Aspects of the invention relate generally to conference call systems, and more particularly, to a telephonic voice authentication and display system and method.
With the advent of conference call systems, most notably in the business world, comes the increasingly common large conference call. With the use of conference call systems becoming more common, the number of locations of conference call attendees and the quantity of actual attendees of conference calls is also increasing. With many conference calls, it can be difficult to identify the instant speaker (i.e., voice owner), especially if there are, multiple, near-contemporaneous speakers. This is made more difficult when there are several attendees, multiple locations, and/or a plurality of types of telephonic systems participating in the conference call.
In view of the foregoing, there is an opportunity to improve upon the related art.
Aspects of the invention provide an improved solution for identifying conference call participants. In an embodiment of the invention, a method includes detecting a sound of a first conference call participant; identifying the first conference call participant based on the sound; and displaying an attribute of the first conference call participant to a second conference call participant.
A first aspect of the invention provides a method of identifying conference call participants, the method comprising: detecting a sound of a first conference call participant; identifying the first conference call participant based on the sound; and displaying an attribute of the first conference call participant to a second conference call participant.
A second aspect of the invention provides a system for identifying conference call participants, the system comprising: a system for detecting a sound of a first conference call participant; a system for identifying the first conference call participant based on the sound; and a system for displaying an attribute of the first conference call participant to a second conference call participant.
A third aspect of the invention provides a computer program comprising program code stored on a computer-readable medium, which when executed, enables a computer system to implement a method of identifying conference call participants, the method comprising: detecting a sound of a first conference call participant; identifying the first conference call participant based on the sound; and displaying an attribute of the first conference call participant to a second conference call participant.
A fourth aspect of the invention provides a method of deploying a system for identifying conference call participants, the method comprising: providing a computer system operable to: detect a sound of a first conference call participant; identify the first conference call participant based on the sound; and display an attribute of the first conference call participant to a second conference call participant.
A fifth aspect of the invention provides a data processing system for identifying conference call participants, comprising: a processing unit; a bus coupled to the processing unit; and a memory medium coupled to the bus comprising program code, which when executed by the processing unit causes the data processing system to: detect a sound of a first conference call participant; identify the first conference call participant based on the sound; and display an attribute of the first conference call participant to a second conference call participant.
A sixth aspect of the invention provides a business method for identifying conference call participants, the business method comprising: managing a network that includes at least one computer system operable to: detect a sound of a first conference call participant; identify the first conference call participant based on the sound; and display an attribute of the first conference call participant to a second conference call participant; and receiving payment based on the managing.
The illustrative aspects of the invention are designed to solve one or more of the problems herein described and/or one or more other problems not discussed.
These and other features of the invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings that depict various embodiments of the invention, in which:
It is noted that the drawings are not to scale. The drawings are intended to depict only typical aspects of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements between the drawings.
As indicated above, aspects of the invention provide an improved solution for identifying conference call participants. In an embodiment of the invention, a method includes: detecting a sound of a first conference call participant; identifying the first conference call participant based on the sound; and displaying an attribute of the first conference call participant to a second conference call participant. As used herein, unless otherwise noted, the term “set” means one or more (i.e., at least one); and, the phrase “any solution” means any now known or later developed solution.
Turning to the drawings,
Computing device 14 is shown including a processor 20, a memory 22A, an input/output (I/O) interface 24, and a bus 26. Further, computing device 14 is shown in communication with an external I/O device/resource 28 and a storage device 22B. In general, processor 20 executes program code, such as voice authentication and display system 30, which is stored in a storage system, such as memory 22A and/or storage device 22B. While executing program code, processor 20 can read and/or write data to/from memory 22A, storage device 22B, and/or I/O interface 24. Bus 26 provides a communications link between each of the components in computing device 14. I/O device 28 can comprise any device that transfers information between a user 16 and computing device 14. To this extent, I/O device 28 can comprise a user I/O device to enable an individual user 16 to interact with computing device 14 and/or a communications device to enable a system user to communicate with computing device 14 using any type of communications link.
In any event, computing device 14 can comprise any general purpose computing article of manufacture capable of executing program code installed thereon. However, it is understood that computing device 14 and voice authentication and display system 30 are only representative of various possible equivalent computing devices that may perform the process described herein. To this extent, in other embodiments, the functionality provided by computing device 14 and voice authentication and display system 30 can be implemented by a computing article of manufacture that includes any combination of general and/or specific purpose hardware and/or program code. In each embodiment, the program code and hardware can be created using standard programming and engineering techniques, respectively.
Similarly, computer system 12 is only illustrative of various types of computer systems for implementing aspects of the invention. For example, in one embodiment, computer system 12 comprises two or more computing devices that communicate over any type of communications link, such as a network, a shared memory, or the like, to perform the process described herein. Further, while performing the process described herein, one or more computing devices in computer system 12 can communicate with one or more other computing devices external to computer system 12 using any type of communications link. In either case, the communications link can comprise any combination of various types of wired and/or wireless links; comprise any combination of one or more types of networks; and/or utilize any combination of various types of transmission techniques and protocols.
As discussed herein, voice authentication and display system 30 enables computer system 12 to identify conference call participants 16. To this extent, voice authentication and display system 30 is shown in
Conference call participant 16 may be any quantity (e.g., 1, 2, . . . N) of entities (e.g., person, group, machine generated voice, etc.) who are connected together, via any suitable conference calling system, so as to conduct a conference call. The participants 16 may be using any type of communication system, such as a system that utilizes digital signals (e.g., Voice over Internet Protocol (VoIP) system), or a system that utilizes analog system (e.g., a traditional telephone circuit system), and/or the like.
Aspects of the invention provide an improved solution for identifying conference call participants 16. To this extent,
As shown, for example, in
Referring to both
As
Referring further to
It should be apparent to one in the art that variations of this embodiment are part and parcel of the present invention. In any event, embodiments of the present invention display an attribute and/or an indicia of the first conference call participant to the other conference call participant(s) upon the detection by the voice authentication and display system 30 that the first conference call participant (e.g., John Smith) is speaking. Note that each of the conference call participants on the conference call may receive a pop-up type display of John Smith and/or his profile. This serves to notify the other users ultimately of who is talking. Display information may be dependent on each participant's 16 individual listening device. For example, the attribute and/or indicia may be displayed through rich graphic user interface (GUI), through simple text base notification, and/or the like. In an embodiment, devices that are limited to only display text would therefore be notified through a quick voice prompt of who is talking (e.g., voice over that states “John Smith is now speaking”).
In another embodiment, the invention provides a computer program stored on a computer-readable medium, which when executed, enables a computer system to identify conference call participants 16. To this extent, the computer-readable medium includes program code, such as voice authentication and display system 30 (
In another embodiment, the invention provides a method of deploying a system for identifying conference call participants 16. In this case, a computer system, such as computer system 12 (
In still another embodiment, the invention provides a business method that identifies conference call participants 16, which enables users to perform the process described herein on a subscription, advertising, and/or fee basis. That is, a service provider could offer to manage a network and/or a computer system 12 (
As used herein, it is understood that “program code” means any set of statements or instructions, in any language, code or notation, that cause a computing device having an information processing capability to perform a particular function either directly or after any combination of the following: (a) conversion to another language, code or notation; (b) reproduction in a different material form; and/or (c) decompression. To this extent, program code can be embodied as any combination of one or more types of computer programs, such as an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing, storage and/or I/O device, and the like.
The foregoing description of various aspects of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and obviously, many modifications and variations are possible. Such modifications and variations that may be apparent to an individual in the art are included within the scope of the invention as defined by the accompanying claims.
Number | Name | Date | Kind |
---|---|---|---|
4961229 | Takahashi | Oct 1990 | A |
5231670 | Goldhor et al. | Jul 1993 | A |
5233556 | Matsuda et al. | Aug 1993 | A |
5414755 | Bahler et al. | May 1995 | A |
5499288 | Hunt et al. | Mar 1996 | A |
5548647 | Naik et al. | Aug 1996 | A |
5717743 | McMahan et al. | Feb 1998 | A |
5752231 | Gammel et al. | May 1998 | A |
5893057 | Fujimoto et al. | Apr 1999 | A |
5897616 | Kanevsky et al. | Apr 1999 | A |
5946654 | Newman et al. | Aug 1999 | A |
5991617 | Powell | Nov 1999 | A |
6006175 | Holzrichter | Dec 1999 | A |
6061653 | Fisher et al. | May 2000 | A |
6078807 | Dunn et al. | Jun 2000 | A |
6185536 | Haber et al. | Feb 2001 | B1 |
6192255 | Lewis et al. | Feb 2001 | B1 |
6205424 | Goldenthal et al. | Mar 2001 | B1 |
6219407 | Kanevsky et al. | Apr 2001 | B1 |
6233555 | Parthasarathy et al. | May 2001 | B1 |
6246751 | Bergl et al. | Jun 2001 | B1 |
6377699 | Musgrave et al. | Apr 2002 | B1 |
6389397 | Otto | May 2002 | B1 |
6393305 | Ulvinen et al. | May 2002 | B1 |
6457043 | Kwak et al. | Sep 2002 | B1 |
6480825 | Sharma et al. | Nov 2002 | B1 |
6577997 | Gong | Jun 2003 | B1 |
6618702 | Kohler et al. | Sep 2003 | B1 |
6697778 | Kuhn et al. | Feb 2004 | B1 |
6757361 | Blair et al. | Jun 2004 | B2 |
6810116 | Sorensen et al. | Oct 2004 | B1 |
6853716 | Shaffer et al. | Feb 2005 | B1 |
6865264 | Berstis | Mar 2005 | B2 |
6868149 | Berstis | Mar 2005 | B2 |
6937702 | Vacek et al. | Aug 2005 | B1 |
6959074 | Berstis | Oct 2005 | B2 |
7023965 | Oates | Apr 2006 | B2 |
7212613 | Kim et al. | May 2007 | B2 |
7447632 | Itou | Nov 2008 | B2 |
7702086 | Susen et al. | Apr 2010 | B2 |
RE41534 | Blair et al. | Aug 2010 | E |
RE41608 | Blair et al. | Aug 2010 | E |
7839803 | Snelgrove et al. | Nov 2010 | B1 |
20030023882 | Udom | Jan 2003 | A1 |
20030046554 | Leydier et al. | Mar 2003 | A1 |
20030074201 | Grashey et al. | Apr 2003 | A1 |
20030182119 | Junqua et al. | Sep 2003 | A1 |
20030200087 | Aronowitz | Oct 2003 | A1 |
20040230689 | Loveland | Nov 2004 | A1 |
20050063522 | Kim et al. | Mar 2005 | A1 |
20050096906 | Barzilay | May 2005 | A1 |
20050135583 | Kardos | Jun 2005 | A1 |
20060036442 | Novack et al. | Feb 2006 | A1 |
20060085189 | Dalrymple et al. | Apr 2006 | A1 |
20070172047 | Coughlan et al. | Jul 2007 | A1 |
20080151785 | Sylvain | Jun 2008 | A1 |
20080195395 | Kim et al. | Aug 2008 | A1 |
Number | Date | Country |
---|---|---|
2388947 | Nov 2003 | GB |
07162536 | Jun 1995 | JP |
Entry |
---|
Dersch, D. R., “The Acoustic Finger Print: A Method for Speaker Identification, Speaker Verification, and Accent Identification”, Proc. of the 6th Australasian International conference on Speech Science and Technology, Adelaide, Dec. 1996, pp. 263-268. |
Xiang, Bing, Speaker Verification Using Gaussian Component Strings in Dynamic Trajectory Space, 2002, abstract. |
Andrews et al., “Phonetic, Idiolectal, and Acoustic Speaker Recognition”, US Department of Defense Speech Processing Research, 2001: A Speaker Odyssey, The Speaker Recognition Workshop, Chania, Crete, Greece, Jun. 19, 2001, 19 pages. |
Number | Date | Country | |
---|---|---|---|
20090202060 A1 | Aug 2009 | US |