Cognitive Intelligence Based Voice Authentication
First Claim
1. A method, in a data processing system comprising at least one processor and at least one memory, wherein the at least one memory comprises instructions which are executed by the at least one processor to specifically configure the at least one processor to detect a potentially fraudulent voice conversation, the method comprising:
- processing, by the data processing system, a corpus of electronic information to extract a fraud feature representative of at least one fraudulent activity;
receiving, by the data processing system, a first voice input from a user;
converting, by the data processing system, the first voice input into a textual representation of the first voice input and a set of one or more behavioral speech characteristics associated with the user;
generating, by the data processing system, a speech model for the user based on the textual representation and the one or more behavioral speech characteristics;
receiving, by the data processing system, a second voice input from an entity requesting access to resources associated with the user;
evaluating, by the data processing system, the second voice input based on the speech model for the user and the fraud feature; and
generating, by the data processing system, an output indicating whether or not the entity is the user based on results of the evaluation.
1 Assignment
0 Petitions
Accused Products
Abstract
Mechanisms are provided to detect a potentially fraudulent voice conversation. The mechanisms process a corpus of electronic information to extract a fraud feature representative of at least one fraudulent activity, receive a first voice input from a user, and convert the first voice input into a textual representation of the first voice input and a set of behavioral speech characteristics associated with the user. The mechanisms generate a speech model for the user based on the textual representation and the behavioral speech characteristics, receive a second voice input from an entity requesting access to resources associated with the user, and evaluate the second voice input based on the speech model for the user and the fraud feature. The mechanisms generate an output indicating whether or not the entity is the user based on results of the evaluation.
-
Citations
20 Claims
-
1. A method, in a data processing system comprising at least one processor and at least one memory, wherein the at least one memory comprises instructions which are executed by the at least one processor to specifically configure the at least one processor to detect a potentially fraudulent voice conversation, the method comprising:
-
processing, by the data processing system, a corpus of electronic information to extract a fraud feature representative of at least one fraudulent activity; receiving, by the data processing system, a first voice input from a user; converting, by the data processing system, the first voice input into a textual representation of the first voice input and a set of one or more behavioral speech characteristics associated with the user; generating, by the data processing system, a speech model for the user based on the textual representation and the one or more behavioral speech characteristics; receiving, by the data processing system, a second voice input from an entity requesting access to resources associated with the user; evaluating, by the data processing system, the second voice input based on the speech model for the user and the fraud feature; and generating, by the data processing system, an output indicating whether or not the entity is the user based on results of the evaluation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product comprising a computer readable storage medium having a computer readable program stored therein, wherein the computer readable program, when executed on a computing device, causes the computing device to be specifically configured to detect a potentially fraudulent voice conversation at least by:
-
processing a corpus of electronic information to extract a fraud feature representative of at least one fraudulent activity; receiving a first voice input from a user; converting the first voice input into a textual representation of the first voice input and a set of one or more behavioral speech characteristics associated with the user; generating a speech model for the user based on the textual representation and the one or more behavioral speech characteristics; receiving a second voice input from an entity requesting access to resources associated with the user; evaluating the second voice input based on the speech model for the user and the fraud feature; and generating an output indicating whether or not the entity is the user based on results of the evaluation. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An apparatus comprising:
-
a processor; and a memory coupled to the processor, wherein the memory comprises instructions which, when executed by the processor, cause the processor to be specifically configured to detect a potentially fraudulent voice conversation at least by; processing a corpus of electronic information to extract a fraud feature representative of at least one fraudulent activity; receiving a first voice input from a user; converting the first voice input into a textual representation of the first voice input and a set of one or more behavioral speech characteristics associated with the user; generating a speech model for the user based on the textual representation and the one or more behavioral speech characteristics; receiving a second voice input from an entity requesting access to resources associated with the user; evaluating the second voice input based on the speech model for the user and the fraud feature; and generating an output indicating whether or not the entity is the user based on results of the evaluation.
-
Specification