H04M2201/41

Machine learning for improving quality of voice biometrics

Methods and systems are disclosed herein for improving the quality of audio for use in a biometric. A biometric system may use machine learning to determine whether audio or a portion of the audio should be used as a biometric for a user. A sample of the user's voice may be used to generate a voice signature of the user. Portions of the audio that do not meet a similarity threshold when compared with the voice signature may be removed from the audio. Additionally or alternatively, interfering noises may be detected and removed from the audio to improve the quality of a voice biometric generated from the audio.

System and method for assessing security threats and criminal proclivities
11553079 · 2023-01-10 · ·

A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.

System and method for video-assisted presence detection in telephony communications
11695868 · 2023-07-04 · ·

Video-assisted presence detection is used to enhance a user experience in telephony communications. Image data, video data, or both, from a camera are used to determine whether a user is present at their device before a call is transferred to him or her. The video-assisted presence detection can be implemented based on a privacy setting. For example, one implementation allows a system to have partial access to the camera to perform a scan to detect that there is a human present without capturing facial information, and without identifying that person. Another implementation allows the system to have partial access to the camera to scan the a face of a user, but not have access to the video feed of the camera. Another implementation allows the system to have full access to the camera.

PROACTIVE AUDIO OPTIMIZATION FOR CONFERENCES
20220417364 · 2022-12-29 ·

In one embodiment, a device obtains audio data from one or more past conferences. A prediction model that predicts when participants of a conference will speak is generated based on the audio data from the one or more past conferences. The device uses the prediction model to predict a speech distribution for participants of a particular conference. Then, the device proactively optimizes audio parameters of the particular conference based on its predicted speech distribution.

MACHINE LEARNING FOR IMPROVING QUALITY OF VOICE BIOMETRICS

Methods and systems are disclosed herein for improving the quality of audio for use in a biometric. A biometric system may use machine learning to determine whether audio or a portion of the audio should be used as a biometric for a user. A sample of the user's voice may be used to generate a voice signature of the user. Portions of the audio that do not meet a similarity threshold when compared with the voice signature may be removed from the audio. Additionally or alternatively, interfering noises may be detected and removed from the audio to improve the quality of a voice biometric generated from the audio.

Mediated multi party electronic conference system
11595528 · 2023-02-28 ·

An AI based moderator system for an electronic conference. The moderator scores users based on ratings and diversity, and attempts to keep a high rating person talking while maintaining diversity.

System and method for detecting fraud rings

A system and method may identify a fraud ring based on call or interaction data by analyzing by a computer processor interaction data including audio recordings to identify clusters of interactions which are suspected of involving fraud each cluster including the same speaker; analyzing by the computer processor the clusters, in combination with metadata associated with the interaction data, to identify fraud rings, each fraud ring describing a plurality of different speakers, each fraud ring defined by a set of speakers and a set of metadata corresponding to interactions including that speaker; and for each fraud ring, creating a relevance value defining the relative relevance of the fraud ring.

Method and system for controlling speaker tracking in a video conferencing system
11589005 · 2023-02-21 · ·

A video conferencing device for video conferencing between at least one local participant and a remote participant includes a video camera, a microphone array, and a speaker tracker. The video camera provides a local video input signal. The microphone array provides a local audio input signal. The speaker tracker is configured to identify a local speaker from the at least one local participant using a sound source localizer. The video conferencing device processes the local video input signal without the local speaker, based on the video conferencing device receiving a signal from a computing system, the signal dependent on a loopback audio output signal indicating that the remote participant is speaking.

Telecommunication call management and monitoring system with voiceprint verification
11496621 · 2022-11-08 · ·

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.

Cloud-based communication system for monitoring and facilitating collaboration sessions

A cloud-based communication system for monitoring a collaboration session. Based on the monitoring, the system identifies a collaboration event that indicates desirability of a break or that a digression from a session topic has or is occurring. When a collaboration event is identified, a prompt is communicated to the facilitator of the collaboration session. The collaboration event may be defined in a variety of ways such as participant fatigue, participant distraction, or the like. The system provides the facilitator with actions to be initiated by the system (automatically or in response to facilitator/user input) to respond to an identified communication event. The actions include initiating a break, acting to avoid or reduce session digressions, and creating a highlight reel of the collaboration session, including a number of unique features enabling more efficient retrieval and/or review of data. A distracted or fatigued participant can be directed to access the highlight reel.