Telecommunication Call Management And Monitoring System With Voiceprint Verification
First Claim
1. A call management system for detecting an unauthorized party, comprising:
- a plurality of trunk lines for providing a connection to at least one telephone service provider;
an electronic switchboard device for connecting said plurality of trunk lines to a telephone network;
a telephone terminal for making a telephone call via said switchboard device; and
a control platform for monitoring a conversation in said telephone call and for storing a first voiceprint of a local user and a second voiceprint of a remote user;
wherein said first and said second voiceprints are obtained from said conversation,wherein said system connects said telephone call to a communication device associated with said remote user,wherein said system monitors information in audio of said conversation to detect a presence of a first characteristic in said audio,wherein said system compares said first characteristic with each of a second characteristic in said first voiceprint and a third characteristic in said second voiceprint,wherein said system terminates said telephone call if said first characteristic is not found in said first voiceprint or said second voiceprint, andwherein said first and said second voiceprints are received from said conversation.
15 Assignments
0 Petitions
Accused Products
Abstract
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user'"'"'s account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
-
Citations
32 Claims
-
1. A call management system for detecting an unauthorized party, comprising:
-
a plurality of trunk lines for providing a connection to at least one telephone service provider; an electronic switchboard device for connecting said plurality of trunk lines to a telephone network; a telephone terminal for making a telephone call via said switchboard device; and a control platform for monitoring a conversation in said telephone call and for storing a first voiceprint of a local user and a second voiceprint of a remote user; wherein said first and said second voiceprints are obtained from said conversation, wherein said system connects said telephone call to a communication device associated with said remote user, wherein said system monitors information in audio of said conversation to detect a presence of a first characteristic in said audio, wherein said system compares said first characteristic with each of a second characteristic in said first voiceprint and a third characteristic in said second voiceprint, wherein said system terminates said telephone call if said first characteristic is not found in said first voiceprint or said second voiceprint, and wherein said first and said second voiceprints are received from said conversation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A telephone call management system for detecting an unauthorized party, comprising:
-
a plurality of trunk lines for providing a connection to at least one telephone service provider, wherein said plurality of trunk lines are connected to a telephone network; a telephone terminal associated with a local user for making at least one telephone call to a communication device associated with a remote user; at least one electronic switchboard device for routing said at least one telephone call to said remote communication device via at least one trunk line; and a control platform for storing a first identification number of said local user, a first voiceprint of said local user, and a second voiceprint of said remote user; wherein said system receives a second identification number and a third voiceprint from said telephone terminal during access to said at least one trunk line, wherein said system authenticates said local user by determining whether said first identification number matches said second identification number, and whether said first voiceprint matches said third voiceprint, wherein said system connects said telephone call to said communication device if said local user is authenticated; wherein said system monitors audio of a conversation in said telephone call to detect a presence of a first characteristic in said audio, wherein said system compares said first characteristic with a second characteristic in said first voiceprint or a third characteristic in said second voiceprint, and wherein said system terminates said telephone call if said first characteristic is not found in said first voiceprint or said second voiceprint. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A telephone call management system for detecting an unauthorized party, comprising:
-
a plurality of trunk lines for providing a connection to a communication network; a telephone terminal associated with said local user for making at least one telephone call to a communication device, said communication device being associated with a remote user; at least one electronic switchboard device for routing said at least one telephone call to said communication device via at least one trunk line; and a control platform for storing a first identification number of said local user, a first voiceprint of said local user, a second identification number of said remote user, and a second voiceprint of said remote user; wherein said system receives a third identification number and a third voiceprint from said telephone terminal and receives a fourth identification number from said communication device during access to said at least one trunk line, wherein said system connects said telephone call to said communication device if each of said local user and said remote user is authenticated; wherein said system monitors audio of a conversation in said telephone call to detect a presence of a first characteristic in said audio, wherein said system compares said first characteristic with a second characteristic in said first voiceprint or a third characteristic in said second voiceprint, and wherein said system terminates said telephone call if said first characteristic is not found in said first voiceprint or said second voiceprint. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification