Telecommunication Call Management and Monitoring System With Voiceprint Verification
First Claim
1. A call management system for detecting an unauthorized party, comprising:
- a control platform configured to;
store voiceprints;
monitor audio information of a telephone conversation between a local user and a remote user to detect a presence of a first characteristic;
search of the stored voiceprints for a matching voiceprint containing a second characteristic that substantially matches the first characteristic;
wherein the stored voiceprints include voiceprints of inmates and voiceprints of called parties.
9 Assignments
0 Petitions
Accused Products
Abstract
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user'"'"'s account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
-
Citations
21 Claims
-
1. A call management system for detecting an unauthorized party, comprising:
a control platform configured to; store voiceprints; monitor audio information of a telephone conversation between a local user and a remote user to detect a presence of a first characteristic; search of the stored voiceprints for a matching voiceprint containing a second characteristic that substantially matches the first characteristic; wherein the stored voiceprints include voiceprints of inmates and voiceprints of called parties. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
12. A method of identifying a person, comprising:
-
monitoring audio information of a telephone conversation between a first user and a second user to detect a presence of a first characteristic; searching a voiceprint database for a matching voiceprint containing a second characteristic that substantially matches the first characteristic; and issuing an alert after the search finds a matching voiceprint, issuing an alert. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method of locating a stolen device, comprising:
-
monitoring audio information of a telephone conversation between a first user and a second user to detect a presence of a first characteristic; searching stored voiceprints for a matching voiceprint containing a second characteristic that substantially matches the first characteristic; and issuing an alert after the search does not find a matching voiceprint. - View Dependent Claims (18, 19, 20, 21)
-
Specification