Abstract:
A system and method for automatic call segmentation including steps and means for automatically detecting boundaries between utterances in the call transcripts; automatically classifying utterances into target call sections; automatically partitioning the call transcript into call segments; and outputting a segmented call transcript. A training method and apparatus for training the system to perform automatic call segmentation includes steps and means for providing at least one training transcript with annotated call sections; normalizing the at least one training transcript; and performing statistical analysis on the at least one training transcript.
Abstract:
A dialogue system and a speech dialogue operation method are provided. In the system, an inquiry speech signal is generated according to data for specific person and is transferred to a receiver. In response to the inquiry speech signal, a reply speech signal is generated by the receiver, and after the reply speech signal is recognized, a speech correspondence signal is obtained. A ID recognition procedure is performed according to the speech correspondence signal, and a dialogue control signal is generated according to the result of the ID recognition procedure, and accordingly, a response speech signal is generated and transferred to the receiver to continue or terminate the dialogue. When the receiver is recognized to be matched with the specific person, a message delivering procedure is performed to deliver a message to be transferred to the specific person to the receiver.
Abstract:
In communications systems where multiple users may be associated with the same account, the voiceprint of a user is used to identify a profile of the user, facilitating identification of the user's preferences without requesting additional information from the user. The system may also monitor messages played to individual users, to control the playing of the messages to users. Calls made by users associated with the same account may be allocated to the caller initiating the call in bills, based on voiceprints. Voiceprints may be collected for use in deriving voiceprint samples during registration of a user with the system and during conversations between the user and the system. A voiceprint comparison threshold may be set based on the type of phone calling the system, to compensate for noise. Changes in phone numbers and/or addresses of users are monitored and the threshold is adjusted if changes are found.
Abstract:
A client identity verification system and method which includes receiving a spoken voice sample from a client. Identifying the match of the client, verifying client information, changing parameters in a conditional database and communicating alerts based on the results. The method also includes matching the received spoken voice sample against a stored voiceprint and voiceprint template of random phrases. The method then also includes verifying the phone number of the client.
Abstract:
A disclosed method of authenticating a telephone caller includes receiving an authentication request for the telephone caller that includes a voice recording of the caller and household information indicative of a household, creating a first voice pattern based on the voice recording of the caller, retrieving a second voice pattern using at least some of the household information, comparing the two voice patterns, and transmitting information indicative of the results of the comparison. The transmitted information may include information that the telephone caller is authenticated, is not authenticated, or that the comparison results were inconclusive. The method may include monitoring telephone calls with the household, and if it is determined that a voice on at least some of the telephone calls is associated with the household, creating the second voice pattern based on the voice, and associating the second voice pattern to the household. The method may further include disassociating the second voice pattern from the household if it is determined that a change of household has occurred.
Abstract:
There is provided a system for facilitating a conference call. The system includes a module to generate a real-time voiceprint from a voice input of a participant in the conference call, and a module to provide information indicative of the participant based on the real-time voiceprint.
Abstract:
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
Abstract:
In one embodiment, a system authenticates a caller before providing the caller with access to one or more secured resources. Identification and verification data is stored during system enrollment of known persons. A processing system, in a current call initiated by a caller and prior to identification of the caller, receives voice-based information for the caller including a digital representation of a telephone number spoken by the caller in the current call, the received information including voice-based identification information and voice-based verification information for the caller. The processing system automatically compares the received identification information and the received verification information for the caller with the stored identification and verification data for known persons, respectively, to uniquely identify and verify the identity of the caller as a particular known person. The processing system authenticates the caller for access to the one or more secured resources in response.
Abstract:
A method of handling an incoming call from a first communication device addressed to a second communication device, the first and second communication devices being operative in a communication network, wherein the second communication device or the communication network comprises an answering unit. The answering unit includes a privacy data unit comprising a privacy code message for bypassing the answering unit. The method comprises receiving, by means of the answering unit, the incoming call intended for and addressed to the second communication device. Furthermore, the method comprises determining whether also a code message is received by the answering unit. If so, the method comprises comparing the received code message with the privacy code message stored in the privacy data unit to determine whether the incoming call should bypass the answering unit and, thereby, be directly forwarded to the second communication device being addressed by the first communication device in the incoming call. Thereby, a user of the second communication device may be permitted to intercept the incoming call from the calling first communication device.
Abstract:
Digital process for authentication of a user of a telecommunications or data network for access to protected data or a service reserved for a defined circle of users or for the use of data currently entered by the user, wherein a voice sample currently enunciated during an access attempt by the user on a telecommunications or VoIP terminal device is routed to a voice analysis unit and, herein, a current voice profile is computed and this is compared in a voice profile comparison unit against a previously stored initial voice profile and, in response to a positive comparison result, the user is authenticated and a first control signal enabling access, but in response to a negative comparison result a second control signal disabling access or triggering a substitute authentication procedure is generated.