-
公开(公告)号:US11632460B2
公开(公告)日:2023-04-18
申请号:US17201849
申请日:2021-03-15
Applicant: PINDROP SECURITY, INC.
Inventor: Ricardo Casal , Theo Walker , Kailash Patil , John Cornwell
Abstract: Embodiments described herein provide for performing a risk assessment using graph-derived features of a user interaction. A computer receives interaction information and infers information from the interaction based on information provided to the computer by a communication channel used in transmitting the interaction information. The computer may determine a claimed identity of the user associated with the user interaction. The computer may extract features from the inferred identity and claimed identity. The computer generates a graph representing the structural relationship between the communication channels and claimed identities associated with the inferred identity and claimed identity. The computer may extract additional features from the inferred identity and claimed identity using the graph. The computer may apply the features to a machine learning model to generate a risk score indicating the probability of a fraudulent interaction associated with the user interaction.
-
公开(公告)号:US10904643B2
公开(公告)日:2021-01-26
申请号:US16378286
申请日:2019-04-08
Applicant: PINDROP SECURITY, INC.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
IPC: H04M1/56 , H04M15/06 , H04Q3/70 , H04M3/22 , H04M7/12 , H04Q1/45 , G10L25/51 , H04L25/02 , H04M3/493
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
公开(公告)号:US20230014180A1
公开(公告)日:2023-01-19
申请号:US17948991
申请日:2022-09-20
Applicant: Pindrop Security, Inc.
Inventor: John Cornwell , Terry Nelms, II
Abstract: Embodiments described herein provide for passive caller verification and/or passive fraud risk assessments for calls to customer call centers. Systems and methods may be used in real time as a call is coming into a call center. An analytics server of an analytics service looks at the purported Caller ID of the call, as well as the unaltered carrier metadata, which the analytics server then uses to generate or retrieve one or more probability scores using one or more lookup tables and/or a machine-learning model. A probability score indicates the likelihood that information derived using the Caller ID information has occurred or should occur given the carrier metadata received with the inbound call. The one or more probability scores be used to generate a risk score for the current call that indicates the probability of the call being valid (e.g., originated from a verified caller or calling device, non-fraudulent).
-
公开(公告)号:US10257591B2
公开(公告)日:2019-04-09
申请号:US15600625
申请日:2017-05-19
Applicant: PINDROP SECURITY, INC.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
IPC: H04M1/56 , H04M15/06 , H04Q3/70 , G10L25/51 , H04L25/02 , H04M3/493 , H04M3/22 , H04M7/12 , H04Q1/45
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
公开(公告)号:US20240323270A1
公开(公告)日:2024-09-26
申请号:US18680327
申请日:2024-05-31
Applicant: Pindrop Security, Inc.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
CPC classification number: H04M1/56 , H04L25/0202 , H04M3/2281 , H04M3/493 , H04M7/1295 , H04Q1/45 , H04Q3/70 , G10L25/51 , H04M2201/18 , H04M2203/60 , H04Q2213/13139 , H04Q2213/13405 , H04Q2213/13515
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
公开(公告)号:US12015731B2
公开(公告)日:2024-06-18
申请号:US17857618
申请日:2022-07-05
Applicant: Pindrop Security, Inc.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
IPC: H04M1/56 , H04L25/02 , H04M3/22 , H04M3/493 , H04M7/12 , H04M15/06 , H04Q1/45 , H04Q3/70 , G10L25/51
CPC classification number: H04M1/56 , H04L25/0202 , H04M3/2281 , H04M3/493 , H04M7/1295 , H04Q1/45 , H04Q3/70 , G10L25/51 , H04M2201/18 , H04M2203/60 , H04Q2213/13139 , H04Q2213/13405 , H04Q2213/13515
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
公开(公告)号:US11470194B2
公开(公告)日:2022-10-11
申请号:US16992789
申请日:2020-08-13
Applicant: PINDROP SECURITY, INC.
Inventor: John Cornwell , Terry Nelms, II
Abstract: Embodiments described herein provide for passive caller verification and/or passive fraud risk assessments for calls to customer call centers. Systems and methods may be used in real time as a call is coming into a call center. An analytics server of an analytics service looks at the purported Caller ID of the call, as well as the unaltered carrier metadata, which the analytics server then uses to generate or retrieve one or more probability scores using one or more lookup tables and/or a machine-learning model. A probability score indicates the likelihood that information derived using the Caller ID information has occurred or should occur given the carrier metadata received with the inbound call. The one or more probability scores be used to generate a risk score for the current call that indicates the probability of the call being valid (e.g., originated from a verified caller or calling device, non-fraudulent).
-
公开(公告)号:US11388490B2
公开(公告)日:2022-07-12
申请号:US17157848
申请日:2021-01-25
Applicant: PINDROP SECURITY, INC.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
IPC: H04M1/56 , H04M15/06 , H04Q3/70 , H04M3/22 , H04M7/12 , H04Q1/45 , G10L25/51 , H04L25/02 , H04M3/493
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
公开(公告)号:US12250344B2
公开(公告)日:2025-03-11
申请号:US18423858
申请日:2024-01-26
Applicant: Pindrop Security, Inc.
Inventor: John Cornwell , Terry Nelms, II
Abstract: Embodiments described herein provide for passive caller verification and/or passive fraud risk assessments for calls to customer call centers. Systems and methods may be used in real time as a call is coming into a call center. An analytics server of an analytics service looks at the purported Caller ID of the call, as well as the unaltered carrier metadata, which the analytics server then uses to generate or retrieve one or more probability scores using one or more lookup tables and/or a machine-learning model. A probability score indicates the likelihood that information derived using the Caller ID information has occurred or should occur given the carrier metadata received with the inbound call. The one or more probability scores be used to generate a risk score for the current call that indicates the probability of the call being valid (e.g., originated from a verified caller or calling device, non-fraudulent).
-
公开(公告)号:US12022024B2
公开(公告)日:2024-06-25
申请号:US18301897
申请日:2023-04-17
Applicant: PINDROP SECURITY, INC.
Inventor: Ricardo Casal , Theo Walker , Kailash Patil , John Cornwell
CPC classification number: H04M3/2281 , G06F18/214 , G06N20/00 , G06N3/08 , G06N20/10 , G06N20/20 , H04M3/42042 , H04M3/51 , H04M2203/551 , H04M2203/556 , H04M2203/6027
Abstract: Embodiments described herein provide for performing a risk assessment using graph-derived features of a user interaction. A computer receives interaction information and infers information from the interaction based on information provided to the computer by a communication channel used in transmitting the interaction information. The computer may determine a claimed identity of the user associated with the user interaction. The computer may extract features from the inferred identity and claimed identity. The computer generates a graph representing the structural relationship between the communication channels and claimed identities associated with the inferred identity and claimed identity. The computer may extract additional features from the inferred identity and claimed identity using the graph. The computer may apply the features to a machine learning model to generate a risk score indicating the probability of a fraudulent interaction associated with the user interaction.
-
-
-
-
-
-
-
-
-