Abstract:
A network for providing a telecommunications service with automatic speech recognition to a telecommunications user, including a switch in communication with a telecommunications device associated with the telecommunications user for detecting a terminating trigger specific to the telecommunications service in response to an incoming communication to the telecommunications device from a calling party, and an intelligent resource server in communication with the switch for receiving the incoming communication from the switch, for placing an outgoing communication to the telecommunications device via the switch, the outgoing communication including an audible message identifying the calling party, and for automatically recognizing a predetermined keyword spoken by the telecommunications user in response to the outgoing communication.
Abstract:
Indications of which participant is providing information during a multi-party conference. Each participant has equipment to display information being transferred during the conference. A sourcing signaler residing in the participant equipment provides a signal that indicates the identity of its participant when this participant is providing information to the conference. The source indicators of the other participant equipment receive the signal and cause a UI to indicate that the participant identified by the received signal is providing information (e.g. the UI can causes the identifier to change appearance). An audio discriminator is used to distinguish between an acoustic signal that was generated by a person speaking from that generated in a band-limited manner. The audio discriminator analyzes the spectrum of detected audio signals and generates several parameters from the spectrum and from past determinations to determine the source of an audio signal on a frame-by-frame basis.
Abstract:
There is provided a system for facilitating a conference call. The system includes a module to generate a real-time voiceprint from a voice input of a participant in the conference call, and a module to provide information indicative of the participant based on the real-time voiceprint.
Abstract:
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account or other related limitations. The system includes management software capable of implementing widespread or local changes to the system and is further capable of modifying or setting any number of user account parameters.
Abstract:
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account or other related limitations. The system includes management software capable of implementing widespread or local changes to the system and is further capable of modifying or setting any number of user account parameters.
Abstract:
Human speech is transported through a voice and data converged Internet network to recognize its content, verify the identity of the speaker, or to verify the content of a spoken phrase by utilizing the Internet protocol to transmit voice packets. The voice data (4) entered is processed and transmitted in the same way as Internet data packets over converged voice and data IP networks. A voice-enabled application sends a message (5), which is decoded by the speech API (2) and the appropriate control and synchronization information is issued (7) to the data preparation module (9) and to the speech engine (3). Standard voice over IP includes a speech compression algorithm and the use of RTP (Real Time Protocol), enabling additional processing of the human voice anywhere in the network to perform speaker verification, with or without the knowledge of the speaker.
Abstract:
An apparatus and method utilize information gathered by the telecommunication terminals that are part of the telecommunication conference to assist in the identification of the speaker at any point in time during a telecommunication conference.
Abstract:
A method and apparatus for providing access to teleconference services using voice recognition technology to receive information on packet networks such as Voice over Internet Protocol (VoIP) and Service over Internet Protocol (SoIP) networks are disclosed. In one embodiment, the service provider enables a caller to enter access information for accessing a conference service using at least one natural language response.
Abstract:
A method and apparatus for performing active speaker selection in teleconferencing applications illustratively comprises a microphone array module, a speaker recognition system, a user interface, and a speech signal selection module. The microphone array module separates the speech signal from each active speaker from those of other active speakers, providing a plurality of individual speaker's speech signals. The speaker recognition system identifies each currently active speaker using conventional speaker recognition/identification techniques. These identities are then transmitted to a remote teleconferencing location for display to remote participants via a user interface. The remote participants may then select one of the identified speakers, and the speech signal selection module then selects for transmission the speech signal associated with the selected identified speaker, thereby enabling the participants at the remote location to listen to the selected speaker and neglect the speech from other active speakers.
Abstract:
Systems, apparatuses, and methods for authenticating an individual. A representation of an utterance is received. A candidate record is identified from among a plurality of candidate records by comparing the representation of the utterance with stored utterance data according to a match parameter. An identity of the individual is verified by comparing received ambiguity information with stored ambiguity resolution criteria. If a candidate record is not found, a new record associated with the individual may be created. The individual may be allowed access to a secured resource.