Telecommunication Call Management and Monitoring System With Voiceprint Verification
First Claim
1. A method for restricting access to a call management system, the method comprising:
- registering a user of the call management system in an institution, the registering including;
receiving a first image from the user via a camera;
verifying the first image is indicative of a face using image recognition; and
associating the verified first image with the user; and
storing the verified first image in a database; and
authenticating a call access attempt by the user, the authenticating including;
receiving the call access request by the user of the call management system;
prompting the user for a second image;
determining whether a visual characteristic of the second image is a statistical match to a visual characteristic of the stored verified first image; and
allowing or rejecting the call to proceed based on the determination.
9 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user'"'"'s account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
-
Citations
20 Claims
-
1. A method for restricting access to a call management system, the method comprising:
registering a user of the call management system in an institution, the registering including; receiving a first image from the user via a camera; verifying the first image is indicative of a face using image recognition; and associating the verified first image with the user; and storing the verified first image in a database; and authenticating a call access attempt by the user, the authenticating including; receiving the call access request by the user of the call management system; prompting the user for a second image; determining whether a visual characteristic of the second image is a statistical match to a visual characteristic of the stored verified first image; and allowing or rejecting the call to proceed based on the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. An apparatus for restricting access to a call management system, the apparatus comprising:
-
a database; and one or more processors and/or circuits configured to; register a user of the call management system in an institution by being configured to; receive a first image from the user via a camera; verify the first image is indicative of a face using image recognition; and associate the verified first image with the user; and store the verified first image in the database; and authenticate a call access attempt by the user by being configured to; receive the call access request by the user of the call management system, prompt the user for a second image; determine whether a visual characteristic of the second image is a statistical match to a visual characteristic of the stored verified first image; and allow or rejecting the call to proceed based on the determination. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification