Abstract:
The present invention refers to a method for localizing a person comprising the steps carried out in a computing system (1): determining (20) the localization of a telecommunication means (3, 6, 8) or determining a telecommunication means (3, 6, 8) at a specific location; this can be implemented using ANI or calling number received and a database to look up address of a fixed telephone, for a cellular device, cell-ID or triangulation can be used; receiving (21) a voice utterance of a person by the telecommunications means; and verifying (22) the identity of that person based on the received voice utterance using biometric voice data (speech, speaker recognition). Further the invention relates to a corresponding system and computer readable medium.
Abstract:
In those transactions requiring the approval of two or more users, users can perform verification of identity and then completion of desired transaction using an IVR system. The combination of two or more user voice prints previously collected during an enrollment phase can be used for verification of parties to the transaction. During a subsequent verification phase of the IVR system, the users can speak their own password phase when prompted to do so during a defined period of time and the IVR system captures them in a captured mixed voice print. Verification can then be provided by comparing the captured mixed voice print with a joined voice reference model built from stored voice reference models.
Abstract:
The invention refers to a Method of informing a person of an event comprising carrying out in a computing system the steps of: receiving (10) information of an event (1); determining (11) a specific person which is to be notified of the event (1); performing (12) an information action with the aim of informing the specific person of the event (1) via a telecommunications system; receiving (15) a voice utterance of a person; verifying (16) that the identity of the person coincides with that of the specific person based on the received voice utterance using biometric voice data.
Abstract:
Process for controlling the access of a user to a service provided in a data network, to protect user data stored in a data base of the service from unauthorized access, the method comprising: (a) inputting, in a VoIP session, a voice sample of the user at a user data terminal which is at least temporarily connected to the data network, (b) processing, in a first processing step, the user's voice sample using a dedicated client implemented at the user data terminal, to obtain a pre-processed voice sample or a current voice profile of the user, (c) further processing, in a second processing step, the pre-processed voice sample or the current voice profile, including a comparison step of the current voice profile with an initial voice profile stored in a data base, and (d) outputting an access control signal for granting or rejecting access to the service, taking the result of the comparison step into account.
Abstract:
Transparent voice registration of a party is provided in order to provide voice verification for communications with a service center. Verbal communication spoken by a party during interaction between the party and an agent of the service center is captured. A voice model associated with the captured communication is created and stored in order to provide voice verification during a subsequent call to the service center. When a requester contacts the service center, a comparison of the voice of the requester and a voice model of the person that the requester claims to be is performed, in order to verify the identity of the requester. Additionally, a voice model associated with a party is automatically updated after a subsequent communication between the party and the service center.
Abstract:
A method, system and computer program product for alerting a participant when a topic of interest is being discussed and/or a speaker of interest is speaking during a conference call. A participant to a conference call identifies the topics and/or speakers of interest which is stored for future use along with the participant's contact information. When a participant's identified topic of interest is being discussed and/or a participant's identified speaker of interest is speaking during a conference call, the participant will be alerted to that fact, such as via the means specified in the participant's contact information.
Abstract:
Methods, systems, and computer-readable media provide for the management of an audio environment with multiple audio sources. According to various embodiments described herein, real-time audio from multiple sources is received. A speaker is identified for each of the audio sources. Upon detecting a change from a first audio source to a second audio source, an identification of the speaker associated with the second audio source is provided. According to various embodiments, a recording of the real-time audio may be made and descriptors inserted to identify each speaker as the audio source changes. Real-time feedback from the speakers regarding characteristics of the audio may be received and corresponding adjustments to the audio made.
Abstract:
A system including a conferencing telephone coupled to or in communication with an identification service. The identification service is configured to poll user devices of conference participants to determine or confirm identities. In response, the user devices transmit audio electronic business cards, which can include user voice samples and/or preprocessed voice recognition data. The identification service stores the resulting audio electronic business card data. When the corresponding participant speaks during the conference, the identification service identifies the speaker.
Abstract:
A system is disclosed for the automatic detection of fraudulent activity on a transaction network, for which each transaction over the network has an associated identifier. In one embodiment, the system includes voice comparison means for comparing a first sampled voice of a user of a first transaction with a subsequently sampled voice of a user of a subsequent transaction having an identical identifier to that of the first transaction. Control means in the form of a voice-based fraud detection engine is provided for determining, from said comparison, a profile of user usage that is representative of a total number of different users of the associated identifier. In a preferred embodiment, the system also includes voice sampling means for sampling a voice of the user of the first transaction to generate a first voice sample.
Abstract:
A method with an information processing system manages a user transaction request associated with a domain name based on an authentication status of a user. The method comprises receiving a request from a user for a transaction associated with a domain name. A voice confirmation user interface is presented to the user and user authentication information, such as spoken user authentication information from the user, is collected. The user authentication information is communicated to an information processing system. An authentication status associated with the user is received from the information processing system. The method also includes determining to allow the request from the user for the transaction associated with the domain name based at least in part on the received authentication status.