Abstract:
Techniques and systems for recalling voicemail messages from remote voicemail systems are disclosed. In one embodiment, a method for recalling a voicemail message from a target mailbox can include: accessing a voicemail system by a caller using a device; authenticating the caller using speaker verification; and deleting the voicemail message from the target mailbox. The target mailbox owner can be a member of the voicemail system, while the caller can be a non-member of that voicemail system. The device may be configured to support a telephony user interface (TUI), for example.
Abstract:
Die Erfindung betrifft die gesteuerte Verifizierung der angenommenen Identität eines Nutzers bzw. rufenden und/oder gerufenen Teilnehmers (8), der über ein Kommunikationsendgerät mit einem Telekommunikationsnetz verbunden ist, anhand wenigstens eines biometrischen Merkmals zur Verbindung des Teilnehmers mit einem Kommunikationssystem (7), das wenigstens einen authentisierungspflichtigen Kommunikationsdienst aus einer Anzahl von authentisierungspflichtigen Kommunikationsdiensten mit unterschiedlichen Sicherheitsanforderungen unterstützt. Bei der Durchführung der Teilnehmerauthentisierung für den angefragten Kommunikationsdienst wird hierzu ein für die Identitätskennung initialisierend zugeordneter und gespeicherter biometrische Abdruck (20a, 20b, 20c) zur Teilnehmerauthentisierung der Anzahl von authentisierungspflichtigen Kommunikationsdiensten oder ein für die Identitätskennung nachfolgend zugeordneter und gespeicherter, adaptierter biometrischer Abdruck (20a, 20b, 21c, 22c) zur Teilnehmerauthentisierung zumindest für den angefragten Kommunikationsdienst mit wenigstens einem Merkmal einer aktuellen Merkmalsstruktur des Teilnehmers verglichen, bei Erreichen eines ersten Grenzwertes (11a, 11b, ..., 11e) wird die Identifizierung des Teilnehmers (8) für den angefragten Kommunikationsdienst verifiziert, und bei Erreichen eines zweiten Grenzwertes (16, 11a, 11b, ..., 11e) wird ein adaptierter biometrischer Abdruck berechnet (14b) und für die Identitätskennung zur Teilnehmerauthentisierung zumindest für den angefragten Kommunikationsdienst zugeordnet und gespeichert (14d).
Abstract:
The invention relates to a method for authorizing a telephone transaction and particularly access to a database by a user in a telecommunication network, said telecommunication network comprising a user interface, an access control for the database, and an authentication device which are interconnected in the telecommunication network via a switching node, and a corresponding switching node. The invention is characterized in that the result of the comparison is output to the access control by the authentication device via the switching node, and the result of the comparison is communicated to the user by the access control via the switching node, signals being blanked out by the authentication device.
Abstract:
Authentication of voice message recipient network addresses employs generating (102) and storing (104) a "network file" that includes "voice clips" and associated network addresses that are extracted from voice messages received across a network (10) from voice message systems (16, 18). A voice clip is the first one to three seconds of voice extracted from each received voice message. Over time, the network file will grow to contain multiple voice clips and associated network voice message addresses. When a voice message originator subsequently enters a recipient's network address (106), the originating voice message system searches (114) the network file for the network address, retrieves the associated voice clip (116), and plays it for the voice message originator to authenticate the recipient's network address. Voice authentication of a voice message originator entails encoding (134) into a "voice print file", original voice clips and associated network addresses received from positively identified voice message originators. Thereafter, when a questionable voice message is received (138), the voice message system extracts a new voice clip (142), generates a new voice print (144), and compares it with the original voice print associated with the voice message address (148). If the voice prints are substantially the same, the received voice message is annotated with an "authenticating" message (150).
Abstract:
Authentication of voice message recipient network addresses employs generating (102) and storing (104) a 'network file' that includes 'voice clips' and associated network addresses that are extracted from voice messages received across a network (10) from voice message systems (16, 18). A voice clip is the first one to three seconds of voice extracted from each received voice message. Over time, the network file will grow to contain multiple voice clips and associated network voice message addresses. When a voice message originator subsequently enters a recipient's network address (106), the originating voice message system searches (114) the network file for the network address, retrieves the associated voice clip (116), and plays it for the voice message originator to authenticate the recipient's network address. Voice authentication of a voice message originator entails encoding (134) into a 'voice print file', original voice clips and associated network addresses received from positively identified voice message originators. Thereafter, when a questionable voice message is received (138), the voice message system extracts a new voice clip (142), generates a new voice print (144), and compares it with the original voice print associated with the voice message address (148). If the voice prints are substantially the same, the received voice message is annotated with an 'authenticating' message (150).
Abstract:
Upon detecting an utterance period by a state decision part 14, a sound source position detecting part 15 detects the positions of sound sources 9 1 to 9 K are detected by a sound source position detecting part 15, then covariance matrix of acquired signals are calculated by a covariance matrix calculating part 18 in correspondence to the respective sound sources, and stored in a covariance matrix storage part 18 in correspondence to the respective sound sources. The acquired sound level for each sound source is estimated by an acquired sound level estimating part 19 from the stored covariance matrix, and filter coefficients are determined by a filter coefficient calculating part 21 from the estimated acquired sound levels and the covariance matrices, and the filter coefficients are set in filters 12 1 to 12 M . Acquired signals from the respective microphones are filtered by the filters, then the filtered outputs are added together by an adder 13, and the added output is provided as a send signal; by this, it is possible to generate send signals of desired levels irrespective of the positions of sound sources.
Abstract:
A system is provided for the automatic detection of fraudulent activity on a transaction network, wherein each transaction has an associated identifier. The system includes voice comparison means (32) for comparing a first sampled voice of a user of a first transaction with a subsequently sampled voice of a user of a subsequent transaction having an identical identifier to that of the first transaction. Control means in the form of a fraud detection engine (26) is provided for determining, from said comparison, a profile of user usage that is representative of a total number of different users of the associated identifier. The fraud detection engine is configured to compare the profile of user usage with a threshold for fraudulent use, and to generate a fraud condition signal (40) in the event that the profile exceeds said threshold. If required, the fraud condition signal may be provided to automatically terminate the fraudulent transaction.
Abstract:
A process for collecting the identity of a telephone caller is disclosed. In one embodiment, a personalized Context Free Grammar (CFG)(212) is created for each potential call recipient (210), and is configured to support identification of incoming callers utilizing voice recognition. Each CFG (212) incorporates an indication of high probability callers and probability weights in each CFG are altered accordingly. When a recipient (210) receives a call (202), the relevant CFG (212) is applied in association with a voice recognition application (222) to enable at least a preliminary identification of the caller. In accordance with another embodiment, the caller confirms identifications. In accordance with one embodiment, standard caller-ID functionality (224) is utilized if possible at least to assist in the caller identification process. In accordance with still another embodiment, voice recognition enhanced caller identification is utilized to provide intelligent call routing functionality (226).
Abstract:
A method of conducting a conference call, comprising: identifying a user (2) of a first communication unit (12) speaking during the conference call; transmitting data related to the identified speaker (2) to other communication units (14, 16, 28) being used by other users (4, 6, 8) participating in the conference call; the communication units (14, 16, 18) receiving the data related to the identified speaker (2) and displaying speaker data based on the received data related to the identified speaker (2). The speaker (2) may be identified by comparing the speech being spoken by the user with a voice profile for that user. Also described is a corresponding communication system, a caller identification module (21), and adapted communication units (12, 14, 16, 18).