Abstract:
The invention relates to a method comprising: monitoring voice, recognizing human speech in the monitored voice using a speech recognizing algorithm, detecting an identity of a person from the recognized human speech, interpreting the recognized human speech for identifying the portion of voice including voice of the person to whom the identity belongs; and generating an audio signature for that portion of voice. The invention further relates to an apparatus and a computer program product.
Abstract:
A method and system for adding a caller (102) in a blocked list is provided. The blocked list is stored at a communication server (104). The method includes receiving (604) a call from the caller (102) at a communication device (108). Further, the method includes receiving (606) a set of inputs at the communication device (108) in response to the call. The set of inputs includes a set of instructions to add the caller (102) in the blocked list. Furthermore, the method includes transmitting (608) a call termination request to the communication server (104). The call termination request includes the set of instructions to add the caller (102) in the blocked list. Transmission of the call termination request initiates addition of the caller (102) in the blocked list at the communication server (104).
Abstract:
A method includes receiving audio electronic business card data during a conference; comparing said audio electronic business card data with voices of conference speakers to confirm identities of said speakers; performing an acoustic triangulation to determine a position of speakers; correlating a position of said speakers with said identities; and displaying locations of said speakers.
Abstract:
A system (200) is provided for verifying an identity of a calling party. The system includes a storage (210) that stores voice sample information in association with information that idetifies an individual. The system also includes a receiver (221) that receives, from a communications platform (150/152/154) called by the calling party, a request to authenticate the identity of the calling party as the individual, using a digital audio sample packetized according to voice over internet protocol and obtained from the calling party during the call. Additionally, the system includes a processor (223) that compares the digital audio sample to the voice sample information to authenticate the identity of the calling party as the individual.
Abstract:
Die vorliegende Erfindung betrifft ein Verfahren und eine Vorrichtung zur Teilnehmerverifizierung in einem Kommunikationsnetz mit den Schritten: identifizieren eines ersten Teilnehmers (S 11, S12), erfassen von mindestens einer Stimmprobe des ersten Teilnehmers und erzeugen eines Sprachmusters des ersten Teilnehmers (S 15), verifizieren der Stimmprobe des ersten Teilnehmers (S21), erfassen von mindestens einer Stimmprobe mindestens eines weiteren Teilnehmers und erzeugen mindestes eines Sprachmusters jedes weiteren Teilnehmers (S17), verifizieren der Stimmproben jedes weiteren Teilnehmers (S31) .
Abstract:
The invention relates to a method for authorizing a telephone transaction and particularly access to a database by a user in a telecommunication network, said telecommunication network comprising a user interface, an access control for the database, and an authentication device which are interconnected in the telecommunication network via a switching node, and a corresponding switching node. The invention is characterized in that the result of the comparison is output to the access control by the authentication device via the switching node, and the result of the comparison is communicated to the user by the access control via the switching node, signals being blanked out by the authentication device.
Abstract:
When a speech section is detected by a state judging section (14), the positions of the sound sources(91 to 9K) are determined by a sound source position detecting section (15). A covariance matrix of the received sound signal is determined correspondingly to each sound source by a covariance matrix calculating section (17) and stored in a covariance matrix storage section (18) correspondingly to the sound source. The levels of the collected sounds from the sound sources are deduced from the covariance matrices by a collected sound level deducing section (19). The filter factors are determined from the deduced collected sound levels and the covariance matrices by a filter factor calculating section (21) so that the output level may be a predetermined value. The determined filter factors are assigned to filters (121 to 12M). The received sound signals from the microphones are processed by means of the filters, and the results of the processings are added by an adder (13) and outputted as a speech transmission signal. Thus, irrespective of the positions of the sound sources, a speech transmission signal of desired level can be generated.
Abstract:
A process for collecting the identity of a telephone caller is disclosed. In one embodiment, a personalized Context Free Grammar (CFG)(212) is created for each potential call recipient (210), and is configured to support identification of incoming callers utilizing voice recognition. Each CFG (212) incorporates an indication of high probability callers and probability weights in each CFG are altered accordingly. When a recipient (210) receives a call (202), the relevant CFG (212) is applied in association with a voice recognition application (222) to enable at least a preliminary identification of the caller. In accordance with another embodiment, the caller confirms identifications. In accordance with one embodiment, standard caller-ID functionality (224) is utilized if possible at least to assist in the caller identification process. In accordance with still another embodiment, voice recognition enhanced caller identification is utilized to provide intelligent call routing functionality (226).
Abstract:
Verfahren zur Authentifikation eines ersten Teilnehmers 1 gegenüber einem mit dem ersten Teilnehmer 1 in Kommunikationsverbindung befindlichen zweiten Teilnehmer 2, wobei sich einer der Teilnehmer unter Vorgabe der Kennung des anderen Teilnehmers mittels eines Endgerätes in ein Kommunikationsnetz einwählt und wobei über das Netz eine Verbindung zum Endgerät des anderen Teilnehmers aufgebaut wird, wobei ein im Netz befindliches Authentifikationsmittel 3,4 angewählt wird, in dem persönliche Daten des ersten Teilnehmers 1 hinterlegt sind, dass das Authentifikationsmittel 3,4 im Rahmen der Verbindung zur Identifikation geeignete Daten des ersten Teilnehmers aufnimmt und durch einen Vergleich mit den gespeicherten Daten seine Identität abgleicht und dass das Authentifikationsmittel 3,4 dem zweiten Teilnehmer 2 die Identität des ersten Teilnehmers 1 bestätigt.