Voice communication management
First Claim
Patent Images
1. A method for managing a voice communication, the method comprising:
- identifying, by a mobile voice communication device associated with a first user, an audio phrase produced by the first user during the voice communication between the first user using the mobile voice communication device and a second user using another voice communication device;
generating, by the mobile voice communication device associated with the first user, an audio signature of the audio phrase produced by the first user, wherein the audio signature is one or more values generated by performing one or more calculations on an audio segment including the audio phrase;
comparing, by the mobile voice communication device associated with the first user, the audio signature of the audio phrase produced by the first user to audio signatures corresponding to a set of undesirable audio phrases containing confidential information associated with the first user included within a policy prohibiting a transmission of the set of undesired audio phrases;
determining, by the mobile voice communication device associated with the first user, that the audio signature of the audio phrase produced by the first user matches an audio signature of an undesirable audio phrase in the set of undesirable audio phrases, wherein the matches the audio signature of the undesirable audio phrase in the set of undesirable audio phrases means either a same or a similar audio signature to the audio signatures corresponding to the set of undesirable audio phrases;
responsive to the mobile voice communication device associated with the first user determining that the audio signature of the audio phrase produced by the first user matches an audio signature of an undesirable audio phrase in the set of undesirable audio phrases, outputting, by the mobile voice communication device associated with the first user, a textual alert message to the first user via a display of the mobile voice communication device associated with the first user that includes a textual representation of the confidential information disclosed and that the confidential information is not to be divulged;
inhibiting, by the mobile voice communication device associated with the first user, the transmission of the undesirable audio phase containing the confidential information from the mobile voice communication device associated with the first user to the other voice communication device used by the second user during the voice communication; and
inhibiting, by the mobile voice communication device associated with the first user, further transmission of audio from the mobile voice communication device associated with the first user to the other voice communication device used by the second user for a period of time until a third user that is a trusted party of the first user joins the voice communication to determine whether the second user is an unauthorized party attempting to fraudulently receive the confidential information from the first user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, a computer program product, and an apparatus for managing a voice communication are provided. In one illustrative embodiment, an audio phrase produced by a first user is identified in the voice communication between the first user and a second user. A determination is made whether the audio phrase is present in a policy which prohibits the transmission of the set of undesired audio phrases. Responsive to a determination that the audio phrase is present in the policy which prohibits the transmission of the set of undesired audio phrases, a communication of the audio phrase is modified.
-
Citations
18 Claims
-
1. A method for managing a voice communication, the method comprising:
-
identifying, by a mobile voice communication device associated with a first user, an audio phrase produced by the first user during the voice communication between the first user using the mobile voice communication device and a second user using another voice communication device; generating, by the mobile voice communication device associated with the first user, an audio signature of the audio phrase produced by the first user, wherein the audio signature is one or more values generated by performing one or more calculations on an audio segment including the audio phrase; comparing, by the mobile voice communication device associated with the first user, the audio signature of the audio phrase produced by the first user to audio signatures corresponding to a set of undesirable audio phrases containing confidential information associated with the first user included within a policy prohibiting a transmission of the set of undesired audio phrases; determining, by the mobile voice communication device associated with the first user, that the audio signature of the audio phrase produced by the first user matches an audio signature of an undesirable audio phrase in the set of undesirable audio phrases, wherein the matches the audio signature of the undesirable audio phrase in the set of undesirable audio phrases means either a same or a similar audio signature to the audio signatures corresponding to the set of undesirable audio phrases; responsive to the mobile voice communication device associated with the first user determining that the audio signature of the audio phrase produced by the first user matches an audio signature of an undesirable audio phrase in the set of undesirable audio phrases, outputting, by the mobile voice communication device associated with the first user, a textual alert message to the first user via a display of the mobile voice communication device associated with the first user that includes a textual representation of the confidential information disclosed and that the confidential information is not to be divulged; inhibiting, by the mobile voice communication device associated with the first user, the transmission of the undesirable audio phase containing the confidential information from the mobile voice communication device associated with the first user to the other voice communication device used by the second user during the voice communication; and inhibiting, by the mobile voice communication device associated with the first user, further transmission of audio from the mobile voice communication device associated with the first user to the other voice communication device used by the second user for a period of time until a third user that is a trusted party of the first user joins the voice communication to determine whether the second user is an unauthorized party attempting to fraudulently receive the confidential information from the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer program product stored on a non-transitory computer readable storage medium having program code embodied thereon that is executable by a mobile voice communication data processing system for managing a voice communication, the computer program product comprising:
-
program code for identifying an audio phrase produced by a first user during the voice communication between the first user using the mobile voice communication data processing system and a second user using another voice communication data processing system; program code for generating an audio signature of the audio phrase produced by the first user, wherein the audio signature is one or more values generated by performing one or more calculations on an audio segment including the audio phrase; program code for comparing the audio signature of the audio phrase produced by the first user to audio signatures corresponding to a set of undesirable audio phrases containing confidential information associated with the first user included within a policy prohibiting a transmission of the set of undesired audio phrases; program code for determining that the audio signature of the audio phrase produced by the first user matches an audio signature of an undesirable audio phrase in the set of undesirable audio phrases, wherein the matches the audio signature of the undesirable audio phrase in the set of undesirable audio phrases means either same or similar audio signature to the audio signatures corresponding to the set of undesirable audio phrases; program code, responsive to determining that the audio signature of the audio phrase produced by the first user matches an audio signature of an undesirable audio phrase in the set of undesirable audio phrases, for outputting a textual alert message to the first user via a display of the mobile voice communication data processing system used by the first user that includes a textual representation of the confidential information disclosed and that the confidential information is not to be divulged; program code for inhibiting the transmission of the undesirable audio phase containing the confidential information from the mobile voice communication data processing system used by the first user to the other voice communication data processing system used by the second user during the voice communication; and program code for inhibiting further transmission of audio from the mobile voice communication data processing system used by the first user to the other voice communication data processing system used by the second user for a period of time until a third user that is a trusted party of the first user joins the voice communication to determine whether the second user is an unauthorized party attempting to fraudulently receive the confidential information from the first user. - View Dependent Claims (16, 17)
-
-
18. A mobile voice communication data processing system for managing a voice communication, the mobile voice communication data processing system comprising:
-
a bus system; a storage device connected to the bus system, wherein the storage device includes program code; and a processor unit connected to the bus system, wherein the processing unit executes the program code to; identify an audio phrase produced by a first user during the voice communication between the first user using the mobile voice communication data processing system and a second user using another voice communication data processing system; generate an audio signature of the audio phrase produced by the first user, wherein the audio signature is one or more values generated by performing one or more calculations on an audio segment including the audio phrase; compare the audio signature of the audio phrase produced by the first user to audio signatures corresponding to a set of undesirable audio phrases containing confidential information associated with the first user included within a policy prohibiting a transmission of the set of undesired audio phrases; determine that the audio signature of the audio phrase produced by the first user matches an audio signature of an undesirable audio phrase in the set of undesirable audio phrases, wherein the matches the audio signature of the undesirable audio phrase in the set of undesirable audio phrases means either a same or a similar audio signature to the audio signatures corresponding to the set of undesirable audio phrases; output a textual alert message to the first user via a display of the mobile voice communication data processing system that includes a textual representation of the confidential information disclosed and that the confidential information is not to be divulged in response to determining that the audio signature of the audio phrase produced by the first user matches an audio signature of an undesirable audio phrase in the set of undesirable audio phrases; inhibit the transmission of the undesirable audio phase containing the confidential information from the mobile voice communication data processing system used by the first user to the other voice communication data processing system used by the second user during the voice communication; and inhibit further transmission of audio from the mobile voice communication data processing system used by the first user to the other voice communication data processing system used by the second user for a period of time until a third user that is a trusted party of the first user joins the voice communication to determine whether the second user is an unauthorized party attempting to fraudulently receive the confidential information from the first user.
-
Specification