Abstract:
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
Abstract:
A computer detects a connected voice or video call between participants and records a brief media sample. Speech recognition is utilized to determine when the call is connected as well as to transcribe the content of the audio portion of the media sample. The recorded media sample and transcribed content is associated with the connected voice or video call such that a user may reference it at a later point. The computer additionally suggests creating or editing contact information associated with the participants of the connected voice or video call based on the transcribed content.
Abstract:
A system for automated adaptation and improvement of speaker authentication in a voice biometric system environment, comprising a speech sample collector, a target selector, a voice analyzer, a voice data modifier, and a call flow creator. The speech sample collector retrieves speech samples from a database of enrolled participants in a speaker authentication system. The target selector selects target users that will be used to test the speaker authentication system. The voice analyzer extracts a speech component data set from each of the speech samples. The call flow creator creates a plurality of call flows for testing the speaker authentication system, each call flow being either an impostor call flow or a legitimate call flow. The call flows created by the call flow creator are used to test the speaker authentication system.
Abstract:
Aspects of the subject disclosure may include, for example, a method in which a device comprising a processor detects a communication session between a calling device and a called device, and receives a motion signal from the called device; the motion signal is generated at a motion sensor of the called device during or after the communication session. The device analyzes the motion signal to determine whether a portion of the motion signal corresponds to a preselected motion of the called device and whether a subsequent call from the calling device accordingly is to be blocked. Responsive to a determination that the subsequent call is to be blocked, the device also updates a list of blocked caller identifiers associated with the called device to add an identifier associated with the calling device. Other embodiments are disclosed.
Abstract:
One-to-many comparisons of callers' words and/or voice prints with known words and/or voice prints to identify any substantial matches between them. When a customer communicates with a particular entity, such as a customer service center, the system makes a recording of the real-time call including both the customer's and agent's voices. The system segments the recording to extract different words, such as words of anger. The system may also segment at least a portion of the customer's voice to create a tone profile, and it formats the segmented words and tone profiles for network transmission to a server. The server compares the customer's words and/or tone profiles with multiple known words and/or tone profiles stored on a database to determine any substantial matches. The identification of any matches may be used for a variety of purposes, such as providing representative feedback or customer follow-up.
Abstract:
A computer detects a connected voice or video call between participants and records a brief media sample. Speech recognition is utilized to determine when the call is connected as well as to transcribe the content of the audio portion of the media sample. The recorded media sample and transcribed content is associated with the connected voice or video call such that a user may reference it at a later point. The computer additionally suggests creating or editing contact information associated with the participants of the connected voice or video call based on the transcribed content.
Abstract:
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
Abstract:
Embodiments of the present invention are directed generally to use of biometric identification during a call for detecting an anomaly occurring in the call, such as a change in the parties participating on the call. Communication between parties of a call is monitored and biometric identification is performed using the communication. According to one exemplary embodiment, biometric prints, such as voice prints, face prints, etc., are obtained for parties that are authorized to participate on a call. The call is then monitored and biometric data (e.g., audio, video, etc.) captured from communication during the call is compared with the biometric prints of the authorized parties to detect changes in the parties participating on the call, such as a new, unauthorized party joining the call. Thus, a call processing system can detect anomalies occurring during monitored calls, such as three-way calling, a handoff of a call, etc.
Abstract:
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
Abstract:
A method and apparatus of applying user profile information to a customized application are disclosed. One example method of operation may include receiving an inquiry message or call from a user device, identifying and authorizing the user from inquiry message information received from the inquiry message, retrieving a user profile comprising at least one user preference, applying the at least one user preference to a user call processing application, and transmitting menu options to the user device based on the applied at least user preference.