Class / Patent application number | Description | Number of patent applications / Date published |
379880020 | Voice verification (e.g., voice authorization, voiceprint, etc.) | 73 |
20080273673 | HANDLING OF TELEPHONE CALLS - A method of handling an incoming call from a first communication device addressed to a second communication device, the first and second communication devices being operative in a communication network, wherein the second communication device or the communication network comprises an answering unit. The answering unit includes a privacy data unit comprising a privacy code message for bypassing the answering unit. The method comprises receiving, by means of the answering unit, the incoming call intended for and addressed to the second communication device. Furthermore, the method comprises determining whether also a code message is received by the answering unit. If so, the method comprises comparing the received code message with the privacy code message stored in the privacy data unit to determine whether the incoming call should bypass the answering unit and, thereby, be directly forwarded to the second communication device being addressed by the first communication device in the incoming call. Thereby, a user of the second communication device may be permitted to intercept the incoming call from the calling first communication device. | 11-06-2008 |
20080279347 | DESTINATION DEVICE BILLING ACCORDING TO CALL RECIPIENT - A method, system, and program for billing for service provided to destination device according to the calling plan of the individual receiving the call. An authenticated identity for a callee answering a call placed to a destination device is received at an intermediary device. The intermediary device then accesses a billing plan for the authenticated identity of the callee and loads the billing plan for specifying charges for the call, such that telephone service billed to the callee is accessible at multiple destination devices. | 11-13-2008 |
20080317220 | System and method for encrypting interactive voice response application information - Encrypting sensitive information sent using an interactive voice response (IVR) system. The systems and methods may include an HSM that provides a secure platform to encrypt the sensitive information. They may also include interfaces with IVR systems and transaction processing hosts. The systems and methods may interact directly with a customer using an IVR to receive the sensitive information. They may also provide for a secure platform to validate the strength of the information, such as a PIN or password, prior to further processing of the sensitive information. | 12-25-2008 |
20090052635 | Method for Accessing Data Via Voice - A method for providing access to data via a voice interface. In one embodiment, the system includes a voice recognition unit and a speech processing server that work together to enable users to interact with the system using voice commands guided by navigation context sensitive voice prompts, and provide user-requested data in a verbalized format back to the users. Digitized voice waveform data are processed to determine the voice commands of the user. The system also uses a “grammar” that enables users to retrieve data using intuitive natural language speech queries. In response to such a query, a corresponding data query is generated by the system to retrieve one or more data sets corresponding to the query. The user is then enabled to browse the data that are returned through voice command navigation, wherein the system “reads” the data back to the user using text-to-speech (TTS) conversion and system prompts. | 02-26-2009 |
20090080623 | SERVICE FOR PROVIDING SPEAKER VOICE METRICS - A method of providing voice metrics over an established telephone call between a user and a subscriber can include receiving voice information from the user over the call and determining biometric information from the voice information for the user. The method further can include encoding the biometric metric information and sending the biometric information to the subscriber over the call. | 03-26-2009 |
20090175424 | METHOD FOR PROVIDING SERVICE FOR USER - A voice-based classification method authenticates a user for a service which is reserved for a predetermined user group and is provided via a communication link in response to a request received from the user over a first communication link in an access control unit for access to the service. Over a second communication link a voice connection between the user and a speech processing unit is established. In the speech processing unit the voice of the user is recorded using a speech sample and at least a first criterion is checked, with the first criterion being fulfilled if the user is assigned to the predetermined user group. An age and or gender classification method may be used, with the predetermined user group being specified by its age and its gender. The service may be Internet-based, for example a chat room, in which persons of a specific age group interact. | 07-09-2009 |
20090214004 | TRACKING INDIVIDUALS USING VOICE VERIFICATION - A method for tracking the location of an individual can include selecting a first audio clip from a plurality of audio clips, wherein each audio clip comprises a different question for the individual and wherein a correct answer corresponds to each audio clip. The method can further include initiating a telephone call to a telephone of the individual at a desired location and playing the first audio clip for the individual via the telephone call. The method can further include receiving an oral response to the first audio clip from the individual via the telephone call and executing a speech recognition process upon the oral response. The method can further include comparing the oral response to a voice print of the individual and storing a record indicating that the individual is compliant if the oral response matches the correct answer and the oral response matches the voice print. | 08-27-2009 |
