System and method for user-privacy-aware communication monitoring and analysis
First Claim
1. A method, comprising:
- receiving monitored voice calls conducted in a communication network;
selecting a partial subset of the monitored voice calls that are suspected of having been conducted by a predefined target individual, encrypting the selected partial subset with an encryption key that is associated with the target individual, and retaining only the encrypted partial subset of the voice calls, wherein selecting the partial subset comprises choosing calls whose speech content matches a digital voice signature of the target individual;
upon showing that the voice calls in the partial subset were conducted by the target individual with a confidence level greater than a threshold, receiving a decryption key that is associated with the target individual, wherein showing that the voice calls in the partial subset were conducted by the target individual comprises jointly processing multiple suspected voice calls such that the confidence level exceeds the threshold; and
decrypting the encrypted partial subset of the voice calls using the decryption key, and providing the decrypted voice calls for analysis.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for monitoring, analyzing and acting upon voice calls in communication networks. An identification system receives monitored voice calls that are conducted in a communication network. Some of the monitored voice calls may be conducted by target individuals who are predefined as suspects. In order to maintain user privacy, the system selects and retains only voice calls that are suspected of being conducted by predefined targets. The techniques disclosed herein are particularly advantageous in scenarios where the network identifiers of the terminal used by the target are not known, or where the target uses public communication devices. In accordance with the disclosure, content-based identifiers such as speaker recognition or keyword matching are used.
16 Citations
16 Claims
-
1. A method, comprising:
-
receiving monitored voice calls conducted in a communication network; selecting a partial subset of the monitored voice calls that are suspected of having been conducted by a predefined target individual, encrypting the selected partial subset with an encryption key that is associated with the target individual, and retaining only the encrypted partial subset of the voice calls, wherein selecting the partial subset comprises choosing calls whose speech content matches a digital voice signature of the target individual; upon showing that the voice calls in the partial subset were conducted by the target individual with a confidence level greater than a threshold, receiving a decryption key that is associated with the target individual, wherein showing that the voice calls in the partial subset were conducted by the target individual comprises jointly processing multiple suspected voice calls such that the confidence level exceeds the threshold; and decrypting the encrypted partial subset of the voice calls using the decryption key, and providing the decrypted voice calls for analysis. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. Apparatus, comprising:
-
an interface, which is configured monitored to receive monitored voice calls conducted in a communication network; and a processor, which is configured to select a partial subset of the monitored voice calls that are suspected of having been conducted by a predefined target individual, to encrypt the selected partial subset with an encryption key that is associated with the target individual and to retain only the encrypted partial subset of the voice calls, to receive a decryption key that is associated with the target individual upon showing that the voice calls in the partial subset were conducted by the target individual with a confidence level greater than a threshold, to decrypt the encrypted partial subset of the voice calls using the decryption key, and to provide the decrypted voice calls for analysis, wherein the processor is further configured to select the partial subset by choosing the voice calls whose speech content matched a digital voice signature of the target individual and further configured to jointly process multiple suspected voice calls such that the confidence level exceeds the threshold to. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
Specification