G10L17/00

Speech recognition method, electronic device, and computer storage medium

A speech recognition method includes segmenting captured voice information to obtain a plurality of voice segments, and extracting voiceprint information of the voice segments; matching the voiceprint information of the voice segments with a first stored voiceprint information to determine a set of filtered voice segments having voiceprint information that successfully matches the first stored voiceprint information; combining the set of filtered voice segments to obtain combined voice information, and determining combined semantic information of the combined voice information; and using the combined semantic information as a speech recognition result when the combined semantic information satisfies a preset rule.

Electronic device and method of controlling thereof

An electronic device for changing a voice of a personal assistant function, and a method therefor are provided. The electronic device includes a display, a transceiver, processor, and a memory for storing commands executable by the processor. The processor is configured to, based on a user command to request acquisition of voice data feature of a person included in a media content displayed on the display being received, control the display to display information of a person, based on a user input to select the one of the information of a person being received, acquire voice data corresponding to an utterance of a person related to the selected information of a person, and acquire voice data feature from the acquired voice data, control the transceiver to transmit the acquired voice data feature to a server.

METHOD AND SYSTEM FOR IMPLEMENTING VOICE MONITORING AND TRACKING OF PARTICIPANTS IN GROUP SETTINGS

Novel tools and techniques are provided for implementing voice monitoring and tracking, and, more particularly, to methods, systems, and apparatuses for implementing voice monitoring and tracking of participants in group settings. In various embodiments, a computing system might receive, from at least one audio sensor among the one or more audio sensors disposed within the first space, voice signals corresponding to voices associated with individuals present within the first space. The computing system might analyze the received voice signals to identify one or more individuals who are present within the first space. The computing system might present, within a user interface of the user device associated with the user, information regarding the identified one or more individuals to assist the user in coordinating discussions among the individuals present within the first space.

METHOD AND SYSTEM FOR IMPLEMENTING VOICE MONITORING AND TRACKING OF PARTICIPANTS IN GROUP SETTINGS

Novel tools and techniques are provided for implementing voice monitoring and tracking, and, more particularly, to methods, systems, and apparatuses for implementing voice monitoring and tracking of participants in group settings. In various embodiments, a computing system might receive, from at least one audio sensor among the one or more audio sensors disposed within the first space, voice signals corresponding to voices associated with individuals present within the first space. The computing system might analyze the received voice signals to identify one or more individuals who are present within the first space. The computing system might present, within a user interface of the user device associated with the user, information regarding the identified one or more individuals to assist the user in coordinating discussions among the individuals present within the first space.

Audio verification

Techniques for enabling a system to verify operations or transactions as being associated with a user account are described. A system receives message data associated with an unverified operation or an unverified transaction. The system generates first audio data that includes a representation of a first digital signature based on at least a first verification code. The system sends a message including second message data with an ability to output the first audio data responsive to first device playing the first audio data within earshot of the second device. The system receives, from a second device, second audio data that represents the first audio data. The system determines that the second audio data includes an audio representation of a second digital signature based on at least the first verification code. The system verifies the unverified operation and associates the operation with the user account to indicate that the operation is a verified operation.

Audio verification

Techniques for enabling a system to verify operations or transactions as being associated with a user account are described. A system receives message data associated with an unverified operation or an unverified transaction. The system generates first audio data that includes a representation of a first digital signature based on at least a first verification code. The system sends a message including second message data with an ability to output the first audio data responsive to first device playing the first audio data within earshot of the second device. The system receives, from a second device, second audio data that represents the first audio data. The system determines that the second audio data includes an audio representation of a second digital signature based on at least the first verification code. The system verifies the unverified operation and associates the operation with the user account to indicate that the operation is a verified operation.

Voice verification for media playback
11562740 · 2023-01-24 · ·

In one aspect, a network microphone device includes a plurality of microphones and is configured to capture a voice input via the one or more microphones, detect a wake word in the voice input, transmit data associated with the voice input to one or more remote computing devices associated with a voice assistant service, and receive a response from the one or more remote computing devices, the response comprising a playback command based on the voice input. The network microphone device may be configured to obtain verification information characterizing the voice input and, based on the verification information indicating that the voice input was spoken by an unverified user, functionally disable the NMD from performing the playback command.

System and methods for speaker identification, message compression and/or message replay in a communications environment

Systems (100) and methods (800) for communicating information. The methods comprise: storing message sets in Communication Devices (“CDs”) so as to be respectively associated with speaker information; performing operations, by a first CD, to capture an audio message spoken by an individual and to convert the audio message into a message audio file; comparing the message audio file to each reference audio file in the message sets to determine whether one of the reference audio files matches the message audio file by a certain amount; converting the audio message into a text message when a determination is made that a reference audio file does match the message audio file by a certain amount; generating a secure text message by appending the speaker information that is associated with the matching reference audio file to the text message, or by appending other information to the text message; transmitting the secure text message.

Detection of liveness
11705135 · 2023-07-18 · ·

Detecting a replay attack on a voice biometrics system comprises: receiving a speech signal from a voice source; generating and transmitting an ultrasound signal through a transducer of the device; detecting a reflection of the transmitted ultrasound signal; detecting Doppler shifts in the reflection of the generated ultrasound signal; and identifying whether the received speech signal is indicative of liveness of a speaker based on the detected Doppler shifts. The method further comprises: obtaining information about a position of the device; and adapting the generating and transmitting of the ultrasound signal based on the information about the position of the device.

Detection of liveness
11705135 · 2023-07-18 · ·

Detecting a replay attack on a voice biometrics system comprises: receiving a speech signal from a voice source; generating and transmitting an ultrasound signal through a transducer of the device; detecting a reflection of the transmitted ultrasound signal; detecting Doppler shifts in the reflection of the generated ultrasound signal; and identifying whether the received speech signal is indicative of liveness of a speaker based on the detected Doppler shifts. The method further comprises: obtaining information about a position of the device; and adapting the generating and transmitting of the ultrasound signal based on the information about the position of the device.