Trade floor compliance nightmares? Make your fears disappear. Store & search all your data, including voice.
Banish the Compliance Monster.
Without the ability to index and search the content of your company’s calls, the simplest inquiry from a regulator, e-discovery, or Freedom Of Information Act Request that applies to voice, can mean trouble. It can mean big, expensive, time-consuming trouble of manually wading—actually listening—through hundreds or thousands of hours of calls.
The alternative? Call Recording and Compliance software by Intelligent Voice.
With IV, you can have ready-access to all of your data, giving you the ability to pinpoint what was verbally said on a call, when, and to whom—as easily as searching for text. Fear the compliance monster no more. Make better use of your compliance team’s resources.
Bogged down by audio? Search hours of recordings with a click. IV’s e-Discovery is the key.
IV’s e-discovery tools find the needle in the audio file haystack.
Increasingly, lawyers have a new addition to the discovery process: voice data. It can hold info that could make or break a case, for plaintiffs and defendants alike. However, sifting through recordings for info that is relevant to your case, or that must be disclosed, is like searching for a needle in a haystack.
Got time for that? We didn’t think so.
There’s a better option; Intelligent Voice’s e-discovery platform. It takes the calls, learns what’s important in them, and makes the key words and phrases searchable, adding voice data directly into your case management system as if it were text.
Imagine: agent voice call and screen data you can search—live, and post-call. IV’s got it. Get it and get ahead.
You can’t improve what you can’t measure.
Call centers have become wizards at measuring data around calls: call and hold times, conversion and retention rates, and more. But attempts to measure the core of the call center world—the verbal content of calls—are still in baby steps. Random QA monitoring a small percentage of calls is the best technology has afforded. Until now.
Intelligent Voice for Call Centers turns what was said in every call into data that can be searched, analyzed and measured. Combine it with screen capture, and other data, to get the full picture of your business.Find and reward the true super-stars, and catch anomalous behavior before it becomes a liability—even in real time s with our “live” call monitoring.
You already record and store your calls. That’s a mountain of unused data. With IV, put your call center voice data to work for you.
Measure both: facts about each call, and what is said.
If your hot new app needs secure, private, high-speed ASR, then you need Intelligent Voice.
Let’s partner, partner.
So, you’re developing an exciting new app and you need accurate, super high-speed Automatic Speech Recognition (ASR) integrated. Don’t reinvent the wheel—unless you’ve got a few extra years and loads of extra cash to invest. We’ve done it for you.
Also, think security. If you’re sending a customer’s sensitive, private data to a public API like Google or Watson, the worry becomes: are you breaching your customer’s data privacy? Are you breaking the law?
Intelligent Voice powers your ASR and speech-to-text functions using our own AWS Azure or other cloud instance. We’ve got every avenue of speech-search covered: hyperphonic, encrypted, biometric. IV model-building means your API gets even better as it’s used, and acquires the vocabulary that is unique to each client. Let our (top quality and cost-effective) technology complement yours, and let’s create something wonderful together.
Get more from your phone. IV Note turns phone time into useful, searchable text—every time.
Turn what’s said, into data you can search.
Not all important calls happen when we’re at a desk, diligently taking notes in an easy-to-find, searchable place. All too-often important parts of calls slip through the cracks of memory, or jotted notes slip through the cracks of the car’s dashboard. And, we only take notes of what we think is important at the time—what about when you didn’t realize something was important until later?
It’s expected. A lot of audible info gets lost. But it doesn’t have to anymore.
With IV Note, you can record your calls and get not only notes on them, but an interactive SmartTranscript immediately delivered to your inbox. With IV Note, what is said in your calls becomes as useful and searchable as your emails.
Get more from your phone time.
Make the audible, searchable
And the invisible,
Intelligent Voice® takes your company’s phone calls (+ email and IM) and turns them into smart data using “World’s Fastest” Speech to Text Engine.
Automatic speech recognition (ASR) technology is how you turn the spoken word into valuable data you can use. Intelligent Voice has developed high-speed, secure, private ASR that is not only cutting edge, but ready to plug into to your existing phone and data systems. With IV, you can quickly and easily turn what is said on the phone into data you can search, with a click of your mouse.
‘Live Call Monitoring’ no longer means you must physically sit, or pay someone to sit, and listen to one live call at a time. Human quality assurance may still have its place. But IV offers Live Call Monitoring that goes beyond, far beyond individual QA. Until now, there hasn’t been a way to perform real-time monitoring to all your company calls. Whether in a call center environment or any other, with Intelligent Voice’s Live Call Monitoring, you can be plugged into all your calls as they happen, and be alerted about anomalous behavior as it occurs.
With each call, your IV Technology creates an HTML file, a SmartTranscript, that generates a written record of what was said. It not only transcribes and indexes the call, but is also linked to the call recording and audio player. Clicking on any of the words in the SmartTranscript allows you to JumpTo that specific part of the call, and listen for yourself. With Intelligent Voice, you can search for key terms in a specific call or in your entire archive of SmartTranscript call data.
IVNOTE is for everyone who’s ever wished they could get more out of their phone calls. IVNOTE is simple. It captures your phone calls, turns them into text, and sends the transcript and the call directly to your inbox. You can be more present in calls, be more engaged in the conversation, ask more relevant questions—if half of your attention and mental energy aren’t spent notetaking and trying to track what was said for future reference. Be there fully. Let us track the important points of what was said for you.
Language is a living thing. We all have specific vocabulary that we favor—and it often changes over time. Whether it’s specific work-related terminology or evolving expressions in our personal and cultural lexicon, Intelligent Voice’s language model-building helps the technology “learn” your frequently used terms, for the most accurate transcripts possible. Also, our acoustic modeling trains the system to recognize and best adjust to different sounds, like background noise, phone and microphone setup, to best hone in on voices and clearly capture what is said.
Increasingly, and especially since Siri, customers expect their apps to respond to the human voice. Intelligent Voice has what IT developers need to drive their app’s features. Partner with us to give your program interface the voice-enabled functionality your customers want. Our technology is easy to incorporate. Our team of experts is flexible, and eager to help our creation bring yours to life. Whether it’s automatic speech recognition, speech-to-text, recording, indexing, model-building, biometric, hyperphonic or encrypted voice data search—our solutions deliver industry-leading accuracy, speed, and security.
While Intelligent Voice turns your phone calls into searchable data—you control where and how that data is stored. Whether you want the flexibility, cost-effectiveness, and quick scalability of hosting your voice data in the cloud, or if you have the expertise and want the added security and control of hosting your data on site, or whether you choose to have your voice data hosted by a third party, IV accommodates. Intelligent Voice helps you find hosting for your voice data that’s right for you.
Our voice is as unique as our finger prints. Intelligent Voice can further boost the IQ of your calls, when you add Biometric Search to your capabilities. Add another significant layer to your data intelligence. Identify and search call data by voice—regardless of what phone number they call from.
Our integrated Hyperphonic Search is our super tool for attaining IV’s signature speech-to-text speed and accuracy. Hyperphonic Search allows your IV technology to recognize words phonetically—by their sounds—as well as by word lattice—the connection to surrounding words. Vocabulary learned through model-building enhances accuracy even further. And all are performed to deliver the highest possible confidence in transcription, all virtually in real-time.
IV’s Encrypted Search may be the solution if you want the ability to search your calls for key phrases, but the very highest security is in order your voice data. If you prefer that no text translation be made of your calls, not even our secured SmartTranscript, Intelligent Voice can offer the latest advances in secure voice search technology. Using Searchable Encryption, your cloud provider only receives encrypted data, and encrypted search terms: At no time is your private data held “in clear” for indexing.
Intelligent Voice in Action
Click on keywords and phrases generated using Intelligent Voice,
and JumpTo where it is said...
Once more unto the (data) breach by Dr Cornelius Glackin 1 in 4 companies will experience a data breach in the next 12 months according to the Ponemon Institute’s “2017 Cost of Data Breach Study: Global Overview”. The perception is that the vast majority of data breaches involve on-premise infrastructure. As such, many companies […]
Once more unto the (data) breach
by Dr Cornelius Glackin
1 in 4 companies will experience a data breach in the next 12 months according to the Ponemon Institute’s “2017 Cost of Data Breach Study: Global Overview”. The perception is that the vast majority of data breaches involve on-premise infrastructure. As such, many companies prefer to employ the cloud for storing their data; it makes sense in principle to outsource cyber security to a professional cloud provider. It is also lower in cost. However, some of the largest and most costly breaches have been for cloud-based systems e.g. Apple iCloud, Dropbox, LinkedIn, Microsoft and Yahoo, each resulting in millions – and in some cases billions – of accounts being compromised.
