Abstract:
A portable device, such as a cellular telephone, engages the user in a challenge-response sequence that is based on recognition of the user's utterance and also upon verification of the user's speech patterns or voiceprint. The challenge-response protocol presents the user with an unexpected challenge word, which the user is then requested to respond to. The system maintains a secure data store of challenge words which it adapts and augments as the user makes use of the portable device. The portable device provides the user with a convenient, single access point through which he or she can authenticate with a variety of disparate secure devices ranging from door locks, ATM machines, financial institutions and third-party business associates.
Abstract:
In communications systems where multiple users may be associated with the same account, the voiceprint of a user is used to identify a profile of the user, facilitating identification of the user's preferences without requesting additional information from the user. The system may also monitor messages played to individual users, to control the playing of the messages to users. Calls made by users associated with the same account may be allocated to the caller initiating the call in bills, based on voiceprints. Voiceprints may be collected for use in deriving voiceprint samples during registration of a user with the system and during conversations between the user and the system. A voiceprint comparison threshold may be set based on the type of phone calling the system, to compensate for noise. Changes in phone numbers and/or addresses of users are monitored and the threshold is adjusted if changes are found.
Abstract:
An improved authentication system utilizes multi-factor user authentication. In an exemplary embodiment, one authentication factor is the user's speech pattern, and another authentication factor is a one-time passcode. The speech pattern and the passcode may be provided via voice portal and/or browser input. The speech pattern is routed to a speaker verification subsystem, while the passcode is routed to a passcode validation subsystem. Many other combinations of input types are also possible. For heightened security, the two (or more) authentication factors are preferably, although not necessarily, provided over differing communication channels (i.e., they are out-of-band with respect to each other). If a user is authenticated by the multi-factor process, he is given access to one or more desired secured applications. Policy and authentication procedures may be abstracted from the applications to allow a single sign-on across multiple applications.
Abstract:
The present invention advanced voice application system takes advantage of information, or attributes, built into a telecommunications network to determine the risk that a call is a fraudulent call in a voice recognition and verification system. To achieve this end, information relating to the telecommunications network is stored in a database as various risk factors. Thus, depending on the type of risk factors associated with a particular call, the risk assigned to that call can be raised or lowered so that the network would not reject a valid caller even though the voice pattern of the caller does not match exactly with the prestored enrolled voice print of the caller. Such risk assessment allows the management of the network to tighten the security of the system without overburdening the caller with questions and also permits calls to be completed for valid subscribers that otherwise would have been rejected. Past calling history may be added to the database as it relates to the different risk factors so that constantly updated risk factors may be used for further assessing whether a call is to be completed.
Abstract:
A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.
Abstract:
The invention relates to a method comprising the steps of: - (a) storing data by means of storage means; - (b) receiving input with a sensor of a communication device. The method further comprises of - determining with comparing means in response to an emergency signal an outcome of a comparison of the received input to at least a part of the stored data; and - determining subject to the outcome whether communication means of the communication device must be activated so as to make contact with an alarm responder.
Abstract:
Disclosed is an apparatus, system, and method to continuously authenticate a user of a mobile device. The mobile device includes a user interface, a transceiver, a microphone, and processor. The processor continuously samples a users voice from the microphone during a call by obtaining voice snippets on a pre-defined periodic basis or on a random basis. The processor further compares the sampled voice from the microphone to a stored voice to authenticate a valid user, wherein if the sampled voice matches the stored voice for a valid user, functionality of the mobile device continues. On the other hand, if the sampled voice does not match the stored voice for a valid user, functionality of the mobile device is locked.
Abstract:
One embodiment of the invention provides a computer-implemented method of handling a telephone call. The method comprises monitoring a conversation between an agent and a customer on a telephone line as part of the telephone call to extract the audio signal therefrom. Real-time voice analytics are performed on the extracted audio signal while the telephone call is in progress. The results from the voice analytics are then passed to a computer-telephony integration system responsible for the call for use by the computer-telephony integration system for determining future handling of the call.
Abstract:
A method includes receiving audio electronic business card data during a conference; comparing said audio electronic business card data with voices of conference speakers to confirm identities of said speakers; performing an acoustic triangulation to determine a position of speakers; correlating a position of said speakers with said identities; and displaying locations of said speakers.