Compliance management of recorded audio using speech analytics
First Claim
1. A system for identifying an occurrence during a conversation being conducted between a first party and a second party where sensitive information is conveyed by at least one of the first party and the second party, the system comprising:
- a speech analytics component configured to;
monitor audio of the conversation for at least one of the first party and the second party;
detect a first speech characteristic in the audio of the conversation for at least one of the first party and the second party indicating a start event identifying a start of the occurrence where the sensitive information is conveyed by at least one of the first party and the second party;
detect a second speech characteristic in the audio of the conversation for at least one of the first party and the second party indicating an end event identifying an end of the occurrence where the sensitive information is conveyed by at least one of the first party and the second party;
record a first identifier for the start event and a second identifier for the end event as metadata along with a recording of the audio of the conversation for at least one of the first party and the second party to identify where in the recording the occurrence takes place;
detect a third speech characteristic in the audio of the conversation for at least one of the first party and the second party indicating a second start event identifying a start of a second occurrence where sensitive information is conveyed by at least one of the first party and the second party; and
based on a confidence score associated with detecting the third speech characteristic being less than a threshold value and greater than a review score, mark the recording of the audio for review beginning at the second start event; and
an audio playback component configured to;
read the first identifier and the second identifier from the metadata;
play the recording of the audio for an individual to the start event based on the first identifier;
after playing the recording of the audio to the start event, apply a mask to the recording of the audio from the start event to the end event based on the second identifier without altering the recording so that the occurrence of sensitive information is permanently removed and so that the individual listening to the recording of the audio is unable to comprehend the sensitive information conveyed during the occurrence; and
after applying the mask to the recording of the audio from the start event to the end event, play the recording of the audio for the individual from the end event to an end of the recording of the audio.
10 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments of the invention provide methods, systems, and computer-program products for identifying an occurrence during a conversation being conducted between a first party and a second party where sensitive information is conveyed by the first party or the second party. In particular embodiments, speech analytics is used to monitor audio of the conversation and a first speech characteristic is detected indicating a start event identifying a start of an occurrence where sensitive information is conveyed by the first party or the second party. Following the detection of first speech characteristic, a second speech characteristic is detected in the audio indicating an end event identifying an end of the occurrence. Accordingly, identifiers for the start and end events are then recorded in various embodiments as metadata along with a recording of the audio of the conversation to identify where in the recording the occurrence takes place.
120 Citations
9 Claims
-
1. A system for identifying an occurrence during a conversation being conducted between a first party and a second party where sensitive information is conveyed by at least one of the first party and the second party, the system comprising:
-
a speech analytics component configured to; monitor audio of the conversation for at least one of the first party and the second party; detect a first speech characteristic in the audio of the conversation for at least one of the first party and the second party indicating a start event identifying a start of the occurrence where the sensitive information is conveyed by at least one of the first party and the second party; detect a second speech characteristic in the audio of the conversation for at least one of the first party and the second party indicating an end event identifying an end of the occurrence where the sensitive information is conveyed by at least one of the first party and the second party; record a first identifier for the start event and a second identifier for the end event as metadata along with a recording of the audio of the conversation for at least one of the first party and the second party to identify where in the recording the occurrence takes place; detect a third speech characteristic in the audio of the conversation for at least one of the first party and the second party indicating a second start event identifying a start of a second occurrence where sensitive information is conveyed by at least one of the first party and the second party; and based on a confidence score associated with detecting the third speech characteristic being less than a threshold value and greater than a review score, mark the recording of the audio for review beginning at the second start event; and an audio playback component configured to; read the first identifier and the second identifier from the metadata; play the recording of the audio for an individual to the start event based on the first identifier; after playing the recording of the audio to the start event, apply a mask to the recording of the audio from the start event to the end event based on the second identifier without altering the recording so that the occurrence of sensitive information is permanently removed and so that the individual listening to the recording of the audio is unable to comprehend the sensitive information conveyed during the occurrence; and after applying the mask to the recording of the audio from the start event to the end event, play the recording of the audio for the individual from the end event to an end of the recording of the audio. - View Dependent Claims (2, 3)
-
-
4. A non-transitory, computer-readable medium comprising computer-executable instructions for identifying an occurrence during a conversation being conducted between a first party and a second party where sensitive information is conveyed by at least one of the first party and the second party, the computer-executable instructions, when executed by at least one computer processor, cause the at least one computer processor to:
-
monitor audio of the conversation for at least one of the first party and the second party; detect a first speech characteristic in the audio of the conversation for at least one of the first party and the second party indicating a start event identifying a start of the occurrence where the sensitive information is conveyed by at least one of the first party and the second party; detect a second speech characteristic in the audio of the conversation for at least one of the first party and the second party indicating an end event identifying an end of the occurrence where the sensitive information is conveyed by at least one of the first party and the second party; record a first identifier for the start event and a second identifier for the end event as metadata along with a recording of the audio of the conversation for at least one of the first party and the second party to identify where in the recording the occurrence takes place; detect a third speech characteristic in the audio of the conversation for at least one of the first party and the second party indicating a second start event identifying a start of a second occurrence where sensitive information is conveyed by at least one of the first party and the second party; based on a confidence score associated with detecting the third speech characteristic being less than a threshold value and greater than a review score, mark the recording of the audio for review beginning at the second start event; read the first identifier and the second identifier from the metadata; play the recording of the audio for an individual to the start event based on the first identifier; after playing the recording of the audio to the start event, apply a mask to the recording of the audio from the start event to the end event based on the second identifier without altering the recording so that the occurrence of sensitive information is permanently removed and so that the individual listening to the recording of the audio is unable to comprehend the sensitive information conveyed during the occurrence; and after applying the mask to the recording of the audio from the start event to the end event, play the recording of the audio for the individual from the end event to an end of the recording of the audio. - View Dependent Claims (5, 6)
-
-
7. A method for identifying an occurrence during a conversation being conducted between a first party and a second party where sensitive information is conveyed by at least one of the first party and the second party, the method comprising the steps of:
-
monitoring audio of the conversation for at least one of the first party and the second party by a speech analytics system; detecting a first speech characteristic in the audio of the conversation for at least one of the first party and the second party by the speech analytics system, the first speech characteristic indicating a start event identifying a start of the occurrence where the sensitive information is conveyed by at least one of the first party and the second party; detecting a second speech characteristic in the audio of the conversation for at least one of the first party and the second party by the speech analytics system, the second speech characteristic indicating an end event identifying an end of the occurrence where the sensitive information is conveyed by at least one of the first party and the second party; recording a first identifier for the start event and a second identifier for the end event by the speech analytics system as metadata along with a recording of the audio of the conversation for at least one of the first party and the second party to identify where in the recording the occurrence takes place; detecting a third speech characteristic in the audio of the conversation for at least one of the first party and the second party by the speech analytics system, the third speech characteristic indicating a second start event identifying a start of a second occurrence where sensitive information is conveyed by at least one of the first party and the second party; and based on a confidence score associated with detecting the third speech characteristic being less than a threshold value and greater than a review score, marking the recording of the audio for review beginning at the second start event by the speech analytics system; reading the first identifier and the second identifier from the metadata by an audio playback system; playing the recording of the audio for an individual to the start event based on the first identifier by the audio playback system; after playing the recording of the audio to the start event, applying a mask to the recording of the audio from the start event to the end event based on the second identifier by the audio playback system without altering the recording so that the occurrence of sensitive information is permanently removed and so that the individual listening to the recording of the audio is unable to comprehend the sensitive information conveyed during the occurrence; and after applying the mask to the recording of the audio from the start event to the end event, playing the recording of the audio for the individual from the end event to an end of the recording of the audio by the audio playback system. - View Dependent Claims (8, 9)
-
Specification