Patent classifications
H04M3/385
Methods and systems for authenticating a user on a call
Methods and systems described in this disclosure allow customers to quickly be authenticated. In some embodiments, a device and a user verifier are associated with a user profile. When a call is received from the device, the user may be requested to input the user verifier. After verifying that the device is unique to the user and that the user verifier matches the user verifier associated with the user profile, the user may be authenticated to the call or activity.
Methods and systems for automatic discovery of fraudulent calls using speaker recognition
A method for determining potentially undesirable voices, in embodiments, includes: receiving audio recordings comprising voices associated with undesirable activity, and determining audio components of each of the audio recordings. The method may further comprise generating a multi-dimensional vector of the audio components for each of the plurality of audio recordings, and comparing audio components between the multi-dimensional vectors to determine clusters of multi-dimensional vectors, each cluster comprising two or more of the multi-dimensional vectors of audio components, wherein each cluster corresponds to a blacklisted voice. The method may further comprise receiving an audio recording or audio stream, and determining whether the audio recording or audio stream is associated with a voice associated with undesirable activity based on a comparison to the clusters.
Method for controlling a real-time conversation and real-time communication and collaboration platform
A method for controlling a real-time communication between at least two participants can include identifying, from the at least two participants a first participant as an active speaker in the conversation by using audio signals received from the first participant via a microphone, and activating the digital assistant unit for the first participant. A voice recognition procedure for identifying and transcribing identified voice commands can be used so the transcribed voice commands are analyzed and executed.
Methods and systems for authenticating a user on a call
Methods and systems described in this disclosure allow customers to quickly be authenticated. In some embodiments, a device and a user verifier are associated with a user profile. When a call is received from the device, the user may be requested to input the user verifier. After verifying that the device is unique to the user and that the user verifier matches the user verifier associated with the user profile, the user may be authenticated to the call or activity.
Secure voice print authentication for wireless communication network services
A method of accessing a wireless communication network using secure voice print authentication. The method includes receiving a request from a mobile device at a gateway of the wireless communication network for service on the wireless communication network. A voice print is obtained at the gateway from a user using the mobile device. The voice print is compared by the gateway with a primary voice print, wherein the primary voice print is associated with a voicemail account at the wireless communication network, and wherein the voicemail account is associated with a primary user of the mobile device. Based upon comparing the voice print with the primary voice print, the service may be provided to the mobile device on the wireless communication network.
SECURE VIDEO VISITATION SYSTEM
Video conferencing in a controlled environment facility entails significant security concerns. These concerns are even more prevalent in a system that permits residents of such facilities to communicate via their own personal devices. Therefore, in order to alleviate these concerns and provide a secure system in which a resident is able to make video calls using their personal device, a kiosk unit is provided to which the personal device must be linked for completing a video call. When making the video call, the camera and display on the personal device are disabled, and all video data is captured and displayed by the kiosk unit. The link between the kiosk unit and the personal device facilitates the exchange of the image information for transmission to the outside party, or display to the user. By providing a fixed camera, and disabling the personal device camera, security can be maintained while permitting video calling services.
SECURE VIDEO VISITATION SYSTEM
Video conferencing in a controlled environment facility entails significant security concerns. These concerns are even more prevalent in a system that permits residents of such facilities to communicate via their own personal devices. Therefore, in order to alleviate these concerns and provide a secure system in which a resident is able to make video calls using their personal device, a kiosk unit is provided to which the personal device must be linked for completing a video call. When making the video call, the camera and display on the personal device are disabled, and all video data is captured and displayed by the kiosk unit. The link between the kiosk unit and the personal device facilitates the exchange of the image information for transmission to the outside party, or display to the user. By providing a fixed camera, and disabling the personal device camera, security can be maintained while permitting video calling services.
Method, apparatus and system for voice verification
The present invention provides a method, apparatus, and system for voice verification, wherein the method comprises: at a network side, obtaining a user voice communication number according to a voice verification request from a user side, and determining voice verification information corresponding to the voice verification request; at the network side, initiating a call to a corresponding user according to the user voice communication number, and in the case of call through, playing the determined voice verification information to the user; at the user side, performing an automatic listening and recording operation when monitoring that the user is called, and upon termination of the call, sending recording information obtained from the recording to the network side; at the network side, determining a verification result according to the voice verification information and the recording information.
SYSTEM AND METHOD TO AUTHENTICATE CONTACT CENTER AGENTS BY A REVERSE AUTHENTICATION PROCEDURE
An authentication system to validate the authenticity of call center agents by using a reverse authentication procedure. The authentication system includes a verification module that verifies the authenticity of agents calling from the call center. The verification module retrieves reference answers in response to the user-provided query questions from a media server. The media server may be located inside the enterprise network. These reference questions and their corresponding reference answers are provided by users when registering with the enterprise network.
System and method to authenticate contact center agents by a reverse authentication procedure
An authentication system to validate the authenticity of call center agents by using a reverse authentication procedure. The authentication system includes a verification module that verifies the authenticity of agents calling from the call center. The verification module retrieves reference answers in response to the user-provided query questions from a media server. The media server may be located inside the enterprise network. These reference questions and their corresponding reference answers are provided by users when registering with the enterprise network.