US20200322399A1 - Automatic speaker identification in calls - Google Patents

Automatic speaker identification in calls Download PDF

Info

Publication number
US20200322399A1
US20200322399A1 US16/858,863 US202016858863A US2020322399A1 US 20200322399 A1 US20200322399 A1 US 20200322399A1 US 202016858863 A US202016858863 A US 202016858863A US 2020322399 A1 US2020322399 A1 US 2020322399A1
Authority
US
United States
Prior art keywords
voice
voice segments
representative
individual
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/858,863
Inventor
Raphael Cohen
Erez Volk
Russell Levy
Micha Yochanan Breakstone
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AffectLayer Inc Israel
AffectLayer Inc USA
Original Assignee
AffectLayer Inc Israel
AffectLayer Inc USA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AffectLayer Inc Israel, AffectLayer Inc USA filed Critical AffectLayer Inc Israel
Priority to US16/858,863 priority Critical patent/US20200322399A1/en
Assigned to AffectLayer, Inc. reassignment AffectLayer, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VOLK, EREZ, BREAKSTONE, MICHA YOCHANAN, COHEN, RAPHAEL, LEVY, RUSSELL
Publication of US20200322399A1 publication Critical patent/US20200322399A1/en
Assigned to AffectLayer, Inc. reassignment AffectLayer, Inc. CHANGE OF ADDRESS Assignors: AffectLayer, Inc.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • H04L65/403Arrangements for multi-party communication, e.g. for conferences
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/005
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/04Training, enrolment or model building
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L21/00Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
    • G10L21/02Speech enhancement, e.g. noise reduction or echo cancellation
    • G10L21/0272Voice signal separating
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/06Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/06Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
    • G10L15/063Training
    • G10L2015/0631Creating reference templates; Clustering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/40Aspects of automatic or semi-automatic exchanges related to call centers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/40Aspects of automatic or semi-automatic exchanges related to call centers
    • H04M2203/407Call center operated for multiple customers

Definitions

  • Automatic speech recognition techniques allow extracting business insights from telephone conversations with customers of an organization. This data allows improving sales and customer success, Customer Support, Marketing and Product functions (e.g., to understand and hear the “voice of the customer”) by providing coaching to representatives of the organization, e.g., on desired behaviors, measuring compliance and generating data regarding market and product requirements automatically. Such data can also be used for determining best practices by identifying winning patterns, making sales process more efficient by summarizing calls so that the representatives can have less sync meetings, and for guiding conversations in real-time. Attributing utterances and words to the person who spoke them is useful for any downstream analysis such as search, call visualization, identifying buying cues, extracting customer pain points, identifying good/bad sales behaviors, and extracting notes and tasks.
  • identifying the speaker requires applying various algorithmic techniques.
  • Previous technologies aim to split the call between different speakers, an approach termed “diarization”, e.g., determine that a particular voice is of “speaker 1 ,” on the call; another voice is of “speaker 2 ” on the call, another voice is of “speaker 3 ” on the call, and so on.
  • Such technologies may not identify those speakers.
  • Some other technologies use multi-channel recordings in which each of the speakers in the conversation is on a separate communication channel and the speakers can be identified based on the channel assigned to the speaker. However, such technologies may not work in a single channel recording.
  • Some technologies may identify the speakers, but they need to record a short voice sample for creating a speaker fingerprint and use this speaker fingerprint to identify the speakers. However, this requires active participation of the recorded user which can hurt adoption rates and provide a non-smooth user experience.
  • FIG. 1 is a block diagram of an environment in which the disclosed embodiments can be implemented.
  • FIG. 2 is a block diagram of an example for identifying a speaker using the speaker identification system of FIG. 1 , consistent with various embodiments.
  • FIG. 3 is a block diagram of the speaker identification system of FIG. 1 , consistent with various embodiments.
  • FIG. 4 is a flow diagram of a process for generating a fingerprint of a speaker, consistent with various embodiments.
  • FIG. 5 is a flow diagram of a process for clustering voice segments of recordings, consistent with various embodiments.
  • FIG. 6 is a flow diagram of a process for identifying a speaker in a conversation, consistent with various embodiments.
  • FIG. 7 is a block diagram of a processing system that can implement operations of the disclosed embodiments.
  • Embodiments are directed to a speaker identification system for identifying a speaker in a conversation without requiring any voice sample or any other action from the speaker for identification purposes.
  • the speaker identification system learns or generates a fingerprint of a speaker in an unsupervised manner, and uses such fingerprints for identifying a speaker in a particular conversation.
  • the speaker identification system can generate fingerprints for and/or identify one or more speakers, e.g., employees or representatives of an organization, who take part in conversations with other speakers, e.g., customers of the organization.
  • the speaker identification system processes a number of calls the specified representative had with a number of customers to generate multiple voice segments for each of the calls, identifies the voice segments that satisfy a speaker identification criterion, e.g., voice segments having the same or a similar feature across all the calls, and determines the voice in the identified voice segments as the voice of the specified representative.
  • a speaker identification criterion e.g., voice segments having the same or a similar feature across all the calls
  • the feature can include at least one of a voice of the speaker, speech rate of the speaker, an accent of the speaker, linguistic attributes of the speaker, an ambient noise, a speech volume, a tone, a timber, emotions of the speaker (e.g., fear, anger, happiness, timidity, fatigue), personal attributes of the speaker (e.g., an age, an accent, and a gender), physical ailments of the speaker, physical conditions of the speaker, and level of education of the speaker.
  • a voice of the speaker e.g., speech rate of the speaker, an accent of the speaker, linguistic attributes of the speaker, an ambient noise, a speech volume, a tone, a timber, emotions of the speaker (e.g., fear, anger, happiness, timidity, fatigue), personal attributes of the speaker (e.g., an age, an accent, and a gender), physical ailments of the speaker, physical conditions of the speaker, and level of education of the speaker.
  • emotions of the speaker e.g., fear, anger, happiness, timidity, fatigue
  • the speaker identification system generates the fingerprint for the specified representative based on the identified voice segments, associates the fingerprint with the user ID of the specified representative, and stores the fingerprint in a data storage system.
  • the data storage system can store fingerprints of multiple such speakers.
  • the speaker identification system can use the fingerprints from the data storage system to identify a representative in a conversation, such as a live or real-time conversation or a recording of a previous conversation. For example, consider that a representative is in conversation with a customer in a telephone call.
  • the speaker identification system receives real-time conversation data, e.g., an audio stream of the telephone call, processes the audio stream to generate multiple voice segments and identifies groups of voice segments that have the same or a similar feature.
  • a first group of voice segments can have the voice of a first speaker; a second group of voice segments can have the voice of a second speaker and so on.
  • the speaker identification system compares the groups of voice segments with the fingerprints from the data storage system to identify a matching fingerprint.
  • the speaker identification system determines the representative in the real-time conversation as the representative corresponding to the user ID associated with the matching fingerprint. After the speaker identification system identifies the representative in the real-time conversation, the speaker identification system can identify the voice segments in the conversation in which the representative spoke, and mark those voice segments as having the voice of the identified representative.
  • the speaker identification system receives as input a call.
  • the calls can be associated with metadata, which can include information regarding identities of all or some speakers in the call. However, the information does not indicate which voice in the call belongs to which speaker.
  • the speaker identification system can receive as input the call and user identification (ID) of the representative.
  • the metadata may optionally include some customer identification as well.
  • at least some portion of the metadata can be derived from video data of the call, e.g., visual data.
  • the calls are mono-channel, that is, the conversations are performed over a single communication channel.
  • Speaker identification can be used for various purposes. For example, in a customer care center scenario, the speaker identification can be used for analysis such as search, call visualization, identifying buying cues, extracting customer pain points, identifying good and/or bad sales behaviors, and extracting notes and tasks. As described above, the disclosed speaker identification system requires no voice print, user effort or explicit interaction by the user for identification purposes.
  • a “call” is a recording of the conversation between two or more speakers and such conversations can be telephone based, Voice over Internet Protocol (VoIP) based, video conference based, Virtual Reality (VR) based, Augmented Reality (AR) based, or based on any online meetings, collaborations or interactions. Further, the call can also be a real-time data stream, e.g., audio stream, of a real-time interaction between the speakers.
  • VoIP Voice over Internet Protocol
  • VR Virtual Reality
  • AR Augmented Reality
  • the call can also be a real-time data stream, e.g., audio stream, of a real-time interaction between the speakers.
  • FIG. 1 is a block diagram of an environment 100 in which the disclosed embodiments can be implemented.
  • the environment 100 includes a speaker identification system 105 that facilitates unsupervised learning or generation of a speaker's fingerprint for identifying of a speaker in a conversation.
  • the speaker identification system 105 analyzes a set of calls 140 to generate a fingerprint for one or more of the speakers 120 in the calls 140 .
  • the speakers 120 can include one or more speakers who are to be identified by the speaker identification system 105 .
  • the speakers to be identified are representatives or employees of an organization such as a customer care center, who are in conversation with speakers who don't have to be identified, e.g., customers of the organization.
  • the speaker identification system 105 can identify a representative in a particular conversation by analyzing one or more calls the representative has had with one or more customers.
  • the roles of the speaker to be identified and the speaker who need not be identified are not limited to the representative and customer roles or terminologies, respectively. Further, the term “speaker” can refer to either a speaker who is to be identified or speaker who need not be identified unless stated otherwise.
  • the speaker identification system 105 may not receive any input of voice samples, fingerprints or some other reference of a voice of the representative that identifies the representative. So, the speaker identification system 105 may have to generate the fingerprints, which can then be used for identifying a specified representative 110 in a specified conversation.
  • the speaker identification system 105 can generate a fingerprint 160 for a specified representative 110 based on calls 140 the specified representative 110 has had with one or more customers 115 .
  • the speaker identification system 105 process the calls 140 to generate voice segments for each of the calls 140 , analyzes the voice segments to identify a set of voice segments that satisfy the speaker identification criterion, e.g., share the same or similar feature across all the calls 140 , and determines the voice in the set of voice segments as associated with the specified representative 110 .
  • the speaker identification system 105 generates a fingerprint 160 based on the identified set of voice segments, associates the fingerprint 160 with a user ID of the specified representative 110 , and stores the fingerprint 160 in a data storage system 135 .
  • the following paragraphs describe additional details regarding the generation of the fingerprints.
  • the calls 140 can include or be associated with metadata such as a user ID of the representative involved in the conversation.
  • metadata is optional and the speaker identification system 105 may not rely on the metadata for generating the fingerprints or for speaker identification purposes.
  • the metadata can also have a customer ID of the customer involved in the conversation. However, the metadata would not indicate which voice in the call is of the corresponding representative.
  • the metadata can be derived video data of the call, e.g., visual data.
  • the calls are selected such that (a) in at least some of the conversations the specified representative 110 is the only representative in conversation with the customers 115 , that is, there is no other representative other than the specified representative 110 , and (b) the customers 115 in different conversations are distinct.
  • calls such as a first call 141 the specified representative 110 had with a first customer 116 , a second call 142 with a second customer 117 , a third call 143 with a third customer 118 , and so on can be selected.
  • calls in which there is only one representative e.g., the specified representative 110 , and the customers are distinct in different calls are selected.
  • the calls 140 can be stored in the data storage system 135 .
  • the speaker identification system 105 can receive such calls 140 , e.g., calls in which the customers are distinct and the specified representative 110 is the only representative, as an input, e.g., from a user associated with speaker identification system 105 or from another computing system. However, if the calls 140 are associated with metadata, the speaker identification system 105 can find and select such calls 140 using the metadata. In some embodiments, if the metadata does not include the customer IDs, the speaker identification system 105 can use other techniques, e.g., Speech, Language and Acoustic modeling techniques, to determine if the customers in each or at least some of the calls 140 are different.
  • other techniques e.g., Speech, Language and Acoustic modeling techniques
  • the speaker identification system 105 processes each of the calls 140 to generate multiple voice segments, such as voice segments 125 of the first call 141 .
  • a voice segment is a portion of a call that includes a human voice or a speech utterance by a human.
  • the speaker identification system 105 can remove any background noise and/or portions that do not have a human voice, e.g., silence, music, etc., from each of the calls 140 .
  • Each of the resulting voice segments would have the voice of at least one of the speakers 120 , e.g., the specified representative 110 or one of the customers 115 .
  • the speaker identification system 105 analyzes each of the voice segments to identify the speakers 120 in the calls 140 .
  • the speaker identification system 105 can cluster the voice segments to multiple clusters 150 to identify the speakers 120 .
  • the clustering process clusters the voice segments such that the voice segments that satisfy the speaker identification criterion are clustered into the same cluster.
  • the clustering process can generate multiple clusters 150 , e.g., a first cluster 151 , a second cluster 152 , and a third cluster 153 .
  • each cluster corresponds to voice segments of one of the speakers 120 .
  • the speaker identification system 105 can then identify a cluster, e.g., the first cluster 151 , that matches a cluster selection criterion, e.g., having highest number of voice segments from each of the calls 140 .
  • the voice in the voice segments of the first cluster 151 are determined to be the voice of the specified representative 110 .
  • the voice segments that overlap, e.g., have a similar or the same feature, across all the calls 140 are determined as likely to have the voice of the specified representative 110 .
  • the speaker identification system 105 generates the fingerprint 160 for the specified representative 110 based on the voice segments in the first cluster 151 .
  • the fingerprint 160 is associated with the user ID of the specified representative 110 and stored in the data storage system 135 .
  • the fingerprint 160 is representative of the feature based on which the clustering is implemented. That is, for example, if the clustering process clusters the voice segments into a cluster based on a voice of the speaker, then the fingerprint 160 is representative of the voice of the speaker. In another example, if the voice segments are clustered based on an accent or other linguistic attributes of the speaker, then the fingerprint 160 is representative of the accent or linguistic attributes voice of the speaker.
  • the speaker identification system 105 can repeat the above described process for other representatives of the organization for generating their fingerprints.
  • the clustering process can be implemented using various techniques, e.g., agglomerative clustering, K-means clustering, or density-based spatial clustering.
  • the voice segments can be identified using various techniques, e.g., Gaussian Mixture Model (GMM)/Universal Background Model (UBM) or Deep Neural Networks (DNN). Further, the voice segments can be analyzed by generating or extracting i-vectors from the voice segments and clustering the i-vectors.
  • an i-vector is a data structure or a compact representation of speaker voice characteristics. An i-vector includes a value, which is representative of the speaker voice characteristics in the corresponding voice segment.
  • the i-vectors can be extracted based on various features, e.g., features mentioned above.
  • a fingerprint can also be generated using the i-vectors corresponding to the voice segments for which the i-vectors are extracted.
  • the speaker identification system 105 can not only identify a particular representative but also representatives of a particular type, e.g., representatives of a specified age or age range, representatives having a specified accent, representatives of a specified gender, representatives having a specified physical ailment, physical condition, level of education, or other such features.
  • the clustering process can be implemented not only for identifying a particular representative but also for identifying representatives based on age, accent, gender, physical ailments, physical conditions, level of education, or other such features.
  • Various technologies can be used to analyze the calls to identify the above features.
  • the speaker identification system 105 can then group the voice segments based on one or more of the above features into multiple groups in which each of the groups corresponds to representatives of a particular type.
  • a first group of voice segments can correspond to “men,” and a second group can correspond to “women.”
  • a group of the voice segments can correspond to speakers with “Alzheimer” physical condition, and another group can correspond to “women over 70 years” etc.
  • the speaker identification system 105 can generate a fingerprint for each of the groups that corresponds to representatives of a particular type. The speaker identification system 105 can use the generated fingerprints to identify a type of the representative in a particular call, e.g., in any given call or a real-time call.
  • the speaker identification system 105 can generate the fingerprints for representatives by analyzing calls having multiple representatives as well.
  • FIG. 2 is a block diagram of an example 200 for identifying a speaker in a conversation using the speaker identification system of FIG. 1 , consistent with various embodiments.
  • the speaker identification system 105 can be used to identify a representative in a received call 215 .
  • the received call 215 can be of a conversation between a first speaker 205 , who is a representative, and a second speaker 210 , who is a customer, and can be a mono-channel call. Note that there can be more than two speakers; however, the number of speakers is limited to two in this example for ease of description.
  • the received call 215 can be a real-time data stream, e.g., audio stream, of a live conversation between the speakers, or a recording of a previous conversation.
  • the speaker identification system 105 processes the received call 215 to generate voice segments 220 .
  • the speaker identification system 105 can remove any background noise and/or portions that do not have a human voice, e.g., silence, music, etc., from the received call 215 .
  • the speaker identification system 105 then clusters the voice segments, e.g., as described above, into multiple clusters, e.g., a first candidate cluster 225 , a second candidate cluster 230 , and a third candidate cluster 235 .
  • the clustering process clusters such that the voice segments satisfying the speaker identification criterion are clustered into the same cluster. As described above, each cluster corresponds to voice segments of one of the speakers.
  • voice segments of a speaker can be clustered into different clusters, e.g., due to some variations in the voice or background noise.
  • various techniques can be used to refine the clustering process, which resolves such inconsistencies and clusters voice segments from the same speaker into the same cluster.
  • the speaker identification system 105 can then compare each of the clusters with the fingerprints 240 of various representatives stored in the data storage system 135 .
  • the speaker identification system 105 can use a matching algorithm to perform the comparing. If the speaker identification system 105 finds a matching fingerprint 245 for a particular cluster, e.g., the first candidate cluster 225 , the speaker identification system 105 determines the voice in voice segments of the first candidate cluster 225 to be the voice of the representative associated with the matching fingerprint 245 , e.g., the first speaker 205 .
  • the speaker identification system 105 assigns the voice segments in the first candidate cluster 225 to the first speaker 205 , and generates a marked conversation 250 , which indicates the voice segments or portions of the received call 215 where the first speaker 205 spoke. For example, the marked conversation 250 indicates the portions of the received call 215 where the first speaker 205 spoke as marked voice segments 255 .
  • the speaker identification system 105 performs the clustering and comparing by extracting i-vectors from the voice segments and then clustering and comparing of the extracted i-vectors with the fingerprints 240 .
  • FIG. 3 is a block diagram of the speaker identification system of FIG. 1 , consistent with various embodiments.
  • the speaker identification system 105 includes a number of components that facilitate in generating fingerprints for speakers and identifying the speakers.
  • the components include a call selection component 305 , a segmentation component 310 , an extraction component 315 , a clustering component 320 , a fingerprint generation component 325 and a fingerprint matching component 330 .
  • the call selection component 305 enables selection of appropriate calls for generating a fingerprint for a representative.
  • the call selection component 305 can receive a set of calls, e.g., calls in which the customers are distinct across the calls and the specified representative 110 is the only representative, as an input.
  • the call selection component 305 can receive the input from a user associated with speaker identification system 105 , or from another computing system. However, if the calls 140 are associated with metadata, the call selection component 305 can select the set of calls, e.g., from the data storage system 135 , using the metadata. Note that there can be more than one representative and/or customer in the call. However, the call selection component 305 selects, when available, calls in which there is only one representative, e.g., the specified representative 110 , in conversation with the customers 115 .
  • the segmentation component 310 enables generation of voice segments from the calls 140 .
  • the segmentation component 310 can remove any background noise and/or portions that do not have a human voice, e.g., silence, music, etc., from each of the calls 140 .
  • the segmentation component 310 can remove or reduce the background noise using various techniques, e.g., Latent Discriminant Analysis (LDA), probabilistic LDA, or DNN.
  • LDA Latent Discriminant Analysis
  • probabilistic LDA probabilistic LDA
  • the extraction component 315 enables generation or extraction of i-vectors from the voice segments.
  • the i-vectors can be extracted based on various features, e.g., features mentioned above.
  • the segmentation component 310 can remove or reduce background noise prior to the extraction of i-vectors.
  • the clustering component 320 can cluster the voice segments, e.g., the i-vectors extracted by the extraction component 315 , to multiple clusters 150 .
  • the clustering component 320 clusters the voice segments such that the voice segments satisfying the speaker identification criterion are clustered into the same cluster.
  • the clustering component 320 can use various techniques to resolve inconsistencies such as voice segments of the same speaker being clustered into different clusters.
  • the clustering component 320 can identify one of the clusters 150 that satisfies the cluster selection criterion, and determines the voice in the voice segments of the identified cluster to be the voice of the specified representative 110 .
  • the fingerprint generation component 325 can generate fingerprints for the representatives based on the voice segments in the clusters identified by the clustering component 320 for the corresponding representative. For example, the fingerprint generation component 325 generates the fingerprint 160 for the specified representative 110 based on the voice segments in the first cluster 151 .
  • the fingerprint 160 is associated with the user ID of the specified representative 110 and stored in the data storage system 135 .
  • the fingerprint matching component 330 can be used to compare voice segments, e.g., i-vectors, in a cluster to fingerprints in the data storage system 135 to find a matching fingerprint. For example, the fingerprint matching component 330 can match clustered voice segments of a received call 215 with the fingerprints 240 in the data storage system 135 to find a matching fingerprint 245 .
  • the fingerprint matching component 330 can use various matching algorithms for comparing the clustered voice segments with the fingerprints.
  • FIG. 4 is a flow diagram of a process 400 for generating a fingerprint of a speaker, consistent with various embodiments.
  • the process 400 can be implemented using the speaker identification system of FIG. 1 .
  • the call selection component 305 selects calls between a representative and different customers. For example, as described at least with reference to FIGS. 1 and 3 , to generate a fingerprint for the specified representative 110 , the call selection component 305 selects or receives calls 140 in which (a) the specified representative 110 is the only representative who is in conversation with the customers 115 in at least some of the calls, and (b) the customers 115 are distinct across the calls.
  • the segmentation component 310 processes the selected calls to generate voice segments for each of the selected calls. For example, as described at least with reference to FIGS. 1 and 3 , the segmentation component 310 can remove portions that do not have a human voice, e.g., silence, music, etc., from each of the calls 140 to generate the voice segments. The segmentation component 310 can also remove or reduce the background noise from each of the generated voice segments.
  • a human voice e.g., silence, music, etc.
  • the clustering component 320 identifies voice segments that satisfy a speaker identification criterion. For example, as described at least with reference to FIGS. 1 and 3 , the clustering component 320 identifies those voice segments that have the same or similar feature across all the calls 140 , and determines the voice in those voice segments to be the voice of the specified representative 110 . Additional details with respect to identifying the voice segments that satisfy the speaker identification criterion are described at least with reference to FIG. 5 below.
  • the fingerprint generation component 325 generates a fingerprint for the representative based on the voice segments identified in block 415 . For example, as described at least with reference to FIGS. 1 and 3 , the fingerprint generation component 325 generates the fingerprint 160 for the specified representative 110 based on the voice segments, e.g., i-vectors extracted from the voice segments, that have the same or similar feature across all the calls 140 .
  • the fingerprint generation component 325 associates the fingerprint with a user ID of the representative. For example, as described at least with reference to FIGS. 1 and 3 , the fingerprint generation component 325 associates the fingerprint 160 with the user ID of the specified representative 110 .
  • the fingerprint generation component 325 stores the fingerprint generated in block 425 at the data storage system 135 .
  • the fingerprint generation component 325 stores the fingerprint 160 at the data storage system 135 .
  • FIG. 5 is a flow diagram of a process 500 for clustering the voice segments, consistent with various embodiments.
  • the process 500 can be implemented in the speaker identification system 105 of FIG. 1 .
  • the process 500 can be implemented as part of block 415 of process 400 .
  • the extraction component 315 generates i-vectors from each of the voice segments.
  • an i-vector is a data structure or a compact representation of speaker voice characteristics.
  • An i-vector includes a value, which is representative of the speaker voice characteristics in the corresponding voice segment.
  • the i-vectors can be extracted based on various features, e.g., features mentioned above, and can be generated using various known techniques.
  • the clustering component 320 clusters the i-vectors to generate multiple clusters of i-vectors.
  • the clustering component 320 clusters the i-vectors of the voice segments such that the voice segments satisfying the speaker identification criterion, e.g., that share the same or a similar feature, are clustered into the same cluster.
  • the clustering component 320 can use various techniques to cluster the i-vectors, e.g., agglomerative clustering, K-means clustering, or density-based spatial clustering.
  • each of the clusters corresponds to a voice of one of the speakers.
  • the clustering component 320 identifies one of the clusters that satisfies the cluster selection criterion, e.g., having highest number of voice segments from each of the calls selected in block 405 of process 400 , and the process returns. For example, as described at least with reference to FIGS. 1 and 3 , the clustering component 320 identifies the first cluster 151 as satisfying the cluster selection criterion, and determines the voice in the voice segments of the identified cluster to be the voice of the specified representative 110 .
  • FIG. 6 is a flow diagram of a process 600 for identifying a speaker in a conversation, consistent with various embodiments.
  • the process 600 can be implemented in the speaker identification system 105 of FIG. 1 .
  • the call selection component 305 receives a call between a representative and a customer, e.g., received call 215 of FIG. 2 .
  • the extraction component 315 generates i-vectors for various voice segments of the received call. For example, the extraction component 315 extracts the i-vectors from the voice segments 220 of the received call 215 .
  • the clustering component 320 clusters the i-vectors into multiple clusters.
  • the clustering component 320 clusters the i-vectors of the voice segments such that the voice segments satisfying the speaker identification criterion, e.g., that share the same or a similar feature, are clustered into the same cluster. For example, the clustering component clusters the i-vectors to the first candidate cluster 225 , the second candidate cluster 230 , and the third candidate cluster 235
  • the fingerprint matching component 330 compares each of the clusters with the fingerprints stored in the data storage system.
  • the fingerprint matching component 330 can use various matching algorithms for comparing the clustered i-vectors with the fingerprints.
  • the fingerprint matching component 330 finds a matching fingerprint for a particular cluster, at block 630 , the fingerprint matching component 330 identifies the representative associated with the matching fingerprint as the representative who is in the conversation of the received call. On the other hand, if no matching fingerprint is found, the process returns.
  • the fingerprint matching component 330 identifies the voice segments or portions of the received call where the identified representative spoke.
  • FIG. 7 is a block diagram of a computer system as may be used to implement features of the disclosed embodiments.
  • the computing system 700 may be used to implement any of the entities, components or services depicted in the examples of the foregoing figures (and any other components described in this specification).
  • the computing system 700 may include one or more central processing units (“processors”) 705 , memory 710 , input/output devices 725 (e.g., keyboard and pointing devices, display devices), storage devices 720 (e.g., disk drives), and network adapters 730 (e.g., network interfaces) that are connected to an interconnect 715 .
  • processors central processing units
  • the interconnect 715 is illustrated as an abstraction that represents any one or more separate physical buses, point to point connections, or both connected by appropriate bridges, adapters, or controllers.
  • the interconnect 715 may include, for example, a system bus, a Peripheral Component Interconnect (PCI) bus or PCI-Express bus, a HyperTransport or industry standard architecture (ISA) bus, a small computer system interface (SCSI) bus, a universal serial bus (USB), IIC (I 2 C) bus, or an Institute of Electrical and Electronics Components (IEEE) standard 1394 bus, also called “Firewire”.
  • PCI Peripheral Component Interconnect
  • ISA industry standard architecture
  • SCSI small computer system interface
  • USB universal serial bus
  • IIC I 2 C
  • IEEE Institute of Electrical and Electronics Components
  • the memory 710 and storage devices 720 are computer-readable storage media that may store instructions that implement at least portions of the described embodiments.
  • the data structures and message structures may be stored or transmitted via a data transmission medium, such as a signal on a communications link.
  • Various communications links may be used, such as the Internet, a local area network, a wide area network, or a point-to-point dial-up connection.
  • computer readable media can include computer-readable storage media (e.g., “non-transitory” media) and computer-readable transmission media.
  • the instructions stored in memory 710 can be implemented as software and/or firmware to program the processor(s) 705 to carry out actions described above.
  • such software or firmware may be initially provided to the processing system 700 by downloading it from a remote system through the computing system 700 (e.g., via network adapter 730 ).
  • programmable circuitry e.g., one or more microprocessors
  • special-purpose hardwired circuitry may be in the form of, for example, one or more ASICs, PLDs, FPGAs, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Multimedia (AREA)
  • Development Economics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Acoustics & Sound (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Computer Interaction (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computational Linguistics (AREA)
  • Quality & Reliability (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A speaker identification system (“system”) automatically assigns a speaker to voiced segments in a conversation, without requiring any previously recorded voice sample or any other action by the speaker. The system enables unsupervised learning of speakers' fingerprints and using such fingerprints for identifying a speaker in a recording of a conversation. The system identifies one or more speakers, e.g., representatives of an organization, who are in conversation with other speakers, e.g., customers of the organization. The system processes recordings of conversations between a representative and one or more customers to generate multiple voice segments having a human voice, identifies the voice segments that have the same or a similar feature, and determines the voice in the identified voice segments as the voice of the representative.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. application Ser. No. 15/604,513, filed on May 24, 2017, which is incorporated by reference herein in its entirety.
  • BACKGROUND
  • Automatic speech recognition techniques allow extracting business insights from telephone conversations with customers of an organization. This data allows improving sales and customer success, Customer Support, Marketing and Product functions (e.g., to understand and hear the “voice of the customer”) by providing coaching to representatives of the organization, e.g., on desired behaviors, measuring compliance and generating data regarding market and product requirements automatically. Such data can also be used for determining best practices by identifying winning patterns, making sales process more efficient by summarizing calls so that the representatives can have less sync meetings, and for guiding conversations in real-time. Attributing utterances and words to the person who spoke them is useful for any downstream analysis such as search, call visualization, identifying buying cues, extracting customer pain points, identifying good/bad sales behaviors, and extracting notes and tasks.
  • When a call is recorded as a single channel (mono), or when multiple speakers are co-located in the same room, identifying the speaker requires applying various algorithmic techniques. Previous technologies aim to split the call between different speakers, an approach termed “diarization”, e.g., determine that a particular voice is of “speaker 1,” on the call; another voice is of “speaker 2” on the call, another voice is of “speaker 3” on the call, and so on. Such technologies may not identify those speakers. Some other technologies use multi-channel recordings in which each of the speakers in the conversation is on a separate communication channel and the speakers can be identified based on the channel assigned to the speaker. However, such technologies may not work in a single channel recording.
  • Some technologies may identify the speakers, but they need to record a short voice sample for creating a speaker fingerprint and use this speaker fingerprint to identify the speakers. However, this requires active participation of the recorded user which can hurt adoption rates and provide a non-smooth user experience.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of an environment in which the disclosed embodiments can be implemented.
  • FIG. 2 is a block diagram of an example for identifying a speaker using the speaker identification system of FIG. 1, consistent with various embodiments.
  • FIG. 3 is a block diagram of the speaker identification system of FIG. 1, consistent with various embodiments.
  • FIG. 4 is a flow diagram of a process for generating a fingerprint of a speaker, consistent with various embodiments.
  • FIG. 5 is a flow diagram of a process for clustering voice segments of recordings, consistent with various embodiments.
  • FIG. 6 is a flow diagram of a process for identifying a speaker in a conversation, consistent with various embodiments.
  • FIG. 7 is a block diagram of a processing system that can implement operations of the disclosed embodiments.
  • DETAILED DESCRIPTION
  • Embodiments are directed to a speaker identification system for identifying a speaker in a conversation without requiring any voice sample or any other action from the speaker for identification purposes. The speaker identification system learns or generates a fingerprint of a speaker in an unsupervised manner, and uses such fingerprints for identifying a speaker in a particular conversation. The speaker identification system can generate fingerprints for and/or identify one or more speakers, e.g., employees or representatives of an organization, who take part in conversations with other speakers, e.g., customers of the organization. For example, to generate a fingerprint for a specified representative, the speaker identification system processes a number of calls the specified representative had with a number of customers to generate multiple voice segments for each of the calls, identifies the voice segments that satisfy a speaker identification criterion, e.g., voice segments having the same or a similar feature across all the calls, and determines the voice in the identified voice segments as the voice of the specified representative.
  • The feature can include at least one of a voice of the speaker, speech rate of the speaker, an accent of the speaker, linguistic attributes of the speaker, an ambient noise, a speech volume, a tone, a timber, emotions of the speaker (e.g., fear, anger, happiness, timidity, fatigue), personal attributes of the speaker (e.g., an age, an accent, and a gender), physical ailments of the speaker, physical conditions of the speaker, and level of education of the speaker.
  • The speaker identification system generates the fingerprint for the specified representative based on the identified voice segments, associates the fingerprint with the user ID of the specified representative, and stores the fingerprint in a data storage system. The data storage system can store fingerprints of multiple such speakers.
  • The speaker identification system can use the fingerprints from the data storage system to identify a representative in a conversation, such as a live or real-time conversation or a recording of a previous conversation. For example, consider that a representative is in conversation with a customer in a telephone call. The speaker identification system receives real-time conversation data, e.g., an audio stream of the telephone call, processes the audio stream to generate multiple voice segments and identifies groups of voice segments that have the same or a similar feature. A first group of voice segments can have the voice of a first speaker; a second group of voice segments can have the voice of a second speaker and so on. The speaker identification system then compares the groups of voice segments with the fingerprints from the data storage system to identify a matching fingerprint. If a matching fingerprint is found for a particular group of voice segments, the speaker identification system determines the representative in the real-time conversation as the representative corresponding to the user ID associated with the matching fingerprint. After the speaker identification system identifies the representative in the real-time conversation, the speaker identification system can identify the voice segments in the conversation in which the representative spoke, and mark those voice segments as having the voice of the identified representative.
  • The speaker identification system receives as input a call. In some embodiments, the calls can be associated with metadata, which can include information regarding identities of all or some speakers in the call. However, the information does not indicate which voice in the call belongs to which speaker. For example, for a call between a representative and one or more customers, the speaker identification system can receive as input the call and user identification (ID) of the representative. The metadata may optionally include some customer identification as well. In some embodiments, at least some portion of the metadata can be derived from video data of the call, e.g., visual data. In some embodiments, the calls are mono-channel, that is, the conversations are performed over a single communication channel.
  • Speaker identification can be used for various purposes. For example, in a customer care center scenario, the speaker identification can be used for analysis such as search, call visualization, identifying buying cues, extracting customer pain points, identifying good and/or bad sales behaviors, and extracting notes and tasks. As described above, the disclosed speaker identification system requires no voice print, user effort or explicit interaction by the user for identification purposes.
  • Note that a “call” is a recording of the conversation between two or more speakers and such conversations can be telephone based, Voice over Internet Protocol (VoIP) based, video conference based, Virtual Reality (VR) based, Augmented Reality (AR) based, or based on any online meetings, collaborations or interactions. Further, the call can also be a real-time data stream, e.g., audio stream, of a real-time interaction between the speakers.
  • Turning now to FIG. 1, FIG. 1 is a block diagram of an environment 100 in which the disclosed embodiments can be implemented. The environment 100 includes a speaker identification system 105 that facilitates unsupervised learning or generation of a speaker's fingerprint for identifying of a speaker in a conversation. The speaker identification system 105 analyzes a set of calls 140 to generate a fingerprint for one or more of the speakers 120 in the calls 140. The speakers 120 can include one or more speakers who are to be identified by the speaker identification system 105. For example, the speakers to be identified are representatives or employees of an organization such as a customer care center, who are in conversation with speakers who don't have to be identified, e.g., customers of the organization. The speaker identification system 105 can identify a representative in a particular conversation by analyzing one or more calls the representative has had with one or more customers.
  • The roles of the speaker to be identified and the speaker who need not be identified are not limited to the representative and customer roles or terminologies, respectively. Further, the term “speaker” can refer to either a speaker who is to be identified or speaker who need not be identified unless stated otherwise.
  • The speaker identification system 105 may not receive any input of voice samples, fingerprints or some other reference of a voice of the representative that identifies the representative. So, the speaker identification system 105 may have to generate the fingerprints, which can then be used for identifying a specified representative 110 in a specified conversation. The speaker identification system 105 can generate a fingerprint 160 for a specified representative 110 based on calls 140 the specified representative 110 has had with one or more customers 115. The speaker identification system 105 process the calls 140 to generate voice segments for each of the calls 140, analyzes the voice segments to identify a set of voice segments that satisfy the speaker identification criterion, e.g., share the same or similar feature across all the calls 140, and determines the voice in the set of voice segments as associated with the specified representative 110. The speaker identification system 105 generates a fingerprint 160 based on the identified set of voice segments, associates the fingerprint 160 with a user ID of the specified representative 110, and stores the fingerprint 160 in a data storage system 135. The following paragraphs describe additional details regarding the generation of the fingerprints.
  • In some embodiments, at least some of the calls 140 can include or be associated with metadata such as a user ID of the representative involved in the conversation. However, such metadata is optional and the speaker identification system 105 may not rely on the metadata for generating the fingerprints or for speaker identification purposes. The metadata can also have a customer ID of the customer involved in the conversation. However, the metadata would not indicate which voice in the call is of the corresponding representative. In some embodiments, the metadata can be derived video data of the call, e.g., visual data. For generating a fingerprint for a representative, the calls are selected such that (a) in at least some of the conversations the specified representative 110 is the only representative in conversation with the customers 115, that is, there is no other representative other than the specified representative 110, and (b) the customers 115 in different conversations are distinct. For example, to generate the fingerprint 160 of the specified representative 110, calls such as a first call 141 the specified representative 110 had with a first customer 116, a second call 142 with a second customer 117, a third call 143 with a third customer 118, and so on can be selected. Note that there can be more than one representative and/or customer in the conversation. However, when available, calls in which there is only one representative, e.g., the specified representative 110, and the customers are distinct in different calls are selected. The calls 140 can be stored in the data storage system 135.
  • The speaker identification system 105 can receive such calls 140, e.g., calls in which the customers are distinct and the specified representative 110 is the only representative, as an input, e.g., from a user associated with speaker identification system 105 or from another computing system. However, if the calls 140 are associated with metadata, the speaker identification system 105 can find and select such calls 140 using the metadata. In some embodiments, if the metadata does not include the customer IDs, the speaker identification system 105 can use other techniques, e.g., Speech, Language and Acoustic modeling techniques, to determine if the customers in each or at least some of the calls 140 are different.
  • After selecting the calls 140, the speaker identification system 105 processes each of the calls 140 to generate multiple voice segments, such as voice segments 125 of the first call 141. In some embodiments, a voice segment is a portion of a call that includes a human voice or a speech utterance by a human. In some embodiments, in generating the voice segments, the speaker identification system 105 can remove any background noise and/or portions that do not have a human voice, e.g., silence, music, etc., from each of the calls 140. Each of the resulting voice segments would have the voice of at least one of the speakers 120, e.g., the specified representative 110 or one of the customers 115.
  • The speaker identification system 105 analyzes each of the voice segments to identify the speakers 120 in the calls 140. For example, the speaker identification system 105 can cluster the voice segments to multiple clusters 150 to identify the speakers 120. The clustering process clusters the voice segments such that the voice segments that satisfy the speaker identification criterion are clustered into the same cluster. The clustering process can generate multiple clusters 150, e.g., a first cluster 151, a second cluster 152, and a third cluster 153. Typically, each cluster corresponds to voice segments of one of the speakers 120. In some embodiments, there can be more clusters than the number of speakers and/or voice segments of a speaker can be clustered into different clusters, e.g., due to some variations in the voice or background noise. However, various techniques can be used to refine the clustering process, which resolves such inconsistencies and clusters voice segments from the same speaker into the same cluster. The speaker identification system 105 can then identify a cluster, e.g., the first cluster 151, that matches a cluster selection criterion, e.g., having highest number of voice segments from each of the calls 140. The voice in the voice segments of the first cluster 151 are determined to be the voice of the specified representative 110. Since the specified representative 110 is on all or a marked majority of the calls 140 (if the calls 140 include calls without the specified representative 110), and not all the customers 115 are on all the calls 140, in some embodiments, the voice segments that overlap, e.g., have a similar or the same feature, across all the calls 140 are determined as likely to have the voice of the specified representative 110.
  • The speaker identification system 105 generates the fingerprint 160 for the specified representative 110 based on the voice segments in the first cluster 151. The fingerprint 160 is associated with the user ID of the specified representative 110 and stored in the data storage system 135. In some embodiments, the fingerprint 160 is representative of the feature based on which the clustering is implemented. That is, for example, if the clustering process clusters the voice segments into a cluster based on a voice of the speaker, then the fingerprint 160 is representative of the voice of the speaker. In another example, if the voice segments are clustered based on an accent or other linguistic attributes of the speaker, then the fingerprint 160 is representative of the accent or linguistic attributes voice of the speaker.
  • The speaker identification system 105 can repeat the above described process for other representatives of the organization for generating their fingerprints.
  • The clustering process can be implemented using various techniques, e.g., agglomerative clustering, K-means clustering, or density-based spatial clustering. The voice segments can be identified using various techniques, e.g., Gaussian Mixture Model (GMM)/Universal Background Model (UBM) or Deep Neural Networks (DNN). Further, the voice segments can be analyzed by generating or extracting i-vectors from the voice segments and clustering the i-vectors. In some embodiments, an i-vector is a data structure or a compact representation of speaker voice characteristics. An i-vector includes a value, which is representative of the speaker voice characteristics in the corresponding voice segment. The i-vectors can be extracted based on various features, e.g., features mentioned above. A fingerprint can also be generated using the i-vectors corresponding to the voice segments for which the i-vectors are extracted.
  • Further, the speaker identification system 105 can not only identify a particular representative but also representatives of a particular type, e.g., representatives of a specified age or age range, representatives having a specified accent, representatives of a specified gender, representatives having a specified physical ailment, physical condition, level of education, or other such features. For example, the clustering process can be implemented not only for identifying a particular representative but also for identifying representatives based on age, accent, gender, physical ailments, physical conditions, level of education, or other such features. Various technologies can be used to analyze the calls to identify the above features. The speaker identification system 105 can then group the voice segments based on one or more of the above features into multiple groups in which each of the groups corresponds to representatives of a particular type. For example, a first group of voice segments can correspond to “men,” and a second group can correspond to “women.” In another example, a group of the voice segments can correspond to speakers with “Alzheimer” physical condition, and another group can correspond to “women over 70 years” etc. The speaker identification system 105 can generate a fingerprint for each of the groups that corresponds to representatives of a particular type. The speaker identification system 105 can use the generated fingerprints to identify a type of the representative in a particular call, e.g., in any given call or a real-time call.
  • Note that although above paragraphs discuss selecting calls that have only one representative, the disclosed embodiments are not restricted to the described example. The speaker identification system 105 can generate the fingerprints for representatives by analyzing calls having multiple representatives as well.
  • FIG. 2 is a block diagram of an example 200 for identifying a speaker in a conversation using the speaker identification system of FIG. 1, consistent with various embodiments. The speaker identification system 105 can be used to identify a representative in a received call 215. The received call 215 can be of a conversation between a first speaker 205, who is a representative, and a second speaker 210, who is a customer, and can be a mono-channel call. Note that there can be more than two speakers; however, the number of speakers is limited to two in this example for ease of description. Further, the received call 215 can be a real-time data stream, e.g., audio stream, of a live conversation between the speakers, or a recording of a previous conversation.
  • The speaker identification system 105 processes the received call 215 to generate voice segments 220. For example, to generate the voice segments, the speaker identification system 105 can remove any background noise and/or portions that do not have a human voice, e.g., silence, music, etc., from the received call 215. The speaker identification system 105 then clusters the voice segments, e.g., as described above, into multiple clusters, e.g., a first candidate cluster 225, a second candidate cluster 230, and a third candidate cluster 235. In some embodiments, the clustering process clusters such that the voice segments satisfying the speaker identification criterion are clustered into the same cluster. As described above, each cluster corresponds to voice segments of one of the speakers. In some embodiments, voice segments of a speaker can be clustered into different clusters, e.g., due to some variations in the voice or background noise. However, various techniques can be used to refine the clustering process, which resolves such inconsistencies and clusters voice segments from the same speaker into the same cluster.
  • The speaker identification system 105 can then compare each of the clusters with the fingerprints 240 of various representatives stored in the data storage system 135. The speaker identification system 105 can use a matching algorithm to perform the comparing. If the speaker identification system 105 finds a matching fingerprint 245 for a particular cluster, e.g., the first candidate cluster 225, the speaker identification system 105 determines the voice in voice segments of the first candidate cluster 225 to be the voice of the representative associated with the matching fingerprint 245, e.g., the first speaker 205. The speaker identification system 105 assigns the voice segments in the first candidate cluster 225 to the first speaker 205, and generates a marked conversation 250, which indicates the voice segments or portions of the received call 215 where the first speaker 205 spoke. For example, the marked conversation 250 indicates the portions of the received call 215 where the first speaker 205 spoke as marked voice segments 255.
  • In some embodiments, the speaker identification system 105 performs the clustering and comparing by extracting i-vectors from the voice segments and then clustering and comparing of the extracted i-vectors with the fingerprints 240.
  • FIG. 3 is a block diagram of the speaker identification system of FIG. 1, consistent with various embodiments. The speaker identification system 105 includes a number of components that facilitate in generating fingerprints for speakers and identifying the speakers. For example, the components include a call selection component 305, a segmentation component 310, an extraction component 315, a clustering component 320, a fingerprint generation component 325 and a fingerprint matching component 330. The call selection component 305 enables selection of appropriate calls for generating a fingerprint for a representative. For example, to generate a fingerprint for the specified representative 110, the call selection component 305 can receive a set of calls, e.g., calls in which the customers are distinct across the calls and the specified representative 110 is the only representative, as an input. The call selection component 305 can receive the input from a user associated with speaker identification system 105, or from another computing system. However, if the calls 140 are associated with metadata, the call selection component 305 can select the set of calls, e.g., from the data storage system 135, using the metadata. Note that there can be more than one representative and/or customer in the call. However, the call selection component 305 selects, when available, calls in which there is only one representative, e.g., the specified representative 110, in conversation with the customers 115.
