Abstract:
A distributed voice application execution environment system conducts a voiceprint analysis when a user initially begins to interact with the system. If the system is able to identify the user through a voiceprint analysis, the system immediately begins to interact with the user utilizing voice applications which have been customized for that user.
Abstract:
A method implemented in a computer infrastructure having computer executable code having programming instructions tangibly embodied on a computer readable storage medium. The programming instructions are operable to receive an audio stream of a communication between a plurality of participants. Additionally, the programming instructions are operable to filter the audio stream of the communication into separate audio streams, one for each of the plurality of participants, wherein each of the separate audio streams contains portions of the communication attributable to a respective participant of the plurality of participants. Furthermore, the programming instructions are operable to output the separate audio streams to a storage system.
Abstract:
A method and apparatus for providing access to teleconference services using voice recognition technology to receive information on packet networks such as Voice over Internet Protocol (VoIP) and Service over Internet Protocol (SoIP) networks are disclosed. In one embodiment, the service provider enables a caller to enter access information for accessing a conference service using at least one natural language response.
Abstract:
An improved solution for telephonic voice authentication and display is provided. A method of identifying conference call participants includes detecting a sound made by one of conference call participants; identifying this conference call participant based on the sound; and then displaying an attribute of the conference call participant to one of the other conference call participants. The attribute may include a picture, a name, and/or other information related to the identified conference call participant.
Abstract:
A method of assisting an end user is provides. A first assistance request signal is received from a communication device. A communication node determines an assistance center in close proximity to the communication device to provide assistance to the end user. The communication node then forwards a second assistance request signal to the assistance center. The communication node receives a first response signal from assistance center. Finally, the communication node transmits a second response signal to the communication device.
Abstract:
A method of providing identifying information over a voice communications link can include receiving, from a call participant, a personal identification code over the voice communications link, determining identifying information for the call participant using the personal identification code, and encoding the identifying information of the call participant within a voice stream carried by the voice communications link. The voice stream and identifying information can be sent to a subscriber.
Abstract:
The invention relates to a method for authorizing a telephone transaction and in particular an access to a database through a user in a telecommunication network, said telecommunication network comprising a user interface, an access control for the database and an authentification device, which are connected with each other over a local node in the telecommunication network, as well as to a corresponding local node.The invention is characterized in that the comparative result is output by the authentification device over the local node to the access control and the result of the comparison is communicated by the access control to the user over the local node, signals sent by the authentification device being masked.
Abstract:
A method and system for managing a communication session is provided. The communication session is associated with multiple communication devices. The method includes learning (304) a set of derived acoustic features of an audio communication signal that is associated substantially only with one user of a communication device. The method also includes receiving (306) a communication session signal. The communication session signal is an audio signal that includes a combination of audio communication signals. Each audio communication signal of the audio communication signals is associated with a user of a communication device of the multiple communication devices. The method includes modifying (308) the communication session signal based on the set of derived acoustic features.
Abstract:
An apparatus and method for detecting a fraud or fraud attempt in a captured interaction. The method comprising a selection step in which interactions suspected as capturing fraud attempts are selected for further analysis, and assigned a first fraud probability, and a fraud detection step in which the voice is scored against one or more voice prints, of the same alleged customer or of known fraudsters. The first fraud or fraud attempt probability is combined with the result of the scoring of the fraud detection step, to generate a total fraud or fraud attempt probability. If the total fraud or fraud attempt probability exceeds a threshold, a notification is issued. The selection, scoring and combination thereof are performed using user-defined rules and thresholds.
Abstract:
Embodiments of the present invention are directed generally to use of biometric identification during a call for detecting an anomaly occurring in the call, such as a change in the parties participating on the call. Communication between parties of a call is monitored and biometric identification is performed using the communication. According to one exemplary embodiment, biometric prints, such as voice prints, face prints, etc., are obtained for parties that are authorized to participate on a call. The call is then monitored and biometric data (e.g., audio, video, etc.) captured from communication during the call is compared with the biometric prints of the authorized parties to detect changes in the parties participating on the call, such as a new, unauthorized party joining the call. Thus, a call processing system can detect anomalies occurring during monitored calls, such as three-way calling, a handoff of a call, etc.