Abstract:
A method and apparatus are provided for authenticating a user of a mobile phone. While the user holds the phone to his or her ear, a microphone near the earpiece emits clicks into the user's ear. The speaker of the phone measures the response from the ear as an otoacoustic signal. A processor digitizes the measured otoacoustic signal to produce a received digital otoacoustic signature, and compares this with a stored digital otoacoustic signature of a legitimate user. If the signatures match, the phone is enabled. The invention allows secure authentication of mobile phones in a manner very natural and convenient to users.
Abstract:
A system (200) is provided for verifying an identity of a calling party. The system includes a storage (210) that stores voice sample information in association with information that idetifies an individual. The system also includes a receiver (221) that receives, from a communications platform (150/152/154) called by the calling party, a request to authenticate the identity of the calling party as the individual, using a digital audio sample packetized according to voice over internet protocol and obtained from the calling party during the call. Additionally, the system includes a processor (223) that compares the digital audio sample to the voice sample information to authenticate the identity of the calling party as the individual.
Abstract:
Die Erfindung betrifft ein Verfahren zum Autorisieren einer fernmündlichen Transaktion und insbesondere eines Zugriffs auf eine Datenbank durch einen Anwender in einem Telekommunikationsnetz, wobei das Telekommunikationsnetz eine Anwenderschnittstelle, eine Zugangskontrolle für die Datenbank und eine Authentifizierungseinrichtung aufweist, die über einen Vermittlungsknoten in dem Telekommunikationsnetz miteinander verbunden sind, sowie einen entsprechenden Vermittlungsknoten. Die Erfindung ist dadurch gekennzeichnet, dass das Vergleichsergebnis von der Authentifizierungseinrichtung über den Vermittlungsknoten an die Zugangskontrolle ausgegeben wird und das Vergleichsergebnis durch die Zugangskontrolle dem Anwender über den Vermittlungsknoten mitgeteilt wird, wobei Signale von der Authentifizierungseinrichtung ausgeblendet werden.
Abstract:
Embodiments provide a system, method, apparatus, means, and computer program code for identifying a speaker participating in a conference. During the conference or collaboration event, users may participate in the conference via user or client devices (e.g., computers) (120a-120n, 122a-122n, 252-258) that are connected to or in communication with a server (104) or collaboration system (100). A person participating in and/or moderating a conference may want to know which of the other participants is speaking at any give time, both for those participants that have a unique channel to the conference (e.g., a single participant participating in the conference via a single telephone or other connection) as well as participants that are aggregated behind a single channel to the conference (e.g., three participants in a conference room with a single telephone line or other connection to the conference).
Abstract:
A method and system for secure authentication of a user in a session conducted over an interactive communication channel, such as a two-way telephony communication channel, with an authenticating entity, such as a financial institution, utilizes a session identifier, such as pseudorandom noise to detect and identify attempts to play back authentication information, such as user-spoken phrases, intercepted and recorded by an unauthorized party during a previous session between the user and the authenticating party.
Abstract:
Human speech is transported through a voice and data converged Internet network to recognize its content, verify the ifentity of the speaker, or to verify the content of a spoken phrase by utilizing the Internet protocol to transmit voice packets. The voice data (4) entered is processed and transmitted in the same way as Internet data packets over converged voice and data IP networks. A voice-enabled application isends a message (5), which is decoded by the speech API (2) and the appriopriate control and synchronization information is issued (7) to the data preparation module (9) and to the speech engine (3). Standard voice over IP includes a speech compression algorithm and the use of RTP (Real Time Protocol), enabling additional processing of the human voice anywhere in the network to perform speaker verification, with or without the knowledge of the speaker.
Abstract:
A method for minimum supervision of an offender required to report into an electronic supervision system. The method includes pre-enrolling the offender in the electronic supervision system and assigning an authorized telephone number. A telephone call is placed by an individual from a telephone located at a remote location, the remote location telephone having an originating telephone number. The telephone call from the remote location is accepted and it is determined whether an ANI of the originating telephone number is available. If available, the ANI of the originating phone number is captured. An enrollee ID number assigned to the offender is entered. The originating telephone number is validated against the authorized telephone number assigned to the offender to verify the location of the remote telephone. It is determined whether a voice template is on file for the offender. The individual is prompted to respond to a plurality of user definable inquiries regarding the status of the offender. The identity of the individual placing the telephone call is verified using voice verification technology during the telephone call.
Abstract:
The present invention advanced voice application system takes advantage of information, or attributes, built into a telecommunications network to determine the risk that a call is a fraudulent call in a voice recognition and verification system. To achieve this end, information relating to the telecommunications network is stored in a database as various risk factors (10). Thus, depending on the type of risk factors associated with a particular call, the risk assigned to that call can be raised or lowered so that the network would not reject a valid caller even though the voice pattern of the caller does not match exactly with the prestored enrolled voice print of the caller. Such risk assessment allows the management of the network to tighten the security of the system without overburdening the caller with questions and also permits calls to be completed for valid subscribers that otherwise would have been rejected. Past calling history may be added to the database as it relates to the different risk factors so that constantly updated risk factors may be used for further assessing whether a call is to be completed.
Abstract:
Methods, systems, computer-readable media, and apparatuses for handling calls based on a voice biometric confidence score are presented. In some embodiments, a computing device may receive a voice sample associated with a telephone call. Subsequently, the computing device may determine a voice biometric confidence score based on the voice sample. The computing device then may determine to route the telephone call to a certain endpoint based on the voice biometric confidence score.