H04M2201/41

PROTECTING USER DATA DURING AUDIO INTERACTIONS
20220294899 · 2022-09-15 ·

A method for protecting user data during an audio interaction includes various operations performed by a processing system including at least one processor. In one example, the operations include detecting an audio signal that is part of an interaction between a user and another party, converting the audio signal into a string of text, detecting that the interaction is likely to put sensitive data of the user at risk, based on a comparison of the string of text to a library of interactions that are known to put sensitive data at risk, and sending an alert to notify the user that the interaction is likely to put the sensitive data of the user at risk, wherein the alert is sent to prevent the user from providing the sensitive data to the another party, and wherein the method is performed contemporaneously with an occurrence of the interaction.

METHODS AND SYSTEMS FOR AUTOMATIC DISCOVERY OF FRAUDULENT CALLS USING SPEAKER RECOGNITION

A computer-implemented method for determining potentially undesirable voices, according to some embodiments, includes: receiving a plurality of audio recordings, the plurality of audio recordings comprising voices associated with undesirable activity, and determining a plurality of audio components of each of the plurality of audio recordings. The method may further comprise generating a multi-dimensional vector of audio components, from the plurality of audio components, for each of the plurality of audio recordings to generate a plurality of multi-dimensional vectors of audio components, and comparing audio components between the plurality of multi-dimensional vectors of audio components to determine a plurality of clusters of multi-dimensional vectors, each cluster of the plurality of clusters comprising two or more of the plurality of multi-dimensional vectors of audio components, wherein each cluster of the plurality of clusters corresponds to a blacklisted voice. The method may further comprise receiving an audio recording or audio stream, and determining whether the audio recording or audio stream is associated with a voice associated with undesirable activity based on a comparison to the plurality of clusters.

Metadata-based diarization of teleconferences
11276407 · 2022-03-15 · ·

A method for audio processing includes receiving, in a computer, a recording of a teleconference among multiple participants over a network including an audio stream containing speech uttered by the participants and conference metadata for controlling a display on video screens viewed by the participants during the teleconference. The audio stream is processed by the computer to identify speech segments, in which one or more of the participants were speaking, interspersed with intervals of silence in the audio stream. The conference metadata are parsed so as to extract speaker identifications, which are indicative of the participants who spoke during successive periods of the teleconference. The teleconference is diarized by labeling the identified speech segments from the audio stream with the speaker identifications extracted from corresponding periods of the teleconference.

System and method for managing an automated voicemail

A system, method and computer-readable storage device are disclosed signing a voicemail and confirming an identity of the speaker. A method includes receiving a request to verify a speaker associated with a communication to a recipient, receiving first data from the speaker in connection with the communication, accessing second data associated with the speaker to verify the speaker, determining whether a match exists between the first data and the second data to yield a determination, retrieving a communication address of the recipient, generating a notification for the recipient, wherein the notification reports on the determination and transmitting the notification to the recipient at the communication address.

SYSTEM AND METHOD FOR HANDLING UNWANTED TELEPHONE CALLS
20220094784 · 2022-03-24 ·

Disclosed herein are systems and methods for handling unwanted telephone calls. In one aspect, an exemplary method comprises, intercepting a call request for a call from a terminal device of a calling party to a terminal device of a called party, generating a call recording containing media data transmitted within a connection established by the intercepted call request, determining attributes of the generated call recording, classifying the call as an unwanted call based on the determined attributes, wherein the classification is performed by a classifier trained on previously collected unwanted calls, and wherein the call is classified as unwanted when the attributes belong to an unwanted call class that is known, and handling the call in accordance with the classification of the call, the handling including at least securing information of the call.

Mediated multi party electronic conference system
11838449 · 2023-12-05 ·

An AI based moderator system for an electronic conference. The moderator scores users based on ratings and diversity, and attempts to keep a high rating person talking while maintaining diversity.

System and method for third party monitoring of voice and video calls
11271976 · 2022-03-08 · ·

A system is described herein that facilitates the monitoring of inmate communications. The system provides a remotely-accessible means for a reviewer to monitor a call between an inmate and another person. The system includes a monitoring server and a monitoring station. The monitoring server is configured to receive a call and call information from a communication center and process the call for monitoring, schedule a review of the call; and store the call, the call information, and scheduling data. The monitoring station is configured to receive the call and the call information from the monitoring server based on the scheduling data, and to display the identifying information and facilitate the review of the call.

SYSTEMS AND METHODS FOR FILTERING UNWANTED SOUNDS FROM A CONFERENCE CALL
20220076689 · 2022-03-10 ·

To filter unwanted sounds from a conference call, a voice profile of a first user is generated based on a first voice signal captured by a media device during a first conference call. The voice profile may be generated by identifying a base frequency of the first voice signal and determining a plurality of voice characteristics, such as pitch, intonation, accent, loudness, and speech rate. These data may be stored in association with the first user. During a second conference call, a second voice signal captured by the media device is analyzed to determine, based on the voice profile of the first user, whether the second voice signal includes the voice of a second user. If so, the second voice signal is prevented from being transmitted into the conference call. A voice profile of the second user may be generated from the second voice signal for future use.

Methods and systems for automatic discovery of fraudulent calls using speaker recognition

A computer-implemented method for determining potentially undesirable voices, according to some embodiments, includes: receiving a plurality of audio recordings, the plurality of audio recordings comprising voices associated with undesirable activity, and determining a plurality of audio components of each of the plurality of audio recordings. The method may further comprise generating a multi-dimensional vector of audio components, from the plurality of audio components, for each of the plurality of audio recordings to generate a plurality of multi-dimensional vectors of audio components, and comparing audio components between the plurality of multi-dimensional vectors of audio components to determine a plurality of clusters of multi-dimensional vectors, each cluster of the plurality of clusters comprising two or more of the plurality of multi-dimensional vectors of audio components, wherein each cluster of the plurality of clusters corresponds to a blacklisted voice. The method may further comprise receiving an audio recording or audio stream, and determining whether the audio recording or audio stream is associated with a voice associated with undesirable activity based on a comparison to the plurality of clusters.

METHOD AND APPARATUS FOR PROVIDING DATA PRODUCED IN A CONFERENCE
20210328822 · 2021-10-21 ·

A method for providing data produced in a conference, in which voice signals from participants in the conference are mixed in a conference bridge, can include provision of a time base that runs concurrently over the duration of the conference and setup of automatic identification of each participant when this participant speaks in the conference. The method also comprises capture of conversation contribution by each speaking participant to a conversation by the participants which is conducted during the conference as speaking time associated with each speaking participant at the conference, association of a time stamp with the speaking time, and production of statistical data by virtue of statistical evaluation of the speaking times of the participants.