Abstract:
Indications of which participant is providing information during a multi-party conference. Each participant has equipment to display information being transferred during the conference. A sourcing signaler residing in the participant equipment provides a signal that indicates the identity of its participant when this participant is providing information to the conference. The source indicators of the other participant equipment receive the signal and cause a UI to indicate that the participant identified by the received signal is providing information (e.g. the UI can causes the identifier to change appearance). An audio discriminator is used to distinguish between an acoustic signal that was generated by a person speaking from that generated in a band-limited manner. The audio discriminator analyzes the spectrum of detected audio signals and generates several parameters from the spectrum and from past determinations to determine the source of an audio signal on a frame-by-frame basis.
Abstract:
Embodiments provide a system, method, apparatus, means, and computer program code for identifying a speaker participating in a conference. During the conference or collaboration event, users may participate in the conference via user or client devices (e.g., computers) that are connected to or in communication with a server or collaboration system. A person participating in and/or moderating a conference may want to know which of the other participants is speaking at any give time, both for those participants that have a unique channel to the conference (e.g., a single participant participating in the conference via a single telephone or other connection) as well as participants that are aggregated behind a single channel to the conference (e.g., three participants in a conference room with a single telephone line or other connection to the conference).
Abstract:
Authentication of voice message recipient network addresses employs generating (102) and storing (104) a nullnetwork filenull that includes nullvoice clipsnull and associated network addresses that are extracted from voice messages received across a network (10) from voice message systems (16, 18). A voice clip is the first one to three seconds of voice extracted from each received voice message. Over time, the network file will grow to contain multiple voice clips and associated network voice message addresses. When a voice message originator subsequently enters a recipient's network address (106), the originating voice message system searches (114) the network file for the network address, retrieves the associated voice clip (116), and plays it for the voice message originator to authenticate the recipient's network address. Voice authentication of a voice message originator entails encoding (134) into a nullvoice print file,null original voice clips and associated network addresses received from positively identified voice message originators. Thereafter, when a questionable voice message is received (138), the voice message system extracts a new voice clip (142), generates a new voice print (144), and compares it with the original voice print associated with the voice message address (148). If the voice prints are substantially the same, the received voice message is annotated with a nullauthenticatingnull message (150).
Abstract:
A system, method and article of manufacture are provided for managing voice messages based on emotion characteristics of the voice messages. First, a plurality of voice messages that are transferred over a telecommunication network are received. Thereafter, such voice messages are stored on a storage medium. An emotion associated with voice signals of the voice messages is then determined. The voice messages are organized based on the determined emotion. Access to the organized voice messages is then permitted.
Abstract:
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account or other related limitations. The system includes management software capable of implementing widespread or local changes to the system and is further capable of modifying or setting any number of user account parameters.
Abstract:
Authentication of voice message recipient network addresses employs generating (102) and storing (104) a “network file” that includes “voice clips” and associated network addresses that are extracted from voice messages received across a network (10) from voice message systems (16, 18). A voice clip is the first one to three seconds of voice extracted from each received voice message. Over time, the network file will grow to contain multiple voice clips and associated network voice message addresses. When a voice message originator subsequently enters a recipient's network address (106), the originating voice message system searches (114) the network file for the network address, retrieves the associated voice clip (116), and plays it for the voice message originator to authenticate the recipient's network address. Voice authentication of a voice message originator entails encoding (134) into a “voice print file,” original voice clips and associated network addresses received from positively identified voice message originators. Thereafter, when a questionable voice message is received (138), the voice message system extracts a new voice clip (142), generates a new voice print (144), and compares it with the original voice print associated with the voice message address (148). If the voice prints are substantially the same, the received voice message is annotated with a “authenticating” message (150).
Abstract:
The invention provides a method and system for adding conference call speaker identification capabilities to a conference call bridge server. The system uses both speech recognition as well as line activity to determine which conference call participant is speaking at any given time. This speaker identification data is broadcast to all conference call participants in various formats, such as in the form of audio, text, and multimedia messages. This allows different types of terminal devices to receive and process the speaker identification data and present it to the participants.
Abstract:
A technique for verifying a user's voice prior to permitting the user to conduct a business transaction over a data network. An order is received via the data network, and a voice verification unit is contacted to (i) access a prestored voice print, (ii) obtain a present voice sample from the consumer desiring the transaction and compare said present voice sample to the prestored voice sample, and (iii) issue a signal indicating whether the voice correctly verifies.
Abstract:
Aspects of the disclosure relate to voiceprint tracking and anomaly detection. A computing platform may detect voice information from a call management system. The computing platform may establish voiceprints for employees and clients of an enterprise. The computing platform may detect a call between an employee and a caller attempting to access a client account. The computing platform may identify a first voiceprint corresponding to the employee and a second voiceprint corresponding to the caller. The computing platform may compare the second voiceprint to a known voiceprint corresponding to the client. Based on the comparison of the second voiceprint to the known voiceprint, the computing platform may determine that the second voiceprint does not match the known voiceprint. The computing platform may identify that the second voiceprint corresponds to another employee of the enterprise, and may send a security notification indicating potential unauthorized account access to an enterprise computing device.
Abstract:
A computer-implemented method for providing an objective evaluation to a customer service representative regarding his performance during an interaction with a customer may include receiving a digitized data stream corresponding to a spoken conversation between a customer and a representative; converting the data stream to a text stream; generating a representative transcript that includes the words from the text stream that are spoken by the representative; comparing the representative transcript with a plurality of positive words and a plurality of negative words; and generating a score that varies according to the occurrence of each word spoken by the representative that matches one of the positive words, and/or the occurrence of each word spoken by the representative that matches one of the negative words. Tone of voice, as well as response time, during the interaction may also be monitored and analyzed to adjust the score, or generate a separate score.