Abstract:
A system, device, and method for generating an audio output includes a master computing device and a plurality of client computing devices. Each client computing device includes a microphone to record audio signals. The client computing devices generate audio data based on the audio signals and transmit the audio data to the master computing device. The master computing device generates a final, higher quality audio output as a function of the audio data received from collection of participating the client computing devices.
Abstract:
Methods and devices are provided for identifying a caller after receiving a missed call from a calling device (502) that is not associated with the caller. An exemplary method involves obtaining (204) an audio message from the caller, recognizing (208) the caller as being a first contact of the called individual by matching (206) an audio sample associated with the first contact to at least a portion of the audio message, and graphically indicating (210) an association between the first contact and the missed call after recognizing the first contact as the caller.
Abstract:
Fraudulent callers that masquerade as legitimate callers in order to discover details of bank accounts or other accounts are an increasing problem. In order to detect possible fraudsters and preventing them from obtaining such details a method and system is proposed that transform the recorded speech of a batch of incoming calls to strings of phonemes or text. Thereafter similar speech patterns, such as distinct similar phrases or wording, in the recorded speech are determined and calls having similar speech patterns, and preferably also similar acoustic properties, are grouped together and identified as being from the same fraudulent caller. Transactions initiated by the fraudulent caller can as a result be stopped and preferably a voiceprint of the fraudulent caller's speech is generated and stored in a database for further use.
Abstract:
A system is presented for logging and recording a call to a call network. The system comprises a voice print logic for generating a voice print of a caller who is making a call to a call network. A telecom routing switch generates a correlated telecom router switch log file by appending the voice print of the caller to a telecom router switch log file for the call. A telecom software system generates a correlated telecom software system log file by appending the voice print of the caller to a telecom software system log file for the call. A contact center agent generates a correlated contact center agent log file by appending the voice print of the caller to a contact center agent log file for the call. The voice print is utilized to retrieve and to consolidate the correlated telecom router switch log file, the correlated telecom software system log file, and the correlated contact center agent log file into a single correlated file for the call.
Abstract:
The present invention refers to a method for localizing a person comprising the steps carried out in a computing system (1) : determining (20) the localization of a telecommunication means (3, 6, 8) or determining a telecommunication means (3, 6, 8) at a specific location; this can be implemented using ANI or calling number received and a database to look up address of a fixed telephone, for a cellular device, cell-ID or triangulation can be used; receiving (21) a voice utterance of a person by the telecommunications means; and verifying (22) the identity of that person based on the received voice utterance using biometric voice data (speech, speaker recognition). Further the invention relates to a corresponding system and computer readable medium.
Abstract:
A method and system for adding a caller (102) in a blocked list is provided. The blocked list is stored at a communication server (104). The method includes receiving (604) a call from the caller (102) at a communication device (108). Further, the method includes receiving (606) a set of inputs at the communication device (108) in response to the call. The set of inputs includes a set of instructions to add the caller (102) in the blocked list. Furthermore, the method includes transmitting (608) a call termination request to the communication server (104). The call termination request includes the set of instructions to add the caller (102) in the blocked list. Transmission of the call termination request initiates addition of the caller (102) in the blocked list at the communication server (104).
Abstract:
The invention relates to a method for the control of a user's access to a service provided in a data network for the purpose of protecting user data stored in a database of the service from unauthorized access, said method comprising: Inputting a speech sample of the user into a user's data terminal in a VoIP session, said data terminal being connected at least temporarily to the data network, processing the user's speech sample in a first processing step using a dedicated client implemented in the user's data terminal for the purpose of obtaining a preprocessed speech sample or current voice profile of the user, additional processing of the preprocessed speech sample or current voice profile in a second processing step, including a comparison step of the current voice profile to an initial voice profile stored in a database, and outputting an access control signal to allow or deny access to the service, taking into account the results of the comparison step.
Abstract:
A method and system for identifying conference participants who dial in to a telephone conference of an electronic conference that includes a web conference is provided. To identify a conference participant, a conference system displays to a user the names of those conference participants who have not yet been associated with a telephone line of the telephone conference. The conference system plays to the user the identification announcement of a conference participant who is not yet associated with a telephone line. When the user hears the identification announcement, the user recognizes the name of the conference participant and selects the name of that conference participant from the displayed names. The conference system can then associate that conference participant with the telephone line associated with the identification announcement that was played to the user.
Abstract:
Digitales Verfahren zur Authentifizierung eines Nutzers eines Telekommunikations- bzw. Datennetzes für einen Zugriff zu geschützten Daten oder einer einem definierten Nutzerkreis vorbehaltenen Leistung oder für die Verwendung aktuell durch den Nutzer eingegebener Daten, wobei eine aktuell bei einem Zugriffs-Versuch durch den Nutzer an einem Telekommunikations- oder VoIP-Endgerät eingesprochene Sprachprobe einer Stimmanalyseeinrichtung zugeführt und hierin ein aktuelles Stimmprofil errechnet und dieses in einer Stimmprofil-Vergleichereinheit mit einem vorgespeicherten initialen Stimmprofil verglichen und im Ansprechen auf ein positives Vergleichsergebnis der Nutzer authentifiziert und ein den Zugriff freigebendes erstes Steuersignal, jedoch im Ansprechen auf ein negatives Vergleichsergebnis ein den Zugriff sperrendes oder eine Ersatz-Authentifizierungsprozedur triggerndes zweites Steuersignal erzeugt wird.