G10L17/24

SYSTEMS AND METHODS FOR BIOMETRIC AUTHENTICATION VIA FACE COVERING

Methods and systems are described for improvements to authentication processes. For example, conventional systems may rely on password authentication or contact-based alternative authentication techniques that are impractical or infeasible in sensitive medical environments, during pandemics, or fail meet the health and safety needs of an increasingly health-conscious public. In contrast, the described solutions provide an improvement over conventional authentication systems and methods by enabling user authentication via contactless physiological biometric authentication processes, behavioral authentication processes, and passive data authentication processes, that do not require a user to remove personal protective equipment.

SYSTEMS AND METHODS FOR BIOMETRIC AUTHENTICATION VIA FACE COVERING

Methods and systems are described for improvements to authentication processes. For example, conventional systems may rely on password authentication or contact-based alternative authentication techniques that are impractical or infeasible in sensitive medical environments, during pandemics, or fail meet the health and safety needs of an increasingly health-conscious public. In contrast, the described solutions provide an improvement over conventional authentication systems and methods by enabling user authentication via contactless physiological biometric authentication processes, behavioral authentication processes, and passive data authentication processes, that do not require a user to remove personal protective equipment.

Method for operating content and electronic device for implementing same

Various embodiments provide an electronic device and a method therefor, the electronic device comprising: a voice recognition unit; a memory; a display; and a processor functionally connected to the voice recognition unit, the memory or the display, wherein the processor is configured to: acquire password information for the content selected by a user, when the voice information of a user recognized by the voice recognition unit includes a hidden command; request the user to articulate the obtained password information; and encrypt the content based on the received voice information according to the request. In addition, other embodiments are possible.

Method for operating content and electronic device for implementing same

Various embodiments provide an electronic device and a method therefor, the electronic device comprising: a voice recognition unit; a memory; a display; and a processor functionally connected to the voice recognition unit, the memory or the display, wherein the processor is configured to: acquire password information for the content selected by a user, when the voice information of a user recognized by the voice recognition unit includes a hidden command; request the user to articulate the obtained password information; and encrypt the content based on the received voice information according to the request. In addition, other embodiments are possible.

Electronic apparatus including control command identification tool generated by using a control command identified by voice recognition identifying a control command corresponding to a user voice and control method thereof

An electronic apparatus is provided. The electronic apparatus includes a microphone, a transceiver, a memory configured to store a control command identification tool based on a control command identified by a voice recognition server that performs voice recognition processing on a user voice received from the electronic apparatus, and at least one processor configured to, based on the user voice being received through the microphone, acquire user intention information by performing the voice recognition processing on the received user voice, receive status information of external devices related to the acquired user intention information from a device control server, identify a control command for controlling a device to be controlled among the plurality of external devices by applying the acquired user intention information and the received status information of the external devices to the control command identification tool, and transmit the identified control command to the device control server.

Electronic apparatus including control command identification tool generated by using a control command identified by voice recognition identifying a control command corresponding to a user voice and control method thereof

An electronic apparatus is provided. The electronic apparatus includes a microphone, a transceiver, a memory configured to store a control command identification tool based on a control command identified by a voice recognition server that performs voice recognition processing on a user voice received from the electronic apparatus, and at least one processor configured to, based on the user voice being received through the microphone, acquire user intention information by performing the voice recognition processing on the received user voice, receive status information of external devices related to the acquired user intention information from a device control server, identify a control command for controlling a device to be controlled among the plurality of external devices by applying the acquired user intention information and the received status information of the external devices to the control command identification tool, and transmit the identified control command to the device control server.

METHOD FOR RECORDING, PARSING, AND TRANSCRIBING DEPOSITION PROCEEDINGS
20230059405 · 2023-02-23 ·

Techniques for accurately recording sworn deposition testimony without use of a court reporter are described herein. According to these techniques, participants in a deposition or other legal proceeding are identified in such a manner that speech in one or more audio files representing the deposition can be associated with the respective participants. The association of participants with recorded speech is used to automatically generate an accurate transcript sequentially reflecting what was said at the deposition proceeding and by which of the respective participants.

METHOD FOR RECORDING, PARSING, AND TRANSCRIBING DEPOSITION PROCEEDINGS
20230059405 · 2023-02-23 ·

Techniques for accurately recording sworn deposition testimony without use of a court reporter are described herein. According to these techniques, participants in a deposition or other legal proceeding are identified in such a manner that speech in one or more audio files representing the deposition can be associated with the respective participants. The association of participants with recorded speech is used to automatically generate an accurate transcript sequentially reflecting what was said at the deposition proceeding and by which of the respective participants.

Voice activated authentication

Systems and methods provide voice activated authentication over time. A user can be registered with a voice authentication system based on a voiceprint profile of common words. This user voiceprint profile can be used in an ongoing secondary authentication as a hands-free head-mounted wearable device is used over time. Upon a user logging into a hands-free head-mounted wearable device voiceprints can be collected during a session. These collected voiceprints can be compared with a user voiceprint profile for a user authorized to operate the hands-free head-mounted wearable device. Such a comparison can include an analysis of frequency, duration, and amplitude for the voiceprints. When the voiceprints match, the login of the user can be maintained based on this secondary authentication using the voiceprints matched to the user voiceprint profile.

Voice activated authentication

Systems and methods provide voice activated authentication over time. A user can be registered with a voice authentication system based on a voiceprint profile of common words. This user voiceprint profile can be used in an ongoing secondary authentication as a hands-free head-mounted wearable device is used over time. Upon a user logging into a hands-free head-mounted wearable device voiceprints can be collected during a session. These collected voiceprints can be compared with a user voiceprint profile for a user authorized to operate the hands-free head-mounted wearable device. Such a comparison can include an analysis of frequency, duration, and amplitude for the voiceprints. When the voiceprints match, the login of the user can be maintained based on this secondary authentication using the voiceprints matched to the user voiceprint profile.