20090252304 | Communications methods and systems using voiceprints - In communications systems where multiple users may be associated with the same account, the voiceprint of a user is used to identify a profile of the user, facilitating identification of the user's preferences without requesting additional information from the user. The system may also monitor messages played to individual users, to control the playing of the messages to users. Calls made by users associated with the same account may be allocated to the caller initiating the call in bills, based on voiceprints. Voiceprints may be collected for use in deriving voiceprint samples during registration of a user with the system and during conversations between the user and the system. A voiceprint comparison threshold may be set based on the type of phone calling the system, to compensate for noise. Changes in phone numbers and/or addresses of users are monitored and the threshold is adjusted if changes are found. | 10-08-2009 |
20090268882 | OUTBOUND DIALOGUE SYSTEM AND DIALOGUE OPERATION METHOD - A dialogue system and a speech dialogue operation method are provided. In the system, an inquiry speech signal is generated according to data for specific person and is transferred to a receiver. In response to the inquiry speech signal, a reply speech signal is generated by the receiver, and after the reply speech signal is recognized, a speech correspondence signal is obtained. A ID recognition procedure is performed according to the speech correspondence signal, and a dialogue control signal is generated according to the result of the ID recognition procedure, and accordingly, a response speech signal is generated and transferred to the receiver to continue or terminate the dialogue. When the receiver is recognized to be matched with the specific person, a message delivering procedure is performed to deliver a message to be transferred to the specific person to the receiver. | 10-29-2009 |
20090323906 | SECURE VOICE TRANSACTION METHOD AND SYSTEM - A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing password/passphrase and a pre-recorded voice sample associated with the user. The computing system prompts the user to enter a password/passphrase using speech. The computing system receives speech data comprising a first password/passphrase from the user. The computing system converts the speech data to text data. The computing system first compares the text data to the first password/passphrase and determines a match. The computing system compares the speech data to the pre-recorded voice sample to determine a result indicating whether a frequency spectrum associated with the speech data matches a frequency spectrum associated with the pre-recorded voice sample. The computing system transmits the result to the user. | 12-31-2009 |
20100054429 | VOICE PHONE-BASED METHOD AND SYSTEM TO AUTHENTICATE USERS - Provided is a method and a telephone-based system with voice-verification capabilities that enable a user to safely and securely conduct transactions with his or her online financial transaction program account over the phone in a convenient and user-friendly fashion, without having to depend on an internet connection. | 03-04-2010 |
20100074420 | PHONE CALL MANAGEMENT - A method of operating a phone is provided and includes receiving input to set a phone in a do-not disturb mode and to set a time period during which the do-not-disturb mode is activated and setting the phone accordingly, upon reception of an incoming call from a caller during the time period, activating a caller ID function of the phone, detecting a caller ID of the caller and searching for the caller ID in black- and white-lists. In an event the caller ID of the caller is stored in the blacklist, the voicemail function is activated or the incoming call is ended. In an event the caller ID of the caller is stored in the whitelist, an input of the password associated with the caller ID is requested, and, in an event the caller inputs the password, the ringing function is activated. | 03-25-2010 |
20100091953 | AUTHENTICATION OF A USER TO A TELEPHONIC COMMUNICATION DEVICE - The invention provides a method, system, and program product for authenticating a user to a telephonic communication device. In one embodiment, the invention includes obtaining a reference sample of an authorized user's voice, storing the reference sample of the authorized user's voice, collecting a sample of the voice of a user of the telephonic communication device, comparing the sample of the voice of the user to the reference sample of the authorized user's voice, determining whether the user is the authorized user, and in the case that the user is determined not to be the authorized user, prohibiting use of the telephonic communication device. | 04-15-2010 |
20100150321 | SYSTEM AND METHOD FOR VOICE ACTIVATED DIALING FROM A HOME PHONE - A system and method for remotely enabled voice activated dialing. Generation of a special dial tone indicating that a user may give the voice identifier is initiated. A voice identifier is received over a network from a wired telephone utilized by a user. Dialing information associated with the voice identifier is determined. One or more receiving parties associated with the voice identifier are dialed. The wired telephone is connected to the one or more receiving parties. | 06-17-2010 |
20100158206 | PERFORMING HUMAN CLIENT VERIFICATION OVER A VOICE INTERFACE - Methods and apparatus, including computer program products, implementing and using techniques for verifying incoming telephone calls to a telephone services subscriber. An incoming telephone call from a caller is received. A time variable including one or more of a current date, a day-of-week, and a time-of-day is determined. One or more challenge questions is selected from a pre-defined schedule, in response to determining the time variable. The schedule includes challenge questions for different time variables. The caller is subjected to the one or more challenge questions. At least one challenge response to one or more of the selected challenge questions is received. It is determined whether the at least one challenge response was an expected correct response. If the at least one challenge response was correct, an action is taken with respect to the incoming telephone call. | 06-24-2010 |
