Telecommunication call management and monitoring system with voiceprint verification
First Claim
1. A method for restricting access to a telephone network by a call management system associated with a controlled environment facility, the method comprising:
- registering a user of the call management system, the registering including;
receiving a first image from the user via a camera coupled to a plurality of user telephones;
verifying the first image is indicative of a face using image recognition;
associating the verified first image with the user; and
storing the verified first image in a database; and
authenticating a call access attempt by the user, the call access attempt being an attempt by the user to gain access to the telephone network for purposes of making a telephone call, the authenticating including;
the call management system;
receiving the call access attempt by the user of a telephone, the telephone being one of the plurality of user telephones;
prompting the user for a second image;
determining whether a visual characteristic of the second image is a statistical match to a visual characteristic of the stored verified first image; and
allowing or rejecting the call access attempt based on the determination.
9 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user'"'"'s account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
-
Citations
20 Claims
-
1. A method for restricting access to a telephone network by a call management system associated with a controlled environment facility, the method comprising:
-
registering a user of the call management system, the registering including; receiving a first image from the user via a camera coupled to a plurality of user telephones; verifying the first image is indicative of a face using image recognition; associating the verified first image with the user; and storing the verified first image in a database; and authenticating a call access attempt by the user, the call access attempt being an attempt by the user to gain access to the telephone network for purposes of making a telephone call, the authenticating including; the call management system; receiving the call access attempt by the user of a telephone, the telephone being one of the plurality of user telephones; prompting the user for a second image; determining whether a visual characteristic of the second image is a statistical match to a visual characteristic of the stored verified first image; and allowing or rejecting the call access attempt based on the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A call management system for restricting access to a telephone network, the call management system associated with a controlled environment facility and comprising:
-
a database; a plurality of user telephones; and one or more processors and/or circuits configured to; register a user of the call management system by being configured to; receive a first image from the user via a camera coupled to the plurality of user telephones; verify the first image is indicative of a face using image recognition; associate the verified first image with the user; and store the verified first image in the database; and authenticate a call access attempt by the user, the call access attempt being an attempt by the user to gain access to the telephone network for purposes of making a telephone call, by being configured to; receive the call access attempt by the user of a telephone, the telephone being one of the plurality of user telephones; prompt the user for a second image; determine whether a visual characteristic of the second image is a statistical match to a visual characteristic of the stored verified first image; and allow or reject the call access attempt based on the determination. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification