Abstract:
An approach is provided for authenticating a user. A request to authenticate the user is received. Historical data that includes social media interactions that specify a person authorized to access the device and geolocations of the person is polled. A question is generated to be relevant to a social media interaction and/or a geolocation included in the historical data. A digital representation of a voice of the user who provided an answer to the question is received. The voice of the user is verified as matching a voice of the person authorized to access the device. The answer is determined to be correct. Based on the matching voices and the answer being correct, the user is authenticated and access to the device by the user is granted.
Abstract:
Novel tools and techniques might provide for implementing call monitoring, and, in particular embodiments, to methods, systems, apparatuses, and computer software for implementing self-learning corrections facility call monitoring. In some embodiments, a method might comprise an automated call monitor monitoring a voice or video call between a call participant and a prison inmate, and analyzing at least one of conversation content of the call, voice characteristics of the call participant and/or the prison inmate, and/or (for video calls) body language of the parties to the call, to determine whether the conversation content, voice characteristics, and/or body language are indicative of impermissible content and/or impermissible conduct (i.e., indicative of past, present, and/or future criminal behavior or acts, and the like). The automated call monitor might flag calls that present such indications of impermissible content and/or conduct, for review by corrections facility personnel, and might self-learn based on input by such personnel.
Abstract:
Systems and methods for inbound calls to controlled-environment facility resident media and/or communications devices may receive, via the device, data associated with the resident operating the device. Authentication of the resident operating the device may be verified as associated with an address identifier of the device and it may be confirmed that an inbound calling non-resident is associated with the address identifier. A notification of the inbound call may then be sent to the device, and the same or other data associated with the resident operating the device may be received, via the device. Authentication of the resident operating the device as a resident as associated with an address identifier may be re-verified using the same or other data and the call connected as a result of the verification, confirmation and/or re-verification.
Abstract:
A computerized system comprising: (a) a compliance server adapted to receive an audio feed of a telephone conversation; (b) an identification module adapted to compare said audio feed to a database of voice prints and identify participants in said telephone conversation; and (c) an analysis module adapted to ascertain a subject of said telephone conversation.
Abstract:
A method of evaluating scripts in an interpersonal communication includes monitoring a customer service interaction. At least one portion of a script is identified. At least one script requirement is determined. A determination is made whether the at least one portion of the script meets the at least one script requirement. An alert is generated indicative of a non-compliant script.
Abstract:
Arrangements described herein include identifying a voice communication session established between a first communication device and a second communication device and, based on the voice communication session established between the first communication device and the second communication device, identifying a plurality of contacts who potentially may be the second user. A list including at least a name of each of the plurality of contacts who potentially may be the second user is presented to a first user using the first communication device.
Abstract:
A request from a party is received by a receiver from a remote system. The request from the party is received when the party attempts to obtain a service using the remote system. A selective determination is made to request, over a network, authentication of the party by a remote biometric system. A request is sent to the remote system for the party to provide a biometric sample responsive to determining to request authentication of the party. The service is provided contingent upon authentication of the party by the remote biometric system.
Abstract:
Embodiments of the present invention are directed generally to use of biometric identification during a call for detecting an anomaly occurring in the call, such as a change in the parties participating on the call. Communication between parties of a call is monitored and biometric identification is performed using the communication. According to one exemplary embodiment, biometric prints, such as voice prints, face prints, etc., are obtained for parties that are authorized to participate on a call. The call is then monitored and biometric data (e.g., audio, video, etc.) captured from communication during the call is compared with the biometric prints of the authorized parties to detect changes in the parties participating on the call, such as a new, unauthorized party joining the call. Thus, a call processing system can detect anomalies occurring during monitored calls, such as three-way calling, a handoff of a call, etc.
Abstract:
A method and apparatus of sharing documents during a conference call data is disclosed. One example method may include initiating a document sharing operation during a conference call conducted between at least two participants communicating during the conference call. The method may also include transferring the document from one of the two participants to another of the two participants, and recording at least one action performed to the document by the participants during the conference call.
Abstract:
In a method of diarization of audio data, audio data is segmented into a plurality of utterances. Each utterance is represented as an utterance model representative of a plurality of feature vectors. The utterance models are clustered. A plurality of speaker models are constructed from the clustered utterance models. A hidden Markov model is constructed of the plurality of speaker models. A sequence of identified speaker models is decoded.