Abstract:
A disclosed method of authenticating a telephone caller includes receiving an authentication request for the telephone caller that includes a voice recording of the caller and household information indicative of a household, creating a first voice pattern based on the voice recording of the caller, retrieving a second voice pattern using at least some of the household information, comparing the two voice patterns, and transmitting information indicative of the results of the comparison. The transmitted information may include information that the telephone caller is authenticated, is not authenticated, or that the comparison results were inconclusive. The method may include monitoring telephone calls with the household, and if it is determined that a voice on at least some of the telephone calls is associated with the household, creating the second voice pattern based on the voice, and associating the second voice pattern to the household. The method may further include disassociating the second voice pattern from the household if it is determined that a change of household has occurred.
Abstract:
Voice activated dialing is described for use in a mobile telecommunications system. A voice input is received from a wireless network user. A telephone number to be dialed is determined by using speaker independent speech recognition to interpret a string of spoken digits in the voice input to determine the telephone number, or using speaker dependent speech recognition to interpret a spoken word in the voice input to determine the telephone number. A telephone call is then initiated by dialing the telephone number.
Abstract:
A method and a related system to index voicemail documents by training a language model for a speaker or group of speakers by using existing emails and contact information on available repositories.
Abstract:
Improved systems and methods are provided for transcribing audio files of voice mails sent over a unified messaging system. Customized grammars specific to a voice mail recipient are created and utilized to transcribe a received voice mail by comparing the audio file to commonly utilized words, names, acronyms, and phrases used by the recipient. Key elements are identified from the resulting text transcription to aid the recipient in processing received voice mails based on the significant content contained in the voice mail.
Abstract:
A system and method provides universal access to voice-based documents containing information formatted using MIME and HTML standards using customized extensions for voice information access and navigation. These voice documents are linked using HTML hyper-links that are accessible to subscribers using voice commands, touch-tone inputs and other selection means. These voice documents and components in them are addressable using HTML anchors embedding HTML universal resource locators (URLs) rendering them universally accessible over the Internet. This collection of connected documents forms a voice web. The voice web includes subscriber-specific documents including speech training files for speaker dependent speech recognition, voice print files for authenticating the identity of a user and personal preference and attribute files for customizing other aspects of the system in accordance with a specific subscriber.
Abstract:
A system and method provides universal access to voice-based documents containing information formatted using MIME and HTML standards using customized extensions for voice information access and navigation. These voice documents are linked using HTML hyper-links that are accessible to subscribers using voice commands, touch-tone inputs and other selection means. These voice documents and components in them are addressable using HTML anchors embedding HTML universal resource locators (URLs) rendering them universally accessible over the Internet. This collection of connected documents forms a voice web. The voice web includes subscriber-specific documents including speech training files for speaker dependent speech recognition, voice print files for authenticating the identity of a user and personal preference and attribute files for customizing other aspects of the system in accordance with a specific subscriber.
Abstract:
This disclosure describes techniques and systems for encoding instructions in audio data that, when output on a speaker of a first device in an environment, cause a second device to output content in the environment. In some instances, the audio data has a frequency that is inaudible to users in the environment. Thus, the first device is able to cause the second device to output the content without users in the environment hearing the instructions. In some instances, the first device also outputs content, and the content output by the second device is played at an offset relative to a position of the content output by the first device.
Abstract:
A computer-implemented method comprises establishing, by media servers, a video conference for client computing devices, each media server receiving audio data and video data from a local subset of the client computing devices, selecting, by each media server, a portion of the local subset for which to send audio data to other media servers, sending, by each media server, audio data associated with the portion to other media servers, after receiving audio data from other media servers, generating, by each media server, ordered global list data that identifies each client computing device for which the media server has received audio data, based on the global list data and by each media server to other media servers, sending video data for each client computing device of the local subset that satisfies a threshold value.
Abstract:
Structures and protocols are presented for using or otherwise relating to a first mobile device (a smartphone or tablet computer or wearable device, e.g.) configured to be shared by two or more parties such that a subset of the parties may be addressed selectively (in content directed to such parties, e.g.) in a cost-effective manner.
Abstract:
An inbound call connection request may be received from a non-resident, directed to a controlled-environment facility resident and/or the resident's device. A determination may be made that a calling account of the resident does not have sufficient funds to pay for the inbound call, whereupon a message may be provided to the non-resident offering billing options, including at least a wireless carrier billing option, to complete the call connection. The call may be connected with the resident device in response to a determination a calling account of the inmate has sufficient funds to pay for the call or acceptance of one of the payment methods by the non-resident, along with authentication that the non-resident is associated with an address identifier (AID) of the resident device, and verification that the resident operating the device is associated with the AID of the device.