G10L17/08

Electronic apparatus, controlling method and computer readable medium
11200904 · 2021-12-14 · ·

An electronic apparatus is provided. The electronic apparatus includes an inputter comprising input circuitry, a voice receiver comprising voice receiving circuitry, a storage, and a processor configured to: provide a guide prompting a user utterance based on user authentication being performed according to user information input through the inputter, generate a speaker recognition model corresponding to the user information based on a voice corresponding to the guide being received through the voice receiver, store the speaker recognition model in the storage, and identify a user corresponding to a voice received through the voice receiver based on the speaker recognition model updated by comparing a voice received through the voice receiver with the speaker recognition model.

Systems and methods for speaker verification using summarized extracted features

A method of speaker verification comprises receiving an audio signal representing speech. While the audio signal is being received, features of the received audio signal are extracted. The extracted features, of at least a part of the received audio signal corresponding to the speech of at least one speaker, are summarised, and the summarised extracted features are stored. In response to a request for a speaker verification process relating to at least one enrolled user, the speaker verification process is performed using the previously summarised features.

Multi-factor authentication with geolocation and voice command
11201873 · 2021-12-14 · ·

A method of multi-factor authentication is performed by an access control device. In response to detecting a voice command, the access control device sends a query to a location server for a current location of a user equipment (UE) included in a list of trusted UEs. The access control device may then receive an indication of the current location from the location server and in response thereto, the access control device may determine whether the current location of the UE is within a threshold distance of the access control device. If so, the access control device may generate an access signal that indicates that a user associated with the UE is authorized to access a protected resource.

Multi-user intelligent assistance

An intelligent assistant records speech spoken by a first user and determines a self-selection score for the first user. The intelligent assistant sends the self-selection score to another intelligent assistant, and receives a remote-selection score for the first user from the other intelligent assistant. The intelligent assistant compares the self-selection score to the remote-selection score. If the self-selection score is greater than the remote-selection score, the intelligent assistant responds to the first user and blocks subsequent responses to all other users until a disengagement metric of the first user exceeds a blocking threshold. If the self-selection score is less than the remote-selection score, the intelligent assistant does not respond to the first user.

Multi-user intelligent assistance

An intelligent assistant records speech spoken by a first user and determines a self-selection score for the first user. The intelligent assistant sends the self-selection score to another intelligent assistant, and receives a remote-selection score for the first user from the other intelligent assistant. The intelligent assistant compares the self-selection score to the remote-selection score. If the self-selection score is greater than the remote-selection score, the intelligent assistant responds to the first user and blocks subsequent responses to all other users until a disengagement metric of the first user exceeds a blocking threshold. If the self-selection score is less than the remote-selection score, the intelligent assistant does not respond to the first user.

VOICE AND SPEECH RECOGNITION FOR CALL CENTER FEEDBACK AND QUALITY ASSURANCE

A computer-implemented method for providing an objective evaluation to a customer service representative regarding his performance during an interaction with a customer may include receiving a digitized data stream corresponding to a spoken conversation between a customer and a representative; converting the data stream to a text stream; generating a representative transcript that includes the words from the text stream that are spoken by the representative; comparing the representative transcript with a plurality of positive words and a plurality of negative words; and generating a score that varies according to the occurrence of each word spoken by the representative that matches one of the positive words, and/or the occurrence of each word spoken by the representative that matches one of the negative words. Tone of voice, as well as response time, during the interaction may also be monitored and analyzed to adjust the score, or generate a separate score.

VOICE AND SPEECH RECOGNITION FOR CALL CENTER FEEDBACK AND QUALITY ASSURANCE

A computer-implemented method for providing an objective evaluation to a customer service representative regarding his performance during an interaction with a customer may include receiving a digitized data stream corresponding to a spoken conversation between a customer and a representative; converting the data stream to a text stream; generating a representative transcript that includes the words from the text stream that are spoken by the representative; comparing the representative transcript with a plurality of positive words and a plurality of negative words; and generating a score that varies according to the occurrence of each word spoken by the representative that matches one of the positive words, and/or the occurrence of each word spoken by the representative that matches one of the negative words. Tone of voice, as well as response time, during the interaction may also be monitored and analyzed to adjust the score, or generate a separate score.

Home automation system supporting dual-authentication

Techniques are described for a security and automation system. One method includes detecting a presence of a person proximate a residence, receiving a first authentication factor from a device associated with the person, receiving a second authentication factor associated with the person, and initiating a change of state of a locking mechanism associated with a barrier of the residence based on the first authentication factor and the second authentication factor.

Home automation system supporting dual-authentication

Techniques are described for a security and automation system. One method includes detecting a presence of a person proximate a residence, receiving a first authentication factor from a device associated with the person, receiving a second authentication factor associated with the person, and initiating a change of state of a locking mechanism associated with a barrier of the residence based on the first authentication factor and the second authentication factor.

Distinguishing voice commands

Aspects of the present disclosure relate to voice command filtering. Communication is established with a voice controlled device located at a location. Data indicating blocked directions is received from the voice controlled device. A voice command is received. A determination is made that the voice command is received from a blocked direction indicated in the data. The received voice command is then ignored.