US 12,080,295 B2
System and method for dynamic facial features for speaker recognition
Ann K. Syrdal, San Jose, CA (US); Sumit Chopra, Jersey City, NJ (US); Patrick Haffner, Atlantic Highlands, NJ (US); Taniya Mishra, New York, NY (US); Ilija Zeljkovic, Scotch Plains, NJ (US); and Eric Zavesky, Austin, TX (US)
Assigned to Nuance Communications, Inc., Burlington, MA (US)
Filed by Nuance Communications, Inc., Burlington, MA (US)
Filed on Mar. 15, 2021, as Appl. No. 17/201,500.
Application 17/201,500 is a continuation of application No. 14/953,984, filed on Nov. 30, 2015, granted, now 10,950,237.
Application 14/953,984 is a continuation of application No. 14/551,907, filed on Nov. 24, 2014, granted, now 9,218,815, issued on Dec. 22, 2015.
Application 14/551,907 is a continuation of application No. 13/101,704, filed on May 5, 2011, granted, now 8,897,500, issued on Nov. 25, 2014.
Prior Publication US 2021/0201911 A1, Jul. 1, 2021
Int. Cl. G10L 15/25 (2013.01); G06F 21/32 (2013.01); G06V 40/16 (2022.01); G06V 40/20 (2022.01); G10L 17/24 (2013.01); G10L 21/06 (2013.01)
CPC G10L 15/25 (2013.01) [G06F 21/32 (2013.01); G06V 40/166 (2022.01); G06V 40/171 (2022.01); G06V 40/172 (2022.01); G06V 40/176 (2022.01); G06V 40/20 (2022.01); G10L 17/24 (2013.01); G10L 21/06 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
performing a first verification method of a user, the first verification method including:
receiving a video including video data and audio data of the user speaking a challenge that is unique to a request to verify the user, the challenge eliciting distinctive facial motion behavior of the user when compared to facial motion behavior of other users;
determining, based on the video data and the audio data, whether the distinctive facial motion behavior of the user is within the received video; and
yielding, based on the determination, a first determination of an identity of the user;
upon determining that the first determination is below a first verification threshold and above a second verification threshold, wherein the second verification threshold is lower than the first verification threshold, performing a second verification method of the user;
based on the second verification method, yielding a second determination of the identity of the user;
upon determining that the first determination is below the second verification threshold, performing a third verification method, wherein the third verification method is different from the first verification method and the second verification method; and
based on the third verification method, yielding a third determination of the identity of the user.