US 12,293,765 B2
Authentication method and apparatus with transformation model
Seungju Han, Seoul (KR); Jaejoon Han, Seoul (KR); Minsu Ko, Suwon-si (KR); Chang Kyu Choi, Seongnam-si (KR); and Bohyung Han, Seoul (KR)
Assigned to Samsung Electronics Co., Ltd., Suwon-si (KR); and SNU R&DB FOUNDATION, Seoul (KR)
Filed by SAMSUNG ELECTRONICS CO., LTD., Suwon-si (KR); and SNU R&DB FOUNDATION, Seoul (KR)
Filed on May 15, 2023, as Appl. No. 18/317,503.
Application 18/317,503 is a continuation of application No. 16/811,452, filed on Mar. 6, 2020, granted, now 11,688,403.
Claims priority of application No. 10-2019-0030147 (KR), filed on Mar. 15, 2019.
Prior Publication US 2023/0282216 A1, Sep. 7, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G10L 17/02 (2013.01); G06F 18/20 (2023.01); G06F 18/24 (2023.01); G06F 21/36 (2013.01); G06F 21/45 (2013.01); G06N 3/045 (2023.01); G06N 3/08 (2023.01); G06V 10/764 (2022.01); G06V 10/82 (2022.01); G06V 40/50 (2022.01); G06V 40/70 (2022.01); G10L 17/04 (2013.01); G10L 17/06 (2013.01); G10L 17/18 (2013.01)
CPC G10L 17/02 (2013.01) [G06F 18/20 (2023.01); G06F 18/24 (2023.01); G06F 21/36 (2013.01); G06F 21/45 (2013.01); G06N 3/045 (2023.01); G06N 3/08 (2013.01); G06V 10/764 (2022.01); G06V 10/82 (2022.01); G06V 40/50 (2022.01); G06V 40/70 (2022.01); G10L 17/04 (2013.01); G10L 17/06 (2013.01); G10L 17/18 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A processor implemented authentication method, the method comprising:
obtaining a transformation model corresponding to a difference between a first feature extractor and a second feature extractor, the first feature extractor comprising a first neural network and the second feature extractor comprising a second neural network separate from the first neural network; and
transforming an initial enrolled feature having been generated by the first feature extractor to an updated enrolled feature by using the transformation model,
wherein the updated enrolled feature is used for a user authentication in response to an input feature determined by extracting a feature from an authentication request including input authentication data with the second feature extractor.