Abstract:
A method of providing identifying information over a voice communications link can include receiving, from a call participant, a personal identification code over the voice communications link, determining identifying information for the call participant using the personal identification code, and encoding the identifying information of the call participant within a voice stream carried by the voice communications link. The voice stream and identifying information can be sent to a subscriber.
Abstract:
Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest.
Abstract:
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account or other related limitations. The system includes management software capable of implementing widespread or local changes to the system and is further capable of modifying or setting any number of user account parameters.
Abstract:
The present invention discloses a contact center with speaker identification and verification (SIV) capabilities. In the invention, a set of contact center components can provide automated interactive communications with callers, can provide queue management for callers waiting to communicate with live agents, and can provide skills based routing for assigning live agents to callers. The SIV component can analyze speech utterances to determine a speaker identify based upon biometric characteristics of the analyzed speech utterances. Additionally, the SIV component can process speech from contact center sessions. In one embodiment, the SIV component can prevent agent substitutions from occurring of which the call center is unaware. The SIV component can also be used to distinguish whether communication session content was spoken by a contact center agent or a caller.
Abstract:
Verification of Caller identification, used independently of caller ID or as an adjunct to caller ID for caller verification by matching caller voice samples to voice samples previously stored. Verification algorithms can be implemented as a stand alone device connected to the telephone line or the interne, in software which can be a resident on a PSTN phone, mobile phone or an IP phone or resident on a computer. Voice samples of the current caller are recorded and compared a database of previously recorded voice samples. When a call is received for the first time, the caller records the caller's name which is stored into a database and correlated with the received caller ID information of the present caller, if such information was received. If no caller ID information is received, the voice sample is stored in the database with an indication of a lack of caller ID information. The collection and storage of voice samples allows the use of such samples for voice authentication if the caller calls again. When a caller calls again, the caller records the caller's name as the current caller's voice sample which is compared to the stored database. The enhanced accuracy will aid in acceptance and rejection decisions as well as decisions regarding the handling of incoming telephone calls and will aid in the retrieval of additional information regarding the caller if available.
Abstract:
A fraud detection method for generating a first fraud or fraud attempt probability, within an at least one captured or recorded interaction, is provided. The method comprises a scoring step for scoring an at least one voice belonging to an at least one tested speaker in the at least one captured or recorded interaction against an at least one voice print within an at least one entry in a voice print collection, the scoring step generating an at least one probability that the at least one voice in the captured or recorded interaction belongs to an at least one second speaker associated with the at least one voice print, said at least one probability represents the probability that the at least one captured or recorded interaction is fraudulent; and an auditing step for auditing the at least one probability and the at least one captured or recorded interaction.
Abstract:
An individual's identity is verifiable using voice biometrics. A voice biometric system includes a receiver configured to receive, from a remote communications device, a voice biometric sample of a party attempting to obtain a service from a remote system. The service is provided contingent on authentication of the party as the individual. The voice biometric system also includes a processor configured to compare the voice biometric sample received by the receiver to voice biometric information obtained from a storage to authenticate the identity of the party as the individual. The receiver and processor are provided within a communications network.
Abstract:
A method and apparatus are provided for authenticating a user of a mobile phone. While the user holds the phone to his or her ear, a microphone near the earpiece emits clicks into the user's ear. The speaker of the phone measures the response from the ear as an otoacoustic signal. A processor digitizes the measured otoacoustic signal to produce a received digital otoacoustic signature, and compares this with a stored digital otoacoustic signature of a legitimate user. If the signatures match, the phone is enabled. The invention allows secure authentication of mobile phones in a manner very natural and convenient to users.
Abstract:
Techniques and systems for recalling voicemail messages from remote voicemail systems are disclosed. In one embodiment, a method for recalling a voicemail message from a target mailbox can include: accessing a voicemail system by a caller using a device; authenticating the caller using speaker verification; and deleting the voicemail message from the target mailbox. The target mailbox owner can be a member of the voicemail system, while the caller can be a non-member of that voicemail system. The device may be configured to support a telephony user interface (TUI), for example.
Abstract:
Schemes for routing a call using caller identification are described herein. These schemes are termed “real caller ID” and can be capable of determining the identity of a calling party independent of a telephone number from which the call originated. According to one exemplary embodiment, a method of routing a call from a calling party to a receiving party may include accessing a database containing a plurality of voice templates of prior calling parties. Each voice template may have correlated therewith a call disposition parameter defined by the receiving party. Next, a voice response from the calling party may be compared with one of the plurality of voice templates stored in the database. Subsequently, the call may be routed to the receiving party based on a match between the voice response and the one of the plurality of voice templates.