profile. This effectively prevents use of the system by such an unauthorized person.

Claims

What is claimed is:
1. A computer system, for operation based on text inputs derived from automatic recognition of speech of a plurality of users providing spoken inputs, the system comprising: a. a plurality of speech-enabled terminals, each having an input for receiving speech from a user; b. an identification comparator for comparing a non-keyboard user identification provided by a specific user with data stored in a user identification data base to determine if the specific user is an authorized user; c. an automatic speech recognizer for deriving text from speech provided by the specific user at a given one of the speech-enabled terminals; d. a profile loader for loading a user-specific profile pertinent to the specific user into the automatic speech recognizer; and e. a system access provider for providing computing access, via the automatic speech recognizer, to the specific user if determined to be authorized by the identification comparator.
2. A computer system according to claim 1 , wherein the non- keyboard user identification is spoken by the specific user.
3. A computer system according to claim 1 , wherein the non- keyboard user identification is contained in a digitally encoded card presented by the specific user.
4. A computer system according to claim 2, wherein the user identification database contains voice prints of authorized users, and the identification comparator compares a voice print derived from the spoken user identification with voice prints in the user identification database.
5. A computer system according to claim 2, wherein the user identification database contains passwords of authorized users and the spoken user identification is a password.
6. A computer system according to claim 5, wherein the user identification database stores the passwords as text derived from utterances using automatic speech recognition.
7. A computer system according to claim 1 , further comprising a user verification comparator for comparing a user verification provided by the specific user with data stored in a user verification data base to verify the identity of the specific user as an authorized user, wherein the system access provider provides computing access to the specific user only if the identity of the specific user has been verified as an authorized user by the verification comparator.
8. A computer system according to claim 2, further comprising a user verification comparator for comparing a user verification provided by the specific user with data stored in a user verification data base to verify the identity of the specific user as an authorized user, wherein the system access provider provides computing access to the specific user only if the identity of the specific user has been verified as an authorized user by the verification comparator.
9. A computer system according to claim 7, wherein the user verification is spoken by the specific user.
10. A computer system according to claim 1 , wherein each speech- enabled terminal is coupled to a telephone line permitting a user to access the computer system by telephone.
11. A computer system according to claim 1 , wherein each speech- enabled terminal is associated with a separate local processor and a local automatic speech recognizer.
12. A computer system according to claim 1 1 , wherein each speech - enabled terminal is coupled to a telephone line permitting a user to access the computer system by telephone.
13. A computer system according to claim 1 , wherein: the identification comparator further includes a text-independent comparator coupled to the automatic speech recognizer and to the system access provider for determining whether characteristics of the speech provided by the specific user fail to match characteristics of the data stored in the user identification database for the specific user within an acceptability threshold, and in the event of a determination of acceptable match, causing the system access provider to preclude computing access to the specific user.
14. A computer system according to claim 7, wherein: the user verification comparator further includes a text-independent comparator coupled to the automatic speech recognizer and to the system access provider for determining whether characteristics of the speech provided by the specific user fail to match characteristics of the data stored in the user identification database for the specific user within an acceptability threshold, and in the event of a determination of acceptable match, causing the system access provider to preclude computing access to the specific user.
15. A method for providing access to a computer system that has an automatic speech recognizer and operates based on text inputs derived from automatic recognition of speech from a plurality of users provided via a plurality of speech-enabled terminals, the access provided to a specific user at a given one of the speech-enabled terminals, the method comprising: a. receiving a non-keyboard user identification provided by the specific user; b. comparing the user identification with data stored in a user identification data base to determine whether the specific user is an authorized user; and c. if the specific user has been determined to be an authorized user, i. loading a user-specific profile into the automatic speech recognizer that is pertinent to the specific user; and ii. providing access to the system to the specific user via the given speech-enabled terminal.
16. A method according to claim 15, further comprising before substep (ii) of step (c), i. receiving a user verification provided by the specific user and ii. comparing the user verification with data stored in a user verification data base to verify the identity of the specific user as an authorized user; and wherein substep (ii) of step (c) is performed only if the identity of the specific user has been verified as an authorized user.
17. A method according to claim 15, wherein the non-keyboard user identification is spoken by the specific user.
18. A method according to claim 16, wherein the non-keyboard user identification is spoken by the specific user.
19. A method according to claim 15, wherein the non-keyboard user identification is contained in a digitally encoded card presented by the specific user.
20. A method according to claim 16, wherein the non-keyboard user identification is contained in a digitally encoded card presented by the specific user.
21. A method according to claim 16, wherein the user verification is spoken by the specific user.
22. A method according to claim 15, further comprising: d. monitoring operation of the automatic speech recognizer; and e. if characteristics of the speech provided by the specific user fail to match characteristics of the data stored in the user identification database for the specific user within an acceptability threshold, disabling the automatic speech recognizer.
23. A computer system, for operation based on text inputs derived from automatic recognition of speech of a plurality of users providing spoken inputs, the system comprising: a. a speech-enabled terminal, having an input for receiving speech from a user; b. an identification comparator for comparing a non-keyboard user identification provided by a specific user with data stored in a user identification data base to determine if the specific user is an authorized user; c. an automatic speech recognizer for deriving text from speech provided by the specific user at the speech-enabled terminal; d. a speaker adaptor for modifying a user-specific profile, pertinent to the specific user, that is used with the automatic speech recognizer; and e. an adaptation inhibitor for preventing at least one of modifying the user-specific profile or saving a modification of the user-specific profile unless the specific user is determined to be authorized by the identification comparator.
24. A computer system according to claim 23, wherein the non- keyboard user identification is spoken by the specific user.
25. A computer system according to claim 23, wherein the non- keyboard user identification is contained in a digitally encoded card presented by the specific user.
26. A computer system according to claim 24, wherein the user identification database contains voice prints of authorized users, and the identification comparator compares a voice print derived from the spoken user identification with voice prints in the user identification database.
27. A computer system according to claim 24, wherein the user identification database contains passwords of authorized users and the spoken user identification is a password.
28. A computer system according to claim 27, wherein the user identification database stores the passwords as text derived from utterances using automatic speech recognition.
29. A computer system according to claim 23, further comprising a user verification comparator for comparing a user verification provided by the specific user with data stored in a user verification data base to verify the identity of the specific user as an authorized user, wherein the adaptation inhibitor prevents at least one of modifying the user-specific profile or saving a modification of the user-specific profile unless the identity of the specific user has been verified as an authorized user by the verification comparator.
30. A computer system according to claim 23, wherein: the identification comparator further includes a text-independent comparator coupled to the automatic speech recognizer and to the system access provider for determining whether characteristics of the speech provided by the specific user fail to match characteristics of the data stored in the user identification database for the specific user within an acceptability threshold, and in the event of a determination of acceptable match, performing at least one of causing the system access provider to preclude computing access to the specific user and preventing the speaker adaptor from modifying the user- specific profile .
31. A computer system according to claim 29, wherein: the user verification comparator further includes a text-independent comparator coupled to the automatic speech recognizer and to the system access provider for determining whether characteristics of the speech provided by the specific user fail to match characteristics of the data stored in the user identification database for the specific user within an acceptability threshold, and in the event of a determination of acceptable match, performing at least one of causing the system access provider to preclude computing access to the specific user and preventing the speaker adaptor from modifying the user- specific profile .
32. A method, for providing access by a plurality of users to a computer system having automatic recognition of speech provided at a plurality of spoken inputs, the method comprising: a. generating a prompt for a spoken user identification over one of the plurality of spoken inputs; b. comparing the spoken user identification with data stored in a user identification data base to determine if the user is an authorized user; c. providing an automatic speech recognizer for deriving text from speech provided at a speech-enabled terminal; d. loading user-specific profiles pertinent to a user who has been determined to be authorized into the automatic speech recognizer; and e. providing access to the system to a user who has been determined to be authorized.
EP98930984A 1997-06-27 1998-06-25 Access-controlled computer system with automatic speech recognition Withdrawn EP0991990A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US5102597P 1997-06-27 1997-06-27
US51025P 1997-06-27
PCT/IB1998/001110 WO1999000719A1 (en) 1997-06-27 1998-06-25 Access-controlled computer system with automatic speech recognition

Publications (1)

Publication Number Publication Date
EP0991990A1 true EP0991990A1 (en) 2000-04-12

Family

ID=21968901

Family Applications (1)

Application Number Title Priority Date Filing Date
EP98930984A Withdrawn EP0991990A1 (en) 1997-06-27 1998-06-25 Access-controlled computer system with automatic speech recognition

Country Status (5)

Country Link
EP (1) EP0991990A1 (en)
JP (1) JP2002507298A (en)
AU (1) AU8125198A (en)
CA (1) CA2288183A1 (en)
WO (1) WO1999000719A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1203368B1 (en) * 1999-06-21 2003-11-05 Palux AG Control device for controlling vending machines
US8355912B1 (en) * 2000-05-04 2013-01-15 International Business Machines Corporation Technique for providing continuous speech recognition as an alternate input device to limited processing power devices
EP1164576B1 (en) * 2000-06-15 2006-02-22 Swisscom Fixnet AG Speaker authentication method and system from speech models
WO2002086865A1 (en) * 2001-04-13 2002-10-31 Koninklijke Philips Electronics N.V. Speaker verification in a spoken dialogue system
US6744868B2 (en) 2001-05-31 2004-06-01 Alcatel Call party profile presentation service in a multimedia-capable network
US20020188725A1 (en) * 2001-05-31 2002-12-12 Mani Babu V. User verification service in a multimedia-capable network
AU2003283742A1 (en) * 2002-12-16 2004-07-09 Koninklijke Philips Electronics N.V. Method of creating an acoustic model for a speech recognition system
DE102007043254A1 (en) * 2007-09-11 2009-03-12 Siemens Ag Data base accessing method for hospital information system, involves identifying speaker assigned to language data, determining whether identified speaker is having right to access, and allowing requested access to database
US10613826B2 (en) 2014-12-25 2020-04-07 Maxell, Ltd. Head-mounted display system and operating method for head-mounted display device
CN106710593B (en) * 2015-11-17 2020-07-14 腾讯科技(深圳)有限公司 Method, terminal and server for adding account

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5430827A (en) * 1993-04-23 1995-07-04 At&T Corp. Password verification system
US5677989A (en) * 1993-04-30 1997-10-14 Lucent Technologies Inc. Speaker verification system and process
US6081782A (en) * 1993-12-29 2000-06-27 Lucent Technologies Inc. Voice command control and verification system
DE19515123C1 (en) * 1995-04-25 1996-08-22 Orga Kartensysteme Gmbh Smart card access control security protection system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9900719A1 *

Also Published As

Publication number Publication date
JP2002507298A (en) 2002-03-05
WO1999000719A1 (en) 1999-01-07
CA2288183A1 (en) 1999-01-07
AU8125198A (en) 1999-01-19

Similar Documents

Publication Publication Date Title
US7240007B2 (en) Speaker authentication by fusion of voiceprint match attempt results with additional information
US6073101A (en) Text independent speaker recognition for transparent command ambiguity resolution and continuous access control
EP0621532B1 (en) Password verification system
US8010367B2 (en) Spoken free-form passwords for light-weight speaker verification using standard speech recognition engines
US6119084A (en) Adaptive speaker verification apparatus and method including alternative access control
US5832063A (en) Methods and apparatus for performing speaker independent recognition of commands in parallel with speaker dependent recognition of names, words or phrases
US20030074201A1 (en) Continuous authentication of the identity of a speaker
EP1019904B1 (en) Model enrollment method for speech or speaker recognition
EP0528990B1 (en) Simultaneous speaker-independent voice recognition and verification over a telephone network
US5717743A (en) Transparent telephone access system using voice authorization
US20080059805A1 (en) Biometrics authentication apparatus
US6931375B1 (en) Speaker verification method
US20070219792A1 (en) Method and system for user authentication based on speech recognition and knowledge questions
US20140350932A1 (en) Voice print identification portal
US20050273333A1 (en) Speaker verification for security systems with mixed mode machine-human authentication
US5832429A (en) Method and system for enrolling addresses in a speech recognition database
US9373325B2 (en) Method of accessing a dial-up service
US6246987B1 (en) System for permitting access to a common resource in response to speaker identification and verification
EP0991990A1 (en) Access-controlled computer system with automatic speech recognition
US20080071538A1 (en) Speaker verification method
EP0762709B1 (en) Method and system for enrolling addresses in a speech recognition database
JPH10173644A (en) Identity authentication method
US9978373B2 (en) Method of accessing a dial-up service
EP1758351B1 (en) Method and system for enrolling addresses in a speech recognition database
JPH02149900A (en) Voice recognizing and answering device

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19991008

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

17Q First examination report despatched

Effective date: 20020314

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20020725