Method and system for screening using voice data and metadata
First Claim
Patent Images
1. A computer-implemented method, comprising:
- (a) maintaining a database of known fraudsters, wherein each fraudster has a voice signature and metadata associated therewith;
(b) segmenting the database into a plurality of segmented databases based on the metadata; and
(c) performing a screening operation using a computer to match a candidate with a fraudster in the database based on matching a voice signature and metadata for the candidate with a voice signature and metadata for the fraudster in at least one segmented database, wherein each voice signature is assigned a home segmented database within which it has an accept rate, and for each voice that has gone inactive within its home segmented database, a search is carried out to determine if the voice signature is active within another segmented database.
3 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, the invention provides a method, comprising: (a) maintaining a database of known fraudsters, wherein each fraudster has a voice signature and metadata associated therewith; (b) performing a screening operation to match a candidate with a fraudster in the database based on matching a voice signature and metadata for the candidate with a voice signature and metadata for the fraudster in the database.
93 Citations
14 Claims
-
1. A computer-implemented method, comprising:
-
(a) maintaining a database of known fraudsters, wherein each fraudster has a voice signature and metadata associated therewith; (b) segmenting the database into a plurality of segmented databases based on the metadata; and (c) performing a screening operation using a computer to match a candidate with a fraudster in the database based on matching a voice signature and metadata for the candidate with a voice signature and metadata for the fraudster in at least one segmented database, wherein each voice signature is assigned a home segmented database within which it has an accept rate, and for each voice that has gone inactive within its home segmented database, a search is carried out to determine if the voice signature is active within another segmented database. - View Dependent Claims (2, 3, 4, 5, 6, 14)
-
-
7. A system, comprising:
-
a processor; and a memory coupled to the processor, the memory storing instructions which when executed by the processor causes the system to perform a method comprising; (a) maintaining a database of known fraudsters, wherein each fraudster has a voice signature and metadata associated therewith; (b) segmenting the database into a plurality of segmented databases based on the metadata; and (c) performing a screening operation to match a candidate with a fraudster in the database based on matching a voice signature and metadata for the candidate with a voice signature and metadata for the fraudster in at least one segmented database, wherein each voice signature is assigned a home segmented database within which it has an accept rate, and for each voice that has gone inactive within its home segmented database, a search is carried out to determine if the voice signature is active within another segmented database. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
Specification