Identical conversation detection method and apparatus
First Claim
Patent Images
1. A method of detecting unauthorized communications between two incarcerated persons, comprising:
- monitoring a plurality of communications, each of the monitored communications originated from a communication device;
generating a time-segmented call signal from each of the plurality of monitored communications;
storing in a database the dialed number for each monitored communication, the start time of each monitored communication, and the duration or end time of each monitored communication;
identifying a first communication and a second communication in the database of monitored communications, where the identified first and second communications at least partially overlap in time;
generating a first time-segmented call signature for a portion of the first communication that overlaps with the second communication and further generating a second time-segmented call signature for a portion of the second communication that overlaps with the first communication;
analyzing the first time-segmented call signature and the second time-segmented call signature to identify identical segment signature data in an overlapping portion of the first communication and the second communication, wherein the first time-segmented call signature and the second time-segmented call signature are analyzed using a digital signal processor; and
alerting a prison official when identical segment signature data is identified in the overlapping communications.
15 Assignments
0 Petitions
Accused Products
Abstract
An automated system is disclosed for detecting situations in which identical segments of conversation appear within two different recordings. The system automatically detects where within each of two audio recordings an identical conversation segment begins and ends, thus enabling detection of conversations where multiple prison inmates participated in a conference call.
24 Citations
20 Claims
-
1. A method of detecting unauthorized communications between two incarcerated persons, comprising:
-
monitoring a plurality of communications, each of the monitored communications originated from a communication device; generating a time-segmented call signal from each of the plurality of monitored communications; storing in a database the dialed number for each monitored communication, the start time of each monitored communication, and the duration or end time of each monitored communication; identifying a first communication and a second communication in the database of monitored communications, where the identified first and second communications at least partially overlap in time; generating a first time-segmented call signature for a portion of the first communication that overlaps with the second communication and further generating a second time-segmented call signature for a portion of the second communication that overlaps with the first communication; analyzing the first time-segmented call signature and the second time-segmented call signature to identify identical segment signature data in an overlapping portion of the first communication and the second communication, wherein the first time-segmented call signature and the second time-segmented call signature are analyzed using a digital signal processor; and alerting a prison official when identical segment signature data is identified in the overlapping communications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for detecting unauthorized communications between two incarcerated persons, the system comprising:
-
a processor; and a memory coupled to the processor, the memory storing computer-readable instructions that, upon execution by the processor, cause the system to; monitor a plurality of communications, each of the monitored communications originated from a communication device; generate a time-segmented call signal from each of the plurality of monitored communications; store in a database the dialed number for each monitored communication, the start time of each monitored communication, and the duration or end time of each monitored communication; identify a first communication and a second communication in the database of monitored communications, where the identified first and second communications at least partially overlap in time; generate a first time-segmented call signature for a portion of the first communication that overlaps with the second communication and further generating a second time-segmented call signature for a portion of the second communication that overlaps with the first communication; analyze the first time-segmented call signature and the second time-segmented call signature to identify identical segment signature data in an overlapping portion of the first communication and the second communication, wherein the first time-segmented call signature and the second time-segmented call signature are analyzed using a digital signal processor; and alert a prison official identical segment signature data is identified in the overlapping communications. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification