WO2013006385A1 - Identifying people that are proximate to a mobile device user via social graphs, speech models, and user context - Google Patents

Identifying people that are proximate to a mobile device user via social graphs, speech models, and user context Download PDF

Info

Publication number
WO2013006385A1
WO2013006385A1 PCT/US2012/044723 US2012044723W WO2013006385A1 WO 2013006385 A1 WO2013006385 A1 WO 2013006385A1 US 2012044723 W US2012044723 W US 2012044723W WO 2013006385 A1 WO2013006385 A1 WO 2013006385A1
Authority
WO
WIPO (PCT)
Prior art keywords
context
partly
data
user
social graph
Prior art date
Application number
PCT/US2012/044723
Other languages
French (fr)
Inventor
Leonard Henry Grokop
Vidya Narayanan
Original Assignee
Qualcomm Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Incorporated filed Critical Qualcomm Incorporated
Priority to JP2014519046A priority Critical patent/JP5930432B2/en
Priority to CN201280033020.8A priority patent/CN103650035B/en
Priority to KR1020147002757A priority patent/KR20140031391A/en
Priority to EP12743266.4A priority patent/EP2727104B1/en
Priority to KR1020157034201A priority patent/KR101753509B1/en
Publication of WO2013006385A1 publication Critical patent/WO2013006385A1/en

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/06Decision making techniques; Pattern matching strategies
    • G10L17/10Multimodal systems, i.e. based on the integration of multiple recognition engines or fusion of expert systems
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/04Training, enrolment or model building

Definitions

  • a unique social graph may be generated and associated with each of a plurality of defined contexts.
  • the social graph may indicate speakers likely to be present in a particular context.
  • an audio signal including a speech signal may be collected and processed.
  • a context may be inferred, and a corresponding social graph may be identified.
  • a set of potential speakers may be determined based on the social graph.
  • the processed signal may then be compared to a restricted set of speech models, each speech model being associated with a potential speaker. By limiting the set of potential speakers, speakers may be more accurately identified.
  • a method for identifying a speaker is provided.
  • the method may include: accessing audio data comprising a speech signal, the audio data generated using a microphone on a mobile device; inferring a context of a user of the mobile device; identifying a social graph based at least partly based on the inferred context, the social graph comprising a list of potential speakers; and identifying a speaker determined to have vocally contributed to the speech signal, the speaker identification based at least partly on the identified social graph.
  • the context of the user may be based at least partly on a location of the user.
  • the method may further include determining the location of the user at least partly based on GPS, WiFi or cellular signals received by the mobile device.
  • Inferring the context of the user may be based at least partly on an environment of the user.
  • the method may further include determining the environment at least partly based on BlueTooth or audio signals received by the mobile device.
  • Inferring the context of the user may be based at least partly on an activity of the user.
  • the method may further include determining the activity based at least partly on motion-sensor data, light-sensor data, or audio signals captured by the microphone on the device.
  • Inferring the context of the user may be based at least partly on one or more of email data, text message data, calendar data, social networking data and contact list data associated with the mobile device.
  • Inferring the context of the user may be based at least partly on a call status and/or current-call details of the mobile device.
  • Inferring the context of the user may be based at least partly on applications actively or inactively being used on the mobile device.
  • the context of the user may be based at least partly on a time of day during which the audio data was collected.
  • the audio data may include audio portions sampled in a privacy-sensitive manner such that spoken words cannot be reconstructed from the audio data.
  • the method may further include storing a plurality of social graphs, each social graph being associated with a different context.
  • the method may further include storing a plurality of speech models, wherein each speech model is associated with a potential speaker.
  • the method may further include: storing a plurality of speech models, wherein each speech model is associated with a potential speaker; processing the accessed audio data; and comparing the processed audio data to a subset of the plurality of speech models, the subset being determined based at least partly on the identified social graph.
  • the method may further include generating social graphs for one or more contexts, wherein generation of the social graphs is at least partly on one or more of: user location data, calendar data, email data, and social networking data.
  • the identified social graph may include edge weightings for one or more edges of the one social graph.
  • the edge weighting for each edge may correspond to a fraction of time the user spends interacting with a person associated with the edge.
  • the method may further include, prior to identifying the social graph: capturing training audio data in each of a plurality of contexts; clustering the captured training audio data; and generating a plurality of social graphs based on the clustered audio data, wherein the generated social graph comprises one of the plurality of social graphs.
  • the method may further include defining a plurality of potential contexts based at least partly on execution of a clustering algorithm.
  • the identifying the speaker may include identifying a name of the speaker.
  • the apparatus may also include one or more processors configured to: capture audio data from the microphone; infer a context of a user of the mobile device; identify a social graph based at least partly on the inferred context, the social graph comprising a list of potential speakers; and identify a speaker determined to have vocally contributed to the speech signal, the speaker identification based at least partly on the identified social graph.
  • a remote server may include at least one of the one or more processors.
  • the mobile device may include all of the one or more processors.
  • the mobile device may include a display, and the one or more processors may be further configured to present the identification of the speaker on the display.
  • a computer-readable medium containing a program which executes the steps of: accessing audio data comprising a speech signal, the audio data generated using a microphone on a mobile device; inferring a context of a user of the mobile device; identifying a social graph based at least partly on the inferred context, the social graph comprising a list of potential speakers; and identifying a speaker determined to have vocally contributed to the speech signal, the speaker identification based at least partly on the identified social graph.
  • the program may further execute the step of: transforming the accessed audio data into a feature space.
  • the program may further execute the step of: storing a plurality of social graphs, each social graph being associated with a different context.
  • the program may further execute the steps of: storing a plurality of speech models, wherein each speech model is associated with a potential speaker; processing the accessed audio data; and comparing the processed audio data to a subset of the plurality of speech models, the subset being determined based at least partly on the identified social graph.
  • a system for recognizing a speaker may include: means for accessing audio data comprising a speech signal (e.g., a transceiver and/or microphone); means for inferring a context (e.g., a present-state analyzer); means for identifying a social graph based at least partly on the inferred context (e.g., a context-to-social-graph mapper), the social graph comprising a list of potential speakers; and means for identifying a speaker determined to have vocally contributed to the speech signal, the speaker identification based at least partly on the identified social graph (e.g., a classifier and/or a speech-model-to-person mapper).
  • a speech signal e.g., a transceiver and/or microphone
  • means for inferring a context e.g., a present-state analyzer
  • means for identifying a social graph based at least partly on the inferred context e.g., a context-to-social-graph mapper
  • the system may further include means for generating social graphs (e.g., a social-graph generator ) for one or more contexts based at least partly on one or more of: user location data, calendar data, email data, and social networking data
  • the identified social graph may include edge weightings for one or more edges of the one social graph.
  • the system may further include means for presenting the identifying speaker to a user of the mobile device (e.g., a display).
  • FIG. 1 A illustrates an embodiment of an apparatus for the identifying one or more persons using social graphs, speech models, and user context information.
  • FIG. I B is a diagram illustrating the capture of audio data according to an embodiment of the present invention.
  • FIG. 1 C is a diagram illustrating the capture of audio data according to another embodiment of the present invention.
  • FIG. I D is a diagram illustrating the capture of audio data according to still another embodiment of the present invention.
  • FIG. 2 is a flow diagram of a process for identifying one or more persons in proximity to a mobile device user.
  • FIG. 3 illustrates an embodiment of a computer system.
  • a speaker is recognized by associating a received audio signal with one of a set of possible speakers. For example, an initial set of possible speakers may be defined, and one or more speech models may be associated with each possible speaker. A received signal may be processed in an attempt to associate the signal with one of the possible speakers.
  • a difficulty arises in that mobile devices frequently receive audio signals from a large number of speakers. Thus, recognizing a speaker may require comparing a given processed signal to a large number of control variables. Such analysis may require substantial computational processing and may be prone to frequent errors in recognition. Required processing power, computational time, and errors may be reduced if recognition of a speaker could be restricted to recognizing a speaker from a smaller set of possible speakers.
  • a signal is recognized using a restricted set of control data.
  • An initial control data set may be downsized to a restricted control data set by using a context.
  • a context e.g., "work”, “home”, “party”, “meeting”, “car”, “with family”, etc.
  • a context may be inferred based on, e.g., a time of day, a location, a user activity, applications executing on a device, sensor data, surrounding noise, calendar events, email data, a call status, applications in use on a mobile device, user input, etc.
  • Each of a plurality of contexts may be associated with a social graph.
  • the social graph may identify a set of people who are likely to have provided a speech signal in the inferred context.
  • the social graph may include a probability that a given speech signal originated with the person.
  • the set itself may be defined based on this probability (e.g., such that a set includes all people with a signal probability greater than a threshold, such as 10%).
  • the probability may be calculated without accounting for audio characteristics of the signal (e.g., there is a 10% probability that a speech signal received at home was from
  • FIG. 1 A illustrates an apparatus 100a for identifying one or more people according to one embodiment of the present invention.
  • apparatus 100a can include a mobile device 1 10a, which may be used by a user 1 13a.
  • a mobile device 1 10a can communicate with a remote server 140a via wireless network 120a and network(s) 130a.
  • Mobile device 1 10a may include a transmitter configured to transmit radio signals, e.g., over a wireless network.
  • Mobile device 1 10a can represent a cellular phone, a smart phone, or some other mobile computerized device, such as a personal digital assistant, tablet computer, laptop, handheld gaming device, digital camera, etc.
  • Mobile device 1 10a as shown in FIG. 1A, can contain microphone 1 12a.
  • Microphone 1 12a can permit mobile device 1 10a to collect or capture audio data from the mobile device's surrounding physical environment (e.g., speech being spoken by person 1 14a).
  • Microphone 1 12a may be configured to convert sound waves into electrical or radio signals during select ("active") time periods. In some instances, whether microphone 1 12a is active depends at least partly on whether one or more programs or parts of programs are executing on mobile device 1 10a. For example, microphone 1 12a may be active only when a particular program is executed, indicating that mobile device 1 10a is in a call state. In some embodiments, microphone 1 12a is activated while mobile device 1 10a is on a call and when one or more independent programs are executed. For example, the user may be able to initiate a program to: set up voice-recognition speed dial, record a dictation, etc. In some embodiments, microphone 1 12a is activated automatically, e.g., during fixed times of the day, at regular intervals, etc.
  • a continuous audio stream in a physical environment can comprise a window 1 10b of audio data lasting T wim j ow seconds and having a plurality of audio portions or data segments. More specifically, the window can comprise N blocks 120b, each block 120b lasting Tu 0 k seconds and comprising a plurality of frames 130b of Tf rame seconds each.
  • a microphone signal can be sampled such that only one frame (with Tf rame seconds of data) is collected in every block of T iovk seconds.
  • frames can range from less than 30ms to 100ms or more
  • blocks can range from less than 250ms up to 2000ms (2s) or more
  • windows can be as short as a single block (e.g., one block per window), up to one minute or more.
  • Different frame, block, and window lengths can impact the number of frames per block and the number of blocks per window.
  • frame capturing can be achieved by either continuously sampling the microphone signal and discarding (i.e.
  • the resulting audio data 140b is a collection of frames that comprises only a subset of the original audio data. Even so, this subset can still include audio
  • the subset may also or alternatively be used to identify a speaker (e.g., once a context is inferred). For example, cepstral coefficients may be determined based on the subset of data and compared to speech models.
  • FIGS. 1C and ID are similar to FIG. IB. In FIGS. 1 C and ID, however, additional steps are taken to help ensure further privacy of any speech that may be captured.
  • FIG. 1 C illustrates how, for every window of T wi though seconds, the first frames of every block in a window can be randomly permutated (i.e. randomly shuffled) to provide the resultant audio data 140c.
  • the random permutation can be computed using a seed that is generated in numerous ways (e.g., based on GPS time, based on noise from circuitry within the mobile device 1 10a, based on noise from microphone, based on noise from an antenna, etc.). Furthermore, the permutation can be discarded (e.g., not stored) to help ensure that the shuffling effect cannot be reversed.
  • the blocks themselves may be shuffled before the frames are captured, or frames are captured randomly throughout the entire window (rather than embodiments limiting frame captures to one frame per block), etc.
  • all frames may be sampled and randomly permutated.
  • some or all frames may be sampled and mapped onto a feature space. Privacy-protecting techniques may enable processed data (e.g., incomplete frame sampling, permutated frames, mapped data, etc.) to be stored, and it may be unnecessary to store original audio data. It may then be difficult or impossible to back-calculate the original audio signal (and therefore a message spoken into the microphone) based on stored data.
  • wireless network 120a can represent a cellular service provider's wireless network.
  • Wireless network 120a can use one or more network(s) 130a to communicate with remote server 140a.
  • Network(s) 130a can include one or more private networks, such as a corporate intranet, and/or one or more public networks, such as the Internet.
  • Remote server 140a can include processor 142a and storage device 144a. In some embodiments, remote server 140a can include other components not illustrated.
  • Mobile device 1 10a may also include a processor and/or a storage device.
  • Speech model data may be stored on storage device 144a and/or a storage device of mobile device 1 10a. Speech model data may include, e.g., raw audio signals, portions of audio signals, processed audio signals (e.g., normalized signals or filtered signals), feature-mapped audio signals (e.g., cepstral coefficients), parameters corresponding to speech model, parameters corresponding to a template, etc.
  • a speech model associated with a speaker may include a set of parameters used to determine whether an unknown signal is likely to include a speech signal by the speaker. For example, a first speech model associated with Speaker 1 may include a specific power spectra template and a second speech model associated with Speaker 1 may include a set of audio-data parameters (e.g., amplitude variation, a clipping variable, etc.).
  • Social graph data may be stored on storage device 144a and/or a storage device of mobile device 1 10a.
  • Social graph data may include, e.g., variables indicative of a social context (e.g., a time of day, a day of the week, a reception signal strength, a location, a GPS coordinate, a program being executed, a user input, etc.), people associated with a particular context (e.g., names, unique identifiers, etc.), a probability that a speech signal will have originated by a specific person given a context, etc.
  • a social context e.g., a time of day, a day of the week, a reception signal strength, a location, a GPS coordinate, a program being executed, a user input, etc.
  • people associated with a particular context e.g., names, unique identifiers, etc.
  • a probability that a speech signal will have originated by a specific person given a context e.g., a probability that a
  • Stored data can be used to identify a speaker proximate to mobile device 1 10a and/or its user.
  • storage device 144a can store social graph data 146a and speech model data 148a for a number of different users.
  • storage device 144a might store ten different social graphs and twenty different speech models for each of five different users.
  • Social graphs can be obtained in any suitable manner and through using any suitable form of data.
  • Social graphs can be obtained through data obtained from a user's location, calendar, email, social networking profile, etc.
  • a social graph may include speech models associated only or at least with people who a calendar indicates will or might be at a current event (e.g., a meeting).
  • relationships may be inferred or determined based on a social networking profile, email data or text-messaging data (e.g., by analyzing defined relationships, email formality, time stamps of text messages or emails, etc.). People with particular relationships (e.g., work colleagues) may be represented with one or more speech models associated with a related context (e.g., work).
  • a social graph is "learned.” For example, speech signals may be monitored and captured. A context may be inferred, e.g., based on received data (e.g., audio data, GPS data, user-input data, time and day data, etc.). Captured speech signals may be clustered, such that one or more clusters are estimated to correspond to a unique speaker. Thus, for example, it may be learned that in Context A, Speakers 1 -3 are likely to be present, and that in Context B, Speakers 1 and 4-6are likely to be present. One or more speech models may be associated with one or more of the speakers. If a speech signal is received in Context B, speech model data associated with Speakers 1 and 4-6 may then be used to identify from whom the speech signal originated.
  • received data e.g., audio data, GPS data, user-input data, time and day data, etc.
  • social graphs can correspond to a user context.
  • a social graph consisting of a list of work colleagues can correspond to a "work" context.
  • family/household members can correspond to a "home" context.
  • a social graph consisting of a list of friends (or a list of friends and all of their friends) that are attending a specific function can correspond to an "party" context.
  • social graphs that correspond to the different contexts of the user can have a nested structure.
  • the social graph may be much smaller— thereby making it easier for the server to accurately identify the speakers that are in proximity to the mobile device user.
  • a user context may be "John's party”.
  • the corresponding social graph might be limited to a list of invited guests (or people that have checked themselves in to the party using a social networking tool), which may be much more specific than a list of all friends (or all friends and all of their friends).
  • social graphs with edge weightings can be utilized.
  • each person represented in a social graph can be assigned a weighting.
  • the weighting can represent the relative fraction of time the mobile device user spends interacting with that person. For example, if the user's context is "work,” work colleagues on the user's team would be assigned higher weightings than people that are not on the user's team.
  • the social graph corresponding to a user's friends would include weightings for close friends that are higher than weightings for distant friends.
  • the invitees would be weighted accordingly on a corresponding social graph. More specifically, higher weights would be assigned to those people that have responded "Attending” than those that have responded "Maybe Attending”. It should be appreciated that the weighting for a particular person with which a user interacts can change with the user's context.
  • the person could have a higher weighting when the user's context is "party,” than when the user's context is "work.”
  • a family member might receive a higher weighting when a user's context is "home” rather than "party.”
  • Edge weightings can be used in any suitable manner to identify a speaker. For example, in some implementations, edge weightings can be treated as prior
  • a speaker with the highest posterior probability can be selected using the following equation:
  • mobile device 1 10a performs substantially all processing described herein.
  • remote server 140a performs some or substantially all processing described herein.
  • Mobile device 1 10a can be configured to provide raw, intermediate or fully processed to remote server 140a.
  • mobile device 1 10a may transmit to remote server 140a: raw audio and/or speech data, privacy-sensitive audio and/or speech data, processed (e.g., filtered, transformed, normalized, etc.) audio and/or speech data, context variables, an inferred context, a list of possible speakers, an applicable social graph, one or more speech models (e.g., corresponding to a list of people in a social graph associated with an inferred context), etc.
  • speech models for a set of people with which a mobile device user most frequently associates are cached by mobile device 1 10a and/or remote server 140a. By caching speech models, a speaker may be identified more quickly and/or identification functionality can continue to be available even during periods when a processor is operating offline.
  • FIG. 2 is a flow diagram of a process 200 for identifying one or more persons according to one embodiment. Part or all of process 200 can be performed by e.g., mobile device 1 10a and/or by remote server 140a.
  • Process 200 starts at 210 when mobile device 1 10a collects or gathers audio data from its surrounding physical environment (e.g., using a microphone and/or recorder on mobile device 1 10a).
  • mobile device 1 10a can collect the audio data using an embedded or connected microphone.
  • mobile device 1 10a can be configured to use privacy sensitive microphone sampling in order to ensure that no spoken words and/or sentences can be heard or reconstructed from the collected audio data.
  • Audio data may be collected, e.g., continuously, regularly, or at discrete intervals. In some instances, audio data is always or sometimes collected when speech is detected.
  • the mobile device can be configured to execute a speech detection program. The speech detection program can be run in the background, and over the course of a day, determine when speech is present in the environment surrounding the mobile device. If speech is detected, audio signals can be recorded by the mobile device (e.g., using microphone 1 12a). In some embodiments, audio data is recorded, e.g., when an input (e.g., from a user) is received indicating that audio data is to be recorded or that a program is to be initiated.
  • an input e.g., from a user
  • audio signals are recorded when a volume of monitored sounds exceeds a threshold; when one or more particular programs or parts of programs (e.g., relating to a mobile device being engaged in a call) is executed; when a mobile device is engaged in a call; when a mobile device is transmitting a signal; etc.
  • programs or parts of programs e.g., relating to a mobile device being engaged in a call
  • segments in the audio data that includes speech are identified (e.g., by a speech detector). For example, a signal may be divided into a plurality of segments. Each segment may be characterized by one or more variables (e.g., cepstral coefficients). Analysis of the variables associated with each segment may enable an estimation as to whether the segment includes a speech signal.
  • speech segments are processed (e.g., by applying a filter, a transformation, a normalization, a noise-reduction algorithm, etc.). For example, feature vectors (e.g., including cepstral coefficients) may be computed for the speech segments. As further examples, speech segments may be filtered, normalized, etc. As yet further examples, speech segments may be sampled and/or permutated such that, e.g., spoken words cannot be reconstructed from the processed data.
  • feature vectors e.g., including cepstral coefficients
  • speech segments may be filtered, normalized, etc.
  • speech segments may be sampled and/or permutated such that, e.g., spoken words cannot be reconstructed from the processed data.
  • a current context is inferred (e.g., by a present-state analyzer).
  • a context may be inferred, e.g., based on sensor data received by mobile device 1 10a
  • a current context may be inferred at least partly based on received audio data. For example, background noise
  • contexts are "learned.” For example, data
  • clusters may be associated with a unique context identifier.
  • contexts are named.
  • one or more contexts are not named and are identified, e.g., based on a unique (e.g., alphanumeric) identifier.
  • inferring a context is based at least partly on a location.
  • the context may be a location (e.g., an address, a portion of a city or a city) or the location may suggest that a user is in a context (e.g., a specific range of GPS coordinates may be associated with a "work" context).
  • the location may be at least partly detennined by the type, time or strength of signals received by of transmitted from a mobile device. For example, the location may be determined at least partly based on GPS, WiFi or cellular signals received by the mobile device.
  • inferring a context is based at least partly on an
  • inferring a context is based at least partly on an activity of a user (e.g., watching a movie, working on a computer, at a social event, running, etc.).
  • the activity may be determined using sensor data, such as motion-sensor data, light- sensor data, received audio signals, etc.
  • the activity may also be determined based on, e.g., email data, text-messaging data, calendar data or social networking data.
  • a "running" context may be determined when motion-sensor data indicates that the device is moving at about six miles per hour.
  • a "social" context may be inferred when calendar data stored on the device or associated with a user of the device indicates that the user accepted an invitation from "John.”
  • inferring a context is based at least partly on a device- related status (e.g., a call status, current-call details, applications being actively or inactively used on the device, etc.).
  • a device- related status e.g., a call status, current-call details, applications being actively or inactively used on the device, etc.
  • an on-call status may be inferred when the device is engaged in a call.
  • a social graph may then include, e.g., people in a contact list or a person associated with a phone number (e.g., in a contact list or public/private database) calling/being called by the device.
  • the device may infer a non-work context.
  • At 250 at least one social graph is identified (e.g., using a context-to-social- graph mapper implementing a mapping algorithm) based at least partly on the inferred context.
  • the context can indicate that a user or device is at "home.”
  • a social graph including the user's household members can be selected.
  • the identified social graph may comprise a stored social graph.
  • Each stored social graph may be associated with one or more contexts and may have been generated (e.g., by a social-graph generator) based at least partly on user location data, calendar data, email data, social networking data, received-signal data, etc.
  • the identified social graph(s) may include features (e.g., weights) as described above.
  • the social graph(s) may have been constructed using any appropriate technique.
  • a social graph may have been constructed based on user inputs to mobile device 1 10a (e.g., identifying people likely to be present in particular contexts), electronic messages (e.g., emails, electronic invitations, text messages, etc.), data on social network sites, audio signals previously captured in an associated context, signals previously received by nearby mobile devices in an associated context, etc.
  • electronic messages e.g., emails, electronic invitations, text messages, etc.
  • data on social network sites e.g., audio signals previously captured in an associated context, signals previously received by nearby mobile devices in an associated context, etc.
  • a social graph associated with a Mary's-party context may include a list of all other people who publicly indicated (e.g., via a webpage) that they would also be attending the party.
  • a social graph may have been determined by capturing audio signals while the user was previously in Context A. The social graph may then indicate that, within ten minutes, there is a 50% probability of receiving a speech signal from Speaker 1 , a 30% probability of receiving a speech signal from Speaker 2, and a 5% probability of receiving a speech signal from Speaker 3.
  • speech data e.g., processed speech segments
  • one or more speech models e.g., using a classifier implementing a classification algorithm
  • each model can be compared to the speech data, and one or more speech models that match the speech data can be determined.
  • one or more models represented in the identified social graph may be associated with a speech model comprising a number of cepstral coefficients.
  • Processed speech data may also include a number of cepstral coefficients.
  • the speech data may be matched to a speech model having the most similar cepstral coefficients.
  • a speech model comprises and/or consists of a probability of receiving a speech signal from a speaker given a context.
  • Speech models may include, e.g., a Gaussian Mixture Model or Hidden Markov Model.
  • one or more persons in proximity to the mobile device user can be identified (e.g., using a speech-model-to-person mapper implementing a mapping algorithm) based at least partly on the results of the matching at 260.
  • Identification of the one or more persons may include identifying the one or more persons, e.g.: by name, by a unique identifier, by a phone number, by an e-mail address, by an online ID, by an audio characteristic, by an audio sample, by a relationship, etc. In some instances, one or more probabilities associated with the identification are determined.
  • the identification of the one or more persons may be presented. In some instances, the identification is communicated to a user of mobile device 1 10a. For example, the identification(s) may be displayed on a display of mobile device 1 10a.
  • a communication (e.g., a text message, a voice message, or an e-mail message) comprising the identification(s) is sent to the user.
  • the identification may be published on a website (e.g., a social networking website).
  • the identification may be used to update a status of the user on a social networking website.
  • mobile device 1 10a performs all of process 200.
  • remote server 140a performs at least part of process 200. In the latter instances, it may be necessary for data to be transmitted by mobile device 1 10a (e.g., via wireless network 120 and/or network(s) 130) and received by remote server
  • Transmitted data may include, e.g., raw or processed audio data, speech data (e.g., data including the computed feature vectors), speech model data, context-related data, social graph data, etc.
  • mobile device 1 10a performs 210-240 and 280 locally. Speech data and the inferred context are the transmitted to remote server 140a. Remote server then performs 250-270.
  • Information regarding one or more persons that are in proximity to the mobile device and/or its use may then be transmitted from remote server 140a (e.g., via wireless network 120 and/or network(s) 130) and received by mobile device 1 10a. Identification of the one or more persons can be based on the speech data and user context previously transmitted to remote server 140a.
  • Remote server 140a may store, e.g., social graph data and speech models.
  • the social graph data can include one or more social graphs with which the speech models can be associated.
  • each social graph can include representations for one or more persons.
  • Each of the representations can be associated with a speech model that represents the voice of a person.
  • FIG. 3 provides a schematic illustration of one embodiment of a computer system 300 that can perform the methods provided by various other embodiments, as described herein, and/or can function as the remote server 140a and/or mobile device 1 10a. It should be noted that FIG. 3 is meant only to provide a generalized illustration of various components, any or all of which may be utilized as appropriate. FIG. 3, therefore, broadly illustrates how individual system elements may be implemented in a relatively separated or relatively more integrated manner.
  • the computer system 300 is shown comprising hardware elements that can be electrically coupled via a bus 305 (or may otherwise be in communication, as appropriate).
  • the hardware elements may include one or more processors 310, including without limitation one or more general-purpose processors and/or one or more special-purpose processors (such as digital signal processing chips, graphics acceleration processors, and/or the like); one or more input devices 315, which can include without limitation a mouse, a keyboard and/or the like; and one or more output devices 320, which can include without limitation a display device, a printer and/or the like.
  • the computer system 300 may further include (and/or be in communication with) one or more storage devices 325, which can comprise, without limitation, local and/or network accessible storage, and/or can include, without limitation, a disk drive, a drive array, an optical storage device, solid-state storage device such as a random access memory (“RAM”) and/or a read-only memory (“ROM”), which can be programmable, flash-updateable and/or the like.
  • storage devices may be configured to implement any appropriate data stores, including without limitation, various file systems, database structures, and/or the like.
  • the computer system 300 might also include a communications subsystem 330, which can include without limitation a modem, a network card (wireless or wired), an infrared communication device, a wireless communication device and/or chipset (such as a BluetoothTM device, an 802.1 1 device, a WiFi device, a WiMax device, cellular communication facilities, etc.), and/or the like.
  • the communications subsystem 330 may permit data to be exchanged with a network (such as the network described below, to name one example), other computer systems, and/or any other devices described herein.
  • the computer system 300 will further comprise a working memory 335, which can include a RAM or ROM device, as described above.
  • the computer system 300 also can comprise software elements, shown as being currently located within the working memory 335, including an operating system 340, device drivers, executable libraries, and/or other code, such as one or more application programs 345, which may comprise computer programs provided by various embodiments, and/or may be designed to implement methods, and/or configure systems, provided by other embodiments, as described herein.
  • an operating system 340 operating system 340
  • device drivers executable libraries
  • application programs 345 which may comprise computer programs provided by various embodiments, and/or may be designed to implement methods, and/or configure systems, provided by other embodiments, as described herein.
  • code and/or instructions can be used to configure and/or adapt a general purpose computer (or other device) to perform one or more operations in accordance with the described methods.
  • a set of these instructions and/or code might be stored on a computer-readable storage medium, such as the storage device(s) 325 described above.
  • the storage medium might be incorporated within a computer system, such as the system 300.
  • the storage medium might be separate from a computer system (e.g., a removable medium, such as a compact disc), and/or provided in an installation package, such that the storage medium can be used to program, configure and/or adapt a general purpose computer with the instructions/code stored thereon.
  • These instructions might take the form of executable code, which is executable by the computer system 300 and/or might take the form of source and/or installable code, which, upon compilation and/or installation on the computer system 300 (e.g., using any of a variety of generally available compilers, installation programs,
  • compression/decompression utilities then takes the form of executable code.
  • some or all of the procedures of such methods are performed by the computer system 300 in response to processor 310 executing one or more sequences of one or more instructions (which might be incorporated into the operating system 340 and/or other code, such as an application program 345) contained in the working memory 335.
  • Such instructions may be read into the working memory 335 from another computer-readable medium, such as one or more of the storage device(s) 325.
  • execution of the sequences of instructions contained in the working memory 335 might cause the processor(s) 3 10 to perform one or more procedures of the methods described herein.
  • machine-readable medium and “computer-readable medium,” as used herein, refer to any medium that participates in providing data that causes a machine to operate in a specific fashion.
  • Computer readable medium and storage medium do not refer to transitory propagating signals.
  • various computer-readable media might be involved in providing instructions/code to processor(s) 310 for execution and/or might be used to store such instructions/code.
  • a computer-readable medium is a physical and/or tangible storage medium.
  • Such a medium may take the form of a nonvolatile media or volatile media.
  • Non-volatile media include, for example, optical and/or magnetic disks, such as the storage device(s) 325.
  • Volatile media include, without limitation, dynamic memory, such as the working memory 335.
  • Common forms of physical and/or tangible computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, EPROM, a FLASH- EPROM, any other memory chip or cartridge, etc.
  • configurations may be described as a process which is depicted as a flow diagram or block diagram. Although each may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently.
  • examples of the methods may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof.
  • the program code or code segments to perform the necessary tasks may be stored in a non-transitory computer-readable medium such as a storage medium. Processors may perform the described tasks.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Game Theory and Decision Science (AREA)
  • Business, Economics & Management (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Artificial Intelligence (AREA)
  • Computational Linguistics (AREA)

Abstract

Techniques are provided to improve identification of a person using speaker recognition. In one embodiment, a unique social graph may be associated with each of a plurality of defined contexts. The social graph may indicate speakers likely to be present in a particular context. Thus, an audio signal including a speech signal may be collected and processed. A context may be inferred, and a corresponding social graph may be identified. A set of potential speakers may be determined based on the social graph. The processed signal may then be compared to a restricted set of speech models, each speech model being associated with a potential speaker. By limiting the set of potential speakers, speakers may be more accurately identified.

Description

IDENTIFYING PEOPLE THAT ARE PROXIMATE TO A MOBILE DEVICE USER VIA SOCIAL GRAPHS, SPEECH MODELS, AND
USER CONTEXT
BACKGROUND
[0001] Identifying those people that a mobile device user is interacting with is an extremely valuable problem to be solved in the fields of context awareness and social networking. To date, the problem remains largely unsolved.
SUMMARY
[0002] Techniques are provided to improve identification of a person using speaker recognition. In one embodiment, a unique social graph may be generated and associated with each of a plurality of defined contexts. The social graph may indicate speakers likely to be present in a particular context. Thus, an audio signal including a speech signal may be collected and processed. A context may be inferred, and a corresponding social graph may be identified. A set of potential speakers may be determined based on the social graph. The processed signal may then be compared to a restricted set of speech models, each speech model being associated with a potential speaker. By limiting the set of potential speakers, speakers may be more accurately identified. [0003] In some embodiments, a method for identifying a speaker is provided. The method may include: accessing audio data comprising a speech signal, the audio data generated using a microphone on a mobile device; inferring a context of a user of the mobile device; identifying a social graph based at least partly based on the inferred context, the social graph comprising a list of potential speakers; and identifying a speaker determined to have vocally contributed to the speech signal, the speaker identification based at least partly on the identified social graph. Inferring the context of the user may be based at least partly on a location of the user. The method may further include determining the location of the user at least partly based on GPS, WiFi or cellular signals received by the mobile device. Inferring the context of the user may be based at least partly on an environment of the user. The method may further include determining the environment at least partly based on BlueTooth or audio signals received by the mobile device. Inferring the context of the user may be based at least partly on an activity of the user. The method may further include determining the activity based at least partly on motion-sensor data, light-sensor data, or audio signals captured by the microphone on the device. Inferring the context of the user may be based at least partly on one or more of email data, text message data, calendar data, social networking data and contact list data associated with the mobile device. Inferring the context of the user may be based at least partly on a call status and/or current-call details of the mobile device. Inferring the context of the user may be based at least partly on applications actively or inactively being used on the mobile device. Inferring the context of the user may be based at least partly on a time of day during which the audio data was collected. The audio data may include audio portions sampled in a privacy-sensitive manner such that spoken words cannot be reconstructed from the audio data. The method may further include storing a plurality of social graphs, each social graph being associated with a different context. The method may further include storing a plurality of speech models, wherein each speech model is associated with a potential speaker. The method may further include: storing a plurality of speech models, wherein each speech model is associated with a potential speaker; processing the accessed audio data; and comparing the processed audio data to a subset of the plurality of speech models, the subset being determined based at least partly on the identified social graph. The method may further include generating social graphs for one or more contexts, wherein generation of the social graphs is at least partly on one or more of: user location data, calendar data, email data, and social networking data. The identified social graph may include edge weightings for one or more edges of the one social graph. The edge weighting for each edge may correspond to a fraction of time the user spends interacting with a person associated with the edge. The method may further include, prior to identifying the social graph: capturing training audio data in each of a plurality of contexts; clustering the captured training audio data; and generating a plurality of social graphs based on the clustered audio data, wherein the generated social graph comprises one of the plurality of social graphs. The method may further include defining a plurality of potential contexts based at least partly on execution of a clustering algorithm. The identifying the speaker may include identifying a name of the speaker. [0004] In some embodiments, an apparatus for recognizing a speaker is provided. The apparatus may include a mobile device comprising: a microphone configured to receive audio signals and convert the received audio signals into radio signals; and a transmitter configured to transmit the radio signals. The apparatus may also include one or more processors configured to: capture audio data from the microphone; infer a context of a user of the mobile device; identify a social graph based at least partly on the inferred context, the social graph comprising a list of potential speakers; and identify a speaker determined to have vocally contributed to the speech signal, the speaker identification based at least partly on the identified social graph. A remote server may include at least one of the one or more processors. The mobile device may include all of the one or more processors. The mobile device may include a display, and the one or more processors may be further configured to present the identification of the speaker on the display.
[0005] In some embodiments, a computer-readable medium is provided, the computer-readable medium containing a program which executes the steps of: accessing audio data comprising a speech signal, the audio data generated using a microphone on a mobile device; inferring a context of a user of the mobile device; identifying a social graph based at least partly on the inferred context, the social graph comprising a list of potential speakers; and identifying a speaker determined to have vocally contributed to the speech signal, the speaker identification based at least partly on the identified social graph. The program may further execute the step of: transforming the accessed audio data into a feature space. The program may further execute the step of: storing a plurality of social graphs, each social graph being associated with a different context. The program may further execute the steps of: storing a plurality of speech models, wherein each speech model is associated with a potential speaker; processing the accessed audio data; and comparing the processed audio data to a subset of the plurality of speech models, the subset being determined based at least partly on the identified social graph.
[0006] In some embodiments, a system for recognizing a speaker is provided. The system may include: means for accessing audio data comprising a speech signal (e.g., a transceiver and/or microphone); means for inferring a context (e.g., a present-state analyzer); means for identifying a social graph based at least partly on the inferred context (e.g., a context-to-social-graph mapper), the social graph comprising a list of potential speakers; and means for identifying a speaker determined to have vocally contributed to the speech signal, the speaker identification based at least partly on the identified social graph (e.g., a classifier and/or a speech-model-to-person mapper). The system may further include means for generating social graphs (e.g., a social-graph generator ) for one or more contexts based at least partly on one or more of: user location data, calendar data, email data, and social networking data The identified social graph may include edge weightings for one or more edges of the one social graph. The system may further include means for presenting the identifying speaker to a user of the mobile device (e.g., a display).
BRIEF DESCRIPTION OF THE DRAWINGS
[0007] FIG. 1 A illustrates an embodiment of an apparatus for the identifying one or more persons using social graphs, speech models, and user context information.
[0008] FIG. I B is a diagram illustrating the capture of audio data according to an embodiment of the present invention.
[0009] FIG. 1 C is a diagram illustrating the capture of audio data according to another embodiment of the present invention.
[0010] FIG. I D is a diagram illustrating the capture of audio data according to still another embodiment of the present invention. [0011] FIG. 2 is a flow diagram of a process for identifying one or more persons in proximity to a mobile device user.
[0012] FIG. 3 illustrates an embodiment of a computer system.
DETAILED DESCRIPTION
[0013] Methods, devices and systems are provided to improve identification of a person using speaker recognition. In some instances, a speaker is recognized by associating a received audio signal with one of a set of possible speakers. For example, an initial set of possible speakers may be defined, and one or more speech models may be associated with each possible speaker. A received signal may be processed in an attempt to associate the signal with one of the possible speakers. [0014] A difficulty arises in that mobile devices frequently receive audio signals from a large number of speakers. Thus, recognizing a speaker may require comparing a given processed signal to a large number of control variables. Such analysis may require substantial computational processing and may be prone to frequent errors in recognition. Required processing power, computational time, and errors may be reduced if recognition of a speaker could be restricted to recognizing a speaker from a smaller set of possible speakers.
[0015] Thus, in some embodiments, a signal is recognized using a restricted set of control data. An initial control data set may be downsized to a restricted control data set by using a context. For example, a context (e.g., "work", "home", "party", "meeting", "car", "with family", etc.) may be inferred based on, e.g., a time of day, a location, a user activity, applications executing on a device, sensor data, surrounding noise, calendar events, email data, a call status, applications in use on a mobile device, user input, etc. Each of a plurality of contexts may be associated with a social graph. The social graph may identify a set of people who are likely to have provided a speech signal in the inferred context.. For one or more people associated with the social graph, the social graph may include a probability that a given speech signal originated with the person. The set itself may be defined based on this probability (e.g., such that a set includes all people with a signal probability greater than a threshold, such as 10%). The probability may be calculated without accounting for audio characteristics of the signal (e.g., there is a 10% probability that a speech signal received at home was from
"sister.") Using the applicable social graph may thereafter aid in recognizing from whom the speech signal originated. More specifically, a recognition may include matching an audio signal to one of a smaller set of possible speakers. [0016] FIG. 1 A illustrates an apparatus 100a for identifying one or more people according to one embodiment of the present invention. As shown in FIG. 1 A, apparatus 100a can include a mobile device 1 10a, which may be used by a user 1 13a. A mobile device 1 10a can communicate with a remote server 140a via wireless network 120a and network(s) 130a. Mobile device 1 10a may include a transmitter configured to transmit radio signals, e.g., over a wireless network. Mobile device 1 10a can represent a cellular phone, a smart phone, or some other mobile computerized device, such as a personal digital assistant, tablet computer, laptop, handheld gaming device, digital camera, etc. Mobile device 1 10a, as shown in FIG. 1A, can contain microphone 1 12a. Microphone 1 12a can permit mobile device 1 10a to collect or capture audio data from the mobile device's surrounding physical environment (e.g., speech being spoken by person 1 14a).
[0017] Microphone 1 12a may be configured to convert sound waves into electrical or radio signals during select ("active") time periods. In some instances, whether microphone 1 12a is active depends at least partly on whether one or more programs or parts of programs are executing on mobile device 1 10a. For example, microphone 1 12a may be active only when a particular program is executed, indicating that mobile device 1 10a is in a call state. In some embodiments, microphone 1 12a is activated while mobile device 1 10a is on a call and when one or more independent programs are executed. For example, the user may be able to initiate a program to: set up voice-recognition speed dial, record a dictation, etc. In some embodiments, microphone 1 12a is activated automatically, e.g., during fixed times of the day, at regular intervals, etc.
[0018] In some embodiments, privacy sensitive microphone sampling can be used to ensure that no spoken words and/or sentences can be heard or reconstructed from captured audio data while providing sufficient information for speech detection purposes. For example, referring to FIG. 1 B, a continuous audio stream in a physical environment can comprise a window 1 10b of audio data lasting Twimjow seconds and having a plurality of audio portions or data segments. More specifically, the window can comprise N blocks 120b, each block 120b lasting Tu0 k seconds and comprising a plurality of frames 130b of Tframe seconds each. A microphone signal can be sampled such that only one frame (with Tframe seconds of data) is collected in every block of T iovk seconds. An example of parameter setting includes Trame = 50ms and 2 i = 500ms, but these settings can vary, depending on desired functionality. For example, frames can range from less than 30ms to 100ms or more, blocks can range from less than 250ms up to 2000ms (2s) or more, and windows can be as short as a single block (e.g., one block per window), up to one minute or more. Different frame, block, and window lengths can impact the number of frames per block and the number of blocks per window. Note that frame capturing can be achieved by either continuously sampling the microphone signal and discarding (i.e. not storing) the unwanted components (e.g., 450ms out of every 500ms), or by turning the microphone off during the unwanted segment (e.g., turning the microphone off for 450ms out of every 500ms). [0019] The resulting audio data 140b is a collection of frames that comprises only a subset of the original audio data. Even so, this subset can still include audio
characteristics that can provide for a determination of an ambient environment and/or other contextual information of the audio data with no significant impact on in the accuracy of the determination. In some instances, the subset may also or alternatively be used to identify a speaker (e.g., once a context is inferred). For example, cepstral coefficients may be determined based on the subset of data and compared to speech models.
[0020] FIGS. 1C and ID are similar to FIG. IB. In FIGS. 1 C and ID, however, additional steps are taken to help ensure further privacy of any speech that may be captured. FIG. 1 C illustrates how, for every window of Twi„dow seconds, the first frames of every block in a window can be randomly permutated (i.e. randomly shuffled) to provide the resultant audio data 140c. FIG. I D illustrates a similar technique, but further randomizing the frame captured for each block. For example, where Twin(i(m = 10 and T block = 500ms, 20 frames of microphone data will be captured. These 20 frames then can be being randomly permutated. The random permutation can be computed using a seed that is generated in numerous ways (e.g., based on GPS time, based on noise from circuitry within the mobile device 1 10a, based on noise from microphone, based on noise from an antenna, etc.). Furthermore, the permutation can be discarded (e.g., not stored) to help ensure that the shuffling effect cannot be reversed.
[0021] Other embodiments are contemplated. For example, the blocks themselves may be shuffled before the frames are captured, or frames are captured randomly throughout the entire window (rather than embodiments limiting frame captures to one frame per block), etc. In some embodiments, all frames may be sampled and randomly permutated. In some embodiments, some or all frames may be sampled and mapped onto a feature space. Privacy-protecting techniques may enable processed data (e.g., incomplete frame sampling, permutated frames, mapped data, etc.) to be stored, and it may be unnecessary to store original audio data. It may then be difficult or impossible to back-calculate the original audio signal (and therefore a message spoken into the microphone) based on stored data.
[0022] Referring again to FIG. 1 A, wireless network 120a can represent a cellular service provider's wireless network. Wireless network 120a can use one or more network(s) 130a to communicate with remote server 140a. Network(s) 130a can include one or more private networks, such as a corporate intranet, and/or one or more public networks, such as the Internet.
[0023] Remote server 140a can include processor 142a and storage device 144a. In some embodiments, remote server 140a can include other components not illustrated. Mobile device 1 10a may also include a processor and/or a storage device. Speech model data may be stored on storage device 144a and/or a storage device of mobile device 1 10a. Speech model data may include, e.g., raw audio signals, portions of audio signals, processed audio signals (e.g., normalized signals or filtered signals), feature-mapped audio signals (e.g., cepstral coefficients), parameters corresponding to speech model, parameters corresponding to a template, etc. A speech model associated with a speaker may include a set of parameters used to determine whether an unknown signal is likely to include a speech signal by the speaker. For example, a first speech model associated with Speaker 1 may include a specific power spectra template and a second speech model associated with Speaker 1 may include a set of audio-data parameters (e.g., amplitude variation, a clipping variable, etc.).
[0024] Social graph data may be stored on storage device 144a and/or a storage device of mobile device 1 10a. Social graph data may include, e.g., variables indicative of a social context (e.g., a time of day, a day of the week, a reception signal strength, a location, a GPS coordinate, a program being executed, a user input, etc.), people associated with a particular context (e.g., names, unique identifiers, etc.), a probability that a speech signal will have originated by a specific person given a context, etc.
[0025] Stored data can be used to identify a speaker proximate to mobile device 1 10a and/or its user. In certain embodiments, storage device 144a can store social graph data 146a and speech model data 148a for a number of different users. Illustratively, storage device 144a might store ten different social graphs and twenty different speech models for each of five different users.
[0026] Social graphs can be obtained in any suitable manner and through using any suitable form of data. Social graphs can be obtained through data obtained from a user's location, calendar, email, social networking profile, etc. As one example, a social graph may include speech models associated only or at least with people who a calendar indicates will or might be at a current event (e.g., a meeting). As another example, relationships may be inferred or determined based on a social networking profile, email data or text-messaging data (e.g., by analyzing defined relationships, email formality, time stamps of text messages or emails, etc.). People with particular relationships (e.g., work colleagues) may be represented with one or more speech models associated with a related context (e.g., work).
[0027] In some instances, a social graph is "learned." For example, speech signals may be monitored and captured. A context may be inferred, e.g., based on received data (e.g., audio data, GPS data, user-input data, time and day data, etc.). Captured speech signals may be clustered, such that one or more clusters are estimated to correspond to a unique speaker. Thus, for example, it may be learned that in Context A, Speakers 1 -3 are likely to be present, and that in Context B, Speakers 1 and 4-6are likely to be present. One or more speech models may be associated with one or more of the speakers. If a speech signal is received in Context B, speech model data associated with Speakers 1 and 4-6 may then be used to identify from whom the speech signal originated.
[0028] In some embodiments, social graphs can correspond to a user context. For example, a social graph consisting of a list of work colleagues can correspond to a "work" context. As another example, a social graph consisting of a user's
family/household members can correspond to a "home" context. As yet another example, a social graph consisting of a list of friends (or a list of friends and all of their friends) that are attending a specific function can correspond to an "party" context.
[0029] In certain embodiments, social graphs that correspond to the different contexts of the user can have a nested structure. In these instances, if a user's context is defined at a low (e.g., more precise) level, the social graph may be much smaller— thereby making it easier for the server to accurately identify the speakers that are in proximity to the mobile device user. For example, as opposed to a high-level context of "party," a user context may be "John's party". In such a case, the corresponding social graph might be limited to a list of invited guests (or people that have checked themselves in to the party using a social networking tool), which may be much more specific than a list of all friends (or all friends and all of their friends). As another example, if a user's context is "a meeting at work," the corresponding social graph may consist only of work colleagues in the user's team, or alternatively consist only of meeting invitees. [0030] According to some embodiments, social graphs with edge weightings can be utilized. In particular, each person represented in a social graph can be assigned a weighting. The weighting can represent the relative fraction of time the mobile device user spends interacting with that person. For example, if the user's context is "work," work colleagues on the user's team would be assigned higher weightings than people that are not on the user's team. Likewise the social graph corresponding to a user's friends would include weightings for close friends that are higher than weightings for distant friends. As another example, if a user is at a party with an RSVP list consisting of various levels of invitation acceptance, such as "Attending", "Maybe Attending", "Not Attending", "Not Replied", the invitees would be weighted accordingly on a corresponding social graph. More specifically, higher weights would be assigned to those people that have responded "Attending" than those that have responded "Maybe Attending". It should be appreciated that the weighting for a particular person with which a user interacts can change with the user's context. For instance, if the user is close friends with someone who happens to also be a work colleague but not a member of the same team, the person could have a higher weighting when the user's context is "party," than when the user's context is "work." As another example, a family member might receive a higher weighting when a user's context is "home" rather than "party."
[0031] Edge weightings can be used in any suitable manner to identify a speaker. For example, in some implementations, edge weightings can be treated as prior
probabilities. Illustratively, suppose a Bayesian classifier is used. Let M denote the feature vectors computed from an audio data vector x . Further, let Pfei (where s = l, ... ,5 ) denote the prior probabilities for the S speakers in a social graph corresponding to a user's context. It should be noted that these prior probabilities sum to s
y PCs) = l
one, i.e. s=t
[0032] Based on the computed feature vectors and prior probabilities, a speaker with the highest posterior probability can be selected using the following equation:
s = argmsxS£ilmrS P(f(x)\s}P(s) _ jn par icular, embodiments can multiply the likelihood scores PC/¾)l->) for each speaker s by the prior probability for that speaker and subsequently select the speaker with the highest result. [0033] In some embodiments, mobile device 1 10a performs substantially all processing described herein. In some embodiments, remote server 140a performs some or substantially all processing described herein. Mobile device 1 10a can be configured to provide raw, intermediate or fully processed to remote server 140a. For example, mobile device 1 10a may transmit to remote server 140a: raw audio and/or speech data, privacy-sensitive audio and/or speech data, processed (e.g., filtered, transformed, normalized, etc.) audio and/or speech data, context variables, an inferred context, a list of possible speakers, an applicable social graph, one or more speech models (e.g., corresponding to a list of people in a social graph associated with an inferred context), etc. In some embodiments, speech models for a set of people with which a mobile device user most frequently associates are cached by mobile device 1 10a and/or remote server 140a. By caching speech models, a speaker may be identified more quickly and/or identification functionality can continue to be available even during periods when a processor is operating offline. [0034] Examples of processes that can be used to identify one or more persons will now be described.
[0035] FIG. 2 is a flow diagram of a process 200 for identifying one or more persons according to one embodiment. Part or all of process 200 can be performed by e.g., mobile device 1 10a and/or by remote server 140a. [0036] Process 200 starts at 210 when mobile device 1 10a collects or gathers audio data from its surrounding physical environment (e.g., using a microphone and/or recorder on mobile device 1 10a). In some embodiments, mobile device 1 10a can collect the audio data using an embedded or connected microphone. According to some embodiments, mobile device 1 10a can be configured to use privacy sensitive microphone sampling in order to ensure that no spoken words and/or sentences can be heard or reconstructed from the collected audio data.
[0037] Audio data may be collected, e.g., continuously, regularly, or at discrete intervals. In some instances, audio data is always or sometimes collected when speech is detected. For example, the mobile device can be configured to execute a speech detection program. The speech detection program can be run in the background, and over the course of a day, determine when speech is present in the environment surrounding the mobile device. If speech is detected, audio signals can be recorded by the mobile device (e.g., using microphone 1 12a). In some embodiments, audio data is recorded, e.g., when an input (e.g., from a user) is received indicating that audio data is to be recorded or that a program is to be initiated. In some embodiments, audio signals are recorded when a volume of monitored sounds exceeds a threshold; when one or more particular programs or parts of programs (e.g., relating to a mobile device being engaged in a call) is executed; when a mobile device is engaged in a call; when a mobile device is transmitting a signal; etc.
[0038] At 220, segments in the audio data that includes speech are identified (e.g., by a speech detector). For example, a signal may be divided into a plurality of segments. Each segment may be characterized by one or more variables (e.g., cepstral coefficients). Analysis of the variables associated with each segment may enable an estimation as to whether the segment includes a speech signal.
[0039] At 230, speech segments are processed (e.g., by applying a filter, a transformation, a normalization, a noise-reduction algorithm, etc.). For example, feature vectors (e.g., including cepstral coefficients) may be computed for the speech segments. As further examples, speech segments may be filtered, normalized, etc. As yet further examples, speech segments may be sampled and/or permutated such that, e.g., spoken words cannot be reconstructed from the processed data.
[0040] At 240, a current context is inferred (e.g., by a present-state analyzer). A context may be inferred, e.g., based on sensor data received by mobile device 1 10a
(e.g., sensing nearby Bluetooths, determined reception strength, received GPS signals, received cellular signals, received audio signals, or received WiFi signals), sensor data received by external sensors (e.g., sensing the time of day), prior user input (e.g., associated with a calendar event), stored text (e.g., email text or a text message), user- provided data (e.g., identifying a context), a social networking status, email data, text message data, calendar data, etc. In some instances, a current context may be inferred at least partly based on received audio data. For example, background noise
characteristics, clarity of a received signal, or an identified particular type of signal (e.g., of a particular speaker or noise), may suggest that a user or device is in a particular context. In some embodiments, contexts are "learned." For example, data
(such as any context-indicative data listed above) may be monitored and clustered. One or more clusters may be associated with a unique context identifier. In some instances, one or more contexts are named. In some instances, one or more contexts are not named and are identified, e.g., based on a unique (e.g., alphanumeric) identifier.
[0041] In some instances, inferring a context is based at least partly on a location. The context may be a location (e.g., an address, a portion of a city or a city) or the location may suggest that a user is in a context (e.g., a specific range of GPS coordinates may be associated with a "work" context). The location may be at least partly detennined by the type, time or strength of signals received by of transmitted from a mobile device. For example, the location may be determined at least partly based on GPS, WiFi or cellular signals received by the mobile device. [0042] In some instances, inferring a context is based at least partly on an
environment (e.g., silence, many voice signals, loud background, many nearby people, * many nearby computers, near a specific computer, or music). The environment may be determined based on, e.g., signals (e.g., BlueTooth or audio signals) received by the mobile device. [0043] In some instances, inferring a context is based at least partly on an activity of a user (e.g., watching a movie, working on a computer, at a social event, running, etc.). The activity may be determined using sensor data, such as motion-sensor data, light- sensor data, received audio signals, etc. The activity may also be determined based on, e.g., email data, text-messaging data, calendar data or social networking data. For example, a "running" context may be determined when motion-sensor data indicates that the device is moving at about six miles per hour. As another example, a "social" context may be inferred when calendar data stored on the device or associated with a user of the device indicates that the user accepted an invitation from "John."
[0044] In some instances, inferring a context is based at least partly on a device- related status (e.g., a call status, current-call details, applications being actively or inactively used on the device, etc.). For example, an on-call status may be inferred when the device is engaged in a call. A social graph may then include, e.g., people in a contact list or a person associated with a phone number (e.g., in a contact list or public/private database) calling/being called by the device. As another example, when the device is executing a game application, the device may infer a non-work context.
[0045] At 250, at least one social graph is identified (e.g., using a context-to-social- graph mapper implementing a mapping algorithm) based at least partly on the inferred context. Illustratively, the context can indicate that a user or device is at "home." As a result, a social graph including the user's household members can be selected. The identified social graph may comprise a stored social graph. Each stored social graph may be associated with one or more contexts and may have been generated (e.g., by a social-graph generator) based at least partly on user location data, calendar data, email data, social networking data, received-signal data, etc. The identified social graph(s) may include features (e.g., weights) as described above.
[0046] The social graph(s) may have been constructed using any appropriate technique. For example, a social graph may have been constructed based on user inputs to mobile device 1 10a (e.g., identifying people likely to be present in particular contexts), electronic messages (e.g., emails, electronic invitations, text messages, etc.), data on social network sites, audio signals previously captured in an associated context, signals previously received by nearby mobile devices in an associated context, etc. As a specific example, it may be inferred that a user is at Mary's party because he accepted an electronic invitation to the party. A social graph associated with a Mary's-party context may include a list of all other people who publicly indicated (e.g., via a webpage) that they would also be attending the party. As another specific example, it may be inferred that a user is in Context A. A social graph may have been determined by capturing audio signals while the user was previously in Context A. The social graph may then indicate that, within ten minutes, there is a 50% probability of receiving a speech signal from Speaker 1 , a 30% probability of receiving a speech signal from Speaker 2, and a 5% probability of receiving a speech signal from Speaker 3.
[0047] At 260, speech data (e.g., processed speech segments) can be matched to one or more speech models (e.g., using a classifier implementing a classification algorithm) based on the selected at least one social graph. In particular, at least some of the people represented in the selected social graph can each be associated with a corresponding speech model. Each model can be compared to the speech data, and one or more speech models that match the speech data can be determined. For example, one or more models represented in the identified social graph may be associated with a speech model comprising a number of cepstral coefficients. Processed speech data may also include a number of cepstral coefficients. The speech data may be matched to a speech model having the most similar cepstral coefficients. In one embodiment, a speech model comprises and/or consists of a probability of receiving a speech signal from a speaker given a context. Speech models may include, e.g., a Gaussian Mixture Model or Hidden Markov Model.
[0048] At 270, one or more persons in proximity to the mobile device user can be identified (e.g., using a speech-model-to-person mapper implementing a mapping algorithm) based at least partly on the results of the matching at 260. Identification of the one or more persons may include identifying the one or more persons, e.g.: by name, by a unique identifier, by a phone number, by an e-mail address, by an online ID, by an audio characteristic, by an audio sample, by a relationship, etc. In some instances, one or more probabilities associated with the identification are determined. For example, it may be determined that there was a 90% probability that a speech signal originated from Speaker 1 , a 5% probability that the speech signal originated from Speaker 2, and a 5% probability that the speech signal originated from an unknown speaker. The probability may be based on a confidence associated with inferring the context and/or a confidence associated with identifying a person given the inferred context. [0049] At 280, the identification of the one or more persons may be presented. In some instances, the identification is communicated to a user of mobile device 1 10a. For example, the identification(s) may be displayed on a display of mobile device 1 10a. In some instances, a communication (e.g., a text message, a voice message, or an e-mail message) comprising the identification(s) is sent to the user. The identification may be published on a website (e.g., a social networking website). The identification may be used to update a status of the user on a social networking website.
[0050] In some embodiments, mobile device 1 10a performs all of process 200. In some embodiments, remote server 140a performs at least part of process 200. In the latter instances, it may be necessary for data to be transmitted by mobile device 1 10a (e.g., via wireless network 120 and/or network(s) 130) and received by remote server
140a. Transmitted data may include, e.g., raw or processed audio data, speech data (e.g., data including the computed feature vectors), speech model data, context-related data, social graph data, etc. In some instances, mobile device 1 10a performs 210-240 and 280 locally. Speech data and the inferred context are the transmitted to remote server 140a. Remote server then performs 250-270. Information regarding one or more persons that are in proximity to the mobile device and/or its use may then be transmitted from remote server 140a (e.g., via wireless network 120 and/or network(s) 130) and received by mobile device 1 10a. Identification of the one or more persons can be based on the speech data and user context previously transmitted to remote server 140a. Remote server 140a may store, e.g., social graph data and speech models. In some embodiments, the social graph data can include one or more social graphs with which the speech models can be associated. For example, each social graph can include representations for one or more persons. Each of the representations can be associated with a speech model that represents the voice of a person.
[0051] A computer system as illustrated in FIG. 3 may be incorporated as part of the previously described computerized devices. For example, computer system 300 can represent some of the components of the mobile devices and/or the remote computer systems discussed in this application. FIG. 3 provides a schematic illustration of one embodiment of a computer system 300 that can perform the methods provided by various other embodiments, as described herein, and/or can function as the remote server 140a and/or mobile device 1 10a. It should be noted that FIG. 3 is meant only to provide a generalized illustration of various components, any or all of which may be utilized as appropriate. FIG. 3, therefore, broadly illustrates how individual system elements may be implemented in a relatively separated or relatively more integrated manner.
[0052] The computer system 300 is shown comprising hardware elements that can be electrically coupled via a bus 305 (or may otherwise be in communication, as appropriate). The hardware elements may include one or more processors 310, including without limitation one or more general-purpose processors and/or one or more special-purpose processors (such as digital signal processing chips, graphics acceleration processors, and/or the like); one or more input devices 315, which can include without limitation a mouse, a keyboard and/or the like; and one or more output devices 320, which can include without limitation a display device, a printer and/or the like.
[0053] The computer system 300 may further include (and/or be in communication with) one or more storage devices 325, which can comprise, without limitation, local and/or network accessible storage, and/or can include, without limitation, a disk drive, a drive array, an optical storage device, solid-state storage device such as a random access memory ("RAM") and/or a read-only memory ("ROM"), which can be programmable, flash-updateable and/or the like. Such storage devices may be configured to implement any appropriate data stores, including without limitation, various file systems, database structures, and/or the like.
[0054] The computer system 300 might also include a communications subsystem 330, which can include without limitation a modem, a network card (wireless or wired), an infrared communication device, a wireless communication device and/or chipset (such as a Bluetooth™ device, an 802.1 1 device, a WiFi device, a WiMax device, cellular communication facilities, etc.), and/or the like. The communications subsystem 330 may permit data to be exchanged with a network (such as the network described below, to name one example), other computer systems, and/or any other devices described herein. In many embodiments, the computer system 300 will further comprise a working memory 335, which can include a RAM or ROM device, as described above.
[0055] The computer system 300 also can comprise software elements, shown as being currently located within the working memory 335, including an operating system 340, device drivers, executable libraries, and/or other code, such as one or more application programs 345, which may comprise computer programs provided by various embodiments, and/or may be designed to implement methods, and/or configure systems, provided by other embodiments, as described herein. Merely by way of example, one or more procedures described with respect to the method(s) discussed above might be implemented as code and/or instructions executable by a computer (and/or a processor within a computer); in an aspect, then, such code and/or instructions can be used to configure and/or adapt a general purpose computer (or other device) to perform one or more operations in accordance with the described methods.
[0056] A set of these instructions and/or code might be stored on a computer-readable storage medium, such as the storage device(s) 325 described above. In some cases, the storage medium might be incorporated within a computer system, such as the system 300. In other embodiments, the storage medium might be separate from a computer system (e.g., a removable medium, such as a compact disc), and/or provided in an installation package, such that the storage medium can be used to program, configure and/or adapt a general purpose computer with the instructions/code stored thereon.
These instructions might take the form of executable code, which is executable by the computer system 300 and/or might take the form of source and/or installable code, which, upon compilation and/or installation on the computer system 300 (e.g., using any of a variety of generally available compilers, installation programs,
compression/decompression utilities, etc.) then takes the form of executable code.
[0057] It will be apparent to those skilled in the art that substantial variations may be made in accordance with specific requirements. For example, customized hardware might also be used, and/or particular elements might be implemented in hardware, software (including portable software, such as applets, etc.), or both. Further, connection to other computing devices such as network input/output devices may be employed. [0058] As mentioned above, in one aspect, some embodiments may employ a computer system (such as the computer system 300) to perform methods in accordance with various embodiments of the invention. According to a set of embodiments, some or all of the procedures of such methods are performed by the computer system 300 in response to processor 310 executing one or more sequences of one or more instructions (which might be incorporated into the operating system 340 and/or other code, such as an application program 345) contained in the working memory 335. Such instructions may be read into the working memory 335 from another computer-readable medium, such as one or more of the storage device(s) 325. Merely by way of example, execution of the sequences of instructions contained in the working memory 335 might cause the processor(s) 3 10 to perform one or more procedures of the methods described herein.
[0059] The terms "machine-readable medium" and "computer-readable medium," as used herein, refer to any medium that participates in providing data that causes a machine to operate in a specific fashion. Computer readable medium and storage medium do not refer to transitory propagating signals. In an embodiment implemented using the computer system 300, various computer-readable media might be involved in providing instructions/code to processor(s) 310 for execution and/or might be used to store such instructions/code. In many implementations, a computer-readable medium is a physical and/or tangible storage medium. Such a medium may take the form of a nonvolatile media or volatile media. Non-volatile media include, for example, optical and/or magnetic disks, such as the storage device(s) 325. Volatile media include, without limitation, dynamic memory, such as the working memory 335. [0060] Common forms of physical and/or tangible computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, EPROM, a FLASH- EPROM, any other memory chip or cartridge, etc.
[0061] The methods, systems, and devices discussed above are examples. Various configurations may omit, substitute, or add various procedures or components as appropriate. For instance, in alternative configurations, the methods may be performed in an order different from that described, and/or various stages may be added, omitted, and/or combined. Also, features described with respect to certain configurations may be combined in various other configurations. Different aspects and elements of the configurations may be combined in a similar manner. Also, technology evolves and, thus, many of the elements are examples and do not limit the scope of the disclosure or claims. [0062] Specific details are given in the description to provide a thorough
understanding of example configurations (including implementations). However, configurations may be practiced without these specific details. For example, well- known circuits, processes, algorithms, structures, and techniques have been shown without unnecessary detail in order to avoid obscuring the configurations. This description provides example configurations only, and does not limit the scope, applicability, or configurations of the claims. Rather, the preceding description of the configurations will provide those skilled in the art with an enabling description for implementing described techniques. Various changes may be made in the function and arrangement of elements without departing from the spirit or scope of the disclosure. [0063] Also, configurations may be described as a process which is depicted as a flow diagram or block diagram. Although each may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be rearranged. A process may have additional steps not included in the figure. Furthermore, examples of the methods may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware, or microcode, the program code or code segments to perform the necessary tasks may be stored in a non-transitory computer-readable medium such as a storage medium. Processors may perform the described tasks.
[0064] Having described several example configurations, various modifications, alternative constructions, and equivalents may be used without departing from the spirit of the disclosure. For example, the above elements may be components of a larger system, wherein other rules may take precedence over or otherwise modify the application of the invention. Also, a number of steps may be undertaken before, during, or after the above elements are considered. Accordingly, the above description does not bound the scope of the claims.

Claims

WHAT IS CLAIMED IS:
1. A method for identifying a speaker, the method comprising: accessing audio data comprising a speech signal, the audio data generated using a microphone on a mobile device;
inferring a context of a user of the mobile device;
identifying a social graph based at least partly based on the inferred context, the social graph comprising a list of potential speakers; and
identifying a speaker determined to have vocally contributed to the speech signal, the speaker identification based at least partly on the identified social graph. 2. The method of claim 1 , wherein inferring the context of the user is based at least partly on a location of the user. 3. The method of claim 2, further comprising determining the location of the user at least partly based on GPS, WiFi or cellular signals received by the mobile device. 4. The method of claim 1 , wherein inferring the context of the user is based at least partly on an environment of the user. 5. The method of claim 4, further comprising determining the environment at least partly based on BlueTooth or audio signals received by the mobile device. 6. The method of claim 1 , wherein inferring the context of the user is based at least partly on an activity of the user. 7. The method of claim 6, further comprising determining the activity based at least partly on motion-sensor data, light-sensor data, or audio signals captured by the microphone on the mobile device. 8. The method of claim 1 , wherein inferring the context of the user is based at least partly on one or more of email data, text message data, calendar data, social networking data and contact list data associated with the mobile device.
9. The method of claim 1 , wherein inferring the context of the user is based at least partly on a call status and/or current-call details of the mobile device. 10. The method of claim 1 , wherein inferring the context of the user is based at least partly on applications actively or inactively being used on the mobile device. 1 ] . The method of claim 1, wherein inferring the context of the user is based at least partly on a time of day during which the audio data was collected. 12. The method of claim 1, wherein the audio data includes audio portions sampled in a privacy-sensitive manner such that spoken words cannot be reconstructed from the audio data. 13. The method of claim 1 , further comprising storing a plurality of social graphs, each of the plurality of social graphs being associated with a different context. 14. The method of claim 1 , further comprising storing a plurality of speech models, wherein each speech model is associated with a potential speaker. 15. The method of claim 1, further comprising:
storing a plurality of speech models, wherein each speech model is associated with a potential speaker;
processing the accessed audio data; and
comparing the processed audio data to a subset of the plurality of speech models, the subset being determined based at least partly on the identified social graph. 16. The method of claim 1 , further comprising generating social graphs for one or more contexts, wherein generation of the social graph is at least partly on one or more of: user location data, calendar data, email data, and social networking data. 17. The method of claim 1 , wherein the identified social graph includes edge weightings for one or more edges of the identified social graph.
18. The method of claim 17, wherein the edge weighting for each edge corresponds to a fraction of time the user spends interacting with a person associated with the edge. 19. The method of claim 1, further comprising, prior to identifying the social graph:
accessing training audio data, the audio data corresponding to a plurality of contexts;
clustering the accessed audio data; and
generating a plurality of social graphs based on the accessed training audio data,
wherein the generated social graph comprises one of the plurality of social graphs. 20. The method of claim 1 , further comprising defining a plurality of potential contexts based at least partly on execution of a clustering algorithm. 21 . The method of claim 1 , wherein the identifying the speaker comprises identifying a name of the speaker. 22. An apparatus for identifying a speaker, the apparatus comprising: a mobile device comprising:
a microphone configured to receive audio signals comprising a speech signal and to convert the received audio signals into radio signals; and a transmitter configured to transmit the radio signals; and one or more processors configured to:
capture audio data from the microphone;
infer a context of a user of the mobile device;
identify a social graph based at least partly on the inferred context, the social graph comprising a list of potential speakers; and
identify a speaker determined to have vocally contributed to the speech signal, the speaker identification based at least partly on the identified social graph.
23. The apparatus of claim 22, wherein a remote server comprises at least one of the one or more processors. 24. The apparatus of claim 22, wherein the mobile device comprises all of the one or more processors. 25. The apparatus of claim 22, wherein the mobile device comprises a display, and wherein the one or more processors are further configured to present the identification of the speaker on the display. 26. A computer-readable medium containing a program which executes the steps of:
accessing audio data comprising a speech signal, the audio data generated using a microphone on a mobile device;
inferring a context of a user of the mobile device;
identifying a social graph based at least partly on the inferred context, the social graph comprising a list of potential speakers; and
identifying a speaker determined to have vocally contributed to the speech signal, the speaker identification based at least partly on the identified social graph. 27. The computer-readable medium of claim 26, wherein the program further executes the step of: transforming the accessed audio data into a feature space. 28. The computer-readable medium of claim 26, wherein the program further executes the step of: storing a plurality of social graphs, each of the plurality of social graphs being associated with a different context. 29. The computer-readable medium of claim 26, wherein the program further executes the steps of:
storing a plurality of speech models, wherein each speech model is associated with a potential speaker;
processing the accessed audio data; and
comparing the processed audio data to a subset of the plurality of speech models, the subset being determined based at least partly on the identified social graph.
30. A system for identifying a speaker, the system comprising: means for accessing audio data comprising a speech signal; means for inferring a context;
means for identifying a social graph based at least partly on the inferred context, the social graph comprising a list of potential speakers; and
means for identifying a speaker determined to have vocally contributed to the speech signal, the speaker identification based at least partly on the identified social graph. 31 . The system of claim 30, further comprising means for generating social graphs for one or more contexts based at least partly on one or more of: user location data, calendar data, email data, and social networking data 32. The system of claim 30, wherein the identified social graph includes edge weightings for one or more edges of the identified social graph. 33. The system of claim 30, further comprising means for presenting the identification of the speaker to a user of a mobile device.
PCT/US2012/044723 2011-07-01 2012-06-28 Identifying people that are proximate to a mobile device user via social graphs, speech models, and user context WO2013006385A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
JP2014519046A JP5930432B2 (en) 2011-07-01 2012-06-28 Identify people near the user of the mobile device through social graphs, conversation models, and user context
CN201280033020.8A CN103650035B (en) 2011-07-01 2012-06-28 Via social graph, speech model and the user context identification people close to mobile device users
KR1020147002757A KR20140031391A (en) 2011-07-01 2012-06-28 Identifying people that are proximate to a mobile device user via social graphs, speech models, and user context
EP12743266.4A EP2727104B1 (en) 2011-07-01 2012-06-28 Identifying people that are proximate to a mobile device user via social graphs, speech models, and user context
KR1020157034201A KR101753509B1 (en) 2011-07-01 2012-06-28 Identifying people that are proximate to a mobile device user via social graphs, speech models, and user context

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201161504084P 2011-07-01 2011-07-01
US61/504,084 2011-07-01
US13/344,726 2012-01-06
US13/344,726 US9159324B2 (en) 2011-07-01 2012-01-06 Identifying people that are proximate to a mobile device user via social graphs, speech models, and user context

Publications (1)

Publication Number Publication Date
WO2013006385A1 true WO2013006385A1 (en) 2013-01-10

Family

ID=47391475

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2012/044723 WO2013006385A1 (en) 2011-07-01 2012-06-28 Identifying people that are proximate to a mobile device user via social graphs, speech models, and user context

Country Status (6)

Country Link
US (1) US9159324B2 (en)
EP (1) EP2727104B1 (en)
JP (1) JP5930432B2 (en)
KR (2) KR101753509B1 (en)
CN (1) CN103650035B (en)
WO (1) WO2013006385A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10134398B2 (en) 2014-10-09 2018-11-20 Google Llc Hotword detection on multiple devices
US10147429B2 (en) 2014-07-18 2018-12-04 Google Llc Speaker verification using co-location information
US10497364B2 (en) 2017-04-20 2019-12-03 Google Llc Multi-user authentication on a device
US10643617B2 (en) 2016-01-06 2020-05-05 Google Llc Voice recognition system
US11676608B2 (en) 2021-04-02 2023-06-13 Google Llc Speaker verification using co-location information
US11942095B2 (en) 2014-07-18 2024-03-26 Google Llc Speaker verification using co-location information

Families Citing this family (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8700406B2 (en) * 2011-05-23 2014-04-15 Qualcomm Incorporated Preserving audio data collection privacy in mobile devices
US10977285B2 (en) * 2012-03-28 2021-04-13 Verizon Media Inc. Using observations of a person to determine if data corresponds to the person
US9502029B1 (en) * 2012-06-25 2016-11-22 Amazon Technologies, Inc. Context-aware speech processing
US8744995B1 (en) 2012-07-30 2014-06-03 Google Inc. Alias disambiguation
US8583750B1 (en) 2012-08-10 2013-11-12 Google Inc. Inferring identity of intended communication recipient
US8520807B1 (en) 2012-08-10 2013-08-27 Google Inc. Phonetically unique communication identifiers
US8571865B1 (en) * 2012-08-10 2013-10-29 Google Inc. Inference-aided speaker recognition
US9058806B2 (en) * 2012-09-10 2015-06-16 Cisco Technology, Inc. Speaker segmentation and recognition based on list of speakers
US10032233B2 (en) * 2012-10-17 2018-07-24 Facebook, Inc. Social context in augmented reality
US10013672B2 (en) 2012-11-02 2018-07-03 Oath Inc. Address extraction from a communication
US9190057B2 (en) * 2012-12-12 2015-11-17 Amazon Technologies, Inc. Speech model retrieval in distributed speech recognition systems
US9460715B2 (en) * 2013-03-04 2016-10-04 Amazon Technologies, Inc. Identification using audio signatures and additional characteristics
US8844050B1 (en) * 2013-03-15 2014-09-23 Athoc, Inc. Personnel crisis communications management and personnel status tracking system
US20140324792A1 (en) * 2013-04-24 2014-10-30 Synchronoss Technologies, Inc. Extracting a social graph from contact information across a confined user base
US20140330566A1 (en) * 2013-05-06 2014-11-06 Linkedin Corporation Providing social-graph content based on a voice print
EP3014463A4 (en) * 2013-06-24 2017-03-08 Intel Corporation Contextual display apparatus and methods
US9294616B2 (en) 2013-06-30 2016-03-22 International Business Machines Corporation Identifying a contact based on a voice communication session
US9530416B2 (en) 2013-10-28 2016-12-27 At&T Intellectual Property I, L.P. System and method for managing models for embedded speech and language processing
US9666188B2 (en) 2013-10-29 2017-05-30 Nuance Communications, Inc. System and method of performing automatic speech recognition using local private data
US9094453B2 (en) 2013-11-06 2015-07-28 Google Technology Holdings LLC Method and apparatus for associating mobile devices using audio signature detection
US9635257B2 (en) * 2014-05-12 2017-04-25 Gopro, Inc. Dual-microphone camera
US9585229B2 (en) * 2014-05-13 2017-02-28 Google Inc. Anticipatory lighting from device screens based on user profile
US9641968B2 (en) * 2014-05-16 2017-05-02 Krumbs, Inc. Sharing moment experiences
US10262655B2 (en) 2014-11-03 2019-04-16 Microsoft Technology Licensing, Llc Augmentation of key phrase user recognition
US20160232922A1 (en) * 2015-02-09 2016-08-11 Simon Hickey Communication Analyzer and Recommendation System
US9691391B2 (en) * 2015-02-10 2017-06-27 Knuedge Incorporated Clustering of audio files using graphs
US10456160B2 (en) * 2015-03-09 2019-10-29 Teleflex Innovations S.À.R.L. Stenotic region scoring assembly and method
EP3067884B1 (en) * 2015-03-13 2019-05-08 Samsung Electronics Co., Ltd. Speech recognition system and speech recognition method thereof
JP6704416B2 (en) * 2015-05-13 2020-06-03 バーテックス ファーマシューティカルズ インコーポレイテッドVertex Pharmaceuticals Incorporated Methods for preparing inhibitors of influenza virus replication
US9786274B2 (en) * 2015-06-11 2017-10-10 International Business Machines Corporation Analysis of professional-client interactions
JP6227209B2 (en) * 2015-09-09 2017-11-08 三菱電機株式会社 In-vehicle voice recognition device and in-vehicle device
CN105208214B (en) * 2015-10-22 2019-02-26 海信集团有限公司 A kind of incoming call processing method and device
US10388280B2 (en) * 2016-01-27 2019-08-20 Motorola Mobility Llc Method and apparatus for managing multiple voice operation trigger phrases
US9972320B2 (en) 2016-08-24 2018-05-15 Google Llc Hotword detection on multiple devices
US9906610B1 (en) * 2016-09-01 2018-02-27 Fotoccasion, Inc Event-based media sharing
KR102241970B1 (en) 2016-11-07 2021-04-20 구글 엘엘씨 Suppressing recorded media hotword trigger
US10347245B2 (en) 2016-12-23 2019-07-09 Soundhound, Inc. Natural language grammar enablement by speech characterization
US10282598B2 (en) 2017-03-07 2019-05-07 Bank Of America Corporation Performing image analysis for dynamic personnel identification based on a combination of biometric features
EP3599604A4 (en) * 2017-03-24 2020-03-18 Sony Corporation Information processing device and information processing method
US11417343B2 (en) * 2017-05-24 2022-08-16 Zoominfo Converse Llc Automatic speaker identification in calls using multiple speaker-identification parameters
US10395650B2 (en) 2017-06-05 2019-08-27 Google Llc Recorded media hotword trigger suppression
US10332545B2 (en) * 2017-11-28 2019-06-25 Nuance Communications, Inc. System and method for temporal and power based zone detection in speaker dependent microphone environments
US10992684B2 (en) * 2017-12-08 2021-04-27 Google Llc Distributed identification in networked system
US10692496B2 (en) 2018-05-22 2020-06-23 Google Llc Hotword suppression
US11463441B2 (en) 2018-05-24 2022-10-04 People.ai, Inc. Systems and methods for managing the generation or deletion of record objects based on electronic activities and communication policies
US11924297B2 (en) 2018-05-24 2024-03-05 People.ai, Inc. Systems and methods for generating a filtered data set
US10565229B2 (en) 2018-05-24 2020-02-18 People.ai, Inc. Systems and methods for matching electronic activities directly to record objects of systems of record
US11934457B2 (en) 2019-05-22 2024-03-19 People.ai, Inc. Systems and methods for maintaining confidence scores of entity associations derived from systems of record
US11257503B1 (en) * 2021-03-10 2022-02-22 Vikram Ramesh Lakkavalli Speaker recognition using domain independent embedding

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080082332A1 (en) * 2006-09-28 2008-04-03 Jacqueline Mallett Method And System For Sharing Portable Voice Profiles
US20090177744A1 (en) * 2008-01-04 2009-07-09 Yahoo! Inc. Identifying and employing social network relationships
US20110022388A1 (en) * 2009-07-27 2011-01-27 Wu Sung Fong Solomon Method and system for speech recognition using social networks
WO2011017653A1 (en) * 2009-08-07 2011-02-10 Google Inc. Facial recognition with social network aiding

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0888692A (en) 1994-09-19 1996-04-02 Oki Electric Ind Co Ltd Transmitter, receiver and transmitter-receiver
US6754631B1 (en) * 1998-11-04 2004-06-22 Gateway, Inc. Recording meeting minutes based upon speech recognition
EP1395803B1 (en) 2001-05-10 2006-08-02 Koninklijke Philips Electronics N.V. Background learning of speaker voices
US6868149B2 (en) * 2001-10-31 2005-03-15 International Business Machines Corporation Apparatus and method for transmission and receipt of conference call roster information via a telephone display unit
US7539616B2 (en) 2006-02-20 2009-05-26 Microsoft Corporation Speaker authentication using adapted background models
WO2009043020A2 (en) 2007-09-28 2009-04-02 The Trustees Of Dartmouth College System and method for injecting sensed presence into social networking applications
JP2009175630A (en) 2008-01-28 2009-08-06 Sharp Corp Speech recognition device, mobile terminal, speech recognition system, speech recognition device control method, mobile terminal control method, control program, and computer readable recording medium with program recorded therein
AT506619B1 (en) 2008-03-21 2015-07-15 Human Bios Gmbh PROCESS FOR THE TEMPORARY PERSONALIZATION OF A COMMUNICATION DEVICE
US9646025B2 (en) 2008-05-27 2017-05-09 Qualcomm Incorporated Method and apparatus for aggregating and presenting data associated with geographic locations
US20100198633A1 (en) 2009-02-03 2010-08-05 Ido Guy Method and System for Obtaining Social Network Information
US10217085B2 (en) 2009-06-22 2019-02-26 Nokia Technologies Oy Method and apparatus for determining social networking relationships
US8489112B2 (en) 2009-07-29 2013-07-16 Shopkick, Inc. Method and system for location-triggered rewards
KR101021217B1 (en) 2010-06-14 2011-03-11 주식회사 예스피치 Automatic response system having function for supplying progress information of customer and method for supplying process information of customer
US8532994B2 (en) * 2010-08-27 2013-09-10 Cisco Technology, Inc. Speech recognition using a personal vocabulary and language model
US8528018B2 (en) * 2011-04-29 2013-09-03 Cisco Technology, Inc. System and method for evaluating visual worthiness of video data in a network environment
US8538742B2 (en) * 2011-05-20 2013-09-17 Google Inc. Feed translation for a social network
US8571865B1 (en) * 2012-08-10 2013-10-29 Google Inc. Inference-aided speaker recognition

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080082332A1 (en) * 2006-09-28 2008-04-03 Jacqueline Mallett Method And System For Sharing Portable Voice Profiles
US20090177744A1 (en) * 2008-01-04 2009-07-09 Yahoo! Inc. Identifying and employing social network relationships
US20110022388A1 (en) * 2009-07-27 2011-01-27 Wu Sung Fong Solomon Method and system for speech recognition using social networks
WO2011017653A1 (en) * 2009-08-07 2011-02-10 Google Inc. Facial recognition with social network aiding

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10147429B2 (en) 2014-07-18 2018-12-04 Google Llc Speaker verification using co-location information
US10460735B2 (en) 2014-07-18 2019-10-29 Google Llc Speaker verification using co-location information
US11942095B2 (en) 2014-07-18 2024-03-26 Google Llc Speaker verification using co-location information
US10986498B2 (en) 2014-07-18 2021-04-20 Google Llc Speaker verification using co-location information
US11557299B2 (en) 2014-10-09 2023-01-17 Google Llc Hotword detection on multiple devices
US10909987B2 (en) 2014-10-09 2021-02-02 Google Llc Hotword detection on multiple devices
US10134398B2 (en) 2014-10-09 2018-11-20 Google Llc Hotword detection on multiple devices
US11915706B2 (en) 2014-10-09 2024-02-27 Google Llc Hotword detection on multiple devices
US11996103B2 (en) 2016-01-06 2024-05-28 Google Llc Voice recognition system
US10643617B2 (en) 2016-01-06 2020-05-05 Google Llc Voice recognition system
US11410660B2 (en) 2016-01-06 2022-08-09 Google Llc Voice recognition system
US11087743B2 (en) 2017-04-20 2021-08-10 Google Llc Multi-user authentication on a device
US11721326B2 (en) 2017-04-20 2023-08-08 Google Llc Multi-user authentication on a device
US11727918B2 (en) 2017-04-20 2023-08-15 Google Llc Multi-user authentication on a device
US11238848B2 (en) 2017-04-20 2022-02-01 Google Llc Multi-user authentication on a device
US10522137B2 (en) 2017-04-20 2019-12-31 Google Llc Multi-user authentication on a device
US10497364B2 (en) 2017-04-20 2019-12-03 Google Llc Multi-user authentication on a device
US11676608B2 (en) 2021-04-02 2023-06-13 Google Llc Speaker verification using co-location information

Also Published As

Publication number Publication date
JP5930432B2 (en) 2016-06-08
US20130006634A1 (en) 2013-01-03
KR20150140867A (en) 2015-12-16
JP2014523707A (en) 2014-09-11
CN103650035A (en) 2014-03-19
KR20140031391A (en) 2014-03-12
EP2727104B1 (en) 2017-09-13
EP2727104A1 (en) 2014-05-07
CN103650035B (en) 2016-01-13
KR101753509B1 (en) 2017-07-03
US9159324B2 (en) 2015-10-13

Similar Documents

Publication Publication Date Title
EP2727104B1 (en) Identifying people that are proximate to a mobile device user via social graphs, speech models, and user context
US20130006633A1 (en) Learning speech models for mobile device users
US20200107152A1 (en) Inferring user availability for a communication
CN111656324B (en) Personalized notification agent
US9740773B2 (en) Context labels for data clusters
KR102405793B1 (en) Method for recognizing voice signal and electronic device supporting the same
CN112074900B (en) Audio analysis for natural language processing
CN110276235B (en) Context awareness through smart devices sensing transient events and continuous events
CN104285427B (en) According to the context configurating terminal device by determining different data sources correlation
EP2847978B1 (en) Calendar matching of inferred contexts and label propagation
CN110770772A (en) Virtual assistant configured to automatically customize an action group
KR20200100677A (en) Responding to Remote Media Classification Queries Using Classifier Models and Context Parameters
KR20160127117A (en) Performing actions associated with individual presence
CN110462647B (en) Electronic device and method for executing functions of electronic device
CN111523850B (en) Invoking an action in response to a co-existence determination
CN106469297A (en) Emotion identification method, device and terminal unit
EP3731507A1 (en) Surface detection for mobile devices
Zheng et al. Missile: A system of mobile inertial sensor-based sensitive indoor location eavesdropping
US20190320972A1 (en) Confirming sleep based on secondary indicia of user activity
CN112882394A (en) Device control method, control apparatus, and readable storage medium
US20170086127A1 (en) Apparatus and method for controlling outbound communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12743266

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2012743266

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2012743266

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2014519046

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20147002757

Country of ref document: KR

Kind code of ref document: A