Telecommunication call management and monitoring system with voiceprint verification
First Claim
1. A method for restricting access to a public communications network using a telephone call management system, the method comprising the steps of:
- assigning a unique first identification number to a potential caller;
recording a first voice print of the potential caller;
storing the first voice print in association with the first identification number in a database;
during an attempt to access the public communications network by the potential caller;
prompting the potential caller to input a second identification number;
first comparing the second identification number to the first identification number;
first determining that the first identification number and second identification number match based on the first comparing;
in response to the first determining;
recording a second voice print of the potential caller;
retrieving the first voice print from the database based on the association between the first voice print and the first identification number in the database;
second comparing the second voice print with the first voice print;
second determining that the first voice print matches the second voice print based on the second comparing; and
in response to the second determining, granting the potential caller access to the public communications network;
establishing a telephone call between the potential caller and a remotely located party;
monitoring the telephone call to detect a presence of a three-way call attempt;
third determining whether recording of the telephone call is permissible;
recording, or not recording, the telephone call based on the third determining; and
detecting a presence of predetermined keywords in audio of the telephone call.
8 Assignments
0 Petitions
Accused Products
Abstract
A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user'"'"'s account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.
244 Citations
23 Claims
-
1. A method for restricting access to a public communications network using a telephone call management system, the method comprising the steps of:
-
assigning a unique first identification number to a potential caller; recording a first voice print of the potential caller; storing the first voice print in association with the first identification number in a database; during an attempt to access the public communications network by the potential caller; prompting the potential caller to input a second identification number; first comparing the second identification number to the first identification number; first determining that the first identification number and second identification number match based on the first comparing; in response to the first determining; recording a second voice print of the potential caller; retrieving the first voice print from the database based on the association between the first voice print and the first identification number in the database; second comparing the second voice print with the first voice print; second determining that the first voice print matches the second voice print based on the second comparing; and in response to the second determining, granting the potential caller access to the public communications network; establishing a telephone call between the potential caller and a remotely located party; monitoring the telephone call to detect a presence of a three-way call attempt; third determining whether recording of the telephone call is permissible; recording, or not recording, the telephone call based on the third determining; and detecting a presence of predetermined keywords in audio of the telephone call. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for restricting access to a public communications network using a telephone call management system, the method comprising the steps of:
-
assigning a unique first identification number to a potential caller; recording a first voice print of the potential caller; storing the first voice print in association with the first identification number in a database; during an attempt to access the public communications network by the potential caller; prompting the potential caller to input a second identification number; first comparing the second identification number to the first identification number; first determining that the first identification number and second identification number match based on the first comparing; in response to the first determining; recording a second voice print of the potential caller; retrieving the first voice print from the database based on the association between the first voice print and the first identification number in the database; second comparing the second voice print with the first voice print; second determining that the first voice print matches the second voice print based on the second comparing; and in response to the second determining, granting the potential caller access to the public communications network. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for restricting access to a public communications network using a telephone call management system, the method comprising the steps of:
-
assigning a unique first identification number to a potential caller; recording a first voice print of the potential caller; storing the first voice print in association with the first identification number in a database; during an attempt to access the public communications network by the potential caller; recording a second voice print of the potential caller; first comparing the second voice print with the first voice print; first determining that the second voice print matches the first voice print based on the first comparing; in response to the first determining; prompting the potential caller to input a second identification number; receiving the second identification number from the potential caller; second comparing the second identification number to the first identification number; second determining that the first identification number and second identification number match based on the second comparing; and in response to the second determining, granting the potential caller access to the public communications network in response to the second determining. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification