H04M2201/41

CALL CONTROL METHOD AND RELATED PRODUCT
20220263934 · 2022-08-18 ·

Provided are a call control method and related product. In the method, during a voice call between the first user of the first terminal and the second user of the second terminal, a three-dimensional face model of the second user is displayed; model-driven parameters are determined according to the call voice of the second user, where the model-driven parameters include expression parameters and posture parameters; the three-dimensional face model of the second user is driven according to the model-driven parameters to display a three-dimensional simulated call animation of the second user.

SYSTEMS AND METHODS FOR DETECTING INMATE TO INMATE CONFERENCE CALLS
20220224791 · 2022-07-14 · ·

A system for detecting inmate to inmate conference calls in a correctional facility is disclosed herein. The system includes a database and a conference call detection server, wherein the conference call detection server is configured to monitor a plurality of inmate communications, convert an audio signal of each inmate communication to a frequency domain signal, identify frequency data comprising one or more frequency peaks and corresponding frequency values in the frequency domain signal for each inmate communication, generate a record comprising the frequency data for each inmate communication, resulting in a plurality of records, store the plurality of records in the database, detect an inmate to inmate conference call by matching a frequency subset of a new inmate communication with frequency data in a detected record in the database, and verify the inmate to inmate conference call by matching audio with voice biometric samples.

Utilizing VoIP coded negotiation during a controlled environment call
11381623 · 2022-07-05 · ·

Controlled-environment communication systems are increasingly using voice over internet protocol (VoIP) to serve their users. VoIP allows voice to be sent in packetized form, where audio is encoded using one of several codecs. Because of bandwidth constraints, particularly during peak call times, codecs may be used which sacrifice audio quality for bandwidth efficiency. As a result, several features of communication systems, including critical security features. The present disclosure provides details for systems and methods by which a controlled-environment communication system may shift between codecs to perform security-related features or to alleviate bandwidth considerations. This involves the special formatting of control-signaling messages, including session initiation protocol (SIP) and session description protocol (SDP) messaging.

Automatic speaker identification in calls using multiple speaker-identification parameters

A speaker identification system (“system”) automatically assigns a speaker to voiced segments in a call. The system identifies one or more speakers in a call using one or more speaker-identification parameters. The system processes the call to determine one or more speaker-identification parameters, such as a transcript of the call, a facial image of the speaker, a scene image, which is an image of a scene in which the speaker is located during the call, or textual data associated with the call such as names of the speaker or an organization that are retrieved from the scene images or video data of the call. The system analyzes one or more of the speaker-identification parameters and determines the identity of the speaker. The system then identifies the voice segments associated with the identified speaker and marks the voice segments with the identity of the speaker.

SYSTEM AND METHOD FOR MANAGING AN AUTOMATED VOICEMAIL

A system, method and computer-readable storage device are disclosed signing a voicemail and confirming an identity of the speaker. A method includes receiving a request to verify a speaker associated with a communication to a recipient, receiving first data from the speaker in connection with the communication, accessing second data associated with the speaker to verify the speaker, determining whether a match exists between the first data and the second data to yield a determination, retrieving a communication address of the recipient, generating a notification for the recipient, wherein the notification reports on the determination and transmitting the notification to the recipient at the communication address.

System and method for handling unwanted telephone calls

Disclosed herein are systems and methods for handling unwanted telephone calls. In one aspect, an exemplary method comprises, intercepting a call request for a call from a terminal device of a calling party to a terminal device of a called party, generating a call recording containing media data transmitted within a connection established by the intercepted call request, determining attributes of the generated call recording, classifying the call as an unwanted call based on the determined attributes, wherein the classification is performed by a classifier trained on previously collected unwanted calls, and wherein the call is classified as unwanted when the attributes belong to an unwanted call class that is known, and handling the call in accordance with the classification of the call, the handling including at least securing information of the call.

SYSTEM AND METHOD FOR DETECTING FRAUDSTERS

A system and method may classify a plurality of interactions, by: obtaining a plurality of voiceprints of the plurality of interactions, wherein each voiceprint of the plurality of voiceprints represents a speaker participating in an interaction of the plurality of interactions; calculating, for each interaction, a plurality of scores, wherein each score of the plurality of scores is indicative of a similarity between the voiceprint of the interaction and one voiceprint of a set of benchmark voiceprints; calculating, for each interaction, statistics of the scores; and determining that a plurality of interactions pertain to a single cluster of interactions based on statistics of the scores of the interactions in the cluster.

CALLER IDENTIFICATION IN A SECURE ENVIRONMENT USING VOICE BIOMETRICS
20220224792 · 2022-07-14 ·

A method of providing a transcription of an electronic communication includes determining a language spoken in the electronic communication, differentiating among participants in the electronic communication, identifying a hierarchy of topics discussed in the electronic communication, and providing a display of the hierarchy of topics.

Systems and methods for proactive fraudster exposure in a customer service channel
11451658 · 2022-09-20 · ·

Methods for improved fraudster detection in a call center. A subset of a plurality of voiceprints from a plurality of interactions between callers and agents at a call center can be used as the basis for fraudster detection. A plurality of connected components that represents one or more voiceprints can be determined based on the subset of the plurality of voiceprints.

Real-time voice phishing detection
11423926 · 2022-08-23 · ·

Methods and systems are disclosed for detecting threats in voice communications such as telephone calls. Various voice phishing (vishing) detectors detect respective type of threats and can be used or activated individually or in various combinations. A tampering detector utilizes deep scattering spectra and shifted delta cepstra features to detect tampering in the form of voice conversion, speech synthesis, or splicing. A content detector predicts a likelihood that word patterns on an incoming voice signal are indicative of a vishing threat. A spoofing detector authenticates or repudiates a purported speaker based on comparison of voice profiles. The vishing detectors can be provided as an authentication service or embedded in communication equipment. Machine learning and signal processing aspects are disclosed, along with applications to mobile telephony and call centers.