http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CA-2196989-A1
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_7ad6be0b574403b900fa93f0205c6c76 |
classificationCPCAdditional | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M3-385 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M2201-40 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M2203-6027 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M3-2218 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M7-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M2201-41 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M2215-0148 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M3-382 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M3-38 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M15-47 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M3-42 |
classificationIPCAdditional | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M7-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M3-22 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M1-663 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M3-42 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M3-50 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M3-38 |
filingDate | 1995-09-18^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_561e8e5c62248c5e7555f5d9eab9c190 |
publicationDate | 1996-03-21^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | CA-2196989-A1 |
titleOfInvention | Method and system therefor of establishing an acceptance threshold for controlling fraudulent telephone calls |
abstract | The present invention advanced voice application system takes advantage of information, or attributes, built into a telecommunications network to determine the risk that a call is a fraudulent call in a voice recognition and verification system. To achieve this end, information relating to the telecommunications network is stored in a database as various risk factors. Thus, depending on the type of risk factors associated with a particular call, the risk assigned to that call can be raised or lowered so that the network would not reject a valid caller even though the voice pattern of the caller does not match exactly with the prestored enrolled voice print of the caller. Such risk assessment allows the management of the network to tighten the security of the system without overburdening the caller with questions and also permits calls to be completed for valid subscribers that otherwise would have been rejected. Past calling history may be added to the database as it relates to the different risk factors so that constantly updated risk factors may be used for further assessing whether a call is to be completed. |
priorityDate | 1994-09-16^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Predicate | Subject |
---|---|
isDiscussedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419499209 http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID5902 |
Showing number of triples: 1 to 28 of 28.