Abstract:
Authentication of voice message recipient network addresses employs generating (102) and storing (104) a “network file” that includes “voice clips” and associated network addresses that are extracted from voice messages received across a network (10) from voice message systems (16, 18). A voice clip is the first one to three seconds of voice extracted from each received voice message. Over time, the network file will grow to contain multiple voice clips and associated network voice message addresses. When a voice message originator subsequently enters a recipient's network address (106), the originating voice message system searches (114) the network file for the network address, retrieves the associated voice clip (116), and plays it for the voice message originator to authenticate the recipient's network address. Voice authentication of a voice message originator entails encoding (134) into a “voice print file,” original voice clips and associated network addresses received from positively identified voice message originators. Thereafter, when a questionable voice message is received (138), the voice message system extracts a new voice clip (142), generates a new voice print (144), and compares it with the original voice print associated with the voice message address (148). If the voice prints are substantially the same, the received voice message is annotated with a “authenticating” message (150).
Abstract:
A system is provided for verifying an identity of a calling party. The system includes a storage that stores voice sample information in association with information that identifies an individual. The system also includes a receiver that receives, from a communications platform called by the calling party, a request to authenticate the identity of the calling party as the individual, using a digital audio sample packetized according to voice over internet protocol and obtained from the calling party during the call. Additionally, the system includes a processor that compares the digital audio sample to the voice sample information to authenticate the identity of the calling party as the individual.
Abstract:
A client identity verification system and method which includes receiving a spoken voice sample from a client. Identifying the match of the client, verifying client information, changing parameters in a conditional database and communicating alerts based on the results. The method also includes matching the received spoken voice sample against a stored voiceprint and voiceprint template of random phrases. The method then also includes verifying the phone number of the client.
Abstract:
A portable device, such as a cellular telephone, engages the user in a challenge-response sequence that is based on recognition of the user's utterance and also upon verification of the user's speech patterns or voiceprint. The challenge-response protocol presents the user with an unexpected challenge word, which the user is then requested to respond to. The system maintains a secure data store of challenge words which it adapts and augments as the user makes use of the portable device. The portable device provides the user with a convenient, single access point through which he or she can authenticate with a variety of disparate secure devices ranging from door locks, ATM machines, financial institutions and third-party business associates.
Abstract:
Disclosed is an automated reservations system for use with a frequent flyer account or other similar awards account. The automated reservations system initially authenticates customers utilizing one or more forms of identification. The customer is then prompted to provide travel itinerary information to the reservations system by a series of voice prompt menus. Utilizing the customer-entered itinerary information, the automated reservations system queries a flight information database to determine if the requested itinerary is available. The automated reservations system then determines if the customer has the required amount of frequent flyer miles to book the requested itinerary. If the customer has the required amount of frequent flyer miles, the automated reservations system allows the customer to either ticket or hold the requested itinerary. The automated reservations system is also capable of assigning seats for each passenger in the customer's itinerary.
Abstract:
A network for providing a telecommunications service with automatic speech recognition to a telecommunications user, including a switch in communication with a telecommunications device associated with the telecommunications user for detecting a terminating trigger specific to the telecommunications service in response to an incoming communication to the telecommunications device from a calling party, and an intelligent resource server in communication with the switch for receiving the incoming communication from the switch, for placing an outgoing communication to the telecommunications device via the switch, the outgoing communication including an audible message identifying the calling party, and for automatically recognizing a predetermined keyword spoken by the telecommunications user in response to the outgoing communication.
Abstract:
In communications systems where multiple users may be associated with the same account, the voiceprint of a user is used to identify a profile of the user, facilitating identification of the user's preferences without requesting additional information from the user. The system may also monitor messages played to individual users, to control the playing of the messages to users. Calls made by users associated with the same account may be allocated to the caller initiating the call in bills, based on voiceprints. Voiceprints may be collected for use in deriving voiceprint samples during registration of a user with the system and during conversations between the user and the system. A voiceprint comparison threshold may be set based on the type of phone calling the system, to compensate for noise. Changes in phone numbers and/or addresses of users are monitored and the threshold is adjusted if changes are found.
Abstract:
An apparatus and method is disclosed that allows a participant in a conference call to receive conference call roster information at a telephone display unit, at a computer display or at both types of display. The conference call information is updated during the call and includes identification of the speaker during a conference call. The conference callers are connected together and identified either by standard caller identification or by other identification provided by the operator. The conference callers' identifications are then transmitted in two ways. First, a coded signal is sent over the telephone connection to a telephone display unit. Second, an information, packet is transmitted over the Internet to a conference call participant's computer. A server computer monitors the conference call and the identification of parties involved is updated and parties are added or disconnected. The speaking party is identified in one of two ways. First, during the call, the speaker's telephone line will have a higher transmission amplitude than the other telephone lines and the line with the highest transmission amplitude will be identified by the server computer. Second, voice identification data is gathered before the conference call and stored in the server computer for use in identifying the speaker.
Abstract:
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
Abstract:
In communications systems where multiple users may be associated with the same account, the voiceprint of a user is used to identify a profile of the user, facilitating identification of the user's preferences without requesting additional information from the user. The system may also monitor messages played to individual users, to control the playing of the messages to users. Calls made by users associated with the same account may be allocated to the caller initiating the call in bills, based on voiceprints. Voiceprints may be collected for use in deriving voiceprint samples during registration of a user with the system and during conversations between the user and the system. A voiceprint comparison threshold may be set based on the type of phone calling the system, to compensate for noise. Changes in phone numbers and/or addresses of users are monitored and the threshold is adjusted if changes are found.