Abstract:
The present invention relates to a system for retrieving information from a network such as the Internet. A user creates a user-defined record in a database that identifies an information source, such as a web site, containing information of interest to the user. This record identifies the location of the information source and also contains a recognition grammar based upon a speech command assigned by the user. Upon receiving the speech command from the user that is described within the recognition grammar, a network interface system accesses the information source and retrieves the information requested by the user.
Abstract:
An intelligent telephone network provides personalized communication services based on subscriber prescribed double speech signal processing of utterances of both calling and answering parties on a subscriber line having multiple subscribers with a single directory number. Specifically, when one of the multiple subscribers has personalized voice mail service and a busy/no answer call is received, the network uses speech processing of an utterance of the calling party to identify a customer service profile of the called party in the terminating switch. This contains instructions inviting storage of a voice message left by the caller. Upon the subscriber going off-hook, the customer profile of the subscriber line is installed in the switch. The subscriber transmits an utterance and the personalized customer profile of the subscriber is identified by a virtual office equipment number and the profile installed in the switch. The subscriber may then retrieve the stored message.
Abstract:
PURPOSE: A portable terminal and operation method thereof are provided to display content which is able to interact with people who creates voice signals by using a preview image of a camera unit. CONSTITUTION: A second control unit deducts link information or registered content from a database in case a voice signal is stored(S730, S740). The second control uni transmits a voice response message to a portable terminal(S750). The second control unit registers the content within a content registration message or the link information in the database when the content registration message is transmitted to the portable terminal(S760, S770). The second control unit transmits content confirmation message to the portable terminal(S780).
Abstract:
PURPOSE: A personal telephone number unit data base estimating method, method for serving automatic call connection using the same, system thereof using voice recognition are provided to automatically connecting a call with a desired person by using a voice. CONSTITUTION: A voice and receiving telephone number about a name of a caller is inputted through a call network from a service user which a personal telephone number unit estimation is requested. The caller telephone number of a service user is obtained. A speaker authentication voice characteristics and speaker-dependent voice recognition name characteristics is extracted at the same time from name of a caller by using a voice recognition(306). By using the obtained caller number as a key, the speaker-dependent voice recognition characteristics per the extracted speaker authentication voice characteristics and the inputted calling number are stored(308).
Abstract:
Improved systems and methods are provided for transcribing audio files of voice mails sent over a unified messaging system. Customized grammars specific to a voice mail recipient are created and utilized to transcribe a received voice mail by comparing the audio file to commonly utilized words, names, acronyms, and phrases used by the recipient. Key elements are identified from the resulting text transcription to aid the recipient in processing received voice mails based on the significant content contained in the voice mail.
Abstract:
Disclosed are systems and methods including software processes executed by a server that detect audio-based synthetic speech (“deepfakes”) in a call conversation. Embodiments include systems and methods for detecting fraudulent presentation attacks using multiple functional engines that implement various fraud-detection techniques, to produce calibrated scores and/or fused scores. A computer may, for example, evaluate the audio quality of speech signals within audio signals, where speech signals contain the speech portions having speaker utterances.
Abstract:
A communication system and method for identifying a threatening and/or illegal call includes (1) a telephony network, (2) a first user device in communication with the telephony network, wherein the first user device is assigned to a first user who is an organization member, (3) a second user device in communication with the telephony network, wherein the second user device is assigned to a second user who is not an organization member, (4) a communications server in communication with at least the first user device, (5) a natural language processor (NLP) in communication with the communications server; and (6) a threatening language database in communication with the communications server and/or the NLP. The NLP is configured to monitor language used by the second user during a communication with first user to identify threatening language by comparing the language used by the second user to the threatening language in the threatening language database.
Abstract:
Methods, systems, and computer storage media for providing a disrupted-speech assistance service associated with a disrupted-speech management engine of a meeting management system. The disrupted-speech assistance service is an accessibility service that supports accessibility operations of a disrupted-speech management engine to provide disrupted-speech assistance features in a meeting management system. In operation, meeting data comprising audio data is accessed. The audio data is analyzed to determine that the audio data comprises disrupted-speech at a threshold level of disrupted-speech. Based on the audio data comprising disrupted-speech at the threshold level of disrupted-speech, one or more disrupted-speech assistance operations for a meeting can be executed. The one or more disrupted-speech assistance operations comprises identifying a disrupted-speech word; determining an alternative word for the disrupted-speech word. A disrupted-speech assistance interface is generated based on the one or more disrupted-speech assistance operations. The disrupted-speech assistance interface comprises the alternative word for the disrupted-speech word.
Abstract:
Systems for and methods of determining the priority of a call interaction include receiving a call interaction from a call center; validating, by a validation and transcription engine, that the call interaction is authentic; converting, by the validation and transcription engine, the call interaction into text; calculating, by the data calculation engine, a priority of the call interaction from the text and organization, location, and time information in the text by determining an important of words in the text and correlating the words to a priority class using a pre-trained algorithm that is trained on emergency-type and emergency services-type language; determining that the call interaction should be transmitted to the call center for initial handling by a call center agent; and transmitting the call interaction, the calculated priority, and the extracted information to the call center.
Abstract:
An electronic call assistant based on a callee-status and a caller-status, comprises one or more sensors, a memory, and a circuitry. The memory in the first electronic device may be configured to store a plurality of applications. The circuitry in the first electronic device is configured to determine an identity of a caller of a voice call received by the first electronic device from a second electronic device. A current callee-status of a callee associated with the first electronic device, is detected. The circuitry is configured to extract a text query from a speech signal in the received voice call. The circuitry is further configured to communicate a custom audio response to the second electronic device based on the extracted text query, the determined identity of the caller, current callee-status of the callee, and the level of access associated with the determined identity.