Cognitive intelligence based voice authentication
First Claim
1. A method, implemented using at least one processor and at least one memory for detecting a potentially fraudulent voice conversation, the method comprising:
- processing, by the data processing system, a corpus of electronic information to extract a fraud feature representative of at least one fraudulent activity, wherein the fraud feature is a textual representation of a fraudulent activity identified from one or more of reported information, events, or news identifying anomalous behavior;
receiving, by the data processing system, a first voice input from a user;
converting, by the data processing system, the first voice input into a first textual representation of the first voice input and a first set of one or more behavioral speech characteristics associated with the user;
generating, by the data processing system, a speech model for the user based on the first textual representation and the first set of one or more behavioral speech characteristics;
receiving, by the data processing system, a second voice input from an entity requesting access to resources associated with the user;
converting the second voice input to a second textual representation of the second voice input and second set of one or more behavioral speech characteristics;
evaluating, by the data processing system, the second voice input based on the speech model for the user and the fraud feature, wherein evaluating the second voice input comprises;
identifying, based on the fraud feature, a portion of the second textual representation and corresponding second set of one or more behavioral speech characteristics; and
comparing the portion of the second textual representation and corresponding second set of one or more behavioral speech characteristics to the first set of one or more behavioral speech characteristics in the speech model to generate a measure of confidence that the portion of the second textual representation is part of the fraudulent activity identified from the one or more of reported information, events, or news identifying the anomalous behavior; and
generating, by the data processing system, an output indicating whether or not the entity is the user based on results of the evaluation.
1 Assignment
0 Petitions
Accused Products
Abstract
Mechanisms are provided to detect a potentially fraudulent voice conversation. The mechanisms process a corpus of electronic information to extract a fraud feature representative of at least one fraudulent activity, receive a first voice input from a user, and convert the first voice input into a textual representation of the first voice input and a set of behavioral speech characteristics associated with the user. The mechanisms generate a speech model for the user based on the textual representation and the behavioral speech characteristics, receive a second voice input from an entity requesting access to resources associated with the user, and evaluate the second voice input based on the speech model for the user and the fraud feature. The mechanisms generate an output indicating whether or not the entity is the user based on results of the evaluation.
-
Citations
20 Claims
-
1. A method, implemented using at least one processor and at least one memory for detecting a potentially fraudulent voice conversation, the method comprising:
-
processing, by the data processing system, a corpus of electronic information to extract a fraud feature representative of at least one fraudulent activity, wherein the fraud feature is a textual representation of a fraudulent activity identified from one or more of reported information, events, or news identifying anomalous behavior; receiving, by the data processing system, a first voice input from a user; converting, by the data processing system, the first voice input into a first textual representation of the first voice input and a first set of one or more behavioral speech characteristics associated with the user; generating, by the data processing system, a speech model for the user based on the first textual representation and the first set of one or more behavioral speech characteristics; receiving, by the data processing system, a second voice input from an entity requesting access to resources associated with the user; converting the second voice input to a second textual representation of the second voice input and second set of one or more behavioral speech characteristics; evaluating, by the data processing system, the second voice input based on the speech model for the user and the fraud feature, wherein evaluating the second voice input comprises; identifying, based on the fraud feature, a portion of the second textual representation and corresponding second set of one or more behavioral speech characteristics; and comparing the portion of the second textual representation and corresponding second set of one or more behavioral speech characteristics to the first set of one or more behavioral speech characteristics in the speech model to generate a measure of confidence that the portion of the second textual representation is part of the fraudulent activity identified from the one or more of reported information, events, or news identifying the anomalous behavior; and generating, by the data processing system, an output indicating whether or not the entity is the user based on results of the evaluation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 19)
-
-
11. A computer program product comprising a computer readable storage medium having a computer readable program stored therein, wherein the computer readable program, when executed on a computing device, causes the computing device to be specifically configured to detect a potentially fraudulent voice conversation at least by:
-
processing a corpus of electronic information to extract a fraud feature representative of at least one fraudulent activity, wherein the fraud feature is a textual representation of a fraudulent activity identified from one or more of reported information, events, or news identifying anomalous behavior; receiving a first voice input from a user; converting the first voice input into a first textual representation of the first voice input and a first set of one or more behavioral speech characteristics associated with the user; generating a speech model for the user based on the first textual representation and the first set of one or more behavioral speech characteristics; receiving a second voice input from an entity requesting access to resources associated with the user; converting the second voice input to a second textual representation and second set of one or more behavioral speech characteristics; evaluating the second voice input based on the speech model for the user and the fraud feature, wherein the computer readable program further causes the computing device to evaluate the second voice input at least by; identifying, based on the fraud feature, a portion of the second textual representation and corresponding second set of one or more behavioral speech characteristics; and comparing the portion of the second textual representation and corresponding second set of one or more behavioral speech characteristics to the first set of one or more behavioral speech characteristics in the speech model to generate a measure of confidence that the portion of the second textual representation is part of the fraudulent activity identified from the one or more of reported information, events, or news identifying the anomalous behavior; and generating an output indicating whether or not the entity is the user based on results of the evaluation. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
20. An apparatus comprising:
-
a processor; and a memory coupled to the processor, wherein the memory comprises instructions which, when executed by the processor, cause the processor to be specifically configured to detect a potentially fraudulent voice conversation at least by; processing a corpus of electronic information to extract a fraud feature representative of at least one fraudulent activity, wherein the fraud feature is a textual representation of a fraudulent activity identified from one or more of reported information, events, or news identifying anomalous behavior; receiving a first voice input from a user; converting the first voice input into a first textual representation of the first voice input and a first set of one or more behavioral speech characteristics associated with the user; generating a speech model for the user based on the first textual representation and the first set of one or more behavioral speech characteristics; receiving a second voice input from an entity requesting access to resources associated with the user; converting the second voice input to a second textual representation and second set of one or more behavioral speech characteristics; evaluating the second voice input based on the speech model for the user and the fraud feature, wherein the computer readable program further causes the computing device to evaluate the second voice input at least by; identifying, based on the fraud feature, a portion of the second textual representation and corresponding second set of one or more behavioral speech characteristics; and comparing the portion of the second textual representation and corresponding second set of one or more behavioral speech characteristics to the first set of one or more behavioral speech characteristics in the speech model to generate a measure of confidence that the portion of the second textual representation is part of the fraudulent activity identified from the one or more of reported information, events, or news identifying the anomalous behavior; and generating an output indicating whether or not the entity is the user based on results of the evaluation.
-
Specification