Telephonic voice message store and forward method having network address and voice authentication
First Claim
1. In a telecommunications network, a method of authenticating for a first user of a first voice message system an identity of a second user of a second voice message system, comprising:
- receiving a voice message from the second user, the voice message having a voice message address of the second user;
extracting from the voice message the voice message address and a voice clip comprising a predetermined voice segment;
encoding the voice clip into an original voice print;
storing in a memory the original voice print in association with the voice message address of the second user;
receiving a subsequent voice message from the voice message address of the second user, wherein the subsequent voice message comprises the voice message address of the second user and a new voice clip;
extracting from the subsequent voice message the voice message address of the second user and the new voice clip;
encoding the new voice clip into a new voice print;
searching the memory for the voice message address of the second user;
retrieving the original voice print associated with the voice message address of the second user;
comparing the original voice print and the new voice print; and
returning to the first user an authenticating response if the original voice print and the new voice print are substantially the same.
4 Assignments
0 Petitions
Accused Products
Abstract
Authentication of voice message recipient network addresses employs generating (102) and storing (104) a “network file” that includes “voice clips” and associated network addresses that are extracted from voice messages received across a network (10) from voice message systems (16, 18). A voice clip is the first one to three seconds of voice extracted from each received voice message. Over time, the network file will grow to contain multiple voice clips and associated network voice message addresses. When a voice message originator subsequently enters a recipient'"'"'s network address (106), the originating voice message system searches (114) the network file for the network address, retrieves the associated voice clip (116), and plays it for the voice message originator to authenticate the recipient'"'"'s network address. Voice authentication of a voice message originator entails encoding (134) into a “voice print file,” original voice clips and associated network addresses received from positively identified voice message originators. Thereafter, when a questionable voice message is received (138), the voice message system extracts a new voice clip (142), generates a new voice print (144), and compares it with the original voice print associated with the voice message address (148). If the voice prints are substantially the same, the received voice message is annotated with a “authenticating” message (150).
-
Citations
7 Claims
-
1. In a telecommunications network, a method of authenticating for a first user of a first voice message system an identity of a second user of a second voice message system, comprising:
-
receiving a voice message from the second user, the voice message having a voice message address of the second user; extracting from the voice message the voice message address and a voice clip comprising a predetermined voice segment; encoding the voice clip into an original voice print; storing in a memory the original voice print in association with the voice message address of the second user; receiving a subsequent voice message from the voice message address of the second user, wherein the subsequent voice message comprises the voice message address of the second user and a new voice clip; extracting from the subsequent voice message the voice message address of the second user and the new voice clip; encoding the new voice clip into a new voice print; searching the memory for the voice message address of the second user; retrieving the original voice print associated with the voice message address of the second user; comparing the original voice print and the new voice print; and returning to the first user an authenticating response if the original voice print and the new voice print are substantially the same. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification