Patent classifications
H04M3/385
Telecommunication call management and monitoring system with voiceprint verification
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
COMMUNICATION TERMINAL, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM
In an information processing system, a storage unit stores data related to a voice of a user for each item of user identification information that identifies the user during transmission or reception of a call. An acquisition unit acquires the user identification information on a calling side and data related to the voice of the user on the calling side after a call is started. A determination unit determines whether the data related to the voice of the user on the calling side and the data related to the voice stored by the storage unit in the user identification information acquired by the acquisition unit are based on the voice of the same person during the call.
Using a conversation context to manage conference participants
Using a conversation context to manage conference participants including receiving a request from an invitee to join a conference in progress; extracting audio from the conference; converting said audio to data describing the conference; matching data to a context, wherein the context comprises a specification of a subject matter of the conference and a list of authorized participants for the conference; comparing the invitee to the list of the authorized participants for the conference; responsive to determining that the invitee matches an authorized participant of the list of authorized participants for the conference, granting permission to the invitee to join the conference; and responsive to determining that the invitee does not match an authorized participant of the list of authorized participants for the conference, denying the invitee access to the conference.
SECURE VOICE PRINT AUTHENTICATION FOR WIRELESS COMMUNICATION NETWORK SERVICES
A method of accessing a wireless communication network using secure voice print authentication. The method includes receiving a request from a mobile device at a gateway of the wireless communication network for service on the wireless communication network. A voice print is obtained at the gateway from a user using the mobile device. The voice print is compared by the gateway with a primary voice print, wherein the primary voice print is associated with a voicemail account at the wireless communication network, and wherein the voicemail account is associated with a primary user of the mobile device. Based upon comparing the voice print with the primary voice print, the service may be provided to the mobile device on the wireless communication network.
METHOD OF COATING METALLIC POWDER PARTICLES WITH SILICON
A method of coating metallic powder particles includes disposing an amount of metallic powder particles in a fluidizing reactor and removing moisture adhered to the powder particles within the reactor with a working gas at an elevated temperature for a predetermined time. The method further includes coating the powder particles in the reactor with silicon present within the precursor gas at an elevated temperature for a predetermined time and purging the precursor gas from the reactor using the working gas.
METHOD OF ACCESSING A DIAL-UP SERVICE
A method of accessing a dial-up service is disclosed. An example method of providing access to a service includes receiving a first speech signal from a user to form a first utterance; recognizing the first utterance using speaker independent speaker recognition; requesting the user to enter a personal identification number; and when the personal identification number is valid, receiving a second speech signal to form a second utterance and providing access to the service.
System and method for multilingual authentication access to communication system in controlled environment
A system and method for multilingual authentication access to a communication system in a controlled environment is disclosed. The system includes a communication subsystem that connects a communication between a first communication device and a second communication device, wherein one of the first communication device or the second communication device is used by the inmate of the correctional system. The system also includes a profile subsystem configured to determine profile information of a party associated with the first communication device. The system further includes an authentication subsystem that provides one or more challenge questions to the first communication device based on the profile information, receives at least one response to the one or more challenge questions from the first communication device, and authorizes connection of the communication between the first communication device and the second communication device based on the at least one response.
METHOD FOR CONTROLLING A REAL-TIME CONVERSATION AND REAL-TIME COMMUNICATION AND COLLABORATION PLATFORM
A method for controlling a real-time communication between at least two participants can include identifying, from the at least two participants a first participant as an active speaker in the conversation by using audio signals received from the first participant via a microphone, and activating the digital assistant unit for the first participant. A voice recognition procedure for identifying and transcribing identified voice commands can be used so the transcribed voice commands are analyzed and executed.
Methods and systems for authenticating a user on a call
Methods and systems described in this disclosure allow customers to quickly be authenticated. In some embodiments, a device and a user verifier are associated with a user profile. When a call is received from the device, the user may be requested to input the user verifier. After verifying that the device is unique to the user and that the user verifier matches the user verifier associated with the user profile, the user may be authenticated to the call or activity.