Methods and apparatus for identifying fraudulent callers
First Claim
Patent Images
1. A method of voice print matching which comprises:
- receiving a telephonic communication from an unknown caller;
separating a first portion of the telephonic communication into silent and non-silent segments;
evaluating the non-silent segments to determine which portions thereof are speech or non-speech;
generating a plurality of parameters that determine what is speech and non-speech in the non-silent segments;
using the generated parameters to determine what is speech and non-speech for at least the remainder of the telephonic communication;
comparing the speech to a Universal Background Model (UBM);
selecting a number of audio elements of the UBM that characterize the speech of the unknown caller relative to other audio elements of the UBM;
selecting audio elements of the speech that correspond to the selected audio elements of the UBM; and
comparing the selected audio elements of the speech to matching audio elements of a plurality of recorded voice prints from a plurality of fraudulent speakers to determine whether the speech belongs to a fraudulent speaker.
4 Assignments
0 Petitions
Accused Products
Abstract
The methods, apparatus, and systems described herein are designed to identify fraudulent callers. A voice print of a call is created and compared to known voice prints to determine if it matches one or more of the known voice prints. The methods include a pre-processing step to separate speech from non-speech, selecting a number of elements that affect the voice print the most, and/or computing an adjustment factor based on the scores of each received voice print against known voice prints.
-
Citations
38 Claims
-
1. A method of voice print matching which comprises:
-
receiving a telephonic communication from an unknown caller; separating a first portion of the telephonic communication into silent and non-silent segments; evaluating the non-silent segments to determine which portions thereof are speech or non-speech; generating a plurality of parameters that determine what is speech and non-speech in the non-silent segments; using the generated parameters to determine what is speech and non-speech for at least the remainder of the telephonic communication; comparing the speech to a Universal Background Model (UBM); selecting a number of audio elements of the UBM that characterize the speech of the unknown caller relative to other audio elements of the UBM; selecting audio elements of the speech that correspond to the selected audio elements of the UBM; and comparing the selected audio elements of the speech to matching audio elements of a plurality of recorded voice prints from a plurality of fraudulent speakers to determine whether the speech belongs to a fraudulent speaker. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An audible fraud detection system, comprising:
-
a node comprising a processor and a computer readable medium operably coupled thereto, the computer readable medium comprising a plurality of instructions stored therein that are accessible to, and executable by, the processor, wherein the plurality of instructions comprises; instructions, that when executed, receive a telephonic communication from an unknown caller via a network; instructions, that when executed, separate a first portion of the communication into silent and non-silent segments; instructions, that when executed, evaluate the non-silent segments to determine which portions are speech or non-speech; instructions, that when executed, generate a plurality of parameters based on the evaluated non-silent segments that determine what is speech and non-speech; instructions, that when executed, use the generated parameters to determine what is speech and non-speech for at least the remainder of the telephonic communication; instructions, that when executed, compare the speech to a Universal Background Model (UBM); instructions, that when executed, select a number of audio elements of the UBM that characterize the speech of the unknown caller relative to other audio elements of the UBM; instructions, that when executed, select audio elements of the speech that correspond to the selected audio elements of the UBM; and instructions, that when executed, compare the selected audio elements of the speech to matching audio elements of a plurality of recorded voice prints from a plurality of fraudulent speakers to determine whether the speech belongs to a fraudulent speaker. - View Dependent Claims (10, 11, 12)
-
-
13. A non-transitory computer readable medium comprising a plurality of instructions stored therein, the plurality of instructions comprising:
-
instructions, that when executed, receive a telephonic communication from an unknown caller; instructions, that when executed, separate a first portion at the beginning of the communication into silent and non-silent segments; instructions, that when executed, evaluate the non-silent segments to determine which portions are speech and non-speech; instructions, that when executed, generate a plurality of parameters based on the evaluated non-silent segments that determine what is speech and non-speech; instructions, that when executed, use the generated parameters to determine what is speech and non-speech for at least the remainder of the telephonic communication; instructions, that when executed, compare the speech to a Universal Background Model (UBM); instructions, that when executed, select a number of audio elements of the UBM that characterize the speech of the unknown caller relative to other audio elements of the UBM; instructions, that when executed, select audio elements of the speech that correspond to the selected audio elements of the UBM; and instructions, that when executed, compare the selected audio elements of the speech matching audio elements of a plurality of recorded voice prints to determine whether the speech belongs to a fraudulent speaker. - View Dependent Claims (14, 15, 16)
-
-
17. A method of detecting a fraudulent speaker comprising:
-
receiving a telephonic communication from an unknown caller; separating a first portion of the telephonic communication into silent and non-silent segments; evaluating the non-silent segments to determine which portions thereof are speech or non-speech; generating a plurality of parameters that determine what is speech and non-speech in the non-silent segments; using the generated parameters to determine what is speech and non-speech for at least the remainder of the telephonic communication; comparing the speech of the unknown caller to a Universal Background Model (UBM); selecting a number of audio elements of the UBM that most characterize the creation of a voice print for the unknown caller relative to other audio elements of the UBM; selecting audio elements of the voice print that correspond to the selected audio elements of the UBM; comparing the selected audio elements of the voice print to matching audio elements of voice prints of a plurality of fraudulent speakers stored in a database; and determining if the voice print belongs to a fraudulent speaker. - View Dependent Claims (18, 19, 20, 21)
-
-
22. An audible fraud detection system, comprising:
-