20100158207 | SYSTEM AND METHOD FOR VERIFYING THE IDENTITY OF A USER BY VOICEPRINT ANALYSIS - A distributed voice application execution environment system conducts a voiceprint analysis when a user initially begins to interact with the system. If the system is able to identify the user through a voiceprint analysis, the system immediately begins to interact with the user utilizing voice applications which have been customized for that user. | 06-24-2010 |
20100158208 | SYSTEM AND METHOD FOR CONNECTING A USER TO BUSINESS SERVICES - A system and method for connecting a user to business services monitors all attempts by the user to place outgoing telephone calls. When a user is attempting to place a call to a business, the system checks to see if the business has created a voice application that could be performed for the user. If so, the business' voice application is performed for the user on the user's local device, instead of connecting the user to the business' customer service line. If no voice application is available for the user, then the system connects the user to the business' customer service line, either through a telephone network, or through a data network connection. | 06-24-2010 |
20100166157 | System and Method for Indexing Voice Mail Messages By Speaker - The invention provides a system and method for indexing and organizing voice mail message by the speaker of the message. One or more speaker models are created from voice mail messages received. As additional messages are left, each of the new messages are compared with existing speaker models to determine the identity of the callers of each of the new messages. The voice mail messages are organized within a user's mailbox by caller. Unknown callers may be identified and tagged by the user and then used to create new speaker models and/or update existing speaker models. | 07-01-2010 |
20100278317 | SPEAKER RECOGNITION IN A MULTI-SPEAKER ENVIRONMENT AND COMPARISON OF SEVERAL VOICE PRINTS TO MANY - One-to-many comparisons of callers' voice prints with known voice prints to identify any matches between them. When a customer communicates with a particular entity, such as a customer service center, the system makes a recording of the real-time call including both the customer's and agent's voices. The system segments the recording to extract at least a portion of the customer's voice to create a customer voice print, and it formats the segmented voice print for network transmission to a server. The server compares the customer's voice print with multiple known voice prints to determine any matches, meaning that the customer's voice print and one of the known voice prints are likely from the same person. The identification of any matches can be used for a variety of purposes, such as determining whether to authorize a transaction requested by the customer. | 11-04-2010 |
20100316198 | CALLER RECOGNITION BY VOICE MESSAGING SYSTEM - Voice analysis of a subscribers' greeting is used to assist with determining a true identity of a caller. When a greeting is recorded by the subscriber (e.g., the subscriber speaks their voice as part of their default greeting, or a custom greeting for a voice mail system), the system can analyze the greeting and create a voice signature or voiceprint of the greeting. This voiceprint information can be saved in the system and associated with the subscriber. When a subscriber changes their greeting that was previously analyzed to create a voiceprint, the messaging system can optionally analyze the newly recorded greeting to create a new voiceprint for the subscriber, with the system saving the new voiceprint in the system for future recognition tasks. This voiceprint is then used to identify the true identity of a caller that leaves a voice message. | 12-16-2010 |
20110002450 | Personalized Caller Identification - This disclosure relates to different systems and methods of indicating a caller identity, e.g. using the caller's voice. | 01-06-2011 |
20110026688 | AUTOMATED PASSCODE RECOVERY IN AN INTERACTIVE VOICE RESPONSE SYSTEM - The preferred embodiments of the present invention include providing automated passcode recovery in an interactive voice response system by providing to a caller an automated passcode recovery question and processing a caller answer to the automated passcode recovery question to authenticate the caller. | 02-03-2011 |
20110044432 | DYNAMIC CONTROL OF VOICE MAIL DELIVERY SEQUENCE - A user of a conversational biometrics based voice mail system sets a user profile of the user that defines one or more biometric parameters of received voice mail intended for the user. A conversational biometrics device analyzes the voice mail in accordance with the one or more biometric parameters of the user profile set by the user and generates a biometric analysis result of the voice mail. The conversational biometrics device assigns a priority for delivery of the voice mail compared with a plurality of voice mails received by the conversational biometrics based voice mail system in accordance with the biometric analysis result and places the voice mail in a sequence in a delivery queue determined by the assigned priority. The delivery queue of the conversational biometrics based voice mail system delivering the voice mail to the user in the sequence determined by the assigned priority. | 02-24-2011 |
20110044433 | METHOD OF GENERATING A TEMPORARILY LIMITED AND/OR USAGE LIMITED MEANS AND/OR STATUS, METHOD OF OBTAINING A TEMPORARILY LIMITED AND/OR USAGE LIMITED MEANS AND/OR STATUS, CORRESPONDING SYSTEM AND COMPUTER READABLE MEDIUM - The invention refers to a method of generating a means and/or status which is temporarily limited and/or usage limited and allows access to a service which has access restrictions, the method being carried out in a computing system and comprising the steps of establishing a telecommunications connection such that an audio call as for example a telephone call, within the telecommunications connection is preferably initiated by a person; determining biometric data of a specific person such as for example voice information; receiving data such as a voice utterance from the person which is connected by the telecommunications connection; verifying that the received data and the determined biometric data fit; and generating the means and/or status which is temporarily limited and/or usage limited after the verifying step. | 02-24-2011 |
