Methods and apparatus for identifying fraudulent callers
First Claim
Patent Images
1. An audible fraud detection system, comprising:
- a node comprising a processor and a non-transitory computer readable medium operably coupled thereto, the non-transitory computer readable medium comprising a plurality of instructions stored therein that are accessible to, and executable by, the processor, wherein the plurality of instructions comprises;
instructions that, when executed, receive a telephonic communication from an unidentified caller via a network;
instructions that, when executed, separate a first portion of the communication into silent and non-silent segments;
instructions that, when executed, evaluate the non-silent segments to determine which portions are speech or non-speech;
instructions that, when executed, generate a plurality of parameters based on the evaluated non-silent segments that determine what is speech and non-speech;
instructions that, when executed, use the generated parameters to determine what is speech and non-speech for at least the remainder of the telephonic communication;
instructions, that when executed, create a voice print from the speech portions of the telephonic communication;
instructions, that when executed, compare the voice print to a Universal Background Model (UBM);
instructions, that when executed, select a number of audio elements of the UBM that characterize the voice print of the unidentified caller relative to other audio elements of the UBM;
instructions, that when executed, select audio elements of the voice print that correspond to the selected audio elements of the UBM; and
instructions, that when executed, compare the selected audio elements of the voice print to matching audio elements of a plurality of recorded voice prints from a plurality of fraudulent speakers to determine whether the voice print belongs to a fraudulent speaker.
4 Assignments
0 Petitions
Accused Products
Abstract
The methods, apparatus, and systems described herein are designed to identify fraudulent callers. A voice print of a call is created and compared to known voice prints to determine if it matches one or more of the known voice prints, and to transaction data associated with a database of voice prints. The methods include a pre-processing step to separate speech from non-speech, selecting a number of elements that affect the voice print the most, and/or computing an adjustment factor based on the scores of each received voice print against known voice prints.
43 Citations
19 Claims
-
1. An audible fraud detection system, comprising:
-
a node comprising a processor and a non-transitory computer readable medium operably coupled thereto, the non-transitory computer readable medium comprising a plurality of instructions stored therein that are accessible to, and executable by, the processor, wherein the plurality of instructions comprises; instructions that, when executed, receive a telephonic communication from an unidentified caller via a network; instructions that, when executed, separate a first portion of the communication into silent and non-silent segments; instructions that, when executed, evaluate the non-silent segments to determine which portions are speech or non-speech; instructions that, when executed, generate a plurality of parameters based on the evaluated non-silent segments that determine what is speech and non-speech; instructions that, when executed, use the generated parameters to determine what is speech and non-speech for at least the remainder of the telephonic communication; instructions, that when executed, create a voice print from the speech portions of the telephonic communication; instructions, that when executed, compare the voice print to a Universal Background Model (UBM); instructions, that when executed, select a number of audio elements of the UBM that characterize the voice print of the unidentified caller relative to other audio elements of the UBM; instructions, that when executed, select audio elements of the voice print that correspond to the selected audio elements of the UBM; and instructions, that when executed, compare the selected audio elements of the voice print to matching audio elements of a plurality of recorded voice prints from a plurality of fraudulent speakers to determine whether the voice print belongs to a fraudulent speaker. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer readable medium comprising a plurality of instructions stored therein, the plurality of instructions comprising:
-
instructions that, when executed, receive a telephonic communication from an unidentified caller; instructions that, when executed, separate a first portion at the beginning of the communication into silent and non-silent segments; instructions that, when executed, evaluate the non-silent segments to determine which portions are speech and non-speech; instructions that, when executed, generate a plurality of parameters based on the evaluated non-silent segments that determine what is speech and non-speech; instructions that, when executed, use the generated parameters to determine what is speech and non-speech for at least the remainder of the telephonic communication; instructions, that when executed, create a voice print from the speech portions of the telephonic communication; instructions, that when executed, compare the voice print to a Universal Background Model (UBM); instructions, that when executed, select a number of audio elements of the UBM that characterize the voice print of the unidentified caller relative to other audio elements of the UBM; instructions, that when executed, select audio elements of the voice print that correspond to the selected audio elements of the UBM; and instructions that, when executed, compare the selected audio elements of the voice print to matching audio elements of a voice print associated with a caller from a previous communication to determine whether the voice print belongs to a fraudulent speaker. - View Dependent Claims (6, 7, 8)
-
-
9. A method of detecting a fraudulent speaker comprising:
-
receiving a telephonic communication from an unidentified caller; separating a first portion of the telephonic communication into silent and non-silent segments; evaluating the non-silent segments to determine which portions thereof are speech or non-speech; generating a plurality of parameters that determine what is speech and non-speech in the non-silent segments; using the generated parameters to determine what is speech and non-speech for at least the remainder of the telephonic communication; comparing the speech of the unidentified caller to a Universal Background Model (UBM); selecting a number of audio elements of the UBM that most characterize the creation of a voice print of the unidentified caller relative to other audio elements of the UBM; selecting audio elements of the voice print that correspond to the selected audio elements of the UBM; comparing the selected audio elements of the voice print to matching audio elements of voice prints stored in a fraudster database; determining if the voice print matches any of the voice prints in a customer database; and adding the voice print to the customer database if the selected audio elements of the voice print did not match any voice print in the fraudster database. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. An audible fraud detection system, comprising:
-
a node comprising a processor and a non-transitory computer readable medium operably coupled thereto, the non-transitory computer readable medium comprising a plurality of instructions stored therein and being accessible to, and executable by, the processor, where the plurality of instructions comprises; instructions that, when executed, receive a voice audio communication from a telephonic communication from an unidentified caller via a network; instructions that, when executed, separate a first portion of the voice audio communication into silent and non-silent segments; instructions that, when executed, evaluate the non-silent segments to determine which portions are speech or non-speech; instructions that, when executed, generate a plurality of parameters based on the evaluated non-silent segments that determine what is speech and non-speech; instructions that, when executed, use the generated parameters to determine what is speech and non-speech for at least the remainder of the voice audio communication; instructions that, when executed, compare the speech of the unidentified caller to a Universal Background Model (UBM); instructions that, when executed, select a number of audio elements of the background model that most characterize creation of a voice print of the unidentified caller relative to other audio elements of the background model to create a voice print from the voice audio communication; instructions that, when executed, select audio elements of the voice print that correspond to the selected audio elements of the UBM; instructions that, when executed, compare a plurality of the selected audio elements of the voice print to matching audio elements of one or more stored voice prints stored in a fraudster database; instructions that, when executed, determine if the voice print matches any stored voice print in the fraudster database; and instructions that, when executed, add the voice print to the customer database if the selected elements of the voice print did not match any voice print in the fraudster database. - View Dependent Claims (16, 17, 18, 19)
-
Specification