TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
First Claim
1. A call management system for detecting an unauthorized party to a telephone conversation between a local user and a remote user, the system comprising:
- a voiceprint database; and
a control platform configured to;
store voiceprints of authorized local users in the voiceprint database;
monitor audio information of the telephone conversation;
detect a first characteristic of the local user in the audio information;
search the stored voiceprints for a first matching voiceprint based on the first characteristic;
identify the local user based on the first characteristic;
detect a second characteristic in the audio information;
identify the second characteristic as belonging to a second local user based on a comparison of the second characteristic to the first matching voiceprint;
search the stored voiceprints for a second matching voiceprint based on the second characteristic; and
determine if the second local user is authorized to participate in the telephone conversation based on results of the search.
6 Assignments
0 Petitions
Accused Products
Abstract
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user'"'"'s account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
-
Citations
20 Claims
-
1. A call management system for detecting an unauthorized party to a telephone conversation between a local user and a remote user, the system comprising:
-
a voiceprint database; and a control platform configured to; store voiceprints of authorized local users in the voiceprint database; monitor audio information of the telephone conversation; detect a first characteristic of the local user in the audio information; search the stored voiceprints for a first matching voiceprint based on the first characteristic; identify the local user based on the first characteristic; detect a second characteristic in the audio information; identify the second characteristic as belonging to a second local user based on a comparison of the second characteristic to the first matching voiceprint; search the stored voiceprints for a second matching voiceprint based on the second characteristic; and determine if the second local user is authorized to participate in the telephone conversation based on results of the search. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A call management system for detecting an unauthorized party to a telephone conversation between a local user and a remote user, the system comprising:
-
a voiceprint database; and a control platform configured to; store voiceprints of authorized remote users in the voiceprint database; monitor audio information of the telephone conversation; detect a first characteristic of the remote user in the audio information; search the stored voiceprints for a first matching voiceprint based on the first characteristic; identify the remote user based on the first characteristic; detect a second characteristic in the audio information; identify the second characteristic as belonging to a second remote user based on a comparison of the second characteristic to the first matching voiceprint; search the stored voiceprints for a second matching voiceprint based on the second characteristic; and determine if the second remote user is authorized to participate in the telephone conversation based on results of the search. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method of call management to detect an unauthorized party to a telephone conversation, the method comprising:
-
storing voiceprints including voiceprints of users authorized to participate in the telephone conversation; monitoring audio information of the telephone conversation; detecting a first characteristic of a first user in the audio information; searching the stored voiceprints for a first matching voiceprint based on the first characteristic; identifying the first user based on the first characteristic; detecting a second characteristic in the audio information; identifying the second characteristic as belonging to a second user based on a comparison of the second characteristic to the first matching voiceprint; searching the stored voiceprints for a second matching voiceprint based on the second characteristic; and determining if the second user is authorized to participate in the telephone conversation based on results of the search. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification