Telecommunication call management and monitoring system with voiceprint verification
DCFirst Claim
1. A call management system for detecting an unauthorized party, comprising:
- a control platform configured to;
store a first voiceprint of a local user and a second voiceprint of a remote user;
monitor audio information of a telephone conversation between said local user and said remote user to detect a presence of a first characteristic;
compare said first characteristic with each of a second characteristic in said first voiceprint and a third characteristic in said second voiceprint; and
take a control action related to said telephone conversation based on a result of the comparison of said first characteristic with said second and third characteristics,wherein said audio information is analyzed to detect said presence of said first characteristic, andwherein each of the first, second, and third characteristics is at least one of a pitch, loudness, frequency or timbre.
15 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user'"'"'s account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
48 Citations
33 Claims
-
1. A call management system for detecting an unauthorized party, comprising:
-
a control platform configured to; store a first voiceprint of a local user and a second voiceprint of a remote user; monitor audio information of a telephone conversation between said local user and said remote user to detect a presence of a first characteristic; compare said first characteristic with each of a second characteristic in said first voiceprint and a third characteristic in said second voiceprint; and take a control action related to said telephone conversation based on a result of the comparison of said first characteristic with said second and third characteristics, wherein said audio information is analyzed to detect said presence of said first characteristic, and wherein each of the first, second, and third characteristics is at least one of a pitch, loudness, frequency or timbre. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 19, 20)
-
-
12. A method for detecting an unauthorized party in a telephone call, comprising:
-
storing a first voiceprint of a local user and a second voiceprint of a remote user; monitoring audio information of a telephone conversation between said local user and said remote user to detect a presence of a first characteristic, comparing said first characteristic with each of a second characteristic in said first voiceprint and a third characteristic in said second voiceprint, taking a control action related to said telephone conversation based on a result of the comparing said first characteristic with said second and third characteristics, wherein said audio information is analyzed to detect said presence of said first characteristic, and wherein each of the first, second, and third characteristics is at least one of a pitch, loudness, frequency or timbre. - View Dependent Claims (13, 14, 15, 16, 17, 18, 21, 22)
-
-
23. A non-transitory computer-readable storage medium having instructions stored thereon, execution of which by a processor cause the processor to perform operations for detecting an unauthorized party, the operations comprising:
-
storing a first voiceprint of a local user and a second voiceprint of a remote user; monitoring audio information of a telephone conversation between said local user and said remote user to detect a presence of a first characteristic, comparing said first characteristic with each of a second characteristic in said first voiceprint and a third characteristic in said second voiceprint, taking a control action related to said telephone conversation based on a result of the comparing said first characteristic with said second and third characteristics, wherein said audio information is analyzed to detect said presence of said first characteristic, and wherein each of the first, second, and third characteristics is at least one of a pitch, loudness, frequency or timbre. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification