20240054195. Authorization of Action by Voice Identification simplified abstract (SoundHound, Inc.)
Authorization of Action by Voice Identification
Organization Name
Inventor(s)
Ahmadul Hassan of San Jose CA (US)
James Hom of Palo Alto CA (US)
Authorization of Action by Voice Identification - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240054195 titled 'Authorization of Action by Voice Identification
Simplified Explanation
The patent application describes a method for authorizing actions based on a confidence score that is computed by comparing metadata about requests with corresponding database records. The confidence score takes into account the reliability of the metadata for authentication and the similarity between a sample of speech audio and a stored voiceprint. Additional identification may be required for authorization, and the confidence score requirement can be adjusted based on recent action requests.
- The patent application proposes a method for determining the authorization of actions based on a confidence score.
- The confidence score is calculated by comparing metadata about requests with fields in corresponding database records.
- The reliability of the metadata is considered in weighting the matches for authentication.
- The confidence score is also influenced by the similarity between a sample of speech audio and a stored voiceprint.
- Additional identification measures may be necessary to grant authorization.
- The confidence score requirement can be relaxed based on identification in a buffer of recent action requests.
Potential Applications
- Access control systems: The technology can be applied in systems that require authentication for granting access to secure areas or sensitive information.
- Voice recognition systems: The innovation can be used in voice recognition systems to enhance the accuracy and reliability of user authentication.
- Biometric security: The method can be utilized in biometric security systems that rely on voiceprints for identification and authorization.
Problems Solved
- Improved authentication: The technology addresses the problem of reliable authentication by considering both metadata matches and voiceprint similarity.
- Enhanced security: By incorporating multiple factors for authorization, the method helps solve the problem of unauthorized access to systems or information.
- Adaptability to different scenarios: The confidence score requirement can be adjusted based on recent action requests, allowing for flexibility in different authentication scenarios.
Benefits
- Increased accuracy: The use of metadata matches and voiceprint similarity improves the accuracy of authentication, reducing the risk of false positives or false negatives.
- Enhanced security: The method provides an additional layer of security by combining multiple factors for authorization.
- Flexibility: The ability to adjust the confidence score requirement based on recent action requests allows for adaptability to different authentication scenarios.
Original Abstract Submitted
actions are authorized by computing a confidence score that exceeds a threshold. the confidence score is based on a match between metadata about requests and fields in corresponding database records. the confidences score weights matches by the dependability of the metadata for authentication. the confidence score is further based on the closeness of a sample of speech audio to a stored voiceprint. additional identification may be required for authorization. the confidence score requirement may be relaxed based on identification in a buffer of recent action requests.