Abstract:
A method and system for identifying conference participants who dial in to a telephone conference of an electronic conference that includes a web conference is provided. To identify a conference participant, a conference system displays to a user the names of those conference participants who have not yet been associated with a telephone line of the telephone conference. The conference system plays to the user the identification announcement of a conference participant who is not yet associated with a telephone line. When the user hears the identification announcement, the user recognizes the name of the conference participant and selects the name of that conference participant from the displayed names. The conference system can then associate that conference participant with the telephone line associated with the identification announcement that was played to the user.
Abstract:
A system for enabling controlled application of derived who-is-speaking indications related to activity of participants to a live multiparty communications conference or recorded outputs. The system includes a first node hosting a conference bridging switch, software or a combination thereof, having multiple conference input channels; a second node having data access to at least an output signal port of the conference bridging switch, software, or a combination thereof, and a software application distributed wholly to the first or second node, or in parts to the first and second node. The application is used to apply the who is speaking indications to output communications, data files, or data streams, forwarded to one of, a select potion of, or combination of, the conference participants, non-participant third parties, and one or more storage facilities.
Abstract:
A system (200) is provided for verifying an identity of a calling party. The system includes a storage (210) that stores voice sample information in association with information that idetifies an individual. The system also includes a receiver (221) that receives, from a communications platform (150/152/154) called by the calling party, a request to authenticate the identity of the calling party as the individual, using a digital audio sample packetized according to voice over internet protocol and obtained from the calling party during the call. Additionally, the system includes a processor (223) that compares the digital audio sample to the voice sample information to authenticate the identity of the calling party as the individual.
Abstract:
When a speech section is detected by a state judging section (14), the positions of the sound sources(91 to 9K) are determined by a sound source position detecting section (15). A covariance matrix of the received sound signal is determined correspondingly to each sound source by a covariance matrix calculating section (17) and stored in a covariance matrix storage section (18) correspondingly to the sound source. The levels of the collected sounds from the sound sources are deduced from the covariance matrices by a collected sound level deducing section (19). The filter factors are determined from the deduced collected sound levels and the covariance matrices by a filter factor calculating section (21) so that the output level may be a predetermined value. The determined filter factors are assigned to filters (121 to 12M). The received sound signals from the microphones are processed by means of the filters, and the results of the processings are added by an adder (13) and outputted as a speech transmission signal. Thus, irrespective of the positions of the sound sources, a speech transmission signal of desired level can be generated.
Abstract:
Authentication of voice message recipient network addresses employs generating (102) and storing (104) a "network file" that includes "voice clips" and associated network addresses that are extracted from voice messages received across a network (10) from voice message systems (16, 18). A voice clip is the first one to three seconds of voice extracted from each received voice message. Over time, the network file will grow to contain multiple voice clips and associated network voice message addresses. When a voice message originator subsequently enters a recipient's network address (106), the originating voice message system searches (114) the network file for the network address, retrieves the associated voice clip (116), and plays it for the voice message originator to authenticate the recipient's network address. Voice authentication of a voice message originator entails encoding (134) into a "voice print file", original voice clips and associated network addresses received from positively identified voice message originators. Thereafter, when a questionable voice message is received (138), the voice message system extracts a new voice clip (142), generates a new voice print (144), and compares it with the original voice print associated with the voice message address (148). If the voice prints are substantially the same, the received voice message is annotated with an "authenticating" message (150).
Abstract:
Die Benutzung eines Telefons als Zugangsterminal zum Intranet/Internet mittels der Sprachkommunikation ist einerseits sehr komfortabel, eröffnet jedoch andererseits auch neue Möglichkeiten des unbefugten Zugriffs. Dieser kann insbesondere dadurch entstehen, dass eine Session de facto unterbrochen wird, die aufgebaute Verbindung zu dem/den Server(n) jedoch nicht, sodass die bestehende Einwahl mit der Autorisierung bestehen bleibt. Dies kann insbesondere bei der Spracheingabe geschehen, da es durchaus sinnvoll erscheint, diese Art des Zugriffs auf das Intranet/Internet auch dann zu benutzen, wenn zuzüglich am Schreibtisch Akten bearbeitet werden z. B., sodass der Nutzer nicht immer sich im klaren ist, ob der Zugang noch aktiv ist oder nicht. Die Erfindung ermöglicht nun kontinuierlich oder in unregelmäßigen oder auch regelmäßigen zeitlichen Abständen die Authentisierung der Person dadurch zu überprüfen, dass ― erfindungsgemäß ― das Profil der Sprache der bedienenden Person mit dem spezifischen gespeicherten Profil der Person verglichen wird, die unter der Anmeldung sich autorisiert hat. Dies setzt jedoch voraus, dass das System der Spracheingabe mit personenspezifischen Sprachprofilen arbeitet.
Abstract:
A method for identifying a caller based on voice recognition is provided that includes receiving call data from a communication device through a communication network. The call data comprises voice data for a user of the communication device. A search is performed for an identifying data match based on the terminal identification data. A voice recognition system is activated when an identifying data match is found and uniquely identifies a terminal. A search is performed for a first voice pattern match with the voice recognition system based on the call data. A user identifier corresponding to the first voice pattern is provided to the communication network when the first voice pattern match is found, the user identifier operable to identify the user of the communication device.
Abstract:
A method and apparatus for recording and indexing audio information exchanged during an audio conference call, or video, audio and data information exchanged during a multimedia conference. For a multimedia conference, the method and apparatus utilize the voice activated switching functionality of a multipoint control unit (MCU) (26) to provide a video signal, which is input to the MCU (26) from a workstation from which an audio signal is detected, to each of the other workstations participating in the conference. A workstation and/or participant-identifying signal generated by the multipoint control unit (26) is stored, together or in correspondence with the audio signal and video information, for subsequent ready retrieval of the stored multimedia information. For an audio conference, a computer (32') is connected to an audio bridge (44) for recording the audio information along with an identification signal for correlating each conference participant with that participant's statements.
Abstract:
A technique for verifying a user's voice prior to permitting the user to conduct a business transaction over a data network is disclosed. An order is received via the data network, and a voice verification unit is contacted to (i) access a prestored voice print, (ii) obtain a present voice sample from the consumer desiring the transaction and compare said present voice sample to the prestored voice sample, and (iii) issue a signal indicating whether or not the voice correctly verifies or not.
Abstract:
The INTERACTIVE CREDIT CARD FRAUD CONTROL PROCESS system utilizes a computer with telephone interface, memory, voice recognition software and hardware, and an information archive and retrieval process. A computer program (10) is used to automatically and electronically control the determination of the caller as the authorized credit card holder, or conversely an unauthorized perpetrator attempting to make a credit card transaction. The telephone interface is connected to a telephone line and the caller dials a number that connects the caller with the present invention (12), which then captures certain information about the incoming call (14 & 16) and creates a permanent Record Stamp (18) of the call to which transactional information is added as the call progresses. The caller is asked question prompts, and the system receives voice and touch tone responses from the caller from which the system determines if a VoicePrint is applicable (20). The caller responses are managed by the present invention in a method that determines if the caller is the authorized credit card holder, and if the caller is not the authorized credit card holder the present invention captures information that can lead to the capture and conviction of the caller as a credit card fraud felon. The present invention uses the caller's spoken voice print of the card holder's name as one of the determining factors to determine if the caller is the authorized credit card holder (22). The VoicePrint, included in a claim in the present invention, uniquely and positively identifies a single person, and therefore becomes a valuable tool and evidence in the apprehension and conviction of perpetrators of credit card fraud. With a VoicePrint of the authorized credit card holder on file, the present invention prevents any other person except approved persons from making credit card transactions with that card number. Even without the VoicePrint, the control process is highly effective in limiting fraud risk and the present invention creates a VoicePrint of the caller, ties that identifier to the Record Stamp, and can thereafter identify that person as the person who was the caller. Additional claims relate to using the present invention for security and access control, including the gathering of positive identifying evidence of perpetrators.