20110051907 | VERIFICATION OF USER PRESENCE DURING AN INTERACTIVE VOICE RESPONSE SYSTEM SESSION - In those transactions requiring the approval of two or more users, users can perform verification of identity and then completion of desired transaction using an IVR system. The combination of two or more user voice prints previously collected during an enrollment phase can be used for verification of parties to the transaction. During a subsequent verification phase of the IVR system, the users can speak their own password phase when prompted to do so during a defined period of time and the IVR system captures them in a captured mixed voice print. Verification can then be provided by comparing the captured mixed voice print with a joined voice reference model built from stored voice reference models. | 03-03-2011 |
20110091020 | CORRELATING CALL LOG FILES USING VOICE PRINTS - A system is presented for logging and recording a call to a call network. The system comprises a voice print logic for generating a voice print of a caller who is making a call to a call network. A telecom routing switch generates a correlated telecom router switch log file by appending the voice print of the caller to a telecom router switch log file for the call. A telecom software system generates a correlated telecom software system log file by appending the voice print of the caller to a telecom software system log file for the call. A contact center agent generates a correlated contact center agent log file by appending the voice print of the caller to a contact center agent log file for the call. The voice print is utilized to retrieve and to consolidate the correlated telecom router switch log file, the correlated telecom software system log file, and the correlated contact center agent log file into a single correlated file for the call. | 04-21-2011 |
20110286584 | Certified Communications System and Method - The certification system and method acquires, records and then authenticates a voice communication between communicating parties by a service provider in a telecommunication system. The system acquires, maintains custody over, controls access to, and permits modification, supplementation and deletion of recorded communications session, and distributes a reproduction of an authenticated recording. The authenticated record includes the authenticated identity AU-ID of the parties which is ascertained and documented at the time of acquisition, upon any access, modification or supplementation to the recording and at the time of authentication. AU-ID is adjunct data to the recording. The supplemented recording may include a translation, a transcription and an emotional characteristic. | 11-24-2011 |
20110286585 | Telecommunication Call Management And Monitoring System With Voiceprint Verification - A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party. | 11-24-2011 |
20120002793 | AUTOMATED TELEPHONE ATTENDANT - A telephony system ( | 01-05-2012 |
20120134478 | SPEAKER RECOGNITION IN A MULTI-SPEAKER ENVIRONMENT AND COMPARISON OF SEVERAL VOICE PRINTS TO MANY - One-to-many comparisons of callers' voice prints with known voice prints to identify any matches between them. When a customer communicates with a particular entity, such as a customer service center, the system makes a recording of the real-time call including both the customers and agent's voices. The system segments the recording to extract at least a portion of the customer's voice to create a customer voice print, and it formats the segmented voice print for network transmission to a server. The server compares the customer's voice print with multiple known voice prints to determine any matches, meaning that the customer's voice print and one of the known voice prints are likely from the same person. The identification of any matches can be used for a variety of purposes, such as determining whether to authorize a transaction requested by the customer. | 05-31-2012 |
20120134479 | RETRIEVING A VOICE PRINT OF A CALLER - A processor-implemented method, system, and/or computer program product retrieves a voice print of a caller to a call network. A processor generates a first voice print, a second voice print, and a third voice print of a caller who makes a call to a call network. The first voice print, the second voice print, and the third voice print are consolidated into a consolidated voice print. In response to a request for a particular voice print, the requested voice print is selectively retrieved from first voice print, the second voice print, and the third voice print in the consolidated voice print, and then sent to the requester. | 05-31-2012 |
20120155621 | TELEPHONE TO COMPUTATIONAL DEVICE ASSOCIATION - The present invention allows for dynamic association of a computational device, such as a personal computer or personal digital assistant, with a telephone terminal. A computer-telephone adaptor or like function implemented in a telephony switch or other telephony device will receive authentication indicia. The authentication indicia may be provided by the computational device that is to be associated with the telephone terminal, or through other means. The authentication indicia may be provided by a user or generated by the computational device or by other means. To confirm the association, the user must enter confirmatory authentication indicia corresponding to the original authentication indicia through the telephone terminal. | 06-21-2012 |
20120207287 | SECURE VOICE TRANSACTION METHOD AND SYSTEM - A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing password/passphrase and a pre-recorded voice sample associated with the user. The computing system prompts the user to enter a password/passphrase using speech. The computing system receives speech data comprising a first password/passphrase from the user. The computing system converts the speech data to text data. The computing system first compares the text data to the first password/passphrase and determines a match. The computing system compares the speech data to the pre-recorded voice sample to determine a result indicating whether a frequency spectrum associated with the speech data matches a frequency spectrum associated with the pre-recorded voice sample. The computing system transmits the result to the user. | 08-16-2012 |
20120219125 | Embedded Biometrics in Telecommunication Devices for Feature Extraction and Context Identification - A method, a system and a computer program product for determining one or more characteristics of a caller, utilizing the biometric characteristics of the caller. One or more biometric characteristics are detected when a request to place an outgoing call to one or more destinations is received at a first telecommunication device. When the request to place an outgoing call is a verbal request, one or more biometric voice samples are obtained. The biometric voice samples comprise the biometric characteristics of the caller. The biometric characteristics are extracted from the biometric voice samples, encoded into a datagram, and transmitted from the first telecommunication device to the outgoing call destination (i.e. a second telecommunication device). When the biometric characteristics are analyzed at the second telecommunication device, a display is generated depicting the mood, gender, age, urgency or other characteristics of the caller associated with the incoming call. | 08-30-2012 |
20130022180 | VOICE PHONE-BASED METHOD AND SYSTEM TO AUTHENTICATE USERS - Provided is a method and a telephone-based system with voice-verification capabilities that enable a user to safely and securely conduct transactions with his or her online financial transaction program account over the phone in a convenient and user-friendly fashion, without having to depend on an internet connection. | 01-24-2013 |
20130077772 | INTERACTIVE VOICE ACCESS AND NOTIFICATION SYSTEM - An interactive voice access and notification method includes monitoring one or more notification events associated with one or more recipients identified by a user to detect a trigger of the notification event(s). The method also includes initiating a call to the recipient(s) in response to detecting the trigger of the notification event(s). The method also includes playing back an interactive audible notification message received from the user in response to confirming the recipient(s) are on the call. The method further includes sending a confirmation response to the user when a response from the recipient(s) to the interactive audible notification message triggers a confirmation response. | 03-28-2013 |
20130108031 | Speech Recognition Method of and System for Determining the Status of an Answered Telephone During the Course of an Outbound Telephone Call | 05-02-2013 |
20130156166 | TRANSPARENT VOICE REGISTRATION AND VERIFICATION METHOD AND SYSTEM - A method includes receiving a communication from a party at a voice response system and capturing verbal communication spoken by the party. Then a processor creates a voice model associated with the party, the voice model being created by processing the captured verbal communication spoken by the party. The creation of the voice model is imperceptible to the party. The voice model is then stored to provide voice verification of the party during a subsequent communication. | 06-20-2013 |
20130177140 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING A CUSTOM, INTERACTIVE CALL FLOW - A custom call flow is implemented by receiving a sequence of user inputs provided as part of an interactive call between a caller requesting a service and a service provider that provides the service. The sequence of user inputs includes data path inputs, security inputs, and a termination input. The custom call flow is further implemented by identifying placement of the security inputs in the sequence, removing the security inputs from the sequence, and creating a custom sequence that includes the data path inputs, a placeholder representing the placement of the security inputs, and the termination input. The custom sequence utilizes the placeholder to prompt the caller to enter the security inputs at a location specified in the placeholder of the custom sequence. The custom call flow is invoked from the custom sequence received from the caller each time the caller initiates a request for the service. | 07-11-2013 |
20130177141 | System and Method for Tracking Persons of Interest Via Voiceprint - Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest. | 07-11-2013 |
20130251119 | PERSISTING CUSTOMER IDENTITY VALIDATION DURING AGENT-TO-AGENT TRANSFERS IN CALL CENTER TRANSACTIONS - A small baseline audio sample is sampled when a person initially calls in and the sample is held only for the duration of the call. For each subsequent transfer, a comparison is made to the baseline established from the initial call and at the end of the call the voice sample is discarded so no resources need to be maintained. Speaker verification and VOIP technologies are used to persist the customer's verification information as service representative hand-offs occur. | 09-26-2013 |
20130329867 | Telecommunication Call Management and Monitoring System With Voiceprint Verification - A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party. | 12-12-2013 |
20140098944 | CONTROLLING HOLD QUEUE POSITION ADJUSTMENT - A computer system detects a call from a caller at a hold queue, wherein an identity of the caller is authenticated according to a voice identity of the caller. The computer system accesses a caller profile according to the identity of the caller, wherein the caller profile comprises at least one previously earned advancement token. The computer system offers the caller an option of redeeming the previously earned advancement token for adjustment of a position of the caller in the hold queue. | 04-10-2014 |
20140119520 | METHOD AND SYSTEM FOR USING CONVERSATIONAL BIOMETRICS AND SPEAKER IDENTIFICATION/VERIFICATION TO FILTER VOICE STREAMS - A method and system for using conversational biometrics and speaker identification and/or verification to filter voice streams during mixed mode communication. The method includes receiving an audio stream of a communication between participants. Additionally, the method includes filtering the audio stream of the communication into separate audio streams, one for each of the participants. Each of the separate audio streams contains portions of the communication attributable to a respective participant. Furthermore, the method includes outputting the separate audio streams to a storage system. | 05-01-2014 |
20140254778 | SYSTEMS AND METHODS FOR IDENTIFYING A CALLER - Systems and methods for authenticating callers are disclosed that may obtain identifying data and a voice print, and compare the voice print to one or more stored voice prints. Further, one or more initial scores may be calculated based on the data and the comparison, and a confidence interval score may also be calculated. The systems and methods may determine whether to authenticate based on the one or more initial scores and the confidence interval score. | 09-11-2014 |
20140270112 | VOICE PRINT TAGGING OF INTERACTIVE VOICE RESPONSE SESSIONS - Embodiments of the invention provide a method, system and computer program product for voice print tagging for interactive voice response (IVR) session management. In an embodiment of the invention, a method of voiceprint tagging for IVR session management is provided. The method includes establishing an IVR session for a caller from over a network and presenting a portion of the IVR session to the caller over the network. The method also includes storing a voiceprint tag in memory associating a voiceprint of the caller with a portion of the IVR session. Finally, the method includes responding to a premature termination of the IVR session by re-establishing the prematurely terminated IVR session with the caller at the portion of the IVR session indicated by the voiceprint tag of the caller. | 09-18-2014 |
20140270113 | VOICE PRINT TAGGING OF INTERACTIVE VOICE RESPONSE SESSIONS - Embodiments of the invention provide a method, system and computer program product for voice print tagging for interactive voice response (IVR) session management. In an embodiment of the invention, a method of voiceprint tagging for IVR session management is provided. The method includes establishing an IVR session for a caller from over a network and presenting a portion of the IVR session to the caller over the network. The method also includes storing a voiceprint tag in memory associating a voiceprint of the caller with a portion of the IVR session. Finally, the method includes responding to a premature termination of the IVR session by re-establishing the prematurely terminated IVR session with the caller at the portion of the IVR session indicated by the voiceprint tag of the caller. | 09-18-2014 |
20140286481 | METHOD AND SYSTEM FOR USING CONVERSATIONAL BIOMETRICS AND SPEAKER IDENTIFICATION/VERIFICATION TO FILTER VOICE STREAMS - A method and system for using conversational biometrics and speaker identification and/or verification to filter voice streams during mixed mode communication. The method includes receiving an audio stream of a communication between participants. Additionally, the method includes filtering the audio stream of the communication into separate audio streams, one for each of the participants. Each of the separate audio streams contains portions of the communication attributable to a respective participant. Furthermore, the method includes outputting the separate audio streams to a storage system. | 09-25-2014 |
20140314216 | UNKNOWN SPEAKER IDENTIFICATION SYSTEM - An apparatus for use in a verbal communication between a speaker and at least one listener, where the speaker and the at least one listener are spatially separate from each other, the apparatus provides the listener with a sensory output associated with the identity of the speaker, the apparatus including an identification device including a vibration sensor for detecting vibrations associated with speech of the speaker, is configured to store identification data representative of the identity of the speaker or the identification device, is associable with the identity of the speaker, and, in response to detecting vibrations, transmits an identification signal comprising or generated from the stored identification data, and a display device operable to receive the identification signal and to generate from the received identification signal a sensory output indicating the identity of either or both of the speaker and the identification device. | 10-23-2014 |
20140328473 | CALLER AUTHENTICATION SYSTEM - A disclosed method of authenticating a telephone caller includes receiving an authentication request for the telephone caller that includes a voice recording of the caller and household information indicative of a household, creating a first voice pattern based on the voice recording of the caller, retrieving a second voice pattern using at least some of the household information, comparing the two voice patterns, and transmitting information indicative of the results of the comparison. The transmitted information may include information that the telephone caller is authenticated, is not authenticated, or that the comparison results were inconclusive. The method may include monitoring telephone calls with the household, and if it is determined that a voice on at least some of the telephone calls is associated with the household, creating the second voice pattern based on the voice, and associating the second voice pattern to the household. The method may further include disassociating the second voice pattern from the household if it is determined that a change of household has occurred. | 11-06-2014 |
20140341362 | INTERACTIVE VOICE RESPONSE SYSTEM WITH ELECTRONIC SIGNATURE FUNCTIONALITY - A method for receiving authorization from a consumer includes steps of connecting a phone call associated with a consumer to an interactive voice response system after the agent has conveyed the confirmation number to the consumer, receiving the confirmation number from the consumer at the interactive voice response system to provide authorization from the consumer, and storing a record of entry of the confirmation number by the consumer through the interactive voice response system in a non-transitory computer readable storage medium. | 11-20-2014 |
20140348308 | Method And System For Speaker Verification - In many scenarios, speaker verification systems can be given a single-channel audio with recordings of multiple speakers. To perform accurate speaker verification, a system can isolate the speech of a speaker. In one embodiment, a method, and corresponding system, of speaker verification includes extracting a target speaker's speech, using a known speaker voiceprint, from an audio recording that includes the target speaker's speech and the known speaker's speech. The known speaker voiceprint can correspond to the known speaker. Extracting the target speaker's speech can include determining portions of the audio recording where the known speaker voiceprint matches the known speaker's speech above a particular threshold, and extracting the target speaker's speech from other portions of the audio recording. In this manner, speaker verification is performed on the target speaker's speech without interference from the known speaker's speech and allows for a more accurate verification. | 11-27-2014 |
20140376703 | UTILIZING VOICE BIOMETRICS - Methods, systems, computer-readable media, and apparatuses for handling calls based on a voice biometric confidence score are presented. In some embodiments, a computing device may receive a voice sample associated with a telephone call. Subsequently, the computing device may determine a voice biometric confidence score based on the voice sample. The computing device then may determine to route the telephone call to a certain endpoint based on the voice biometric confidence score. | 12-25-2014 |
20150023481 | METHOD FOR PERSONALIZING VOICE ASSISTANT - The present invention provides a method for personalizing voice assistant. First, the voice module is activated. Then, the voice message received by the voice module is recognized. According to the recognition result, the personal name in the voice message is converted to the intelligent conversation name at a remote site, and thus triggering an intelligent conversation module of the server for providing the service of intelligent conversation. Accordingly, the present invention corresponds the universal intelligent conversation name to the personal name for triggering the intelligent conversation module. Consequently, the voice assistant can be personalized. | 01-22-2015 |
20150023482 | TELEPHONE TO COMPUTATIONAL DEVICE ASSOCIATION - The disclosure relates to a system for dynamic association of a computational device, which includes at least one communication interface and a control system coupled to the at least one communication interface with a communication device. A request to authenticate an association between a computational device and a communication device is received by the control system and a communication connection is established with the communication device. A request for authentication information is sent via the communication connection to the communication device. A response is received from the communication device and information determined from the response is forwarded. | 01-22-2015 |
20150030142 | Methods and Systems for Controlling Calling Party Access to Called Device - Devices, systems, and methods are provided to send an alert to a called party communications device during a call setup phase and to present the alert to a called party during an alert portion of the call setup phase. Other devices, systems, and methods are provided that allow a calling party to remotely and securely access at least one host computer by sending a security phrase during a call setup phase and presenting the security phrase to the host computer to determine if by way of comparison to a voice print if the calling party is a valid user. | 01-29-2015 |
20150055763 | SYSTEMS, METHODS, AND MEDIA FOR DETERMINING FRAUD PATTERNS AND CREATING FRAUD BEHAVIORAL MODELS - Systems, methods, and media for analyzing fraud patterns and creating fraud behavioral models are provided herein. In some embodiments, methods for analyzing call data associated with fraudsters may include executing instructions stored in memory to compare the call data to a corpus of fraud data to determine one or more unique fraudsters associated with the call data, associate the call data with one or more unique fraudsters based upon the comparison, generate one or more voiceprints for each of the one or more identified unique fraudsters from the call data, and store the one or more voiceprints in a database. | 02-26-2015 |
20150055764 | TRANSPARENT VOICE REGISTRATION AND VERIFICATION METHOD AND SYSTEM - A method includes receiving a communication from a party at a voice response system and capturing speech spoken by the party during the communication. Then a processor creates a voice model of the party, the voice model being created by processing the speech, without notifying the party. The voice model is then stored to provide voice verification during a subsequent communication. | 02-26-2015 |
20150085999 | System and Method for Tracking Persons of Interest Via Voiceprint - Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest. | 03-26-2015 |
20150098556 | METHOD AND SYSTEM FOR VOICE-BASED CONTACT UPDATION - A method and a system for updating contact information in an electronic device include capturing a voice of a caller to generate a voice signature. The method includes determining presence of the voice signature in the electronic device. The method includes updating contact information of the caller based on the voice signature. | 04-09-2015 |
20150110256 | SELECTIVE VOICE TRANSMISSION DURING TELEPHONE CALLS - Embodiments of the disclosure relate to selective voice transmission and include receiving an identification of one or more authorized speakers for a telephone call and retrieving a voice sample for each of the one or more authorized speakers. Embodiments also include receiving one or more audio signals for the telephone call and filtering the one or more audio signals by removing a portion of the one or more audio signals that do not contain a voice of at least one of the one or more authorized speakers in the one or more audio signals. | 04-23-2015 |
