Telecommunication call management and monitoring system with voiceprint verification
First Claim
1. A computer-implemented method for restricting access to a telephone call management system, said method comprising the steps of:
- during a registration process by a user of said telephone call management system;
prompting the user to speak one or more predetermined keywords;
receiving a first speech sample from said user;
verifying said first speech sample is indicative of said one or more predetermined keywords using speaker independent voice recognition; and
associating said verified first speech sample with said user and storing said verified first speech sample in a database; and
during each subsequent access attempt by said user to said telephone call management system to place a telephone;
prompting said user for a second speech sample;
determining whether a voice characteristic of said second speech sample matches a voice characteristic of said verified first speech sample;
allowing said telephone call to be completed when the voice characteristic of said second speech sample matches the voice characteristic of said verified first speech sample; and
after the allowing said telephone call to be completed, sampling voice data from said telephone call to detect if an unauthorized person has spoken based on the voice characteristic of the verified first speech sample.
16 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user'"'"'s account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
-
Citations
17 Claims
-
1. A computer-implemented method for restricting access to a telephone call management system, said method comprising the steps of:
-
during a registration process by a user of said telephone call management system; prompting the user to speak one or more predetermined keywords; receiving a first speech sample from said user; verifying said first speech sample is indicative of said one or more predetermined keywords using speaker independent voice recognition; and associating said verified first speech sample with said user and storing said verified first speech sample in a database; and during each subsequent access attempt by said user to said telephone call management system to place a telephone; prompting said user for a second speech sample; determining whether a voice characteristic of said second speech sample matches a voice characteristic of said verified first speech sample; allowing said telephone call to be completed when the voice characteristic of said second speech sample matches the voice characteristic of said verified first speech sample; and after the allowing said telephone call to be completed, sampling voice data from said telephone call to detect if an unauthorized person has spoken based on the voice characteristic of the verified first speech sample. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus for restricting access to a telephone call management system, said apparatus comprising:
-
a registration module configured to, during a registration process by a user of said telephone call management system, prompt said user to speak one or more predetermined keywords and receive a first speech sample from said user; a database including said first speech sample associated with said user; a prompting module configured to prompt said user to provide a second speech sample when said user subsequently attempts to access said telephone call management system; a speaker independent voice recognition module configured to verify said first speech sample is indicative of said one or more predetermined keywords; and a speaker dependent voice identification module configured to determine whether a voice characteristic of said second speech sample matches a voice characteristic of said first speech sample, wherein said telephone call management system authorizes said user to complete a telephone call using said telephone call management system when a voice characteristic of said second speech sample matches a voice characteristic of said first speech sample, and wherein said telephone call management system, after authorizing said user to use said telephone management system, samples voice data from said telephone call to detect if an unauthorized person has spoken based on the voice characteristic of the verified first speech sample. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification