Patent classifications
H04M3/385
Apparatus and method for transmitting personal information using automatic response system
An electronic device is disclosed. In addition, various embodiments recognized through the specification are possible. The electronic device includes a sensor, a processor operatively connected with the sensor, and a memory, operatively connected with the processor, including instructions. The instructions, when executed by the processor, cause the processor to perform biometric authentication for a user of the electronic device using the sensor, while a call connection procedure is performed with an ARS server, receive a voice signal for requesting private information of the user from the ARS server and convert the voice signal into text, and determine private information requested by the ARS server among at least one private information of the user, the at least one private information being previously stored in the memory, based on the converted text, and transmit the determined private information to the ARS server.
METHOD AND SYSTEM FOR SCREENING VOICE CALLS
Methods and apparatus are described for a telephony server screening voice calls. In one embodiment, the telephony server receives, form an originating device, an incoming call to be routed to a receiving device. The server answers the incoming call to establish a communication link with the originating device. The server transmits, via the communication link, a challenge audio signal containing an audio message for playback by the originating device. The server receives, via the communication link, a response from the originating device, and, in response to authenticating the response, routes the incoming call to the receiving device. Other embodiments are also described and claimed.
Methods and systems for authenticating a user on a call
Methods and systems described in this disclosure allow customers to quickly be authenticated. In some embodiments, a device and a user verifier are associated with a user profile. When a call is received from the device, the user may be requested to input the user verifier. After verifying that the device is unique to the user and that the user verifier matches the user verifier associated with the user profile, the user may be authenticated to the call or activity.
System and method to authenticate contact center agents by a reverse authentication procedure
An authentication system to validate the authenticity of call center agents by using a reverse authentication procedure. The authentication system includes a verification module that verifies the authenticity of agents calling from the call center. The verification module retrieves reference answers in response to the user-provided query questions from a media server. The media server may be located inside the enterprise network. These reference questions and their corresponding reference answers are provided by users when registering with the enterprise network.
Secure video visitation system
Video conferencing in a controlled environment facility entails significant security concerns. These concerns are even more prevalent in a system that permits residents of such facilities to communicate via their own personal devices. Therefore, in order to alleviate these concerns and provide a secure system in which a resident is able to make video calls using their personal device, a kiosk unit is provided to which the personal device must be linked for completing a video call. When making the video call, the camera and display on the personal device are disabled, and all video data is captured and displayed by the kiosk unit. The link between the kiosk unit and the personal device facilitates the exchange of the image information for transmission to the outside party, or display to the user. By providing a fixed camera, and disabling the personal device camera, security can be maintained while permitting video calling services.
APPARATUS AND METHOD FOR TRANSMITTING PERSONAL INFORMATION USING AUTOMATIC RESPONSE SYSTEM
An electronic device is disclosed. In addition, various embodiments recognized through the specification are possible. The electronic device includes a sensor, a processor operatively connected with the sensor, and a memory, operatively connected with the processor, including instructions. The instructions, when executed by the processor, cause the processor to perform biometric authentication for a user of the electronic device using the sensor, while a call connection procedure is performed with an ARS server, receive a voice signal for requesting private information of the user from the ARS server and convert the voice signal into text, and determine private information requested by the ARS server among at least one private information of the user, the at least one private information being previously stored in the memory, based on the converted text, and transmit the determined private information to the ARS server.
Verifying a user using speaker verification and a multimodal web-based interface
A method of verifying a user identity using a Web-based multimodal interface can include sending, to a remote computing device, a multimodal markup language document that, when rendered by the remote computing device, queries a user for a user identifier and causes audio of the user's voice to be sent to a multimodal, Web-based application. The user identifier and the audio can be received at about a same time from the client device. The audio can be compared with a voice print associated with the user identifier. The user at the remote computing device can be selectively granted access to the system according to a result obtained from the comparing step.
METHODS AND SYSTEMS FOR AUTOMATIC DISCOVERY OF FRAUDULENT CALLS USING SPEAKER RECOGNITION
A computer-implemented method for determining potentially undesirable voices, according to some embodiments, includes: receiving a plurality of audio recordings, the plurality of audio recordings comprising voices associated with undesirable activity, and determining a plurality of audio components of each of the plurality of audio recordings. The method may further comprise generating a multi-dimensional vector of audio components, from the plurality of audio components, for each of the plurality of audio recordings to generate a plurality of multi-dimensional vectors of audio components, and comparing audio components between the plurality of multi-dimensional vectors of audio components to determine a plurality of clusters of multi-dimensional vectors, each cluster of the plurality of clusters comprising two or more of the plurality of multi-dimensional vectors of audio components, wherein each cluster of the plurality of clusters corresponds to a blacklisted voice. The method may further comprise receiving an audio recording or audio stream, and determining whether the audio recording or audio stream is associated with a voice associated with undesirable activity based on a comparison to the plurality of clusters.
Secure call center communications
This disclosure describes techniques for authenticating a person that seeks to engage in a voice call session with a call center agent, an interactive voice response system, or other system. In one example, this disclosure describes a method that includes storing information associating an authorized device with an account; receiving, over a network and from a device operated by a user, authentication credentials for the user; determining, based on the authentication credentials, that the user is authorized to access the account; receiving, over the network and from the device operated by the user, a request to engage in a voice conversation; responsive to receiving the request, accessing the phone number associated with the authorized device; and initiating a voice call session by placing a call, over the network, to the phone number associated with the authorized device.
Methods and systems for automatic discovery of fraudulent calls using speaker recognition
A computer-implemented method for determining potentially undesirable voices, according to some embodiments, includes: receiving a plurality of audio recordings, the plurality of audio recordings comprising voices associated with undesirable activity, and determining a plurality of audio components of each of the plurality of audio recordings. The method may further comprise generating a multi-dimensional vector of audio components, from the plurality of audio components, for each of the plurality of audio recordings to generate a plurality of multi-dimensional vectors of audio components, and comparing audio components between the plurality of multi-dimensional vectors of audio components to determine a plurality of clusters of multi-dimensional vectors, each cluster of the plurality of clusters comprising two or more of the plurality of multi-dimensional vectors of audio components, wherein each cluster of the plurality of clusters corresponds to a blacklisted voice. The method may further comprise receiving an audio recording or audio stream, and determining whether the audio recording or audio stream is associated with a voice associated with undesirable activity based on a comparison to the plurality of clusters.