VOICE.TRUST AG Patent applications |
Patent application number | Title | Published |
20120095763 | DIGITAL METHOD AND ARRANGEMENT FOR AUTHENTICATING A PERSON - Digital method for authentication of a person by comparing a current voice profile with a previously stored initial voice profile, wherein to determine the relevant voice profile the person speaks at least one speech sample into the system, this speech sample is conveyed to a voice-profile calculation unit and thereby, on the basis of a prespecified voice-profile algorithm, the voice profile is calculated, such that the overall size of the speech sample and/or parameters of its evaluation to determine the relevant voice profile are established dynamically and automatically as the sample is spoken, in response to the result of an evaluation of a first partial speech sample. | 04-19-2012 |
20100131279 | METHOD AND ARRANGEMENT FOR CONTROLLING USER ACCESS - Method for controlling user access to a service available in a data network and/or to information stored in a user database, in order to protect stored user data from unauthorized access, such that the method comprises the following: input of a user's speech sample to a user data terminal, processing of the user's speech sample in order to obtain a prepared speech sample as well as a current voice profile of the user, comparison of the current voice profile with an initial voice profile stored in an authorization database, and output of an access-control signal to either permit or refuse access, taking into account the result of the comparison step, such that the comparison step includes a quantitative similarity evaluation of the current and the stored voice profiles as well as a threshold-value discrimination of a similarity measure thereby derived, and an access-control signal that initiates permission of access is generated only if a prespecified similarity measure is not exceeded. | 05-27-2010 |
20090025071 | PROCESS AND ARRANGEMENT FOR AUTHENTICATING A USER OF FACILITIES, A SERVICE, A DATABASE OR A DATA NETWORK - A process for authenticating a user to control remote access to a service, data base or data network is provided, in which during an enrolment step, an initial voice sample provided by the user is analyzed to obtain an initial user-specific voice profile and, in a later verification step, a current voice sample of the user is analyzed and compared to the initial voice profile to generate an access control signal. An additional user-dedicated authentication is generated in a pre-enrolment period, and the additional authentication is used to authenticate the user in the enrolment step and/or in an access control step prior to and independent on the enrolment step, in a provisional or supplementary authentication procedure. | 01-22-2009 |
20090006254 | VIRTUAL PREPAID OR CREDIT CARD AND PROCESS AND SYSTEM FOR PROVIDING SAME AND FOR ELECTRONIC PAYMENTS - A virtual credit card, as a set of data, free of a physical substrate, the data being adapted to authorize a person who is in possession thereof to pay for a product or service, in particular in the framework of an online transaction, the data set being produced on the basis of a credit card account or a pre-payment and in response to a user authentication procedure involving an evaluation of biometric features of a user, in particular of his/her voice profile, and being available at a telecommunication terminal, in particular a mobile phone, of the authenticated user. | 01-01-2009 |
20080281600 | DIGITAL PROCESS AND ARRANGEMENT FOR AUTHENTICATING A USER OF A DATABASE - Digital process for authentication of a user of a database for access to protected data or a service reserved for a defined circle of users or for the use of data currently entered by the user, wherein a voice sample currently enunciated during an access attempt by the user is routed to a voice analysis unit and, herein, a current voice profile is computed and this is compared in a voice profile comparison unit against a previously stored initial voice profile and, in response to a positive comparison result, the user is authenticated and a first control signal enabling access, but in response to a negative comparison result a second control signal disabling access or triggering a substitute authentication procedure is generated. | 11-13-2008 |