Abstract:
A method for speaker recognition comprising: obtaining speaker information for a target speaker; obtaining speech samples from telephone calls from an unknown speaker; classifying the speech samples according the unknown speaker thereby providing speaker-dependent classes of speech samples; extracting speaker information of each of the speaker-dependent classes of speech samples; combining the extracted speaker information; comparing the combined extracted speaker information with the stored speaker information for the target speaker to obtain a comparison result; and determining whether the unknown speaker is identical with the target speaker based on the comparison result.
Abstract:
A method and a system for voice transmission control. The method comprises: receiving, by a voice answering device, a voice command and transmitting the voice command to a sound control server through a network data transmission channel; recognizing, by the sound control server, the voice command, generating corresponding VXML control information based on a recognition result, and transmitting the VXML control information to the voice answering device through the network data transmission channel; and performing, by the voice answering device, an operation according to the received VXML control information. With this method, the architecture and workflow of the communication system can be simplified, and the difficulty of design thereof can be reduced.
Abstract:
A caller identification apparatus, in order to make, with higher precision, a sharp distinction between a call from a fraud and a call from a person who is not a fraud, comprises a storage means and a voice characteristic analysis means. The storage means stores both a white list with which first voice characteristic information, which is the voice characteristic information of closely related persons of a call recipient, is registered and a black list with which second voice characteristic information, which is the voice characteristic information of frauds, is registered. The voice characteristic analysis means acquires the voice data of a call, obtains third voice characteristic information, which is the voice characteristic information of the voice data, and determines whether the third voice characteristic information matches the first voice characteristic information or the second voice characteristic information. If the third voice characteristic information matches neither the first voice characteristic information nor the second voice characteristic information, the voice characteristic analysis means determines whether the third voice characteristic information includes the voice characteristic information of any multiple persons. If the third voice characteristic information includes the voice characteristic information of any multiple persons, the voice characteristic analysis means obtains a first determination result that the call is probably a call from said frauds.
Abstract:
A facility and method for analyzing and classifying calls without transcription via keyword spotting is disclosed. The facility uses a group of calls having known outcomes to generate one or more domain- or entity-specific grammars containing keywords and related information that are indicative of particular outcome. The facility monitors telephone calls by determining the domain or entity associated with the call, loading the appropriate grammar or grammars associated with the determined domain or entity, and tracking keywords contained in the loaded grammar or grammars that are spoken during the monitored call, along with additional information. The facility performs a statistical analysis on the tracked keywords and additional information to determine a classification for the monitored telephone call.
Abstract:
A telephony communication system prevents an incoming telephony communication directed to a user from being completed if the user is not authorized to communicate with the calling party. Likewise, a telephony system prevents a user from completing an outgoing telephony communication directed to a called party if the user the user is not authorized to communicate with the called party. The telephony communication system also electronically monitors a telephony communication between first and second parties and censors portions of the telephony communication to terminates the telephony communication if predetermined keywords appear in the communication.
Abstract:
A telephone device and a method and for controlling a mute function in the telephone device. While the mute function is active, voice recognition software in the telephone device processes sound detected by a microphone in the telephone device to recognize and identify one or more specific words as having been spoken by a specific person and not by another person, and in response, the telephone device activates an alarm in the telephone device to communicate that the mute function is active. The voice recognition software was trained, prior to the sound having been detected, to differentiate the one or more specific words spoken by the specific person from the same one or more specific words spoken by other people.
Abstract:
The present invention relates to a system for retrieving information from a network such as the Internet. A user creates a user-defined record in a database that identifies an information source, such as a web site, containing information of interest to the user. This record identifies the location of the information source and also contains a recognition grammar based upon a speech command assigned by the user. Upon receiving the speech command from the user that is described within the recognition grammar, a network interface system accesses the information source and retrieves the information requested by the user.
Abstract:
An illustrative method includes receiving, at a processor of a computing device, an audio voice signal of a first call participant during a first call, where the first call is a communication across a communication network. The method further includes determining an identity of the first call participant and determining a speech to text profile associated with the identity of the first call participant, where the speech to text profile includes at least one rule for transcribing a word in the audio voice signal into text. The method further includes generating a text output, where the text output is a transcribed version of a plurality of words identified in the audio voice signal of the first call participant. At least one of the plurality of words identified is identified using the at least one rule.
Abstract:
Structures and protocols are presented for using or otherwise relating to a first mobile device (a smartphone or tablet computer or wearable device, e.g.) configured to be shared by two or more parties such that a subset of the parties may be addressed selectively (in content directed to such parties, e.g.) in a cost-effective manner.
Abstract:
A telephone device and a method and for controlling a mute function in the telephone device. While the mute function is active, voice recognition software in the telephone device processes sound detected by a microphone in the telephone device to recognize and identify one or more specific words as having been spoken by a specific person and not by another person, and in response, the telephone device activates an alarm in the telephone device to communicate that the mute function is active. The voice recognition software was trained, prior to the sound having been detected, to differentiate the one or more specific words spoken by the specific person from the same one or more specific words spoken by other people.