Abstract:
A method and system for adding a caller (102) in a blocked list is provided. The blocked list is stored at a communication server (104). The method includes receiving (604) a call from the caller (102) at a communication device (108). Further, the method includes receiving (606) a set of inputs at the communication device (108) in response to the call. The set of inputs includes a set of instructions to add the caller (102) in the blocked list. Furthermore, the method includes transmitting (608) a call termination request to the communication server (104). The call termination request includes the set of instructions to add the caller (102) in the blocked list. Transmission of the call termination request initiates addition of the caller (102) in the blocked list at the communication server (104).
Abstract:
The present invention refers to a method for localizing a person comprising the steps carried out in a computing system (1) : determining (20) the localization of a telecommunication means (3, 6, 8) or determining a telecommunication means (3, 6, 8) at a specific location; this can be implemented using ANI or calling number received and a database to look up address of a fixed telephone, for a cellular device, cell-ID or triangulation can be used; receiving (21) a voice utterance of a person by the telecommunications means; and verifying (22) the identity of that person based on the received voice utterance using biometric voice data (speech, speaker recognition). Further the invention relates to a corresponding system and computer readable medium.
Abstract:
The invention relates to a method of enrolling a user for purposes of authentication, the method comprising sending from a server, to a remote computing device, a multimodal markup language document that, when rendered by the remote computing device, queries the user for a user identifier and prompts the user to read an enrollment script; receiving at the server from the remote computing device the user identifier and audio obtained from the user reading the enrollment script; creating a voice print for the user from the audio; associating the voice print with the received user identifier; and storing the voice print and the user identifier.
Abstract:
Voice analysis of a subscribers' greeting is used to assist with determining a true identity of a caller. When a greeting is recorded by the subscriber (e.g., the subscriber speaks their voice as part of their default greeting, or a custom greeting for a voice mail system), the system can analyze the greeting and create a voice signature or voiceprint of the greeting. This voiceprint information can be saved in the system and associated with the subscriber. When a subscriber changes their greeting that was previously analyzed to create a voiceprint, the messaging system can optionally analyze the newly recorded greeting to create a new voiceprint for the subscriber, with the system saving the new voiceprint in the system for future recognition tasks. This voiceprint is then used to identify the true identity of a caller that leaves a voice message.
Abstract:
Systems and methods of making secure communications in a communications network comprising a user device (2) connectable to the network (12) and comprising, encryption/decryption means (8) operative after connection, a recipient device (4) is connectable to the user device via, an intermediary device (10) having an intermediary contact number and complementary encryption/decryption means (8) to the user device encryption/decryption means; in use, when the user device connects to the intermediary device using the intermediary contact number, the intermediary device securely obtains a recipient contact number and enables encrypted connection at least between the user and server (10).
Abstract:
The invention relates to a method for the control of a user's access to a service provided in a data network for the purpose of protecting user data stored in a database of the service from unauthorized access, said method comprising: Inputting a speech sample of the user into a user's data terminal in a VoIP session, said data terminal being connected at least temporarily to the data network, processing the user's speech sample in a first processing step using a dedicated client implemented in the user's data terminal for the purpose of obtaining a preprocessed speech sample or current voice profile of the user, additional processing of the preprocessed speech sample or current voice profile in a second processing step, including a comparison step of the current voice profile to an initial voice profile stored in a database, and outputting an access control signal to allow or deny access to the service, taking into account the results of the comparison step.
Abstract:
A telephonic authentication system (11), method and program product. An authentication system is provided for authenticating a user of a telephonic device that includes a setup system (12) for capturing and storing an authentic user speech pattern sample (37), a comparison system (18) that compares the authentic user speech pattern sample (37) with an inputted speech pattern sample (27) and generates a comparison result (32); and a control system (26) for controlling access to the telephonic device. The control system (26) analyzes the comparison result (32) for an initial inputted speech pattern sample (27) received when a telephone call is initiated and periodically analyzes comparison results for ongoing inputted speech pattern samples (27) received during the telephone call.
Abstract:
A method and system for identifying conference participants who dial in to a telephone conference of an electronic conference that includes a web conference is provided. To identify a conference participant, a conference system displays to a user the names of those conference participants who have not yet been associated with a telephone line of the telephone conference. The conference system plays to the user the identification announcement of a conference participant who is not yet associated with a telephone line. When the user hears the identification announcement, the user recognizes the name of the conference participant and selects the name of that conference participant from the displayed names. The conference system can then associate that conference participant with the telephone line associated with the identification announcement that was played to the user.