Abstract:
Methods and systems for monitoring, analyzing and acting upon voice calls in communication networks. An identification system receives monitored voice calls that are conducted in a communication network. Some of the monitored voice calls may be conducted by target individuals who are predefined as suspects. In order to maintain user privacy, the system selects and retains only voice calls that are suspected of being conducted by predefined targets. The techniques disclosed herein are particularly advantageous in scenarios where the network identifiers of the terminal used by the target are not known, or where the target uses public communication devices. In accordance with the disclosure, content-based identifiers such as speaker recognition or keyword matching are used.
Abstract:
Method of filtering undesirable incoming telephone calls, in which a decision to block a call or to transmit it is based both on the caller's number and on analysis of the caller's voice.
Abstract:
A conference proceeding apparatus a conference proceeding method for advancing a conference are provided. The conference proceeding apparatus includes an interface configured to receive an input, a display configured to display subjects of a conference in response to the interface receiving an input to start the conference, and a voice recognizer configured to recognize voices of participants of the conference. The conference proceeding apparatus further includes a voice-text converter configured to convert the recognized voices into texts, and a controller configured to register, in a record of the conference, the converted texts corresponding to the subjects.
Abstract:
A method of enabling speaker identification, the method comprising receiving an identifier, the identifier having a limited number of potential speakers associated with it, processing speech data received from a speaker, and when the speaker is recognized, tagging a speaker and displaying a speaker identity. The method further comprises, when the speaker is not recognized, prompting an associate to identify the speaker.
Abstract:
A method for providing data produced in a conference, in which voice signals from participants in the conference are mixed in a conference bridge, comprises provision of a time base that runs concurrently over the duration of the conference and setup of automatic identification of each participant when this participant speaks in the conference. The method also comprises capture of conversation contribution by each speaking participant to a conversation by the participants which is conducted during the conference as speaking time associated with each speaking participant at the conference, association of a time stamp with the speaking time, and production of statistical data by virtue of statistical evaluation of the speaking times of the participants.
Abstract:
Disclosed is an apparatus, system, and method to continuously authenticate a user of a mobile device. The mobile device includes a user interface, a transceiver, a microphone, and processor. The processor continuously samples a user's voice from the microphone during a call by obtaining voice snippets on a pre-defined periodic basis or on a random basis. The processor further compares the sampled voice from the microphone to a stored voice to authenticate a valid user, wherein if the sampled voice matches the stored voice for a valid user, functionality of the mobile device continues. On the other hand, if the sampled voice does not match the stored voice for a valid user, functionality of the mobile device is locked.
Abstract:
The natural biometric enrolment system describes a methodology and associated apparatus for extracting spoken biometric voiceprint data from user/enrollee such a way that the natural course of live agent verification is used to mask what has typically been an automated interactive voice response task. The natural biometric enrolment system also provide the capability to synchronize agent location and agent identification such that tradition CTI systems integration is not required; this being achieved with a bidirectional and dual verification process wherein both agent and caller voiceprints are matched in a common database and software control is used to match the telephone caller with an enrolment and verification widget located at the agent desktop. Further, such an enrollment/verification widget can be used by the agent to make human judgment notations in that cause the system to a) have better scoring for enrolment and verification; b) record notations reflecting the live agent confidence regarding the user's validity, or c) trigger a PIN reset for fraudulent callers in native or third party systems.
Abstract:
Fraudulent callers that masquerade as legitimate callers in order to discover details of bank accounts or other accounts are an increasing problem. In order to detect possible fraudsters and preventing them from obtaining such details a method and system is proposed that transform the recorded speech of a batch of incoming calls to strings of phonemes or text. Thereafter similar speech patterns, such as distinct similar phrases or wording, in the recorded speech are determined and calls having similar speech patterns, and preferably also similar acoustic properties, are grouped together and identified as being from the same fraudulent caller. Transactions initiated by the fraudulent caller can as a result be stopped and preferably a voiceprint of the fraudulent caller's speech is generated and stored in a database for further use.