Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 23. Отображено 23.
22-11-2016 дата публикации

Systems, methods, and media for determining fraud patterns and creating fraud behavioral models

Номер: US0009503571B2

Systems, methods, and media for analyzing fraud patterns and creating fraud behavioral models are provided herein. In some embodiments, methods for analyzing call data associated with fraudsters may include executing instructions stored in memory to compare the call data to a corpus of fraud data to determine one or more unique fraudsters associated with the call data, associate the call data with one or more unique fraudsters based upon the comparison, generate one or more voiceprints for each of the one or more identified unique fraudsters from the call data, and store the one or more voiceprints in a database.

Подробнее
11-05-2017 дата публикации

SYSTEMS, METHODS, AND MEDIA FOR DETERMINING FRAUD RISK FROM AUDIO SIGNALS

Номер: US20170133017A1
Принадлежит:

Systems, methods, and media for determining fraud risk from audio signals and non-audio data are provided herein. Some exemplary methods include receiving an audio signal and an associated audio signal identifier, receiving a fraud event identifier associated with a fraud event, determining a speaker model based on the received audio signal, determining a channel model based on a path of the received audio signal, using a server system, updating a fraudster channel database to include the determined channel model based on a comparison of the audio signal identifier and the fraud event identified, and updating a fraudster voice database to include the determined speaker model based on a comparison of the audio signal identifier and the fraud event identifier. 1. A method for screening callers in a call center , the method comprising:maintaining a set of channel models, wherein each channel model represents noise, artifacts, distortions, degradations, or modifications of call audio data associated with an instance of fraud;receiving a screening request, the screening request comprising an audio sample from a caller;extracting a caller's channel model from the audio sample;comparing the caller's channel model with channel models in the set of channel models;generating a channel match score based on the comparison, the channel match score indicating the level of risk that the caller is a fraudster; andproviding the channel match score to a call agent that is currently speaking with the caller.2. The method according to claim 1 , wherein the comparing the caller's speaker model with channel models in the set of channel models claim 1 , comprises:selecting channel models from the set of channel models based on past calls associated with the caller's account; andcomparing the caller's channel model with the selected channel models.3. The method according to claim 1 , further comprising:maintaining a set of speaker models, wherein each speaker model represents voice ...

Подробнее
14-02-2017 дата публикации

Enhanced diarization systems, media and methods of use

Номер: US9571652B1

Enhanced diarization systems and methods of use are provided herein. Some exemplary methods may include applying one or more rules that affect separation of the call audio data into segments, the rules being associated with the at least one call schema, separating the call audio data into segments according to the one or more rules, grouping segments of call audio data associated with a speaker, and storing in a storage media an identifier and the grouped segments for the speaker.

Подробнее
01-03-2012 дата публикации

SPEAKER VERIFICATION-BASED FRAUD SYSTEM FOR COMBINED AUTOMATED RISK SCORE WITH AGENT REVIEW AND ASSOCIATED USER INTERFACE

Номер: US20120053939A9
Принадлежит: VICTRIO

Disclosed is method for screening an audio for fraud detection, the method comprising: providing a User Interface (UI) control capable of: a) receiving an audio; b) comparing the audio with a list of fraud audios; c) assigning a risk score to the audio based on the comparison with a potentially matching fraud audio of the list of fraud audios; and d) displaying an audio interface on a display screen, wherein the audio interface is capable of playing the audio along with the potentially matching fraud audio, and wherein the display screen further displays metadata for each of the audio and the potentially matching fraud audio thereon, wherein the metadata includes location and incident data of each of the audio and the potentially matching fraud audio. 1. A system for screening an audio for fraud detection , the system comprising: a receiver module capable of receiving an audio;', 'a comparator module capable of comparing the audio with a list of fraud audios;', 'an risk score generator capable of assigning a risk score to the audio based on the comparison with a potentially matching fraud audio of the list of fraud audios; and', 'a display screen capable of displaying an audio interface thereon, wherein the audio interface is capable of playing the audio along with the potentially matching fraud audio, and wherein the display screen further displays metadata for each of the audio and the potentially matching fraud audio thereon, wherein the metadata includes at least one of a location and incident data of each of the audio and the potentially matching fraud audio., 'a User Interface (UI) control comprising2. The system of claim 1 , wherein the UI control further comprises a processor capable of generating a visually highlighted representation of the comparison on the display screen claim 1 , wherein visually highlighted representation comprises at least one of a color highlighting claim 1 , hatching claim 1 , shading claim 1 , and shadowing claim 1 , and wherein the ...

Подробнее
01-03-2012 дата публикации

Method and System for Screening Using Voice Data and Metadata

Номер: US20120054202A1
Автор: Rajakumar Anthony
Принадлежит: Victrio, Inc.

In one embodiment, the invention provides a method, comprising: (a) maintaining a database of known fraudsters, wherein each fraudster has a voice signature and metadata associated therewith; (b) performing a screening operation to match a candidate with a fraudster in the database based on matching a voice signature and metadata for the candidate with a voice signature and metadata for the fraudster in the database. 1. A system comprising:a processor; and maintaining a database of fraudster records for known fraudsters, each fraudster record including a voice signature and metadata associated therewith; and', 'performing a screening operation to match a candidate and a known fraudster based on matching a voice signature and metadata for the candidate with a voice signature and metadata in the a fraudster record in the database., 'a memory coupled to the processor, the memory storing instructions which when executed by the processor causes the system to perform a method comprising2. The system of claim 1 , wherein the database of fraudster records comprises a plurality of segmented databases according to the metadata.3. The system of claim 2 , wherein segmentation of the segmented databases is based on industry type.4. The system of claim 2 , wherein segmented databases are sorted based on frequency of matching of fraudster records in each segmented databases.5. The system of claim 2 , wherein an inactive fraudster record is removed from a segmented database after predefined period.6. The system of claim 1 , further comprising extracting metadata for the candidate using speech recognition.7. The system of claim 1 , wherein a probability of matching the voice signature and metadata for the candidate is based on a distance of a location in the metadata for the candidate from a location in the metadata in the fraudster record.8. A method claim 1 , comprising:collecting a voice sample and related metadata without regard to association of the voice sample and related ...

Подробнее
22-03-2012 дата публикации

Systems, methods, and media for determining fraud patterns and creating fraud behavioral models

Номер: US20120072453A1
Принадлежит: Victrio Inc

Systems, methods, and media for analyzing fraud patterns and creating fraud behavioral models are provided herein. In some embodiments, methods for analyzing call data associated with fraudsters may include executing instructions stored in memory to compare the call data to a corpus of fraud data to determine one or more unique fraudsters associated with the call data, associate the call data with one or more unique fraudsters based upon the comparison, generate one or more voiceprints for each of the one or more identified unique fraudsters from the call data, and store the one or more voiceprints in a database.

Подробнее
04-10-2012 дата публикации

SYSTEMS, METHODS, AND MEDIA FOR DETERMINING FRAUD RISK FROM AUDIO SIGNALS

Номер: US20120253805A1
Принадлежит:

Systems, methods, and media for determining fraud risk from audio signals and non-audio data are provided herein. Some exemplary methods include receiving an audio signal and an associated audio signal identifier, receiving a fraud event identifier associated with a fraud event, determining a speaker model based on the received audio signal, determining a channel model based on a path of the received audio signal, using a server system, updating a fraudster channel database to include the determined channel model based on a comparison of the audio signal identifier and the fraud event identified, and updating a fraudster voice database to include the determined speaker model based on a comparison of the audio signal identifier and the fraud event identifier. 1. A method comprising:receiving an audio signal and an associated audio signal identifier;receiving a fraud event identifier associated with a fraud event;determining a speaker model based on the received audio signal, using a server system;determining a channel model based on a path of the received audio signal, using the server system;updating a fraudster channel database to include the determined channel model based on a comparison of the audio signal identifier and the fraud event identifier; andupdating a fraudster voice database to include the determined speaker model based on a comparison of the audio signal identifier and the fraud event identifier.2. The method of claim 1 , wherein the audio signal is received without regard to fraud activities.3. The method of claim 1 , wherein the channel model represents distortion of a source of the received audio signal along the path of the received audio signal.4. The method of claim 1 , further comprising:receiving a candidate audio sample;determining a channel match score based on a match between candidate audio sample and the determined channel model in the fraudster channel database;determining a voice match score based on a match between candidate audio ...

Подробнее
04-10-2012 дата публикации

Systems, methods, and media for generating hierarchical fused risk scores

Номер: US20120254243A1
Принадлежит: Victrio Inc

Systems, methods, and media for generating fused risk scores for determining fraud in call data are provided herein. Some exemplary methods include generating a fused risk score used to determine fraud from call data by generating a fused risk score for a leg of call data, via a fuser module of an analysis system, the fused risk score being generated by fusing together two or more uniquely calculated fraud risk scores, each of the uniquely calculated fraud risk scores being generated by a sub-module of the analysis system; and storing the fused risk score in a storage device that is communicatively couplable with the fuser module.

Подробнее
26-09-2013 дата публикации

Method and System for Enrolling a Voiceprint in a Fraudster Database

Номер: US20130253919A1
Принадлежит:

Disclosed is a method for enrolling a voiceprint in a fraudster database, the method comprising: a) defining a fraud model comprising at least one hypothesis indicative of a fraudulent transaction; b) processing audio data based on the fraud model to identify at least one suspect voiceprint in the audio data suspected of belonging to a fraudster; and c) enrolling the at least one suspect voiceprint in the fraudster database. 120-. (canceled)21. A method for enrolling a voiceprint into a fraudster database , the method comprising:storing a fraud model in a memory device;receiving at a fraud detection engine a batch of transactions before detection of a fraud for transactions in the batch, each transaction including audio data and a caller identity;processing the batch of transactions to extract a subset of the batch of transactions based on the fraud model, the processing performed using a selection engine;processing the audio data of each of the extracted transactions using a voice processing engine to identify a group of transactions in the extracted transactions, the identified group of transactions including audio data characteristic of a unique individual who has called multiple times;processing the caller identities of the identified group of transactions using the voice processing engine to determine that the unique individual has used multiple caller identities;generating a voiceprint from the audio data of the identified group of transactions using the voice processing engine; andenrolling the generated voiceprint into the fraudster database using an enrollment engine.22. The method according to claim 21 , wherein the fraud model comprises transactions related to a phone number pattern belonging to a specific geographical location.23. The method according to claim 21 , wherein the fraud model comprises transactions related to a specific action requested by the caller.24. The method according to claim 23 , wherein the specific action is change of address.25. ...

Подробнее
26-02-2015 дата публикации

SYSTEMS, METHODS, AND MEDIA FOR DETERMINING FRAUD PATTERNS AND CREATING FRAUD BEHAVIORAL MODELS

Номер: US20150055763A1
Принадлежит:

Systems, methods, and media for analyzing fraud patterns and creating fraud behavioral models are provided herein. In some embodiments, methods for analyzing call data associated with fraudsters may include executing instructions stored in memory to compare the call data to a corpus of fraud data to determine one or more unique fraudsters associated with the call data, associate the call data with one or more unique fraudsters based upon the comparison, generate one or more voiceprints for each of the one or more identified unique fraudsters from the call data, and store the one or more voiceprints in a database. 1populating a first database with a plurality of voice samples that are each identified by a unique identifier, the populating begun performed using a server system including a computer having a processor coupled to memory;receiving a fraud report comprising a plurality of identifiers associated with fraud;matching, using the server system, unique identifiers in the first database with the plurality of identifiers associated with fraud in the fraud report;generating a blacklist comprising a first list of voice prints based on the voice samples having unique identifiers that match one of the plurality of identifiers associated with fraud in the fraud report;generating a whitelist comprising a second list of voice prints based on the voice samples having unique identifiers that do not match one of the plurality of identifiers associated with fraud in the fraud report;using the whitelist to perform an identification of an individual; andauthenticating the user in accordance with the identification.. A method comprising: This application is a continuation of U.S. patent application Ser. No. 13/290,011, filed Nov. 4, 2011, entitled “SYSTEMS, METHODS, AND MEDIA FOR DETERMINING FRAUD PATTERNS AND CREATING FRAUD BEHAVIORAL MODELS,” which is a continuation-in-part and claims benefit of and priority to U.S. patent application Ser. No. 11/754,974, filed on May 29, ...

Подробнее
07-03-2019 дата публикации

AUTOMATED SCALABLE IDENTITY-PROOFING AND AUTHENTICATION PROCESS

Номер: US20190075105A1
Автор: Rajakumar Anthony
Принадлежит:

An automated process is disclosed for improving the functionality of computer systems and electronic commerce in user identity-proofing. Steps include verifying that a user who is electronically seeking identity proofing is on an electronic directory of persons eligible for such identity proofing; creating an attest list for the user that includes associates who can vouch for his or her identity; collecting a video or other data from the user; sending the video or data to the associates and asking them for a confirmation or a disavowal of the identity of the user; deriving a biometric from the video or data upon receiving the confirmation; and saving the biometric as an identity-proofed biometric. 1. A process for obtaining an identity proofed biometric of a user in an organization , the process comprising:creating an attest list for the user, the attest list comprising one or more associates of the user that can confirm an identity of the user when viewing a video of the user, wherein creating the attest list comprises identifying persons to verify the identity of the user from a directory of the organization who have been approved to confirm the identity of user by another person within the organization;presenting a video of the user to the one or more associates on the attest list for confirmation of the identity of the user;obtaining confirmation of the identity of the user from the one or more associates based on reviewing the video of the user;deriving a biometric for the user from the video of the user;storing the first biometric derived from the video as an identity-proofed biometric in response to the one or more associates confirming the identity of the user in the first video.2. A process for authenticating a user in an organization , the process comprising:receiving a request for identity authentication of the user after the identity of the user has been confirmed by one or more associates in the organization;obtaining a stored identity-proofed biometric ...

Подробнее
19-05-2016 дата публикации

SYSTEMS, METHODS, AND MEDIA FOR DETERMINING FRAUD PATTERNS AND CREATING FRAUD BEHAVIORAL MODELS

Номер: US20160142534A1
Принадлежит:

Systems, methods, and media for analyzing fraud patterns and creating fraud behavioral models are provided herein. In some embodiments, methods for analyzing call data associated with fraudsters may include executing instructions stored in memory to compare the call data to a corpus of fraud data to determine one or more unique fraudsters associated with the call data, associate the call data with one or more unique fraudsters based upon the comparison, generate one or more voiceprints for each of the one or more identified unique fraudsters from the call data, and store the one or more voiceprints in a database. 1. A method for analyzing call data associated with fraudsters , the method comprising:executing instructions stored in memory, the instructions to be executed by a processor, the instructions being configured to: (a) generate a voiceprint for each fraudster in the first call data such that a first plurality of voiceprints are generated;', '(b) retrieve from a blacklist database a second plurality of voiceprints;', '(c) compare each voiceprint of the first plurality of voiceprints with each voiceprint of the second plurality of voiceprints to generate a plurality of relative comparison scores, wherein the comparing is performed using a matrix arranged such that the first plurality of voiceprints are disposed on a first axis of the matrix, the second plurality of voiceprints are disposed on a second axis of the matrix, and such that cells of the matrix include a relative comparison score for each voiceprint pair, wherein relative comparison scores are numerical values that indicate a degree of similarity between two voiceprints; and', '(d) group together voiceprint pairs having relative comparison scores above or below a predetermined threshold values;, 'responsive to receiving first call data associated with fraudstersgenerate a master voiceprint for the group; andgenerate the master voiceprint in the blacklist database.2. The method of claim 1 , wherein ...

Подробнее
25-06-2015 дата публикации

METHOD AND SYSTEM FOR GENERATING A FRAUD RISK SCORE USING TELEPHONY CHANNEL BASED AUDIO AND NON-AUDIO DATA

Номер: US20150178736A1
Принадлежит:

Disclosed is a method for generating a fraud risk score representing a fraud risk associated with an individual, the method comprising: a) determining a telephony channel risk score from at least one of audio channel data and non-audio channel data of the individual; and b) generating the fraud risk score based on at least one of the telephony channel risk score, the audio channel data, and the non-audio channel data.

Подробнее
23-11-2017 дата публикации

Automated scalable identity-proofing and authentication process

Номер: US20170339139A1
Автор: Rajakumar Anthony
Принадлежит:

An automated process is disclosed for improving the functionality of computer systems and electronic commerce in user identity-proofing. Steps include verifying that a user who is electronically seeking identity proofing is on an electronic directory of persons eligible for such identity proofing; creating an attest list for the user that includes associates who can vouch for his or her identity; collecting a video or other data from the user; sending the video or data to the associates and asking them for a confirmation or a disavowal of the identity of the user; deriving a biometric from the video or data upon receiving the confirmation; and saving the biometric as an identify-proofed biometric. 1. A process involving identity proofing , the process performed electronically , automated on a computer system and scalable as to number of persons participating , the process comprising the steps of:verifying that a potential candidate electronically seeking identity proofing is on an electronic directory of persons eligible for such identity proofing;creating an attest list, the attest list comprising for each potential candidate, one or more associates of the potential candidate that can confirm the identity of the potential candidate when viewing a video of the potential candidate;collecting a video from the potential candidate making an electronic request for identity proofing;presenting the video to the one or more associates on the attest list;asking the one or more associates for a confirmation or a disavowal of the identity of the potential candidate based on reviewing the video;deriving a biometric from the video upon receiving the confirmation from any of the one or more associates; andsaving the biometric as an identify-proofed biometric.2. The process of claim 1 , further comprising the steps of:designating a number of associates of the potential candidate that are needed to confirm the identity of the potential candidate;scoring a confidence level in the ...

Подробнее
31-12-2015 дата публикации

SYSTEMS, METHODS, AND MEDIA FOR DISAMBIGUATING CALL DATA TO DETERMINE FRAUD

Номер: US20150381801A1
Принадлежит:

Systems, methods, and media for disambiguating call data are provided herein. Some exemplary methods include receiving notification of a fraud event including a customer account identifier and a fraud time stamp; determining a time frame that is proximate the fraud time stamp; collecting call events associated with the customer account identifier that occur during the determined time frame, each call event including a unique call event identifier, a voice sample, and a call event time stamp; identifying a first call event belonging to a first speaker and a second call event belonging to a second speaker; and generating a timeline presentation that includes the first call event and call event timestamp and an identification of a first voice sample as belonging to the first speaker, the second call event and call event timestamp and an identification of a second voice sample as belonging to the second speaker. 1. A non-transitory computer readable storage media having a program embodied thereon , the program being executable by a processor to perform a method for disambiguating call data , the method comprising:receiving notification of a fraud event including a customer account identifier and a fraud time stamp;determining a time frame that is proximate the fraud time stamp;collecting call events associated with the customer account identifier that occur during the determined time frame, each call event including a unique call event identifier, a voice sample, and a call event time stamp;identifying a first call event belonging to a first speaker and a second call event belonging to a second speaker; andgenerating a timeline presentation that includes the first call event and call event timestamp and an identification of a first voice sample as belonging to the first speaker, the second call event and call event timestamp and an identification of a second voice sample as belonging to the second speaker.2. The non-transitory computer readable storage media according ...

Подробнее
04-12-2018 дата публикации

Automated scalable identity-proofing and authentication process

Номер: US10148649B2
Автор: Anthony Rajakumar
Принадлежит: Vercrio Inc

An automated process is disclosed for improving the functionality of computer systems and electronic commerce in user identity-proofing. Steps include verifying that a user who is electronically seeking identity proofing is on an electronic directory of persons eligible for such identity proofing; creating an attest list for the user that includes associates who can vouch for his or her identity; collecting a video or other data from the user; sending the video or data to the associates and asking them for a confirmation or a disavowal of the identity of the user; deriving a biometric from the video or data upon receiving the confirmation; and saving the biometric as an identify-proofed biometric.

Подробнее
11-02-2021 дата публикации

Automated scalable identity-proofing and authentication process

Номер: US20210044584A1
Автор: Anthony Rajakumar
Принадлежит: Vercrio Inc

A process of confirming an originator of an electronic mail (email) includes receiving a request for verification of the identity of an alleged originator of the email, which may be sent from the actual originator of the email or a recipient of the email. The alleged originator of the email may be determined, e.g., by parsing the email to determine the name of the sender in the email. Verification is obtained from an biometric-enabled client that is associated with the send whether the email was in fact sent by the sender as well as confirmation of the identity of the sender based on a previously stored identity-proofed biometric.

Подробнее
06-01-2015 дата публикации

Method and system for generating a fraud risk score using telephony channel based audio and non-audio data

Номер: US8930261B2
Принадлежит: Verint Americas Inc

Disclosed is a method for generating a fraud risk score representing a fraud risk associated with an individual, the method comprising: a) determining a telephony channel risk score from at least one of audio channel data and non-audio channel data of the individual; and b) generating the fraud risk score based on at least one of the telephony channel risk score, the audio channel data, and the non-audio channel data.

Подробнее
07-05-2009 дата публикации

Building whitelists comprising voiceprints not associated with fraud and screening calls using a combination of a whitelist and blacklist

Номер: US20090119106A1
Принадлежит: Victrio Inc

According to one aspect of the invention there is provided a method, comprising collecting voiceprints of callers; identifying which of the collected voiceprints are associated with fraud; and generating a whitelist comprising voiceprints corresponding to the collected voiceprints not identified as associated with fraud.

Подробнее
23-11-2017 дата публикации

Automated scalable identity-proofing and authentication process

Номер: WO2017200789A1
Автор: Anthony Rajakumar
Принадлежит: Anthony Rajakumar

An automated process is disclosed for improving the functionality of computer systems and electronic commerce in user identity-proofing. Steps include verifying that a user who is electronically seeking identity proofing is on an electronic directory of persons eligible for such identity proofing; creating an attest list for the user that includes associates who can vouch for his or her identity; collecting a video or other data from the user; sending the video or data to the associates and asking them for a confirmation or a disavowal of the identity of the user; deriving a biometric from the video or data upon receiving the confirmation; and saving the biometric as an identify-proofed biometric.

Подробнее
08-02-2024 дата публикации

Automated scalable identity-proofing and authentication process

Номер: US20240048556A1
Автор: Anthony Rajakumar
Принадлежит: Vercrio Inc

A process of confirming an originator of an electronic mail (email) includes receiving a request for verification of the identity of an alleged originator of the email, which may be sent from the actual originator of the email or a recipient of the email. The alleged originator of the email may be determined, e.g., by parsing the email to determine the name of the sender in the email. Verification is obtained from a biometric-enabled client that is associated with the send whether the email was in fact sent by the sender as well as confirmation of the identity of the sender based on a previously stored identity-proofed biometric.

Подробнее
12-12-2023 дата публикации

Automated scalable identity-proofing and authentication process

Номер: US11843597B2
Автор: Anthony Rajakumar
Принадлежит: Vercrio Inc

A process of confirming an originator of an electronic mail (email) includes receiving a request for verification of the identity of an alleged originator of the email, which may be sent from the actual originator of the email or a recipient of the email. The alleged originator of the email may be determined, e.g., by parsing the email to determine the name of the sender in the email. Verification is obtained from a biometric-enabled client that is associated with the send whether the email was in fact sent by the sender as well as confirmation of the identity of the sender based on a previously stored identity-proofed biometric.

Подробнее
21-03-2024 дата публикации

Mitigating risk from multi-factor authentication fatigue attacks

Номер: US20240098113A1
Автор: Anthony Rajakumar
Принадлежит: Vercrio Inc

An authentication system identifies and mitigates the effectiveness of a Multi-factor Authentication (MFA) Fatigue attack. The attack may be detected based on the number of requests for authentication received for a user within a predetermined time window, or through user or administrator input. Once detected, the authentication system is placed in a safe mode to mitigate the MFA Fatigue attack. In safe mode, all pending requests for authentication are automatically rejected. Subsequent requests for mitigation may be automatically rejected or the authentication process may be modified to accurately differentiate authentication attempts from a legitimate user from authentication attempts that are part of the MFA Fatigue attack. To further mitigate the effectiveness of MFA Fatigue attacks, the authentication system may use simulated authentication attempts to identify and train users who are susceptible to MFA Fatigue attacks.

Подробнее