It is a common task in conversational applications to validate a claimed identity through utterance verification mechanisms; for example, by asking for a password or a challenge question. Sometimes, due to the private nature of the keyphrase, it is desirable to impose restrictions on how this keyphrase, or information that leads to it, is handled during the verification process. In this paper we describe a method where the utterance verification takes place in a concealed way, i.e., in a way that the keyphrase cannot be inferred or obtained directly by an intruder, from the decoding and application artifacts. We achieve this by a novel algorithm based on matrix operations in the verification network's nodes. If the traversed path corresponds to the keyphrase, the annotation converges to the dominant eigenvector of the occluded kernel matrix
[1]
Fernando Pereira,et al.
Weighted finite-state transducers in speech recognition
,
2002,
Comput. Speech Lang..
[2]
Biing-Hwang Juang,et al.
Key-phrase detection and verification for flexible speech understanding
,
1996,
Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.
[3]
Birgit Pfitzmann,et al.
Federated Identity-Management Protocols
,
2003,
Security Protocols Workshop.
[4]
Carlo Bellettini,et al.
WebUml: reverse engineering of web applications
,
2004,
SAC '04.
[5]
Bruce Lucas.
VoiceXML for Web-based distributed conversational applications
,
2000,
CACM.
[6]
B. Parlett.
The Symmetric Eigenvalue Problem
,
1981
.