  • The segmentation component 310 enables generation of voice segments from the calls 140. In some embodiments, in generating the voice segments, the segmentation component 310 can remove any background noise and/or portions that do not have a human voice, e.g., silence, music, etc., from each of the calls 140. The segmentation component 310 can remove or reduce the background noise using various techniques, e.g., Latent Discriminant Analysis (LDA), probabilistic LDA, or DNN.
  • The extraction component 315 enables generation or extraction of i-vectors from the voice segments. The i-vectors can be extracted based on various features, e.g., features mentioned above. In some embodiments, the segmentation component 310 can remove or reduce background noise prior to the extraction of i-vectors.
  • The clustering component 320 can cluster the voice segments, e.g., the i-vectors extracted by the extraction component 315, to multiple clusters 150. The clustering component 320 clusters the voice segments such that the voice segments satisfying the speaker identification criterion are clustered into the same cluster. The clustering component 320 can use various techniques to resolve inconsistencies such as voice segments of the same speaker being clustered into different clusters. The clustering component 320 can identify one of the clusters 150 that satisfies the cluster selection criterion, and determines the voice in the voice segments of the identified cluster to be the voice of the specified representative 110.
  • The fingerprint generation component 325 can generate fingerprints for the representatives based on the voice segments in the clusters identified by the clustering component 320 for the corresponding representative. For example, the fingerprint generation component 325 generates the fingerprint 160 for the specified representative 110 based on the voice segments in the first cluster 151. The fingerprint 160 is associated with the user ID of the specified representative 110 and stored in the data storage system 135.
  • The fingerprint matching component 330 can be used to compare voice segments, e.g., i-vectors, in a cluster to fingerprints in the data storage system 135 to find a matching fingerprint. For example, the fingerprint matching component 330 can match clustered voice segments of a received call 215 with the fingerprints 240 in the data storage system 135 to find a matching fingerprint 245.
  • The fingerprint matching component 330 can use various matching algorithms for comparing the clustered voice segments with the fingerprints.
  • FIG. 4 is a flow diagram of a process 400 for generating a fingerprint of a speaker, consistent with various embodiments. In some embodiments, the process 400 can be implemented using the speaker identification system of FIG. 1. At block 405, the call selection component 305 selects calls between a representative and different customers. For example, as described at least with reference to FIGS. 1 and 3, to generate a fingerprint for the specified representative 110, the call selection component 305 selects or receives calls 140 in which (a) the specified representative 110 is the only representative who is in conversation with the customers 115 in at least some of the calls, and (b) the customers 115 are distinct across the calls.
  • At block 410, the segmentation component 310 processes the selected calls to generate voice segments for each of the selected calls. For example, as described at least with reference to FIGS. 1 and 3, the segmentation component 310 can remove portions that do not have a human voice, e.g., silence, music, etc., from each of the calls 140 to generate the voice segments. The segmentation component 310 can also remove or reduce the background noise from each of the generated voice segments.
  • At block 415, the clustering component 320 identifies voice segments that satisfy a speaker identification criterion. For example, as described at least with reference to FIGS. 1 and 3, the clustering component 320 identifies those voice segments that have the same or similar feature across all the calls 140, and determines the voice in those voice segments to be the voice of the specified representative 110. Additional details with respect to identifying the voice segments that satisfy the speaker identification criterion are described at least with reference to FIG. 5 below.
  • At block 420, the fingerprint generation component 325 generates a fingerprint for the representative based on the voice segments identified in block 415. For example, as described at least with reference to FIGS. 1 and 3, the fingerprint generation component 325 generates the fingerprint 160 for the specified representative 110 based on the voice segments, e.g., i-vectors extracted from the voice segments, that have the same or similar feature across all the calls 140.
  • At block 425, the fingerprint generation component 325 associates the fingerprint with a user ID of the representative. For example, as described at least with reference to FIGS. 1 and 3, the fingerprint generation component 325 associates the fingerprint 160 with the user ID of the specified representative 110.
  • At block 430, the fingerprint generation component 325 stores the fingerprint generated in block 425 at the data storage system 135. For example, as described at least with reference to FIGS. 1 and 3, the fingerprint generation component 325 stores the fingerprint 160 at the data storage system 135.
  • FIG. 5 is a flow diagram of a process 500 for clustering the voice segments, consistent with various embodiments. In some embodiments, the process 500 can be implemented in the speaker identification system 105 of FIG. 1. In some embodiments, the process 500 can be implemented as part of block 415 of process 400. At block 505, the extraction component 315 generates i-vectors from each of the voice segments. In some embodiments, an i-vector is a data structure or a compact representation of speaker voice characteristics. An i-vector includes a value, which is representative of the speaker voice characteristics in the corresponding voice segment. The i-vectors can be extracted based on various features, e.g., features mentioned above, and can be generated using various known techniques.
  • At block 510, the clustering component 320 clusters the i-vectors to generate multiple clusters of i-vectors. The clustering component 320 clusters the i-vectors of the voice segments such that the voice segments satisfying the speaker identification criterion, e.g., that share the same or a similar feature, are clustered into the same cluster. The clustering component 320 can use various techniques to cluster the i-vectors, e.g., agglomerative clustering, K-means clustering, or density-based spatial clustering. In some embodiments, each of the clusters corresponds to a voice of one of the speakers.
  • At block 515, the clustering component 320 identifies one of the clusters that satisfies the cluster selection criterion, e.g., having highest number of voice segments from each of the calls selected in block 405 of process 400, and the process returns. For example, as described at least with reference to FIGS. 1 and 3, the clustering component 320 identifies the first cluster 151 as satisfying the cluster selection criterion, and determines the voice in the voice segments of the identified cluster to be the voice of the specified representative 110.
  • FIG. 6 is a flow diagram of a process 600 for identifying a speaker in a conversation, consistent with various embodiments. In some embodiments, the process 600 can be implemented in the speaker identification system 105 of FIG. 1. At block 605, the call selection component 305 receives a call between a representative and a customer, e.g., received call 215 of FIG. 2.
  • At block 610, the extraction component 315 generates i-vectors for various voice segments of the received call. For example, the extraction component 315 extracts the i-vectors from the voice segments 220 of the received call 215.
  • At block 615, the clustering component 320 clusters the i-vectors into multiple clusters. The clustering component 320 clusters the i-vectors of the voice segments such that the voice segments satisfying the speaker identification criterion, e.g., that share the same or a similar feature, are clustered into the same cluster. For example, the clustering component clusters the i-vectors to the first candidate cluster 225, the second candidate cluster 230, and the third candidate cluster 235
  • At block 620, the fingerprint matching component 330 compares each of the clusters with the fingerprints stored in the data storage system. The fingerprint matching component 330 can use various matching algorithms for comparing the clustered i-vectors with the fingerprints.
  • At determination block 625, if the fingerprint matching component 330 finds a matching fingerprint for a particular cluster, at block 630, the fingerprint matching component 330 identifies the representative associated with the matching fingerprint as the representative who is in the conversation of the received call. On the other hand, if no matching fingerprint is found, the process returns.
  • At block 635, the fingerprint matching component 330 identifies the voice segments or portions of the received call where the identified representative spoke.
  • FIG. 7 is a block diagram of a computer system as may be used to implement features of the disclosed embodiments. The computing system 700 may be used to implement any of the entities, components or services depicted in the examples of the foregoing figures (and any other components described in this specification). The computing system 700 may include one or more central processing units (“processors”) 705, memory 710, input/output devices 725 (e.g., keyboard and pointing devices, display devices), storage devices 720 (e.g., disk drives), and network adapters 730 (e.g., network interfaces) that are connected to an interconnect 715. The interconnect 715 is illustrated as an abstraction that represents any one or more separate physical buses, point to point connections, or both connected by appropriate bridges, adapters, or controllers. The interconnect 715, therefore, may include, for example, a system bus, a Peripheral Component Interconnect (PCI) bus or PCI-Express bus, a HyperTransport or industry standard architecture (ISA) bus, a small computer system interface (SCSI) bus, a universal serial bus (USB), IIC (I2C) bus, or an Institute of Electrical and Electronics Components (IEEE) standard 1394 bus, also called “Firewire”.
  • The memory 710 and storage devices 720 are computer-readable storage media that may store instructions that implement at least portions of the described embodiments. In addition, the data structures and message structures may be stored or transmitted via a data transmission medium, such as a signal on a communications link. Various communications links may be used, such as the Internet, a local area network, a wide area network, or a point-to-point dial-up connection. Thus, computer readable media can include computer-readable storage media (e.g., “non-transitory” media) and computer-readable transmission media.
  • The instructions stored in memory 710 can be implemented as software and/or firmware to program the processor(s) 705 to carry out actions described above. In some embodiments, such software or firmware may be initially provided to the processing system 700 by downloading it from a remote system through the computing system 700 (e.g., via network adapter 730).
  • The embodiments introduced herein can be implemented by, for example, programmable circuitry (e.g., one or more microprocessors) programmed with software and/or firmware, or entirely in special-purpose hardwired (non-programmable) circuitry, or in a combination of such forms. Special-purpose hardwired circuitry may be in the form of, for example, one or more ASICs, PLDs, FPGAs, etc.
  • Remarks
  • The above description and drawings are illustrative and are not to be construed as limiting. Numerous specific details are described to provide a thorough understanding of the disclosure. However, in some instances, well-known details are not described in order to avoid obscuring the description. Further, various modifications may be made without deviating from the scope of the embodiments. Accordingly, the embodiments are not limited except as by the appended claims.
  • Reference in this specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the disclosure. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Moreover, various features are described which may be exhibited by some embodiments and not by others. Similarly, various requirements are described which may be requirements for some embodiments but not for other embodiments.
  • The terms used in this specification generally have their ordinary meanings in the art, within the context of the disclosure, and in the specific context where each term is used. Terms that are used to describe the disclosure are discussed below, or elsewhere in the specification, to provide additional guidance to the practitioner regarding the description of the disclosure. For convenience, some terms may be highlighted, for example using italics and/or quotation marks. The use of highlighting has no influence on the scope and meaning of a term; the scope and meaning of a term is the same, in the same context, whether or not it is highlighted. It will be appreciated that the same thing can be said in more than one way. One will recognize that “memory” is one form of a “storage” and that the terms may on occasion be used interchangeably.
  • Consequently, alternative language and synonyms may be used for any one or more of the terms discussed herein, nor is any special significance to be placed upon whether or not a term is elaborated or discussed herein. Synonyms for some terms are provided. A recital of one or more synonyms does not exclude the use of other synonyms. The use of examples anywhere in this specification including examples of any term discussed herein is illustrative only, and is not intended to further limit the scope and meaning of the disclosure or of any exemplified term. Likewise, the disclosure is not limited to various embodiments given in this specification.
  • Those skilled in the art will appreciate that the logic illustrated in each of the flow diagrams discussed above, may be altered in various ways. For example, the order of the logic may be rearranged, substeps may be performed in parallel, illustrated logic may be omitted; other logic may be included, etc.
  • Without intent to further limit the scope of the disclosure, examples of instruments, apparatus, methods and their related results according to the embodiments of the present disclosure are given below. Note that titles or subtitles may be used in the examples for convenience of a reader, which in no way should limit the scope of the disclosure. Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure pertains. In the case of conflict, the present document, including definitions will control.

Claims (21)

1-34. (canceled)
35. A computer-implemented method comprising:
receiving recordings of multiple conversations involving an individual,
wherein each of the recordings includes voice data corresponding to a different conversation, and
wherein each of the recordings is of a conversation that the individual had with a different participant;
splitting each of the recordings into voice segments,
wherein each voice segment corresponds to a voice of the individual or the corresponding participant;
analyzing the voice segments of the recordings to identify a set of voice segments that have a feature that corresponds to the individual;
generating a fingerprint for the individual based on the set of voice segments,
wherein the fingerprint is representative of a vocal characteristic of the individual that is derived from the set of voice segments; and
storing the fingerprint in a data storage system.
36. The computer-implemented method of claim 35, wherein the fingerprint is one of multiple fingerprints associated with multiple representatives of an organization that are stored in the data storage system.
37. The computer-implemented method of claim 36, further comprising:
receiving a stream of voice data corresponding to a conversation between multiple parties;
splitting the stream of voice data into voice segments,
wherein each voice segment corresponds to a voice of one of the multiple parties;
comparing a given set of voice segments in the stream of voice data to the multiple fingerprints to identify a matching fingerprint;
identifying a representative associated with the matching fingerprint as the representative to be associated with the given set of voice segments; and
generating a marked conversation by appending information to the given subset of voice segments associated with the representative.
38. The computer-implemented method of claim 37, wherein information identifying the source is appended only to the subset of voice segments associated with the representative.
39. The computer-implemented method of claim 35, further comprising:
associating the fingerprint with an identifier associated with the individual.
40. The computer-implemented method of claim 35, wherein said analyzing comprises clustering the voice segments to generate multiple clusters of one or more voice segments, and wherein each cluster corresponds to the individual or one of the participants.
41. The computer-implemented method of claim 40, further comprising:
determining that a given cluster includes the set of voice segments associated with the individual since the given cluster has a highest number of voice segments.
42. The computer-implemented method of claim 40, wherein said clustering comprises batching the voice segments such that two voice segments having a feature in common are clustered to a single cluster.
43. The computer-implemented method of claim 35, wherein the feature is representative of a voice of the individual, an accent of the individual, a speech rate of the individual, a linguistic attribute of the individual, or a background noise.
44. A non-transitory computer-readable medium with instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
receiving recordings of multiple conversations involving an individual,
wherein each recording includes voice data corresponding to a different conversation;
splitting each of the recordings into voice segments for which i-vector data structures are created,
wherein each i-vector data structure includes a value representative of one or more features of the corresponding voice segment;
sorting the voice segments into at least two clusters based on the i-vector data structures,
wherein each cluster includes voice segments associated with substantially similar i-vector data structures;
identifying a given cluster that is associated with the individual; and
generating a fingerprint for the individual based on the voice segments included in the given cluster,
wherein the fingerprint is representative of a vocal characteristic of the individual that is derived from the voice segments included in the given cluster.
45. The non-transitory computer-readable medium of claim 44, the operations further comprising:
storing the fingerprint in a data storage system that maintains multiple fingerprints associated with different individuals.
46. The non-transitory computer-readable medium of claim 45, wherein the different individuals are representatives who interact with customers on behalf of an enterprise.
47. The non-transitory computer-readable medium of claim 46, the operations further comprising:
receiving a stream of voice data corresponding to a conversation between multiple parties;
splitting the stream of voice data into voice segments,
wherein each voice segment corresponds to a voice of one of the multiple parties;
comparing a set of voice segments in the stream of voice data to the multiple fingerprints to identify a matching fingerprint; and
identify a representative associated with the matching fingerprint as the representative involved in the conversation.
48. The non-transitory computer-readable medium of claim 47, the operations further comprising:
generating a marked conversation by appending information to the set of voice segments associated with the representative.
49. The non-transitory computer-readable medium of claim 44, wherein the feature is indicative of an age of the individual, a gender of the individual, a physical ailment of the individual, a physical condition of the individual, or an education level of the individual.
50. The non-transitory computer-readable medium of claim 44, wherein each of the recordings is a mono-channel recording in which speech of all participants in the corresponding conversation is over a single communication channel.
51. A computer-implemented method comprising:
receiving a stream of voice data corresponding to a conversation between multiple parties;
splitting the stream of voice data into voice segments,
wherein each voice segment corresponds to a voice of one of the multiple parties;
sorting the voice segments into multiple clusters associated with the multiple parties;
identifying a given cluster associated with a party of interest;
comparing the voice segments in the given cluster to a series of fingerprints stored in a data storage system to identify a matching fingerprint,
wherein each fingerprint is representative of a vocal characteristic of a different representative who interacts with customers on behalf of an enterprise;
identifying a representative associated with the matching fingerprint as the party of interest; and
generating a marked conversation by appending information regarding the representative only to the voice segments in the given cluster.
52. The computer-implemented method of claim 51, wherein the given cluster is identified from amongst the multiple multiples since the given cluster has a highest number of voice segments.
53. The computer-implemented method of claim 51, wherein the conversation is a video call, and wherein the stream of voice data is part of a multimedia stream that also includes a stream of video data.
54. The computer-implemented method of claim 51, wherein voice segments of the stream of voice data other than the voice segments in the given cluster do not have information regarding the corresponding party appended thereto.
US16/858,863 2017-05-24 2020-04-27 Automatic speaker identification in calls Abandoned US20200322399A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/858,863 US20200322399A1 (en) 2017-05-24 2020-04-27 Automatic speaker identification in calls

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/604,513 US10637898B2 (en) 2017-05-24 2017-05-24 Automatic speaker identification in calls
US16/858,863 US20200322399A1 (en) 2017-05-24 2020-04-27 Automatic speaker identification in calls

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US15/604,513 Continuation US10637898B2 (en) 2017-05-24 2017-05-24 Automatic speaker identification in calls

Publications (1)

Publication Number Publication Date
US20200322399A1 true US20200322399A1 (en) 2020-10-08

Family

ID=64401575

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/604,513 Active 2037-06-16 US10637898B2 (en) 2017-05-24 2017-05-24 Automatic speaker identification in calls
US16/858,863 Abandoned US20200322399A1 (en) 2017-05-24 2020-04-27 Automatic speaker identification in calls

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US15/604,513 Active 2037-06-16 US10637898B2 (en) 2017-05-24 2017-05-24 Automatic speaker identification in calls

Country Status (1)

Country Link
US (2) US10637898B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11252280B2 (en) * 2019-12-05 2022-02-15 Scott C Harris Conveyor call center with cryptographic ledger

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016209888A1 (en) 2015-06-22 2016-12-29 Rita Singh Processing speech signals in voice-based profiling
GB2563952A (en) * 2017-06-29 2019-01-02 Cirrus Logic Int Semiconductor Ltd Speaker identification
CN107527620B (en) * 2017-07-25 2019-03-26 平安科技(深圳)有限公司 Electronic device, the method for authentication and computer readable storage medium
EP3688975A4 (en) * 2017-09-26 2021-04-21 Hewlett-Packard Development Company, L.P. Conference call participants identifications
US11276407B2 (en) 2018-04-17 2022-03-15 Gong.Io Ltd. Metadata-based diarization of teleconferences
JP7047626B2 (en) * 2018-06-22 2022-04-05 コニカミノルタ株式会社 Conference system, conference server and program
US10885920B2 (en) * 2018-12-31 2021-01-05 Nice Ltd Method and system for separating and authenticating speech of a speaker on an audio stream of speakers
CN109545229B (en) * 2019-01-11 2023-04-21 华南理工大学 Speaker recognition method based on voice sample characteristic space track
CN109961794B (en) * 2019-01-14 2021-07-06 湘潭大学 Method for improving speaker recognition efficiency based on model clustering
US11289098B2 (en) * 2019-03-08 2022-03-29 Samsung Electronics Co., Ltd. Method and apparatus with speaker recognition registration
MX2021014721A (en) * 2019-05-30 2022-04-06 Insurance Services Office Inc Systems and methods for machine learning of voice attributes.
CN111899755A (en) * 2020-08-11 2020-11-06 华院数据技术(上海)有限公司 Speaker voice separation method and related equipment
DK202070795A1 (en) * 2020-11-27 2022-06-03 Gn Audio As System with speaker representation, electronic device and related methods
US11727935B2 (en) 2020-12-15 2023-08-15 Optum Technology, Inc. Natural language processing for optimized extractive summarization
US20230274377A1 (en) * 2021-12-13 2023-08-31 Extramarks Education India Pvt Ltd. An end-to-end proctoring system and method for conducting a secure online examination
US11741143B1 (en) 2022-07-28 2023-08-29 Optum, Inc. Natural language processing techniques for document summarization using local and corpus-wide inferences

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3745403B2 (en) * 1994-04-12 2006-02-15 ゼロックス コーポレイション Audio data segment clustering method
US20030154072A1 (en) * 1998-03-31 2003-08-14 Scansoft, Inc., A Delaware Corporation Call analysis
US6424946B1 (en) * 1999-04-09 2002-07-23 International Business Machines Corporation Methods and apparatus for unknown speaker labeling using concurrent speech recognition, segmentation, classification and clustering
US7739114B1 (en) * 1999-06-30 2010-06-15 International Business Machines Corporation Methods and apparatus for tracking speakers in an audio stream
US6748356B1 (en) * 2000-06-07 2004-06-08 International Business Machines Corporation Methods and apparatus for identifying unknown speakers using a hierarchical tree structure
US7620547B2 (en) * 2002-07-25 2009-11-17 Sony Deutschland Gmbh Spoken man-machine interface with speaker identification
US7940897B2 (en) * 2005-06-24 2011-05-10 American Express Travel Related Services Company, Inc. Word recognition system and method for customer and employee assessment
US7937269B2 (en) * 2005-08-22 2011-05-03 International Business Machines Corporation Systems and methods for providing real-time classification of continuous data streams
US8537978B2 (en) * 2008-10-06 2013-09-17 International Business Machines Corporation Method and system for using conversational biometrics and speaker identification/verification to filter voice streams
US8554562B2 (en) * 2009-11-15 2013-10-08 Nuance Communications, Inc. Method and system for speaker diarization
US8406608B2 (en) * 2010-03-08 2013-03-26 Vumanity Media, Inc. Generation of composited video programming
GB2489489B (en) * 2011-03-30 2013-08-21 Toshiba Res Europ Ltd A speech processing system and method
US9384737B2 (en) * 2012-06-29 2016-07-05 Microsoft Technology Licensing, Llc Method and device for adjusting sound levels of sources based on sound source priority
US8515025B1 (en) * 2012-08-30 2013-08-20 Google Inc. Conference call voice-to-name matching
US9406298B2 (en) * 2013-02-07 2016-08-02 Nuance Communications, Inc. Method and apparatus for efficient i-vector extraction
US20140337034A1 (en) * 2013-05-10 2014-11-13 Avaya Inc. System and method for analysis of power relationships and interactional dominance in a conversation based on speech patterns
US9460722B2 (en) * 2013-07-17 2016-10-04 Verint Systems Ltd. Blind diarization of recorded calls with arbitrary number of speakers
US9875742B2 (en) * 2015-01-26 2018-01-23 Verint Systems Ltd. Word-level blind diarization of recorded calls with arbitrary number of speakers
US9704488B2 (en) * 2015-03-20 2017-07-11 Microsoft Technology Licensing, Llc Communicating metadata that identifies a current speaker
US9596349B1 (en) * 2015-06-29 2017-03-14 State Farm Mutual Automobile Insurance Company Voice and speech recognition for call center feedback and quality assurance
WO2018053537A1 (en) * 2016-09-19 2018-03-22 Pindrop Security, Inc. Improvements of speaker recognition in the call center
US10147438B2 (en) * 2017-03-02 2018-12-04 International Business Machines Corporation Role modeling in call centers and work centers

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11252280B2 (en) * 2019-12-05 2022-02-15 Scott C Harris Conveyor call center with cryptographic ledger

Also Published As

Publication number Publication date
US10637898B2 (en) 2020-04-28
US20180342250A1 (en) 2018-11-29

Similar Documents

Publication Publication Date Title
US20200322399A1 (en) Automatic speaker identification in calls
US11417343B2 (en) Automatic speaker identification in calls using multiple speaker-identification parameters
US9900436B2 (en) Coordinating voice calls between representatives and customers to influence an outcome of the call
US10706873B2 (en) Real-time speaker state analytics platform
US9635178B2 (en) Coordinating voice calls between representatives and customers to influence an outcome of the call
US10950219B2 (en) Systems and methods for providing a virtual assistant
US20180197548A1 (en) System and method for diarization of speech, automated generation of transcripts, and automatic information extraction
US10324979B2 (en) Automatic generation of playlists from conversations
CN107481720B (en) Explicit voiceprint recognition method and device
US10387573B2 (en) Analyzing conversations to automatically identify customer pain points
US10750018B2 (en) Modeling voice calls to improve an outcome of a call between a representative and a customer
US10181326B2 (en) Analyzing conversations to automatically identify action items
CN107211062A (en) Audio playback scheduling in virtual acoustic room
CN107210045A (en) The playback of search session and search result
CN107211061A (en) The optimization virtual scene layout played back for space meeting
CN107211058A (en) Dialogue-based dynamic meeting segmentation
CN107211027A (en) Perceived quality original higher rear meeting playback system heard than in meeting
CN107210034A (en) selective conference summary
CN107210036A (en) Meeting word cloud
US10367940B2 (en) Analyzing conversations to automatically identify product feature requests
US10360911B2 (en) Analyzing conversations to automatically identify product features that resonate with customers
Chakraborty et al. Literature Survey
CN104424955B (en) Generate figured method and apparatus, audio search method and the equipment of audio
Haider et al. An active data representation of videos for automatic scoring of oral presentation delivery skills and feedback generation
Székely et al. Augmented prompt selection for evaluation of spontaneous speech synthesis

Legal Events

Date Code Title Description
AS Assignment

Owner name: AFFECTLAYER, INC., ISRAEL

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:COHEN, RAPHAEL;VOLK, EREZ;LEVY, RUSSELL;AND OTHERS;SIGNING DATES FROM 20170605 TO 20170606;REEL/FRAME:052498/0248

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

AS Assignment

Owner name: AFFECTLAYER, INC., CALIFORNIA

Free format text: CHANGE OF ADDRESS;ASSIGNOR:AFFECTLAYER, INC.;REEL/FRAME:055982/0215

Effective date: 20210420

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION