Building whitelists comprising voiceprints not associated with fraud and screening calls using a combination of a whitelist and blacklist
First Claim
Patent Images
1. A method comprising:
- receiving precursor data comprising a plurality of identifiers and voice samples, each identifier associated with a voice sample, the precursor data received without regard to whether the voice samples are fraudulent or not, the receiving performed using a server system including a computer having a processor coupled to memory;
receiving a fraud report comprising a plurality of identifiers associated with fraud;
identifying using the server system which of the precursor data are associated with fraud based on a match between identifiers associated with the voice samples and the identifiers associated with fraud in the fraud report;
generating a blacklist comprising a list of voice prints based on the voice samples corresponding to the identified precursor data associated with fraud using the server system;
generating a whitelist comprising a list of voice prints based on voice samples not corresponding to the identified precursor data associated with fraud using the server system; and
processing requests to screen voice samples of speakers against voice prints in one of the blacklist and the whitelist.
3 Assignments
0 Petitions
Accused Products
Abstract
According to one aspect of the invention there is provided a method, comprising collecting voiceprints of callers; identifying which of the collected voiceprints are associated with fraud; and generating a whitelist comprising voiceprints corresponding to the collected voiceprints not identified as associated with fraud.
-
Citations
17 Claims
-
1. A method comprising:
-
receiving precursor data comprising a plurality of identifiers and voice samples, each identifier associated with a voice sample, the precursor data received without regard to whether the voice samples are fraudulent or not, the receiving performed using a server system including a computer having a processor coupled to memory; receiving a fraud report comprising a plurality of identifiers associated with fraud; identifying using the server system which of the precursor data are associated with fraud based on a match between identifiers associated with the voice samples and the identifiers associated with fraud in the fraud report; generating a blacklist comprising a list of voice prints based on the voice samples corresponding to the identified precursor data associated with fraud using the server system; generating a whitelist comprising a list of voice prints based on voice samples not corresponding to the identified precursor data associated with fraud using the server system; and processing requests to screen voice samples of speakers against voice prints in one of the blacklist and the whitelist. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system comprising:
-
a processor, and a memory coupled to the processor, the memory storing instructions which when executed by the processor cause the system to perform a method comprising; receiving precursor data, each entry in the precursor data comprising an identifier and a voice print associated with the identifier, the data received without regard to whether the voice print is associated with fraud; identifying which of the voice print entries in the precursor data are associated with fraud, based on matching the associated identifiers to information in a fraud report; generating a blacklist comprising the voice print entries in the precursor data associated with fraud; generating a whitelist comprising data corresponding to identifiers and associated voice print entries in the precursor data not identified as associated with fraud and based on identifiers associated with non-fraudulent transactions; and processing requests to screen speakers against one of the blacklist and the whitelist. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium having stored there on a sequence of instructions which when executed by a machine, causes the machine to perform a method comprising:
-
collecting data comprising a plurality of identification metadata and for each of the identification metadata, a corresponding voiceprint; comparing each of the collected identification metadata to fraud data in a fraud report; identifying which of the compared identification metadata are associated with the fraud data; generating a blacklist comprising a list of voiceprints corresponding to identification metadata that are identified as associated with fraud data; generating a whitelist comprising a list of voiceprints corresponding to identification metadata that are not identified as associated with fraud data; and processing requests to screen speakers against one of the blacklist and the whitelist. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification