Telecommunication call management and monitoring system with voiceprint verification
First Claim
1. A call management system for detecting an unauthorized party, comprising:
- a control platform configured to;
store voiceprints including voiceprints of inmates and voiceprints of called parties;
monitor audio information of a telephone conversation between at least a local user and a remote user;
detect a first characteristic of the local user in the audio information;
search the stored voiceprints for a first matching voiceprint based on the first characteristic;
detect a second characteristic of the remote user in the audio information;
search the stored voiceprints for a second matching voiceprint based on the second characteristic;
detect a third characteristic in the audio information;
identify the third characteristic as belonging to a third party based on a comparison of the third characteristic to at least one of the first and second matching voiceprints;
determine an identity of the third party by searching the stored voiceprints for a third matching voiceprint based on the third characteristic.
8 Assignments
0 Petitions
Accused Products
Abstract
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user'"'"'s account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
182 Citations
17 Claims
-
1. A call management system for detecting an unauthorized party, comprising:
-
a control platform configured to; store voiceprints including voiceprints of inmates and voiceprints of called parties; monitor audio information of a telephone conversation between at least a local user and a remote user; detect a first characteristic of the local user in the audio information; search the stored voiceprints for a first matching voiceprint based on the first characteristic; detect a second characteristic of the remote user in the audio information; search the stored voiceprints for a second matching voiceprint based on the second characteristic; detect a third characteristic in the audio information; identify the third characteristic as belonging to a third party based on a comparison of the third characteristic to at least one of the first and second matching voiceprints; determine an identity of the third party by searching the stored voiceprints for a third matching voiceprint based on the third characteristic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9)
-
-
8. A method of tracking a wanted criminal, comprising:
-
monitoring audio information of a telephone conversation between a first user and a second user to detect a presence of a first characteristic; searching a national voiceprint database including voiceprints of wanted criminals for a matching voiceprint containing a second characteristic that substantially matches the first characteristic; and issuing an alert identifying the user associated with the first characteristic as a wanted criminal after the search finds a matching voiceprint. - View Dependent Claims (10, 11)
-
-
12. A method of locating a stolen device, comprising:
-
monitoring audio information of a telephone conversation between a first user and a second user to detect a presence of a first characteristic; receiving a device identifier for a device used by one of the first user or the second user to conduct the telephone conversation; searching stored voiceprints including voiceprints of persons authorized to use the device for a matching voiceprint containing a second characteristic that substantially matches the first characteristic; determining that the stored voiceprints do not include the matching voiceprint or that the matching voiceprint is not one of the voiceprints of person authorized to use the device; issuing an alert identifying the device as stolen in response to the determination. - View Dependent Claims (13, 14, 15)
-
-
16. A call management system for detecting an unauthorized party, comprising:
-
a control platform configured to; store voiceprints; monitor audio information of a telephone conversation between a local user and a remote user to detect a presence of a first characteristic; search of the stored voiceprints for a matching voiceprint containing a second characteristic that substantially matches the first characteristic; and wherein the stored voiceprints include voiceprints of inmates and Voiceprints of called parties; wherein the control platform is further configured to authenticate the local user and the remote user before connecting the telephone conversation; and wherein the authentication comprises requesting a first identifier and a first voice sample from the local user and a second identifier and a second voice sample from the remote user and verifying that the first voice sample and first identifier match a first stored voiceprint and associated unique identifier, respectively, and that the second voice sample and second identifier match a second stored voiceprint and associated unique identifier, respectively.
-
-
17. A call management system for detecting an unauthorized party, comprising:
-
a control platform configured to; store voiceprints; monitor audio information of a telephone conversation between a local user and a remote user to detect a presence of a first characteristic; search of the stored voiceprints for a matching voiceprint containing a second characteristic that substantially matches the first characteristic; wherein the stored voiceprints include voiceprints of inmates and voiceprints of called parties; adjust a stored voiceprint using a sample of the audio information; and store the adjusted voiceprint; wherein the adjusting comprises extracting a current voiceprint from the audio information and computing an average value of the current voiceprint and the stored voiceprint.
-
Specification