a node comprising a processor and a computer readable medium operably coupled thereto, the computer readable medium comprising a plurality of instructions stored therein and being accessible to, and executable by, the processor, where the plurality of instructions comprises; instructions, that when executed, receive a voice audio communication from a telephonic communication from an unknown caller via a network; instructions, that when executed, separate a first portion of the telephonic communication into silent and non-silent segments; instructions, that when executed, evaluate the non-silent segments to determine which portions thereof are speech or non-speech; instructions, that when executed generate a plurality of parameters that determine what is speech and non-speech in the non-silent segments; instructions, that when executed use the generated parameters to determine what is speech and non-speech for at least the remainder of the telephonic communication; instructions, that when executed, compare the speech of the unknown caller to a Universal Background Model (UBM); instructions, that when executed, select a number of audio elements of the UBM that most characterize creation of a voice print for the unknown caller relative to other audio elements of the UBM to create a voice print from the voice audio communication; instructions, that when executed, select audio elements of the voice print that correspond to the selected audio elements of the UBM; instructions, that when executed, compare the selected audio elements of the voice print to matching audio elements of one or more stored voice prints of a plurality of fraudulent speakers stored in a database; and instructions, that when executed, determine if the voice print belongs to a fraudulent speaker. - View Dependent Claims (23, 24, 25)
-
-
26. A non-transitory computer readable medium comprising a plurality of instructions stored therein, the plurality of instructions comprising:
-
instructions, that when executed, receive a voice audio communication through a telephonic communication from an unknown caller; instructions, that when executed, separate a first portion of the telephonic communication into silent and non-silent segments; instructions, that when executed, evaluate the non-silent segments to determine which portions thereof are speech or non-speech; instructions, that when executed generate a plurality of parameters that determine what is speech and non-speech in the non-silent segments; instructions, that when executed use the generated parameters to determine what is speech and non-speech for at least the remainder of the telephonic communication; instructions, that when executed, compare the speech of the unknown caller to a Universal Background Model (UBM); instructions, that when executed, select a number of audio elements of the UBM that most characterize creation of a voice print for the unknown caller relative to other audio elements of the UBM to create a voice print from the voice audio communication; instructions, that when executed, select audio elements of the voice print that correspond to audio elements of the UBM; instructions, that when executed, compare the selected audio elements of the voice print to matching audio elements of one or more stored voice prints of a plurality of fraudulent speakers in a database; and instructions, that when executed, determine if the voice print belongs to a fraudulent speaker. - View Dependent Claims (27, 28)
-
-
29. A method of detecting a fraudulent speaker, which comprises:
-
creating a voice print from a received telephonic communication from an unknown caller; comparing the voice print to a Universal Background Model (UBM); selecting a number of audio elements of the UBM that characterize the voice print of the unknown caller relative to other audio elements of the UBM; selecting audio elements of the voice print that correspond to the selected audio elements of the UBM; scoring the selected audio elements of the voice print against matching audio elements of one or more voice prints of a plurality of fraudulent speakers that are stored in a database; calculating an adjustment factor based on the scores of the voice print against the stored voice prints and the scores of other unknown voice prints against the stored voice prints; and comparing the adjustment factor of the voice print to adjustment factors of the other unknown voice prints to determine the probability that the voice print belongs to a fraudulent speaker. - View Dependent Claims (30, 31, 32)
-
-
33. An audible fraud detection system, which comprises:
-
a node comprising a processor and a computer readable medium operably coupled thereto, the computer readable medium comprising a plurality of instructions stored therein that are accessible to, and executable by, the processor, where the plurality of instructions comprises; instructions, that when executed, receive a telephonic communication from an unknown caller via a network and create an unknown voice print; instructions, that when executed, compare the unknown voice print to a Universal Background Model (UBM); instructions, that when executed, select a number of audio elements of the UBM that characterize the unknown voice print of the unknown caller relative to other audio elements of the UBM; instructions, that when executed, select audio elements of the unknown voice print that correspond to the selected audio elements of the UBM; instructions, that when executed, score the unknown voice print against stored voice prints in a database by comparing the selected audio elements of the unknown voice print to matching audio elements of the stored voice prints; instructions, that when executed, compute an adjustment factor for each telecommunication received that is based on the score of each unknown voice print compared to the stored voice prints; and instructions, that when executed, compare the adjustment factors for each unknown voice print to determine which voice print is from a fraudulent speaker. - View Dependent Claims (34, 35)
-
-
36. A non-transitory computer readable medium comprising a plurality of instructions stored therein, the plurality of instructions comprising:
-
instructions, that when executed, receive a telephonic communication from an unknown caller; instructions, that when executed, separate a first portion of the telephonic communication into silent and non-silent segments; instructions, that when executed, evaluate the non-silent segments to determine which portions thereof are speech or non-speech; instructions, that when executed generate a plurality of parameters that determine what is speech and non-speech in the non-silent segments; instructions, that when executed use the generated parameters to determine what is speech and non-speech for at least the remainder of the telephonic communication; instructions, that when executed, compare the speech of the unknown caller to a Universal Background Model (UBM); instructions, that when executed, select a number of audio elements of the UBM that characterize an unknown voice print created from the communication from the unknown caller relative to other audio elements of the UBM; instructions, that when executed, select audio elements of the unknown voice print that correspond to the selected audio elements of the UBM; instructions, that when executed, compare the selected audio elements of the unknown voice print to matching audio elements of voice prints stored in a database to create a score for each unknown voice print; instructions, that when executed, compute an adjustment factor based on the score of each voice print against stored voice prints; and instructions, that when executed, compare the adjustment factors for each unknown voiceprint to determine which voice print is a fraudster. - View Dependent Claims (37, 38)
-
Specification