Systems and methods of sound-based fraud protection
First Claim
Patent Images
1. A computer-implemented method of fraud protection for a computer-accessible account, comprising:
- monitoring, by a listening device, ambient sound;
detecting, by the listening device, one or more triggering sound patterns from the ambient sound, the one or more triggering sound patterns including sound indicative of an initiation of an interaction between an initiator and a recipient;
recording, by the listening device, the one or more triggering sound patterns;
recording, by the listening device, a voice of the recipient for a first time duration, in response to detecting the one or more triggering sound patterns; and
transmitting, by the listening device, to a server in communication with the listening device, the recorded one or more triggering sound patterns and the recording of the recipient'"'"'s voice,and wherein the server is configured to;
determine a correlation between the one or more triggering sound patterns and the recording of the recipient'"'"'s voice;
determine a speech pattern of the recipient from the recorded recipient'"'"'s voice;
determine a speech pattern model of the recipient by analyzing one or more speech samples associated with the recipient;
determine a difference between the speech pattern and the speech pattern model of the recipient;
calculate a confidence level of fraud being attempted against the recipient based on the determined correlation and the determined difference; and
freeze the computer-accessible account associated with the recipient if the confidence level of fraud is greater than a threshold value, thereby restricting access to the computer-accessible account by one or more computing devices.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure describes systems and methods of fraud protection. A listening device may monitor ambient sound and detect one or more triggering sound patterns. The listening device may record the one or more triggering sound patterns and record a person'"'"'s voice, and send the recordings to a server, wherein the server is configured to calculate a confidence level of fraud based on the one or more triggering sound patterns and the recording of the person'"'"'s voice using a speech pattern model of the person, and to output an alert if the confidence level of fraud is greater than a threshold value.
-
Citations
19 Claims
-
1. A computer-implemented method of fraud protection for a computer-accessible account, comprising:
-
monitoring, by a listening device, ambient sound; detecting, by the listening device, one or more triggering sound patterns from the ambient sound, the one or more triggering sound patterns including sound indicative of an initiation of an interaction between an initiator and a recipient; recording, by the listening device, the one or more triggering sound patterns; recording, by the listening device, a voice of the recipient for a first time duration, in response to detecting the one or more triggering sound patterns; and transmitting, by the listening device, to a server in communication with the listening device, the recorded one or more triggering sound patterns and the recording of the recipient'"'"'s voice, and wherein the server is configured to; determine a correlation between the one or more triggering sound patterns and the recording of the recipient'"'"'s voice; determine a speech pattern of the recipient from the recorded recipient'"'"'s voice; determine a speech pattern model of the recipient by analyzing one or more speech samples associated with the recipient; determine a difference between the speech pattern and the speech pattern model of the recipient; calculate a confidence level of fraud being attempted against the recipient based on the determined correlation and the determined difference; and freeze the computer-accessible account associated with the recipient if the confidence level of fraud is greater than a threshold value, thereby restricting access to the computer-accessible account by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method of fraud protection for a computer-accessible account, comprising:
-
receiving, by a server, one or more speech samples associated with a person; generating a speech pattern model of the person based on extracting a person'"'"'s speech from the one or more speech samples; storing the speech pattern model of the person; receiving one or more triggering sound patterns and a recording of the person'"'"'s voice obtained by a listening device, the one or more triggering sound patterns including sound indicative of an initiation of an interaction between an initiator and a recipient; determining, a correlation between the one or more triggering sound patterns and the recording of the person'"'"'s voice, thereby identifying the person as the recipient; determining a speech pattern from the recorded recipient'"'"'s voice; determining a difference between the speech pattern and the generated speech pattern model of the recipient; determining a confidence level of fraud being attempted against the recipient from the determined correlation between the one or more triggering sound patterns and the recording of the recipient'"'"'s voice and the difference between the speech pattern of the recipient and the speech pattern model of the recipient; and freezing the computer-accessible account associated with the recipient if the determined confidence level of fraud is greater than a threshold value, thereby restricting access to the computer-accessible account by one or more computing devices. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A system of fraud protection for a computer-accessible account, comprising:
-
one or more microphones configured to monitor ambient sound and detect one or more triggering sound patterns from the ambient sound, the one or more triggering sound patterns including sound indicative of an initiation of an interaction between an initiator and a recipient; and a processor circuit coupled to the one or more microphones and configured to execute instructions causing the processor to; record the one or more triggering sound patterns; record a voice of the recipient for a first time duration, in response to detecting the one or more triggering sound patterns; and transmit the recorded one or more triggering sound patterns and the recording of the recipient'"'"'s voice to a server in communication with the processor circuit, and wherein the server is configured to; determine a correlation between the one or more triggering sound patterns and the recording of the recipient'"'"'s voice; determine a speech pattern of the person from the recorded recipient'"'"'s voice for the first time duration; determine a speech pattern model of the recipient by analyzing one or more speech samples associated with the recipient; determine a difference between the speech pattern and the speech pattern model of the recipient; calculate a confidence level of fraud being attempted against the recipient based on the determined correlation and the determined difference; and freeze the computer-accessible account associated with the recipient if the confidence level of fraud is greater than a threshold value, thereby restricting access to the computer-accessible account by one or more computing devices. - View Dependent Claims (16, 17, 18, 19)
-
Specification