SYSTEM METHOD AND ARTICLE OF MANUFACTURE FOR A VOICE MESSAGING EXPERT SYSTEM THAT ORGANIZES VOICE MESSAGES BASED ON DETECTED EMOTIONS
    301.
    发明申请
    SYSTEM METHOD AND ARTICLE OF MANUFACTURE FOR A VOICE MESSAGING EXPERT SYSTEM THAT ORGANIZES VOICE MESSAGES BASED ON DETECTED EMOTIONS 有权
    用于基于检测到的情绪组织语音消息的语音消息专家系统的制造系统方法和制造

    公开(公告)号:US20020002460A1

    公开(公告)日:2002-01-03

    申请号:US09387166

    申请日:1999-08-31

    Abstract: A system, method and article of manufacture are provided for managing voice messages based on emotion characteristics of the voice messages. First, a plurality of voice messages that are transferred over a telecommunication network are received. Thereafter, such voice messages are stored on a storage medium. An emotion associated with voice signals of the voice messages is then determined. The voice messages are organized based on the determined emotion. Access to the organized voice messages is then permitted.

    Abstract translation: 提供了一种基于语音消息的情绪特征来管理语音消息的系统,方法和制品。 首先,接收通过电信网络传送的多个话音消息。 此后,这样的语音消息被存储在存储介质上。 然后确定与语音消息的语音信号相关联的情绪。 基于所确定的情绪来组织语音消息。 然后可以访问有组织的语音留言。

    System and method for identifying an unidentified person using an ambiguity-resolution criterion
    302.
    发明授权
    System and method for identifying an unidentified person using an ambiguity-resolution criterion 失效
    使用模糊度分辨率标准识别身份不明的人的系统和方法

    公开(公告)号:US06205204B1

    公开(公告)日:2001-03-20

    申请号:US08982190

    申请日:1997-12-17

    Abstract: A system (8, 60, 500) for identifying an unidentified person (14, 510) includes a database (42) that contains utterance data (162) and an ambiguity-resolution criterion (114, 119, 121) corresponding to a known person. A processing system (10, 11, 502) is coupled to the database (42) and receives utterance information and an ambiguity-resolution identifier corresponding to the unidentified person (14, 510). The processing system (10, 11, 502) compares the utterance information with the utterance data (162) to identify the unidentified person (14, 510) as at least one known person. If the processing system (10, 11, 502) ambiguously identifies the unidentified person (14, 510) as more than one known person, the processing system (10, 11, 502) compares the ambiguity-resolution identifier with the ambiguity-resolution criterion (114, 119, 121) to identify the unidentified person (14, 510) as a particular known person. In response to identifying the person (14, 510), the processing system (10, 11, 502) may automatically retrieve stored information (104, 132, 162) corresponding to the known customer.

    Abstract translation: 用于识别身份不明的人(14,510)的系统(8,60,500)包括数据库(42),其包含话音数据(162)和与已知人物对应的模糊度分辨率标准(114,119,121) 。 处理系统(10,11,450)耦合到数据库(42)并且接收对应于不明身份的人(14,510)的话语信息和模糊度分辨率标识符。 处理系统(10,11,502)将话语信息与话语数据(162)进行比较,以识别作为至少一个已知人的身份不明的人(14,510)。 如果处理系统(10,11,502)将不明身份的人(14,510)识别为多于一个已知人,则处理系统(10,11,450)将模糊度分辨率标识符与模糊度分辨率标准进行比较 (114,119,121),以识别身份不明的人(14,510)作为特定的已知人。 响应于识别人(14,510),处理系统(10,11,502)可以自动检索对应于已知客户的存储信息(104,132,162)。

    Telephonic voice message store and forward method having network address and voice authentication
    303.
    发明授权
    Telephonic voice message store and forward method having network address and voice authentication 失效
    具有网络地址和语音认证的电话语音消息存储和转发方法

    公开(公告)号:US06181780B2

    公开(公告)日:2001-01-30

    申请号:US08977925

    申请日:1997-11-24

    Inventor: Paul F. Finnigan

    Abstract: Authentication of voice message recipient network addresses employs generating (102) and storing (104) a “network file” that includes “voice clips” and associated network addresses that are extracted from voice messages received across a network (10) from voice message systems (16, 18). A voice clip is the first one to three seconds of voice extracted from each received voice message. Over time, the network file will grow to contain multiple voice clips and associated network voice message addresses. When a voice message originator subsequently enters a recipient's network address (106), the originating voice message system searches (114) the network file for the network address, retrieves the associated voice clip (116), and plays it for the voice message originator to authenticate the recipient's network address. Voice authentication of a voice message originator entails encoding (134) into a “voice print file,” original voice clips and associated network addresses received from positively identified voice message originators. Thereafter, when a questionable voice message is received (138), the voice message system extracts a new voice clip (142), generates a new voice print (144), and compares it with the original voice print associated with the voice message address (148). If the voice prints are substantially the same, the received voice message is annotated with a “authenticating” message (150).

    Abstract translation: 语音消息接收网络地址的认证采用生成(102)并存储(104)包括“语音剪辑”和相关联的网络地址的“网络文件”,该网络地址是从语音消息系统(10)从网络(10)接收的语音消息中提取的 16,18)。 语音剪辑是从每个接收到的语音消息中提取的第一个到三秒的语音。 随着时间的推移,网络文件将增长到包含多个语音片段和相关联的网络语音消息地址。 当语音消息发起者随后进入接收者的网络地址(106)时,发起语音消息系统搜索网络文件(114)网络地址,检索相关联的语音剪辑(116),并将其播放给语音消息发起者 验证收件人的网络地址。 语音消息发起者的语音认证需要编码(134)到“语音打印文件”中,从主动识别的语音消息发起者接收到的原始语音片段和相关联的网络地址。 此后,当接收到可疑的语音消息(138)时,语音消息系统提取新的语音片段(142),生成新的语音打印(144),并将其与与语音消息地址相关联的原始语音打印( 148)。 如果语音打印基本上相同,则接收到的语音消息用“认证”消息(150)注释。

    TECHNIQUES FOR RELAYING AUDIO MESSAGES TO DEVICES

    公开(公告)号:US20230254669A1

    公开(公告)日:2023-08-10

    申请号:US18137190

    申请日:2023-04-20

    Applicant: Apple Inc.

    CPC classification number: H04W4/12 H04M3/53391 H04M2201/41

    Abstract: Techniques are disclosed for transmitting an announcement to one or more devices. In one example, a first device receives a first message that includes an announcement, the announcement associated with a voice that spoke the announcement. The first device may determine the announcement from the first message, and then identify one or more devices for receiving the announcement. The one or more devices may have a particular device type of a plurality of different device types comprising at least a mobile device. The first device may determine a network path through which a second message is transmitted based at least in part on the location of a second device. In accordance with a determination that the second device is located within a local area network associated with a home environment, the first device transmits the second message over the local area network. In accordance with a determination that the second device is located away from a local area network associated with a home environment, the first device transmits the second message over the wide area network.

    SYSTEM AND METHOD FOR ASSESSING SECURITY THREATS AND CRIMINAL PROCLIVITIES

    公开(公告)号:US20230231947A1

    公开(公告)日:2023-07-20

    申请号:US18093633

    申请日:2023-01-05

    Inventor: Mitch VOLKART

    CPC classification number: H04M3/2281 H04M3/387 G06F40/279 H04M2201/41

    Abstract: A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.

Patent Agency Ranking