Abstract:
Embodiments of the present invention provide a method, device, and system for classifying voice conference minutes. The method is: performing voice source locating according to audio data of the conference site so as to acquire a location of a voice source corresponding to the audio data, writing the location of the voice source into additional field information of the audio data, writing a voice activation flag into the additional field information, packaging the audio data as an audio code stream, and sending the audio code stream and the additional field information of the audio code stream to a recording server, so that the recording server classifies the audio data according to the additional field information and writes a participant identity that corresponds to the location of the voice source corresponding to the audio data into the additional field information of the audio code stream.
Abstract:
Methods and systems for monitoring, analyzing and acting upon voice calls in communication networks. An identification system receives monitored voice calls that are conducted in a communication network. Some of the monitored voice calls may be conducted by target individuals who are predefined as suspects. In order to maintain user privacy, the system selects and retains only voice calls that are suspected of being conducted by predefined targets. The techniques disclosed herein are particularly advantageous in scenarios where the network identifiers of the terminal used by the target are not known, or where the target uses public communication devices. In accordance with the disclosure, content-based identifiers such as speaker recognition or keyword matching are used.
Abstract:
The invention provides a computer-implemented method of handling a telephone call, comprising monitoring a conversation between an agent and a customer on a telephone line as part of the telephone call to extract the audio signal therefrom. Real-time voice analytics are performed on the extracted audio signal while the telephone call is in progress. The results from the voice analytics are then passed to a computer-telephony integration system responsible for the call for use by the computer-telephony integration system for determining future handling of the call.
Abstract:
Techniques and systems for recalling voicemail messages from remote voicemail systems are disclosed. In one embodiment, a method for recalling a voicemail message from a target mailbox can include: accessing a voicemail system by a caller using a device; authenticating the caller using speaker verification; and deleting the voicemail message from the target mailbox. The target mailbox owner can be a member of the voicemail system, while the caller can be a non-member of that voicemail system. The device may be configured to support a telephony user interface (TUI), for example.
Abstract:
A method of verifying a user identity using a Web-based multimodal interface can include sending, to a remote computing device, a multimodal markup language document that, when rendered by the remote computing device, queries a user for a user identifier and causes audio of the user's voice to be sent to a multimodal, Web-based application. The user identifier and the audio can be received at about a same time from the client device. The audio can be compared with a voice print associated with the user identifier. The user at the remote computing device can be selectively granted access to the system according to a result obtained from the comparing step.
Abstract:
Die Erfindung betrifft ein Verfahren zur Personalisierung eines Telekommunikationsdienstes umfassend das Identifizieren eines Teilnehmers und das Konfigurieren von Dienstleistungen anhand der Identifikation, wobei das Identifizieren des Teilnehmers durch eine Kombination von CLI und eine automatische Sprechererkennung erfolgt und dass die Identifikation des Teilnehmers durch die Identifikation des erkannten Sprechers ergänzt bzw. korrigiert wird. Weiterhin umfasst die Erfindung ein Telekommunikationsdienst, eine Diensteinheit, ein Telekommunikationssystem und ein Computer Software Produkt dazu.
Abstract:
A system is provided for the automatic detection of fraudulent activity on a transaction network, wherein each transaction has an associated identifier. The system includes voice comparison means (32) for comparing a first sampled voice of a user of a first transaction with a subsequently sampled voice of a user of a subsequent transaction having an identical identifier to that of the first transaction. Control means in the form of a fraud detection engine (26) is provided for determining, from said comparison, a profile of user usage that is representative of a total number of different users of the associated identifier. The fraud detection engine is configured to compare the profile of user usage with a threshold for fraudulent use, and to generate a fraud condition signal (40) in the event that the profile exceeds said threshold. If required, the fraud condition signal may be provided to automatically terminate the fraudulent transaction.