Telecommunication Call Management and Monitoring System With Voiceprint Verification
First Claim
1. A system comprising:
- a database configured to;
store biometric data of a plurality of users;
store first identifying information associated with the plurality of users in correspondence with the biometric data; and
a control platform coupled to the database, the control platform configured to;
prior to a call;
receive second biometric data associated with a calling party;
receive second identifying information related to the calling party;
find in the database third identifying information from among the first identifying information that matches the second identifying information received from the calling party;
retrieve from the database third biometric data associated with the third identifying information;
compare the second biometric data received from the calling party with the third biometric data retrieved from the database; and
authenticate the calling party based on the comparison; and
during the call;
acquire and store biometric information of the called party;
acquire, at regular intervals, biometric information of a person speaking;
compare the acquired biometric information of the person speaking to at least one of the stored third biometric information and the stored biometric information of the called party; and
detect the presence of an unauthorized call participant based on the comparison.
8 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user'"'"'s account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
19 Citations
20 Claims
-
1. A system comprising:
-
a database configured to; store biometric data of a plurality of users; store first identifying information associated with the plurality of users in correspondence with the biometric data; and a control platform coupled to the database, the control platform configured to; prior to a call; receive second biometric data associated with a calling party; receive second identifying information related to the calling party; find in the database third identifying information from among the first identifying information that matches the second identifying information received from the calling party; retrieve from the database third biometric data associated with the third identifying information; compare the second biometric data received from the calling party with the third biometric data retrieved from the database; and authenticate the calling party based on the comparison; and during the call; acquire and store biometric information of the called party; acquire, at regular intervals, biometric information of a person speaking; compare the acquired biometric information of the person speaking to at least one of the stored third biometric information and the stored biometric information of the called party; and detect the presence of an unauthorized call participant based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving biometric data of a plurality of users; storing the biometric data in a database; receiving first identifying information of the plurality of users; storing the first identifying information in the database in correspondence with the biometric data of the plurality of users; prior to a call; receiving second biometric data related to a calling party; receiving second identifying information related to the calling party; finding in the database third identifying information from among the first identifying information that substantially matches the second identifying information received from the calling party; retrieving from the database third biometric data associated with the third identifying information; comparing the second biometric data received from the calling party with the third biometric data retrieved from the database; and authenticating the calling party based on the comparing; and during the call; acquiring and storing biometric information of the called party; acquiring, at regular intervals, biometric information of a person speaking; comparing the acquired biometric information of the person speaking to at least one of the stored third biometric information and the stored biometric information of the called party; and detecting the presence of an unauthorized call participant based on the comparison. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification