Abstract:
A technique for verifying a user's voice prior to permitting the user to conduct a business transaction over a data network is disclosed. An order is received via the data network, and a voice verification unit is contacted to (i) access a prestored voice print, (ii) obtain a present voice sample from the consumer desiring the transaction and compare said present voice sample to the prestored voice sample, and (iii) issue a signal indicating whether or not the voice correctly verifies or not.
Abstract:
A method and apparatus for recording and indexing audio information exchanged during an audio conference call, or video, audio and data information exchanged during a multimedia conference. For a multimedia conference, the method and apparatus utilize the voice activated switching functionality of a multipoint control unit (MCU) (26) to provide a video signal, which is input to the MCU (26) from a workstation from which an audio signal is detected, to each of the other workstations participating in the conference. A workstation and/or participant-identifying signal generated by the multipoint control unit (26) is stored, together or in correspondence with the audio signal and video information, for subsequent ready retrieval of the stored multimedia information. For an audio conference, a computer (32') is connected to an audio bridge (44) for recording the audio information along with an identification signal for correlating each conference participant with that participant's statements.
Abstract:
Video-assisted presence detection is used to enhance a user experience in telephony communications. Image data, video data, or both, from a camera are used to determine whether a user is present at their device before a call is transferred to him or her. The video-assisted presence detection can be implemented based on a privacy setting. For example, one implementation allows a system to have partial access to a detector to detect user presence without capturing facial information, and without identifying that person. Another implementation allows the system to have partial access to the detector to detect user presence without having access to a video feed of the detector.
Abstract:
A method for determining potentially undesirable voices, in embodiments, includes: receiving audio recordings comprising voices associated with undesirable activity, and determining audio components of each of the audio recordings. The method may further comprise generating a multi-dimensional vector of the audio components for each of the plurality of audio recordings, and comparing audio components between the multi-dimensional vectors to determine clusters of multi-dimensional vectors, each cluster comprising two or more of the multi-dimensional vectors of audio components, wherein each cluster corresponds to a blacklisted voice. The method may further comprise receiving an audio recording or audio stream, and determining whether the audio recording or audio stream is associated with a voice associated with undesirable activity based on a comparison to the clusters.
Abstract:
A system for detecting inmate to inmate conference calls in a correctional facility is disclosed herein. The system includes a database and a conference call detection server, wherein the conference call detection server is configured to monitor a plurality of inmate communications, convert an audio signal of each inmate communication to a frequency domain signal, identify frequency data comprising one or more frequency peaks and corresponding frequency values in the frequency domain signal for each inmate communication, generate a record comprising the frequency data for each inmate communication, resulting in a plurality of records, store the plurality of records in the database, detect an inmate to inmate conference call by matching a frequency subset of a new inmate communication with frequency data in a detected record in the database, and verify the inmate to inmate conference call by matching audio with voice biometric samples.
Abstract:
A system and method for providing call sessions between personal communication devices (PCDs) of sender users and recipient users are described. The system includes one or more voice communication domains (VCDs) interacting with each other, and a cross-domain coordinator configured to coordinate interaction between the voice communication domains over the Global Communication Network. Each VCD includes PCDs associated with the corresponding users, and a voice communication server (VCS) deployed within the voice communication domain. The VCS is configured to control operation of the PCDs verbally by user voice commands, and to provide call sessions between a sender user and a recipient user within the same voice communication domain and between the users of different voice communication domains. Initiation of the call sessions can be carried out either by voice commands to the VCS of the system, or by delivering a voice call proposal of the caller user for voice communication directly to the recipient in a natural manner.
Abstract:
Techniques described herein include receiving, authorizing, and processing voice commands to control computing devices and perform various device capabilities. In some examples, a user computing device may implement voice command functionality using multiple independent components, with shared security credentials established between different combinations of components. An intermediate voice authorization component may receive and compare voice input data received from a user interface component with voice template data stored securely by a voice data component, to protect against a component becoming compromised by malware or exposure to an untrusted system. Voice commands may be used to execute, disable, or enable various capabilities on the user device, including different device applications and features, and may be authorized by different users with various security and authorization techniques.
Abstract:
A system and method may identify a fraud ring based on call or interaction data by analyzing by a computer processor interaction data including audio recordings to identify clusters of interactions which are suspected of involving fraud each cluster including the same speaker; analyzing by the computer processor the clusters, in combination with metadata associated with the interaction data, to identify fraud rings, each fraud ring describing a plurality of different speakers, each fraud ring defined by a set of speakers and a set of metadata corresponding to interactions including that speaker; and for each fraud ring, creating a relevance value defining the relative relevance of the fraud ring.
Abstract:
A server transmits a task to client devices using push-to-talk (PTT). The server receives a response accepting the task from a device of the client devices. The server assigns the task to a user of the device. The server transmits an indication that the task was assigned to the user of the device to at least a subset of the client devices.
Abstract:
Controlled-environment communication systems are increasingly using voice over internet protocol (VoIP) to serve their users. VoIP allows voice to be sent in packetized form, where audio is encoded using one of several codecs. Because of bandwidth constraints, particularly during peak call times, codecs may be used which sacrifice audio quality for bandwidth efficiency. As a result, several features of communication systems, including critical security features. The present disclosure provides details for systems and methods by which a controlled-environment communication system may shift between codecs to perform security-related features or to alleviate bandwidth considerations. This involves the special formatting of control-signaling messages, including session initiation protocol (SIP) and session description protocol (SDP) messaging.