Abstract:
An illustrative method includes receiving, at a processor of a computing device, an audio voice signal of a first call participant during a first call, where the first call is a communication across a communication network. The method further includes determining an identity of the first call participant and determining a speech to text profile associated with the identity of the first call participant, where the speech to text profile includes at least one rule for transcribing a word in the audio voice signal into text. The method further includes generating a text output, where the text output is a transcribed version of a plurality of words identified in the audio voice signal of the first call participant. At least one of the plurality of words identified is identified using the at least one rule.
Abstract:
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
Abstract:
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
Abstract:
A system, method, and computer readable medium that facilitate user authentication via voice biometrics in a network system featuring interactive voice response system access is provided. The voice biometric authentication mechanisms alleviate identity theft occurring via specific interactive voice response transactions. A voice biometrics authentication system interfaces with an interactive network platform and may be hosted by a third party provider of voice biometric technologies.
Abstract:
A system and method for providing guidance to persuade a caller is provided. A call is received from a caller into a call center and an offer is provided to the caller. A likelihood of the caller to accept the offer is measured by analyzing voice input of the caller during the call. One or more paralinguistic voice characteristics in the voice input are determined. A stage of persuasion is assigned to the caller based on the paralinguistic voice characteristics and a recommendation is made for guidance to persuade the caller to accept the offer.
Abstract:
In one aspect, the present invention facilitates the investigation of networks of criminals, by gathering associations between phone numbers, the names of persons reached at those phone numbers, and voice print data. In another aspect the invention automatically detects phone calls from a prison where the voiceprint of the person called matches the voiceprint of a past inmate. In another aspect the invention detects identity scams in prisons, by monitoring for known voice characteristics of likely imposters on phone calls made by prisoners. In another aspect, the invention automatically does speech-to-text conversion of phone numbers spoken within a predetermined time of detecting data indicative of a three-way call event while monitoring a phone call from a prison inmate. In another aspect, the invention automatically thwarts attempts of prison inmates to use re-dialing services. In another aspect, the invention automatically tags audio data retrieved from a database, by steganographically encoding into the audio data the identity of the official retrieving the audio data.
Abstract:
A request from a party is received by a receiver from a remote system. The request from the party is received when the party attempts to obtain a service using the remote system. A selective determination is made to request, over a network, authentication of the party by a remote biometric system. A request is sent to the remote system for the party to provide a biometric sample responsive to determining to request authentication of the party. The service is provided contingent upon authentication of the party by the remote biometric system.
Abstract:
To store voice information for identifying the voice of the opposite party in a telephone directory. A telephone directory management apparatus (100) according to a mode of the present invention is a telephone directory management apparatus (100) having telephone directory storage means (12) for storing a telephone number, and has registration means (24) for searching the telephone directory storage means (12) to check if a telephone number the same as the telephone number of the opposite party stored in call history storage means (11) for storing the telephone number of the opposite party and voice information for identifying the voice of the opposite party in an associated state is stored in the telephone directory storage means (12) and when a telephone number the same as the telephone number of the opposite party is stored in the telephone directory storage means (12), registering the voice information associated with the telephone number of the opposite party in the call history storage means (11) in a state of being associated with the telephone number the same as the telephone number of the opposite party in the telephone directory storage means (12).
Abstract:
Contact center agents often work in close proximity to other agents. As a primary agent is engaged in a call, a neighboring agent speech may be picked up by the primary agent's microphone. Contact centers using automated speech recognition systems may monitor the agent's speech for key terms and, if detected, respond accordingly. Determining a primary agent spoke a key term, when the true speaker of the key term is a neighboring agent, may cause errors or other problems. Characterizing at least the primary agent's voice and then, once a key term is detected, determining if it was the primary agent that spoke the key term, may help to reduce the errors. Additionally, computational requirements may be reduced as non-key terms may be quickly discarded and optionally, key terms determined to not have been spoke by the primary agent, may also be discarded without further processing.
Abstract:
In one aspect, the present invention facilitates the investigation of networks of criminals, by gathering associations between phone numbers, the names of persons reached at those phone numbers, and voice print data. In another aspect the invention automatically detects phone calls from a prison where the voiceprint of the person called matches the voiceprint of a past inmate. In another aspect the invention detects identity scams in prisons, by monitoring for known voice characteristics of likely imposters on phone calls made by prisoners. In another aspect, the invention automatically does speech-to-text conversion of phone numbers spoken within a predetermined time of detecting data indicative of a three-way call event while monitoring a phone call from a prison inmate. In another aspect, the invention automatically thwarts attempts of prison inmates to use re-dialing services. In another aspect, the invention automatically tags audio data retrieved from a database, by steganographically encoding into the audio data the identity of the official retrieving the audio data.