TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
First Claim
1. A computer-implemented method for restricting access to a call management system, the method comprising the steps of:
- during a registration process by a user of the call management system;
receiving a first image from the user;
verifying the first image is indicative of a face using image recognition; and
associating the verified first image with the user and storing the verified first image in a database; and
during each subsequent access attempt by the user to the call management system to place a call;
prompting the user for a second image;
determining whether a visual characteristic of the second image matches a visual characteristic of the verified first image;
determining whether the visual characteristic of the second image is a statistical match to the visual characteristic of the verified first image; and
allowing or rejecting the call based on the determination.
9 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user'"'"'s account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
-
Citations
20 Claims
-
1. A computer-implemented method for restricting access to a call management system, the method comprising the steps of:
-
during a registration process by a user of the call management system; receiving a first image from the user; verifying the first image is indicative of a face using image recognition; and associating the verified first image with the user and storing the verified first image in a database; and during each subsequent access attempt by the user to the call management system to place a call; prompting the user for a second image; determining whether a visual characteristic of the second image matches a visual characteristic of the verified first image; determining whether the visual characteristic of the second image is a statistical match to the visual characteristic of the verified first image; and allowing or rejecting the call based on the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus for restricting access to a call management system, the apparatus comprising:
-
a database; and one or more processors and/or circuits configured to; register a user, the registering including; receiving a first image from the user; and store the first image in the database; and authorize or reject a subsequent call attempt by the user by; receiving a second image from the user; verifying that the first image is indicative of a face; determining whether a visual characteristic of the second image matches a visual characteristic of the first image; and authorize or reject the subsequent call attempt based on the determining. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method for determining a number of participants to a live electronic communication, the live electronic communication having been initiated by a first participant at an initiator side and including a second participant at a recipient side, the method comprising:
-
sampling image data from the initiator side of the live electronic communication; analyzing the sampled image data; identifying a number of participants on the initiator side of the conversation based on the analyzing; determining that the number of participants on the initiator side of the conversation exceeds a predetermined number; and taking a predefined action in response to the determining. - View Dependent Claims (17, 18, 19, 20)
-
Specification