Abstract:
Verfahren zur Authentifikation eines ersten Teilnehmers 1 gegenüber einem mit dem ersten Teilnehmer 1 in Kommunikationsverbindung befindlichen zweiten Teilnehmer 2, wobei sich einer der Teilnehmer unter Vorgabe der Kennung des anderen Teilnehmers mittels eines Endgerätes in ein Kommunikationsnetz einwählt und wobei über das Netz eine Verbindung zum Endgerät des anderen Teilnehmers aufgebaut wird, wobei ein im Netz befindliches Authentifikationsmittel 3,4 angewählt wird, in dem persönliche Daten des ersten Teilnehmers 1 hinterlegt sind, dass das Authentifikationsmittel 3,4 im Rahmen der Verbindung zur Identifikation geeignete Daten des ersten Teilnehmers aufnimmt und durch einen Vergleich mit den gespeicherten Daten seine Identität abgleicht und dass das Authentifikationsmittel 3,4 dem zweiten Teilnehmer 2 die Identität des ersten Teilnehmers 1 bestätigt.
Abstract:
The invention relates to a method for the voice-operated identification of the user of a telecommunication line in a telecommunications network during an interactive communication using a voice-operated conversational system. According to the invention, during a person-to-person and/or person-to-machine conversation, the verbal expressions of a caller in a group of callers that is restricted to a telecommunication line are used to create a reference pattern for the user. A user identification is stored for each reference pattern. Said identification is activated after recognition of the user and, together with the CLI or ANI, is made available to a server with a voice-operated conversational system. Data for this user, which has already been saved using the CLI with user identification is determined by the system and made available for the interaction with the client. The inventive method can be advantageously used in voice-operated conversational systems.
Abstract:
Die Erfindung bezieht sich auf ein Kommunikationssystem mit Systemkomponenten zur Feststellung der Urheberschaft eines Kommunikationsbeitrages (40,41) mittels Auswertung eines Videosignals durch Mustererkennung und/oder Sprecheridentifikation durch Auswertung eines Audiosignals und/oder Bestimmung einer relativen Position des Urhebers (50) inmitten von Kommunikationsteilnehmer (50, 61 bis 66), die als das Kommunikationsendgerät benutzende Teilnehmer angemeldet sind. Neben der Urheberschaft eines Beitrags (40, 41) kann auch die Stimmung des Urhebers (30, 31, 50) festgestellt werden. Das Kommunikationssystem ist derart ausgestaltet, einen Beitrag (40, 41) in einer Weise wiederzugeben, die den Urheber (30, 31, 50) des Beitrags (40, 41) und/oder dessen Stimmung kennzeichnet.
Abstract:
A method and apparatus for recording and indexing audio information exchanged during an audio conference call, or video, audio and data information exchanged during a multimedia conference. For a multimedia conference, the method and apparatus utilize the voice activated switching functionality of a multipoint control unit (MCU) (26) to provide a video signal, which is input to the MCU (26) from a workstation from which an audio signal is detected, to each of the other workstations participating in the conference. A workstation and/or participant-identifying signal generated by the multipoint control unit (26) is stored, together or in correspondence with the audio signal and video information, for subsequent ready retrieval of the stored multimedia information. For an audio conference, a computer (32') is connected to an audio bridge (44) for recording the audio information along with an identification signal for correlating each conference participant with that participant's statements.
Abstract:
The present invention advanced voice application system takes advantage of information, or attributes, built into a telecommunications network to determine the risk that a call is a fraudulent call in a voice recognition and verification system. To achieve this end, information relating to the telecommunications network is stored in a database as various risk factors (10). Thus, depending on the type of risk factors associated with a particular call, the risk assigned to that call can be raised or lowered so that the network would not reject a valid caller even though the voice pattern of the caller does not match exactly with the prestored enrolled voice print of the caller. Such risk assessment allows the management of the network to tighten the security of the system without overburdening the caller with questions and also permits calls to be completed for valid subscribers that otherwise would have been rejected. Past calling history may be added to the database as it relates to the different risk factors so that constantly updated risk factors may be used for further assessing whether a call is to be completed.
Abstract:
Techniques and systems for recalling voicemail messages from remote voicemail systems are disclosed. In one embodiment, a method for recalling a voicemail message from a target mailbox can include: accessing a voicemail system by a caller using a device; authenticating the caller using speaker verification; and deleting the voicemail message from the target mailbox. The target mailbox owner can be a member of the voicemail system, while the caller can be a non-member of that voicemail system. The device may be configured to support a telephony user interface (TUI), for example.
Abstract:
A method includes receiving audio electronic business card data during a conference; comparing said audio electronic business card data with voices of conference speakers to confirm identities of said speakers; performing an acoustic triangulation to determine a position of speakers; correlating a position of said speakers with said identities; and displaying locations of said speakers.