Cloud computing means organizations allowing access to business-critical applications and sensitive data over the Internet. Recent advances in deep learning have revolutionised image and speech processing, making exciting new applications possible. Many of these applications require the support of cloud computing infrastructure to centralise the necessary computing power required to process video and audio data. There are numerous emerging examples of this such as Amazon’s personal assistant Alexa which employs cloud processing to support its voice recognition and dialogue management functionality. Whilst no breaches of this system have been reported, the implication is that unencrypted audio data must reside on the cloud, to enable it to be processed, and hence carries a substantial risk.
Earlier this year, an open database containing links to more than 2 million voice messages recorded on cuddly toys was discovered. Personal pictures of celebrities were breached from Apple’s iCloud offering. In the majority of cases, cloud providers typically urge their customers to use stronger passwords, and add notification systems that look for suspicious activity.
Whilst personal photos of Jennifer Lawrence are seemingly of interest to hackers, the implications for leakage of audio data could be even more serious. Perhaps the largest unknown in this scenario, is what the future capabilities of deep learning will have on analysis of biometric signals like voice.
Dr Rita Singh from Carnegie Mellon University and her colleagues pieced together a profile of a serial US Coastguard prank caller solely from recordings of his voice. This included a prediction of his height and weight, and also the size of room he was calling from, leading to his apprehension by the authorities. Dr Singh’s team are using this research to identify a person’s use of intoxicants or other substances, and also the onset of various medical conditions the speaker may not even be aware they possess. For instance, the biomarker for Parkinson’s Disease can be detected in a person’s voice long before any other symptoms arise. This raises the prospect of using voice recognition in the medical field to diagnose diseases with speech-related biomarkers.
This recognition of the usefulness of voice biometrics is now utilised by some banks to “secure” accounts. Banking has embraced voice authentication in order to make the banking customer’s experience frictionless. However, a recent BBC article detailed a voice biometric breach that occurred when a journalist gained access to his twin brother’s HSBC bank account. Whilst this flaw was attributed to legacy voice biometric solutions, one should be cautious with relying on voice as the principle mode for authentication, for no other reason than it is not difficult to record someone’s voice, and in the near future to use that recording to synthesise that voice to say anything. Start-ups like Lyrebird are working on ways to replicate a voice using just a minute of recorded speech. In the very near future, any sample of your voice could be used to realistically impersonate you.
The implication is that the future will feature a significant arms race between AI-equipped adversaries’ intent on breaching cloud-based systems, and the intelligent algorithms designed to protect such systems. So, what is the answer? Well, first of all, organisations must understand the probability of being attacked, how it affects them, and even more importantly, which factors can reduce or increase the impact and cost of a data breach. One such way to mitigate the effects of a breach of audio or video data in particular is to encrypt it.
For sensitive data, there is the option of using encryption for the secure storage of data in the cloud. However, while we have become increasingly good at encrypting data at rest, in order to process the data on the cloud we first need to decrypt it, which in turn excludes the possibility for using the cloud’s resources to process sensitive data, unless it can be done in a secure way. Cryptography research has made some innovative strides with this issue in recent years.
Searchable Encryption (SE) is a relatively new form of encryption that enables encrypted data to be searched with encrypted keywords. In this way, the idea is that the cloud can be used to store sensitive data that has been encrypted. An authenticated user can then search that data using search terms that are also encrypted, and the Searchable Encryption protocol residing on the cloud is able to compare the encrypted search terms and match it to the relevant encrypted data without ever understanding either what was being searched for, or what data it contains. It is no surprise that the seminal paper from Senny Kamara, the inventor of this revolutionary cryptosystem, is one of the most-cited security papers since 1981.
Searchable Symmetric Encryption (SSE) is also the basis of the Intelligent Voice’s encrypted search product CryptoSearch, with which large volumes of a users’ encrypted speech transcripts and their corresponding encrypted audio can be outsourced to the cloud for storage. For review, the audio database and its associated encrypted transcripts can be searched, and once the pertinent audio file has been found it can be downloaded and decrypted behind the client’s own firewall – without the need to download everything, decrypt it, find what you are looking for, re-encrypt and re-upload. At no point does the cloud server ever see the data or the search terms in the clear. In the event of a breach any data retrieved is encrypted and can only be decrypted with either prohibitively computationally costly brute force decryption, or the user’s private encryption key.
Ultimately it is advances such as Searchable Symmetric Encryption and Fully Homomorphic Encryption that will be the cloud defender’s most valuable asset for safeguarding our data in the cyber security threat climate we can expect in the very near future.