| CPC G10L 17/02 (2013.01) [G06F 18/20 (2023.01); G06F 18/24 (2023.01); G06F 21/36 (2013.01); G06F 21/45 (2013.01); G06N 3/045 (2023.01); G06N 3/08 (2013.01); G06V 10/764 (2022.01); G06V 10/82 (2022.01); G06V 40/50 (2022.01); G06V 40/70 (2022.01); G10L 17/04 (2013.01); G10L 17/06 (2013.01); G10L 17/18 (2013.01)] | 19 Claims |

|
1. A processor implemented authentication method, the method comprising:
obtaining a transformation model corresponding to a difference between a first feature extractor and a second feature extractor, the first feature extractor comprising a first neural network and the second feature extractor comprising a second neural network separate from the first neural network; and
transforming an initial enrolled feature having been generated by the first feature extractor to an updated enrolled feature by using the transformation model,
wherein the updated enrolled feature is used for a user authentication in response to an input feature determined by extracting a feature from an authentication request including input authentication data with the second feature extractor.
|