1. Technical Field
This invention relates to the field of speech or voice recognition, and more particularly to a method and system for determining unsolicited callers.
2. Description of the Related Art
Unsolicited telephone calls from telemarketers and others continue to be an annoyance to most households. Even calls that have been solicited at one point in time become an disturbance at other times. The called party typically has the option of picking up the call or leaving an answering machine on all the time and returning calls later. Even with such existing features as Caller-ID that allows the called party to see the number of the caller (unless Caller-ID is blocked), the phone still rings and the caller needs to make an effort to recognize the calling party. With Caller-ID, if the number listed is unfamiliar, the called party does not have to pick it up and can allow an answering machine to handle the call. Again, although Caller-ID provides some peace of mind, it fails to prevent the phone from ringing and disturbing a called party since the called party also has to look at the caller-ID and decide if the call is desirable. If the Caller-ID is unrecognized, the called party may be further disturbed by having to call the number back. None of these options alleviate the annoying call in the first place or provide the convenience of talking to the desired people.
Yet another option is the so called “privacy director”, which allows calls through for pre-determined authorized callers (as set up by the called party) and otherwise asks the caller's name and rings the called party to see if they want to accept the call from the calling party. The call proceeds on a positive reply from the called party. Once again, the called party receives a call they still need to pick-up and answer. Although the called party does not directly get disturbed by the caller, the called party still gets disturbed by the call. A privacy director can also have the unintended effect of making desired callers go through verification particularly when they are calling from a place they usually don't call from.
Embodiments in accordance with the invention can enable a method and system for processing an unsolicited call without necessarily disturbing a called party based on voice recognition and transcription in accordance with the present invention.
In a first aspect of the invention, a method of determining an unsolicited caller, can include the steps of receiving a call from a caller, requesting a voice sample from the caller, analyzing the voice sample using speech recognition to provide an analyzed voice sample, transcribing the analyzed voice sample to provide a text output, and comparing the text output with a database of authorized callers. In a specific embodiment, the voice sample requested can include the name of the caller which is transcribed as text output and compared with information in the database of authorized users. The method can further include the step of proceeding with the call from the caller if the text output matches information in the database. In one alternative, if the text output fails to match information in the database or alternatively matches information indicating an undesired caller, then the caller can be transferred to voice mail In another option, if the text output fails to match information in the database or alternatively matches information indicating an undesired caller, then the call can be terminated. The method can also include the step of determining if the call includes a known caller identification and proceeding with the call if the call includes the known caller identification and else requesting the voice sample from the caller. The method can also include the step of comparing the analyzed voice sample with a voice profile stored in a memory.
In a second aspect of the invention, a system for determining an unsolicited caller can include a memory and a processor. The processor can be programmed to receive a call from a caller, request a voice sample from the caller, analyze the voice sample using speech recognition to provide an analyzed voice sample, transcribe the analyzed voice sample to provide a text output, compare the text output with a database of authorized callers, and proceed with the call from the caller if the text output matches information in the database. The database can be local or can be accessible via a network. The processor can be further programmed to transfer the caller to voice mail if the text output fails to match information in the database or alternatively matches information indicating an undesired caller. In another alternative, the processor can be programmed to terminate the call if the text output fails to match information in the database or alternatively matches information indicating an undesired caller. The processor can also be programmed to determine if the call includes a known caller identification and proceed with the call if the call includes the known caller identification. If not, the processor can request the voice sample from the caller.
In a third aspect of the invention, a computer program has a plurality of code sections executable by a machine for causing the machine to perform certain steps as described in the method and systems outlined in the first and second aspects above.
There are shown in the drawings embodiments which are presently preferred, it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown.
Embodiments in accordance with the invention can determine whether a caller is a desired caller using speech recognition and transcription. Referring to
In a specific embodiment, the voice sample requested can include the name of the caller which is transcribed as text output and compared with information in the database of authorized users. The method can further include the step of proceeding with the call from the caller if the text output matches information in the database. If the text output fails to match information in the database or alternatively matches information indicating an undesired caller, then the caller can be transferred to voice mail or the call can be terminated as discussed above.
The GUI or voice web browser 28 can include a user menu accessible through a web site on a web server 24 that can allow the user (called party) to type the names of any number of valid callers. The text of the names can be stored along with the calling party's number and placed in association with the user's phone number on a telephone carrier's system for example. Using a privacy director-like function, the caller's name is requested when the caller's number is not known. In this embodiment, rather than having the system ring through the call and disturb the called party, a speech recognition system can decode the utterance to text, match it to the user's authorized list, and let any valid callers through. The system can be further enhanced by putting in custom messages for certain callers to be spoken when they are identified. Such a system solves the problem of being disturbed for every call because only those in the database will be let through and only the calling party might be slightly inconvenienced when calling from unknown phone numbers by having to provide a voice sample.
It should be understood that the present invention can be realized in hardware, software, or a combination of hardware and software. The present invention can also be realized in a centralized fashion in one computer system, or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods described herein is suited. A typical combination of hardware and software can be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
The present invention also can be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which when loaded in a computer system is able to carry out these methods. Computer program or application in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to another language, code or notation; b) reproduction in a different material form.
This invention can be embodied in other forms without departing from the spirit or essential attributes thereof. Accordingly, reference should be made to the following claims, rather than to the foregoing specification, as indicating the scope of the invention.