Telecommunication call management and monitoring system with voiceprint verification
First Claim
1. A computer-implemented method for restricting access to a call management system, the method comprising the steps of:
- during a registration process by a user of the call management system;
receiving a first image from the user via a biometric sensing device;
verifying the first image is indicative of a face using image recognition; and
associating the verified first image with a user profile and storing the verified first image in a database; and
during each subsequent access attempt by the user to the call management system to place a call;
prompting the user to utilize the biometric sensing device to provide a second image;
determining that a visual characteristic of the second image matches a visual characteristic of the verified first image;
determining that the visual characteristic of the second image is a statistical match to the visual characteristic of the verified first image; and
in response to determining that the visual characteristic of the second image is a statistical match to the visual characteristics of the verified first image;
retrieving voice prompt menu information associated with the user profile;
selecting a voice prompt menu from a plurality of voice prompt menus based on the retrieved voice prompt menu information;
playing the selected voice prompt menu for a called party that the user is attempting to contact, wherein the voice prompt menu prompts the called party to supply biometric authentication information; and
allowing the call in response to receiving and authenticating supplied biometric authentication information from the called party.
8 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user'"'"'s account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
241 Citations
20 Claims
-
1. A computer-implemented method for restricting access to a call management system, the method comprising the steps of:
-
during a registration process by a user of the call management system; receiving a first image from the user via a biometric sensing device; verifying the first image is indicative of a face using image recognition; and associating the verified first image with a user profile and storing the verified first image in a database; and during each subsequent access attempt by the user to the call management system to place a call; prompting the user to utilize the biometric sensing device to provide a second image; determining that a visual characteristic of the second image matches a visual characteristic of the verified first image; determining that the visual characteristic of the second image is a statistical match to the visual characteristic of the verified first image; and in response to determining that the visual characteristic of the second image is a statistical match to the visual characteristics of the verified first image; retrieving voice prompt menu information associated with the user profile; selecting a voice prompt menu from a plurality of voice prompt menus based on the retrieved voice prompt menu information; playing the selected voice prompt menu for a called party that the user is attempting to contact, wherein the voice prompt menu prompts the called party to supply biometric authentication information; and allowing the call in response to receiving and authenticating supplied biometric authentication information from the called party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus for restricting access to a call management system, the apparatus comprising:
-
a database; and one or more processors and/or circuits configured to; register a user, the registering including; receiving a first image from the user via a biometric sensing device; and storing the first image in the database; and authorize or reject-a subsequent call attempt by the user by; receiving a second image from the user; verifying that the first image is indicative of a face; determining that a visual characteristic of the second image matches a visual characteristic of the first image; in response to determining that the visual characteristic of the second image matches a visual characteristic of the first image, retrieving voice prompt menu information from the database; selecting a voice prompt menu from a plurality of voice prompt menus based on the retrieved voice prompt menu information; playing the selected voice prompt menu for a called party that the user is attempting to contact, wherein the voice prompt menu prompts the called party to supply biometric authentication information; and authorizing the subsequent call attempt in response to receiving and authenticating supplied biometric authentication information from the called party. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A tangible non-transitory computer-readable device having instructions stored thereon that, when executed by at least one computing device, causes the at least one computing device to perform operations comprising:
-
during a registration process by a user of a call management system; receiving a first image from the user via a biometric sensing device; verifying the first image is indicative of a face using image recognition; and associating the verified first image with a user profile and storing the verified first image in a database; and during each subsequent access attempt by the user to the call management system to place a call; prompting the user to utilize the biometric sensing device to provide a second image; determining that a visual characteristic of the second image matches a visual characteristic of the verified first image; determining that the visual characteristic of the second image is a statistical match to the visual characteristic of the verified first image; and in response to determining that the visual characteristic of the second image is a statistical match to the visual characteristics of the verified first image; retrieving voice prompt menu information associated with the user profile; selecting a voice prompt menu from a plurality of voice prompt menus based on the retrieved voice prompt menu information; playing the selected voice prompt menu for a called party that the user is attempting to contact, wherein the voice prompt menu prompts the called party to supply biometric authentication information; and allowing the call in response to receiving and authenticating supplied biometric authentication information from the called party. - View Dependent Claims (17, 18, 19, 20)
-
Specification