20150110257 | SYSTEM AND METHOD FOR INTERACTIVE ADVERTISEMENT AUGMENTATION VIA A CALLED VOICE CONNECTION - Disclosed herein are systems, methods, and computer-readable storage devices for streaming data. The method includes presenting a data stream including an interactive communication and detecting feedback from the user in response to the interactive communication. If the feedback indicates a request to receive data associated with the interactive communication, the method includes buffering the data stream from a point in time associated with the feedback to yield a buffered data stream, connecting the user device to a commerce presence associated with the interactive communication temporarily and resuming playback of the buffered data stream to the user device following completion of the temporary communication between the user device and commerce presence. | 04-23-2015 |
20150124945 | SYSTEM, METHOD AND APPARATUS FOR AUTHENTICATING CALLS - The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification. | 05-07-2015 |
20150139411 | SYSTEMS AND TECHNIQUES FOR PRODUCING SPOKEN VOICE PROMPTS - Methods and systems are described in which spoken voice prompts can be produced in a manner such that they will most likely have the desired effect, for example to indicate empathy, or produce a desired follow-up action from a call recipient. The prompts can be produced with specific optimized speech parameters, including duration, gender of speaker, and pitch, so as to encourage participation and promote comprehension among a wide range of patients or listeners. Upon hearing such voice prompts, patients/listeners can know immediately when they are being asked questions that they are expected to answer, and when they are being given information, as well as the information that considered sensitive. | 05-21-2015 |
20150358457 | Digital Telecommunications Call Management and Monitoring System - The present invention discloses a centralized, digital, computer-based telephone call management system for authenticating users of a telephone system in an institutional facility. The system includes the capacity to allow an institution to control, record, monitor, and bill and report usage and access to a telephone network. The telephone call management system further includes both accounting and management software for use in controlling, monitoring, billing, recording, and reporting usage and access. Also, it can operate over both a. Public Switch Telephone Network (PSTN) and a Voice over Internet Protocol (VOIP) infrastructure. | 12-10-2015 |
20150358463 | SYSTEM AND METHOD FOR MANAGING CUSTOMER INTERACTIONS IN AN ENTERPRISE - An automated system of an enterprise is disclosed for managing a communication session with a customer of the enterprise. The automated system includes a monitoring module configured to monitor one or more attributes associated with the communication session. The automated system further includes an analysis module configured to determine a plurality of resources required for managing the communication session based on the attributes. The automated system further includes a management module configured to manage allocation of the resources for the communication session, wherein the allocation is refined during the communication session based on the attributes. | 12-10-2015 |
20160014270 | TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION | 01-14-2016 |
20160111085 | IDENTIFYING A CONTACT BASED ON A VOICE COMMUNICATION SESSION - Arrangements described herein include identifying a voice communication session established between a first communication device and a second communication device and, based on the voice communication session established between the first communication device and the second communication device, identifying a plurality of contacts who potentially may be the second user. A list including at least a name of each of the plurality of contacts who potentially may be the second user is presented to a first user using the first communication device. | 04-21-2016 |
20160112569 | Utilizing Voice Biometrics - Methods, systems, computer-readable media, and apparatuses for handling calls based on a voice biometric confidence score are presented. In some embodiments, a computing device may receive a voice sample associated with a telephone call. Subsequently, the computing device may determine a voice biometric confidence score based on the voice sample. The computing device then may determine to route the telephone call to a certain endpoint based on the voice biometric confidence score. | 04-21-2016 |
20160142534 | SYSTEMS, METHODS, AND MEDIA FOR DETERMINING FRAUD PATTERNS AND CREATING FRAUD BEHAVIORAL MODELS - Systems, methods, and media for analyzing fraud patterns and creating fraud behavioral models are provided herein. In some embodiments, methods for analyzing call data associated with fraudsters may include executing instructions stored in memory to compare the call data to a corpus of fraud data to determine one or more unique fraudsters associated with the call data, associate the call data with one or more unique fraudsters based upon the comparison, generate one or more voiceprints for each of the one or more identified unique fraudsters from the call data, and store the one or more voiceprints in a database. | 05-19-2016 |
20160150074 | PLAYING A PERSONALIZED PRERECORDED AUDIO OF A CALL RECIPIENT TO THE CALL RECIPIENT TO AUTHENTICATE A TELEPHONE CALLER - An audio segment recorded by an individual is stored in a computational device controlled by an entity, where the computational device is coupled to a telephony device having a speaker and a microphone that are configurable to be enabled or disabled by the computational device. An electronic communication is initiated to the individual via the telephony device when the speaker and the microphone are both enabled. The stored audio segment is retrieved from an audio recording database that stores a plurality of audio segments of a plurality of individuals and played to the individual to authenticate the entity, in response to the initiating of the electronic communication to the individual. | 05-26-2016 |
20160182727 | MUTE DETECTOR | 06-23-2016 |
20160255189 | TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION | 09-01-2016 |