System and method for user-privacy-aware communication monitoring and analysis
First Claim
1. A method, comprising:
- maintaining a voice signature database including a received digital voice signature of a predefined target individual;
receiving monitored voice calls conducted in a communication network;
comparing speech content of the monitored voice calls to the received digital voice signature of the predefined target individual maintained in the voice signature database;
selecting, based on the comparison, a partial subset of the monitored voice calls that are suspected of having been conducted by the predefined target individual, the selected partial subset of the voice calls include speech content that matches the received digital voice signature of the predefined target individual;
after selecting the partial subset, encrypting the selected partial subset with an encryption key that is associated with the target individual;
storing only the encrypted partial subset of the voice calls from the received monitored voice calls in a call database;
upon showing that the voice calls in the partial subset were conducted by the target individual with a confidence level greater than a threshold, receiving a decryption key that is associated with the target individual; and
decrypting the encrypted partial subset of the voice calls retrieved from the call database using the decryption key, and providing the decrypted voice calls for analysis.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for monitoring, analyzing and acting upon voice calls in communication networks. An identification system receives monitored voice calls that are conducted in a communication network. Some of the monitored voice calls may be conducted by target individuals who are predefined as suspects. In order to maintain user privacy, the system selects and retains only voice calls that are suspected of being conducted by predefined targets. The techniques disclosed herein are particularly advantageous in scenarios where the network identifiers of the terminal used by the target are not known, or where the target uses public communication devices. In accordance with the disclosure, context-based identifiers such as speaker recognition or keyword matching are used.
-
Citations
20 Claims
-
1. A method, comprising:
-
maintaining a voice signature database including a received digital voice signature of a predefined target individual; receiving monitored voice calls conducted in a communication network; comparing speech content of the monitored voice calls to the received digital voice signature of the predefined target individual maintained in the voice signature database; selecting, based on the comparison, a partial subset of the monitored voice calls that are suspected of having been conducted by the predefined target individual, the selected partial subset of the voice calls include speech content that matches the received digital voice signature of the predefined target individual; after selecting the partial subset, encrypting the selected partial subset with an encryption key that is associated with the target individual; storing only the encrypted partial subset of the voice calls from the received monitored voice calls in a call database; upon showing that the voice calls in the partial subset were conducted by the target individual with a confidence level greater than a threshold, receiving a decryption key that is associated with the target individual; and decrypting the encrypted partial subset of the voice calls retrieved from the call database using the decryption key, and providing the decrypted voice calls for analysis. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. Apparatus, comprising:
-
a voice signature database configured to store a received digital voice signature of a predefined target individual; an interface, which is configured to receive monitored voice calls conducted in a communication network; and a processor, which is configured to select a partial subset of the monitored voice calls that are suspected of having been conducted by the predefined target individual, to encrypt the selected partial subset with an encryption key that is associated with the target individual and to retain only the encrypted partial subset of the voice calls, to receive a decryption key that is associated with the target individual upon showing that the voice calls in the partial subset were conducted by the target individual with a confidence level greater than a threshold, to decrypt the encrypted partial subset of the voice calls using the decryption key, and to provide the decrypted voice calls for analysis; wherein the processor is configured to select the partial subset by choosing the voice calls whose speech content matches the received digital voice signature of the target individual. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification