摘要:
A conference proceeding apparatus a conference proceeding method for advancing a conference are provided. The conference proceeding apparatus includes an interface configured to receive an input, a display configured to display subjects of a conference in response to the interface receiving an input to start the conference, and a voice recognizer configured to recognize voices of participants of the conference. The conference proceeding apparatus further includes a voice-text converter configured to convert the recognized voices into texts, and a controller configured to register, in a record of the conference, the converted texts corresponding to the subjects.
摘要:
The invention provides a computer-implemented method of handling a telephone call, comprising monitoring a conversation between an agent and a customer on a telephone line as part of the telephone call to extract the audio signal therefrom. Real-time voice analytics are performed on the extracted audio signal while the telephone call is in progress. The results from the voice analytics are then passed to a computer-telephony integration system responsible for the call for use by the computer-telephony integration system for determining future handling of the call.
摘要:
The invention relates to a method of authentication to gain access to a multi-modal application, receiving a multimodal markup language document for the multi-modal application that, when rendered, queries a user for a user identifier and for audio of the user's voice, rendering the multimodal markup language document to query the user for the user identifier and the audio of the user's voice, receiving user input comprising the user identifier and the audio of the user's voice, sending the user identifier and the audio of the user's voice to a server hosting the multi-modal application, and selectively receiving access to the multi-modal application program.
摘要:
Digitales Verfahren zur Authentifizierung eines Nutzers eines Telekommunikations- bzw. Datennetzes für einen Zugriff zu geschützten Daten oder einer einem definierten Nutzerkreis vorbehaltenen Leistung oder für die Verwendung aktuell durch den Nutzer eingegebener Daten, wobei eine aktuell bei einem Zugriffs-Versuch durch den Nutzer an einem Telekommunikations- oder VoIP-Endgerät eingesprochene Sprachprobe einer Stimmanalyseeinrichtung zugeführt und hierin ein aktuelles Stimmprofil errechnet und dieses in einer Stimmprofil-Vergleichereinheit mit einem vorgespeicherten initialen Stimmprofil verglichen und im Ansprechen auf ein positives Vergleichsergebnis der Nutzer authentifiziert und ein den Zugriff freigebendes erstes Steuersignal, jedoch im Ansprechen auf ein negatives Vergleichsergebnis ein den Zugriff sperrendes oder eine Ersatz-Authentifizierungsprozedur triggerndes zweites Steuersignal erzeugt wird.
摘要:
Die Erfindung betrifft ein Verfahren zur Steuerung eines Telekommunikationssystems in/an einem Telekommunikationsnetz (1) oder sprachboxbasierter Dienste (2), wobei bei einer Kommunikationsverbindung zwischen einem Anrufer (A,B,C,D) und dem Telekommunikationssystem der Anrufer anhand seiner Stimme erkannt wird und in Abhängigkeit einer Erkennung ein Dienst aktiviert wird. Die Erfindung betrifft weiterhin ein Telekommunikationssystem mit Sprachboxen.
摘要:
Authentication of voice message recipient network addresses employs generating (102) and storing (104) a 'network file' that includes 'voice clips' and associated network addresses that are extracted from voice messages received across a network (10) from voice message systems (16, 18). A voice clip is the first one to three seconds of voice extracted from each received voice message. Over time, the network file will grow to contain multiple voice clips and associated network voice message addresses. When a voice message originator subsequently enters a recipient's network address (106), the originating voice message system searches (114) the network file for the network address, retrieves the associated voice clip (116), and plays it for the voice message originator to authenticate the recipient's network address. Voice authentication of a voice message originator entails encoding (134) into a 'voice print file', original voice clips and associated network addresses received from positively identified voice message originators. Thereafter, when a questionable voice message is received (138), the voice message system extracts a new voice clip (142), generates a new voice print (144), and compares it with the original voice print associated with the voice message address (148). If the voice prints are substantially the same, the received voice message is annotated with an 'authenticating' message (150).
摘要:
The INTERACTIVE CREDIT CARD FRAUD CONTROL PROCESS system utilizes a computer with telephone interface, memory, voice recognition software and hardware, and an information archive and retrieval process. A computer program (10) is used to automatically and electronically control the determination of the caller as the authorized credit card holder, or conversely an unauthorized perpetrator attempting to make a credit card transaction. The telephone interface is connected to a telephone line and the caller dials a number that connects the caller with the present invention (12), which then captures certain information about the incoming call (14 & 16) and creates a permanent Record Stamp (18) of the call to which transactional information is added as the call progresses. The caller is asked question prompts, and the system receives voice and touch tone responses from the caller from which the system determines if a VoicePrint is applicable (20). The caller responses are managed by the present invention in a method that determines if the caller is the authorized credit card holder, and if the caller is not the authorized credit card holder the present invention captures information that can lead to the capture and conviction of the caller as a credit card fraud felon. The present invention uses the caller's spoken voice print of the card holder's name as one of the determining factors to determine if the caller is the authorized credit card holder (22). The VoicePrint, included in a claim in the present invention, uniquely and positively identifies a single person, and therefore becomes a valuable tool and evidence in the apprehension and conviction of perpetrators of credit card fraud. With a VoicePrint of the authorized credit card holder on file, the present invention prevents any other person except approved persons from making credit card transactions with that card number. Even without the VoicePrint, the control process is highly effective in limiting fraud risk and the present invention creates a VoicePrint of the caller, ties that identifier to the Record Stamp, and can thereafter identify that person as the person who was the caller. Additional claims relate to using the present invention for security and access control, including the gathering of positive identifying evidence of perpetrators.
摘要:
A computer system may communicate metadata that identifies a current speaker. The computer system may receive audio data that represents speech of the current speaker, generate an audio fingerprint of the current speaker based on the audio data, and perform automated speaker recognition by comparing the audio fingerprint of the current speaker against stored audio fingerprints contained in a speaker fingerprint repository. The computer system may communicate data indicating that the current speaker is unrecognized to a client device of an observer and receive tagging information that identifies the current speaker from the client device of the observer. The computer system may store the audio fingerprint of the current speaker and metadata that identifies the current speaker in the speaker fingerprint repository and communicate the metadata that identifies the current speaker to at least one of the client device of the observer or a client device of a different observer.