Abstract:
A method and system for secure authentication of a user in a session conducted over an interactive communication channel, such as a two-way telephony communication channel, with an authenticating entity, such as a financial institution, utilizes a session identifier, such as pseudorandom noise to detect and identify attempts to play back authentication information, such as user-spoken phrases, intercepted and recorded by an unauthorized party during a previous session between the user and the authenticating party.
Abstract:
The present invention provides a method to allow conference call participants to determine the identity of the current speaker without interrupting the call by verbally requesting the identity of the speaker. When a conference call is established, a conference bridge initiates a connection to an Automatic Speech Recognition (ASR) system. The conference bridge prompts each participant as they join the call to repeat words on a predetermined list. The repeated words are sent to the ASR system, where a voice profile is generated for each conference participant. When a conference participant wishes to know the identity of the current speaker, the participant notifies the conference bridge. The conference bridge sends the request to the ASR system, where a comparison is made between the voice of the current speaker and the voice templates. When a match is found, the identity of the current speaker is returned to the requesting participant.
Abstract:
The voice-print based voice message screening system enables a calling party to leave a voice message for the identified subscriber without the need to input any additional information. When the subscriber receives a voice message from a calling party, the subscriber can elect to add the calling party to the subscriber's calling party screening list by activating the voice-print based voice message screening system to register the calling party. The voice-print based voice message screening system stores data indicative of the subscriber's listed directory number, the calling party's number, the identity of the calling party as characterized by the subscriber, and also stores a small set of determined speech characteristics to identify the calling party. On a subsequently received call for the subscriber, the voice-print based voice message screening system analyzes the calling party's voice based on one or more parameters that can be managed by the subscriber to identify the calling party.
Abstract:
A method of conducting a conference call, comprising: identifying a user (2) of a first communication unit (12) speaking during the conference call; transmitting data related to the identified speaker (2) to other communication units (14, 16, 28) being used by other users (4, 6, 8) participating in the conference call; the communication units (14, 16, 18) receiving the data related to the identified speaker (2) and displaying speaker data based on the received data related to the identified speaker (2). The speaker (2) may be identified by comparing the speech being spoken by the user with a voice profile for that user. Also described is a corresponding communication system, a caller identification module (21), and adapted communication units (12, 14, 16, 18).
Abstract:
A system (8, 60, 500) for identifying an unidentified person (14, 510) includes a database (42) that contains utterance data (162) and an ambiguity-resolution criterion (114, 119, 121) corresponding to a known person. A processing system (10, 11, 502) is coupled to the database (42) and receives utterance information and an ambiguity-resolution identifier corresponding to the unidentified person (14, 510). The processing system (10, 11, 502) compares the utterance information with the utterance data (162) to identify the unidentified person (14, 510) as at least one known person. If the processing system (10, 11, 502) ambiguously identifies the unidentified person (14, 510) as more than one known person, the processing system (10, 11, 502) compares the ambiguity-resolution identifier with the ambiguity-resolution criterion (114, 119, 121) to identify the unidentified person (14, 510) as a particular known person. In response to identifying the person (14, 510), the processing system (10, 11, 502) may automatically retrieve stored information (104, 132, 162) corresponding to the known customer.
Abstract:
The invention relates to a communication system with system components for ascertaining the authorship of a communication contribution (40, 41) put in into a communication end device through evaluation of a video signal by pattern recognition, and/or speaker identification through evaluation of an audio signal, and/or determination of a relative position of the author (50) among communication participants registered as participants (50, 61 to 66) using said communication end device. In addition to the authorship of a contribution (40, 41), the mood of the author (30, 31, 50) may also be determined. The communication system is constructed such that it represents a contribution (40, 41) in a manner which characterizes the author (30, 31, 50) of the contribution (40, 41) and/or his/her mood.
Abstract:
A method for minimum supervision of an offender required to report in to an electronic supervision system. The method includes pre-enrolling the offender in the electronic supervision system and assigning an authorized telephone number. A telephone call is placed by an individual from a telephone located at a remote location, the remote location telephone having an originating telephone number. The telephone call from the remote location is accepted and it is determined whether an ANI of the originating telephone number is available. If available, the ANI of the originating phone number is captured. An enrollee ID number assigned to the offender is entered. The originating telephone number is validated against the authorized telephone number assigned to the offender to verify the location of the remote telephone. It is determined whether a voice template is on file for the offender. The individual is prompted to respond to a plurality of user definable inquiries regarding the status of the offender. The identity of the individual placing the telephone call is verified using voice verification technology during the telephone call.
Abstract:
A system (500) for identifying an unidentified customer (510) includes a database (42) that contains utterance data (162) corresponding to a known customer. A processing system (502) coupled to the database (42) receives utterance information corresponding to the unidentified customer (510) at the point of sale and compares the utterance information with the utterance data (162) to identify the unidentified customer (510) as the known customer. In response, the processing system (502) may automatically retrieve stored information (104, 132, 162) corresponding to the known customer.
Abstract:
Authentication of voice message recipient network addresses employs generating (102) and storing (104) a nullnetwork filenull that includes nullvoice clipsnull and associated network addresses that are extracted from voice messages received across a network (10) from voice message systems (16, 18). A voice clip is the first one to three seconds of voice extracted from each received voice message. Over time, the network file will grow to contain multiple voice clips and associated network voice message addresses. When a voice message originator subsequently enters a recipient's network address (106), the originating voice message system searches (114) the network file for the network address, retrieves the associated voice clip (116), and plays it for the voice message originator to authenticate the recipient's network address. Voice authentication of a voice message originator entails encoding (134) into a nullvoice print file,null original voice clips and associated network addresses received from positively identified voice message originators. Thereafter, when a questionable voice message is received (138), the voice message system extracts a new voice clip (142), generates a new voice print (144), and compares it with the original voice print associated with the voice message address(148). If the voice prints are substantially the same, the received voice message is annotated with a nullauthenticatingnull message (150).
Abstract:
An enduser at a POTS analog voice-only endpoint (136) and endusers at H.320 standard multimedia terminals (101, 102, 103, 104), which each communicate over separate voice, video and data streams, engage in a videoconference with each other in a pseudo multimedia manner through a central platform (135) that provides call conversion capabilities. A document to be shared by a user at the POTS endpoint with users at the multimedia endpoints is transmitted as a data signal from a facsimile machine (137) or PC terminal (138) associated with the POTS user to a server (146) in the platform. The received data signal is then inputted to a multimedia bridge (124) and transmitted on the data stream to each multimedia endpoint for display on a window on each multimedia terminal. Similarly, a document to be shared by a multimedia endpoint is transmitted on a data stream to the multimedia bridge, where it is bridged on the data stream transmitted to the other multimedia endpoints and to the server. The document is then transmitted from the server to the facsimile machine or PC terminal associated with the POTS endpoint. In conventional multimedia conferencing arrangements, voice-activated switching is used to determine which user's video image is bridged onto the video stream transmitted to each multimedia terminal. When the audio signal from the POTS user would cause a video signal from that user's terminal to be bridged to all the multimedia endpoints if in fact that user was at a multimedia terminal, a stored image of that user is retrieved from a database (151) and outputted by the bridge on the video stream transmitted to each multimedia terminal to enable the multimedia participants to visually identify the presently talking enduser.