Abstract:
To gain access to an enhanced telecommunications service, security measures are put in place to verify the identity of a caller. In accordance with the invention, some of the security measures may be opted out by a user to expedite the service. In an illustrative embodiment, a user or his/her account is preliminarily identified by an automatic number identification (ANI) accompanying the call. The ANI indicates the number of the telephone from which the call originates. The user may elect the opt out if the originating telephone is believed to be secure from unauthorized users.
Abstract:
A system and method for speaker identification in a conference calling unit. The method identifies the speaker, locates the speaker identifier, transfers the speaker identifier to an outgoing path and sends the speaker identifier to endpoints participating in the conference call. If the endpoints have the capability of displaying caller identification, their displays will be updated dynamically with the speaker identifier in place of the caller identifier. The system includes a conference call unit. The unit has a processing unit operable to extract the caller identification of the line having the speaker and a network interface unit operable to send the caller identification to endpoints participating in the call as speaker identification.
Abstract:
Schemes for routing a call using caller identification are described herein. These schemes are termed nullreal caller IDnull and can be capable of determining the identity of a calling party independent of a telephone number from which the call originated. According to one exemplary embodiment, a method of routing a call from a calling party to a receiving party may include accessing a database containing a plurality of voice templates of prior calling parties. Each voice template may have correlated therewith a call disposition parameter defined by the receiving party. Next, a voice response from the calling party may be compared with one of the plurality of voice templates stored in the database. Subsequently, the call may be routed to the receiving party based on a match between the voice response and the one of the plurality of voice templates.
Abstract:
Human speech is transported through a voice and data converged Internet network to recognize its content, verify the ifentity of the speaker, or to verify the content of a spoken phrase by utilizing the Internet protocol to transmit voice packets. The voice data (4) entered is processed and transmitted in the same way as Internet data packets over converged voice and data IP networks. A voice-enabled application isends a message (5), which is decoded by the speech API (2) and the appriopriate control and synchronization information is issued (7) to the data preparation module (9) and to the speech engine (3). Standard voice over IP includes a speech compression algorithm and the use of RTP (Real Time Protocol), enabling additional processing of the human voice anywhere in the network to perform speaker verification, with or without the knowledge of the speaker.
Abstract:
There is provided a system for facilitating a conference call. The system includes a module to generate a real-time voiceprint from a voice input of a participant in the conference call, and a module to provide information indicative of the participant based on the real-time voiceprint.
Abstract:
A system and method for recording a telephone conference and replaying a portion of the recording during the conference. Users participate by connecting through different types of networks using a device having a communication line connection. The recording can be in audio format, text format, or both. Thus, users can recall and replay textual information in addition to the recorded audio. Other information-such as time and user data-may also be recorded along with the audio and text. Users in the conference are identified to enable the association with them each user's contribution to the conference. The user or the user's device can assist by providing identification information. User identification may also be accomplished by associating each user's contribution with the particular line the user is calling from. Caller ID information may also be used to identify the user. Voice analysis may also performed to accomplish user identification.
Abstract:
A telecommunication system obtains personal information from a caller to provide the identity of the caller to a called telephone. In one embodiment, fingerprint information of the caller is obtained from a fingerprint scanner at the calling telephone of the caller which is then correlated with names in a finger print information database to the identify the caller. In another embodiment, voiceprint information of the caller is obtained to identify the caller through use of a voiceprint information database that correlates the voiceprint information with voiceprint data in the voiceprint information database. In both embodiments, if a called telephone local switch determines that the called telephone is authorized to receive the identity of the caller, the called telephone local switch transmits the identity of the caller to the called telephone.
Abstract:
A computer-based system (70) for identifying an unidentified caller (14) includes a database (42) that contains utterance data (162) corresponding to a known caller. A processing system (72) coupled to the database (42) receives utterance information corresponding to the unidentified caller (14) and compares the utterance information with the utterance data (162) to identify the unidentified caller (14) as the known caller. In response, the processing system (72) provides a call routing option (84). The call routing option (84) may include an accept option (86), a transfer option (90), or a disconnect option (89), and may be provided to a called party visually using a personal computer (50).
Abstract:
The present invention advanced voice application system takes advantage of information, or attributes, built into a telecommunications network to determine the risk that a call is a fraudulent call in a voice recognition and verification system. To achieve this end, information relating to the telecommunications network are stored in a database as various risk factors. Thus, depending on the type of risk factors associated with a particular call, the risk assigned to that call can be raised or lowered so that the network would not reject a valid caller even though the voice pattern of the caller does not match exactly with the prestored enrolled voice print of the caller. Such risk assessment allows the management of the network to tighten the security of the system without overburdening the caller with questions and also permits calls to be completed for valid subscribers that otherwise would have been rejected. Past calling history may be added to the database as it relates to the different risk factors so that constantly updated risk factors may be used for further assessing whether a call is to be completed.
Abstract:
A system/method is disclosed for screening telephone system callers, using speaker-dependent text-independent voice recognition, to either prevent excessive fraudulent use of certain telephone system lines (or radio channels) or to selectively restrict classes of service allowed for different users of a common line. The voice recognition process is configured to provide an extent of mismatch indication, between a voice sample taken from a caller immediately using the protected line (or channel) and a recorded reference voice sample, which indication corresponds to the probability that the instant caller is not the same as the person who provided the reference sample. The extent of mismatch indication is compared to a mismatch limit value which can be set to a different magnitude for each call. Different actions are taken depending upon whether the extent of mismatch indication is or is not larger than the limit value. In situations screening for potential fraudulent use of a line/channel, a mismatch indication larger than the set limit is considered representative of possible fraud and further action is taken to either immediately block continuation of the call or to acquire additional information from the caller which can be used to verify authorized usage.