Identical conversation detection method and apparatus
First Claim
Patent Images
1. A method for detecting unauthorized communications by a first resident of a correctional facility, comprising:
- embedding first identifying data within an audio signal generated by a first voice communication by the first resident utilizing a first communication device provided by the first correctional facility, wherein the first identifying data uniquely identifies the first correctional facility;
monitoring a second voice communication by a second resident utilizing a second communication device;
detecting the first identifying data within the audio signal of the second voice communication by the second resident;
generating a recording-point invariant data set of the audio signal of the second voice communication, wherein the recording-point invariant data set specifies the detected first identifying data that identifies the first correctional facility and further specifies times of the detected first identifying data within the data set; and
issuing a notification if the first identifying data is detected in the monitored second voice communication, wherein the notification indicates an unauthorized communication between the first resident and the second resident.
16 Assignments
0 Petitions
Accused Products
Abstract
An automated system is disclosed for detecting situations in which identical segments of conversation appear within two different recordings. The system automatically detects where within each of two audio recordings an identical conversation segment begins and ends, thus enabling detection of conversations where multiple prison inmates participated in a conference call.
112 Citations
16 Claims
-
1. A method for detecting unauthorized communications by a first resident of a correctional facility, comprising:
-
embedding first identifying data within an audio signal generated by a first voice communication by the first resident utilizing a first communication device provided by the first correctional facility, wherein the first identifying data uniquely identifies the first correctional facility; monitoring a second voice communication by a second resident utilizing a second communication device; detecting the first identifying data within the audio signal of the second voice communication by the second resident; generating a recording-point invariant data set of the audio signal of the second voice communication, wherein the recording-point invariant data set specifies the detected first identifying data that identifies the first correctional facility and further specifies times of the detected first identifying data within the data set; and issuing a notification if the first identifying data is detected in the monitored second voice communication, wherein the notification indicates an unauthorized communication between the first resident and the second resident. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for detecting unauthorized communications by a first resident of a correctional facility, the system comprising:
-
one or more processors; and a memory device coupled to the one or more processors, the memory device storing computer-readable instructions that, upon execution by the one or more processors, cause the system to; embed first identifying data within an audio signal generated by a first voice communication by the first resident utilizing a first communication device provided by the first correctional facility, wherein the first identifying data uniquely identifies the first correctional facility; monitor a second voice communication by a second resident utilizing a second communication device; detect the first identifying data within the audio signal of the second voice communication by the second resident; generate a recording-point invariant data set of the audio signal of the second voice communication, wherein the recording-point invariant data set specifies the detected first identifying data that identifies the first correctional facility and further specifies times of the detected first identifying data within the data set; and issue a notification if the first identifying data is detected in the monitored second voice communication, wherein the notification indicates an unauthorized communication between the first resident and the second resident. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification