Telecommunication call management and monitoring system with voiceprint verification
First Claim
1. A system, comprising:
- a voice sample database;
a control platform configured to;
receive a first voice sample from a first user;
store the first voice sample in the voice sample database;
receive first identifying information related to the first user; and
store the first identifying information in the voice sample database in correspondence with the first voice sample; and
an authentication module configured to;
receive a second voice sample from a second user;
receive second identifying information related to the second user;
find in the voice sample database third identifying information that substantially matches the second identifying information received from the second user;
retrieve from the voice sample database a third voice sample associated with the third identifying information;
compare the second voice sample with the third voice sample; and
authenticate the second user based on the comparison.
6 Assignments
0 Petitions
Accused Products
Abstract
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user'"'"'s account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
227 Citations
18 Claims
-
1. A system, comprising:
-
a voice sample database; a control platform configured to; receive a first voice sample from a first user; store the first voice sample in the voice sample database; receive first identifying information related to the first user; and store the first identifying information in the voice sample database in correspondence with the first voice sample; and an authentication module configured to; receive a second voice sample from a second user; receive second identifying information related to the second user; find in the voice sample database third identifying information that substantially matches the second identifying information received from the second user; retrieve from the voice sample database a third voice sample associated with the third identifying information; compare the second voice sample with the third voice sample; and authenticate the second user based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
receiving a first voice sample from a first user; storing the first voice sample in a voice sample database; receiving first identifying information related to the first user; storing the first identifying information in the voice sample database in correspondence with the first voice sample; receiving a second voice sample from a second user; receiving second identifying information related to the second user; finding in the voice sample database third identifying information that substantially matches the second identifying information received from the second user; retrieving from the voice sample database a third voice sample associated with the third identifying information; comparing the second voice sample with the third voice sample; and authenticating the second user based on the comparison. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification