COMPUTER SOFTWARE VOICE PROCESSING

Brand Owner (click to sort) Address Description
CATALYST VP STENOGRAPH 2626 Warrenville Road Downers Grove IL 60515 Computer software for voice processing;CATALYST VOICE PROCESSING;
DICTANET NetDictate, Corp. Major Center Office Plaza 5728 Major Blvd, Suite 200 Orlando FL 32819 Computer Software for voice processing purposes;
FORTEVOICE ForteMedia, Inc. 4051 Burton Dr. Santa Clara CA 95054 computer software for voice processing, voice recognition, noise cancelation, and microphones; integrated circuit chips; interfaces for computers implementing voice processing and recognition; microprocessors;FORTE VOICE;
ISAM ForteMedia, Inc. 4051 Burton Dr. Santa Clara CA 95054 computer software for voice processing, voice recognition, noise cancelation, and microphones; integrated circuit chips implementing voice processing, voice recognition, noise cancelation, and microphones; interfaces for computers implementing voice processing and recognition; microprocessors implementing voice processing, voice recognition, noise cancelation, and microphones;I SAM;
NETDICTATE NetDictate, Corp. Major Center Office Plaza 5728 Major Blvd, Suite 200 Orlando FL 32819 Computer Software for Voice Processing Purposes;
REALSPEECH BROOKTROUT TECHNOLOGY, INC. 410 First Avenue Needham MA 02494 Computer software for voice processing applications, namely, speech recognition software and telephone call processing software;REAL SPEECH;
SAMSOFT ForteMedia, Inc. 4051 Burton Dr. Santa Clara CA 95054 computer software for voice processing, voice recognition, noise cancelation, and microphones; integrated circuit chips implementing voice processing, voice recognition, noise cancelation, and microphones; interfaces for computers implementing voice processing and recognition; microprocessors implementing voice processing, voice recognition, noise cancelation, and microphones;In the statement, Line 2, through line 3, 801 EAST ARQUES AVE SUNNYVALE, CA 94085 should be deleted, and 4051 BURTON DR. SANTA CLARA, CA 95054 should be inserted.;SAM SOFT;
VB VOICE PRONEXUS 123 PINERIDGE RD. CARP ONTARIO K0A 1L0 Canada computer software for voice processing systems;
VID ForteMedia, Inc. 4051 Burton Dr. Santa Clara CA 95054 Computer software for voice processing, voice recognition and noise cancelation in microphones; interfaces for computers for implementing voice processing and recognition;
VOICESTAR Intellivoice Communications, Inc. One Securities Centre 3490 Piedmont Road, Suite 700 Atlanta GA 30305 computer software for voice processing applications, and instructional manuals, sold as a unit;VOICE STAR;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for facilitating secure network communications includes a security computer system and corresponding software. The security system is utilized in conjunction with a voice browser residing on a server system. A user accesses the network by placing a call to the voice browser system. The voice browser includes a software module that creates a secure connection to the security system. The user provides an identification to the voice browser system that is transferred to and verified by the security system. Once the identification is verified, the user is prompted by the voice browser system to speak a phrase for voice verification. The verification speech signals are transferred from the voice browser system to the security system to verify those speech signals against speech signals of a particular authorized user associated with the identification and stored in a database. When the user is verified, the security system retrieves a user private key and certificate from the database. In response to the user subsequently accessing a web site residing on a secure server, the secure server and voice browser system initiate a secure key exchange. During the key exchange, data packets containing security information are transferred from the voice browser system to the security system for processing, while security information from the security system is transferred to the secure server via the voice browser system. The resulting session key is securely transferred to the voice browser system to facilitate secure communications between the voice browser system and secure server.