Cognitive security for voice phishing activity
First Claim
1. A method implemented by an information handling system that includes a memory and a processor, the method comprising:
- generating, by the processor, a plurality of information elements based upon a voice conversation between a first entity and a second entity over a communication network;
constructing a current conversation pattern from the plurality of information elements, wherein the current conversation pattern specifies an order of the plurality of information elements based upon the voice conversation;
identifying one or more deceptive conversation properties of the current conversation pattern based upon analyzing the order of the plurality of information elements in the current conversation pattern against one or more domain-based conversation patterns; and
sending an alert message to the first entity based upon the identified one or more deceptive conversation properties.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach is provided in which a question answer system monitors a voice conversation between a first entity and a second entity. During the conversation, the question answer system parses the conversation into information phrases, and constructs the information phrases into a current conversation pattern. The question answer system identifies deceptive conversation properties of the current conversation by analyzing the current conversation pattern against domain-based conversation patterns. The question answer system, in turn, sends an alert message to the first entity to notify the first entity of the identified deceptive conversation properties.
-
Citations
9 Claims
-
1. A method implemented by an information handling system that includes a memory and a processor, the method comprising:
-
generating, by the processor, a plurality of information elements based upon a voice conversation between a first entity and a second entity over a communication network; constructing a current conversation pattern from the plurality of information elements, wherein the current conversation pattern specifies an order of the plurality of information elements based upon the voice conversation; identifying one or more deceptive conversation properties of the current conversation pattern based upon analyzing the order of the plurality of information elements in the current conversation pattern against one or more domain-based conversation patterns; and sending an alert message to the first entity based upon the identified one or more deceptive conversation properties. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification