-
公开(公告)号:US20190281158A1
公开(公告)日:2019-09-12
申请号:US16289957
申请日:2019-03-01
Applicant: PINDROP SECURITY, INC.
Inventor: Payas GUPTA , Terry NELMS, II
Abstract: In an illustrative embodiment, a user device may block all the phone numbers used by an enterprise. When an enterprise wants to call the user, the enterprise may notify the user device through a separate secure channel that an enterprise phone number is in the process of making a phone call to the user device. The secure channel may include an authentication server that may request the user device to unblock the enterprise phone number. An incoming phone call from the enterprise phone number therefore can be trusted. After the phone call is terminated, the user device may again block the enterprise phone number. An attacker may not have access to the authentication server and a phone call from the attacker with a spoofed enterprise phone number (now blocked) may be dropped by the user device.
-
公开(公告)号:US20190281157A1
公开(公告)日:2019-09-12
申请号:US16287879
申请日:2019-02-27
Applicant: PINDROP SECURITY, INC.
Inventor: Payas GUPTA , Terry NELMS, II
Abstract: Disclosed herein are embodiments of systems, methods, and products comprises an authentication server for caller ID verification. When a caller makes a phone call, the server receives the phone call and verifies whether the phone call is from a registered device associated with the phone number. The server queries the registered device to retrieve one or more current call states via an authentication function on the registered device. The server compares the states and/or state transitions to the observed states and/or state transitions of the phone call. If the registered device states and/or state transitions match the observed phone call states and/or state transitions, the server verifies that the phone call is from the registered device and not some imposter's device. If there is no such match, the server rejects the phone call before the call phone is connected or terminates the phone call after the phone call is connected.
-
公开(公告)号:US20190096424A1
公开(公告)日:2019-03-28
申请号:US16200283
申请日:2018-11-26
Applicant: PINDROP SECURITY, INC.
Inventor: Elie KHOURY , Matthew GARLAND
Abstract: Methods, systems, and apparatuses for audio event detection, where the determination of a type of sound data is made at the cluster level rather than at the frame level. The techniques provided are thus more robust to the local behavior of features of an audio signal or audio recording. The audio event detection is performed by using Gaussian mixture models (GMMs) to classify each cluster or by extracting an i-vector from each cluster. Each cluster may be classified based on an i-vector classification using a support vector machine or probabilistic linear discriminant analysis. The audio event detection significantly reduces potential smoothing error and avoids any dependency on accurate window-size tuning. Segmentation may be performed using a generalized likelihood ratio and a Bayesian information criterion, and the segments may be clustered using hierarchical agglomerative clustering. Audio frames may be clustered using K-means and GMMs.
-
公开(公告)号:US20180075849A1
公开(公告)日:2018-03-15
申请号:US15818231
申请日:2017-11-20
Applicant: PINDROP SECURITY, INC.
Inventor: Elie KHOURY , Matthew GARLAND
CPC classification number: G10L17/08 , G06N3/04 , G06N3/08 , G10L15/16 , G10L17/02 , G10L17/04 , G10L17/18 , G10L17/22
Abstract: The present invention is directed to a deep neural network (DNN) having a triplet network architecture, which is suitable to perform speaker recognition. In particular, the DNN includes three feed-forward neural networks, which are trained according to a batch process utilizing a cohort set of negative training samples. After each batch of training samples is processed, the DNN may be trained according to a loss function, e.g., utilizing a cosine measure of similarity between respective samples, along with positive and negative margins, to provide a robust representation of voiceprints.
-
公开(公告)号:US20180041823A1
公开(公告)日:2018-02-08
申请号:US15600625
申请日:2017-05-19
Applicant: PINDROP SECURITY, INC.
Inventor: Nick GAUBITCH , Scott STRONG , John CORNWELL , Hassan KINGRAVI , David DEWEY
CPC classification number: H04Q3/70 , G10L25/51 , H04L25/0202 , H04M3/2281 , H04M3/493 , H04M7/1295 , H04M2201/18 , H04M2203/60 , H04Q1/45 , H04Q2213/13139 , H04Q2213/13405 , H04Q2213/13515
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
公开(公告)号:US20180041638A1
公开(公告)日:2018-02-08
申请号:US15445569
申请日:2017-02-28
Applicant: PINDROP SECURITY, INC.
Inventor: Payas GUPTA , David DEWEY
CPC classification number: H04M3/543 , H04L63/00 , H04L67/02 , H04M3/42059 , H04M3/436 , H04M3/54 , H04M2203/6027 , H04M2203/6045 , H04W4/50 , H04W12/06
Abstract: The invention may verify calls to a telephone device by activating call forwarding to redirect calls for the telephone device to a prescribed destination; receiving a message from a server verifying the call; deactivating call forwarding to receive the call; and reactivating call forwarding when the call is concluded. In another embodiment, the invention may, in response to a telephone device initiating a call to a second telephone device installed with a particular application or software, transmit a message to a server causing it to instruct the second telephone device to deactivate call forwarding. In yet another embodiment, the invention may cause a server to receive a message from a prescribed location indicating that a call was received via call forwarding, and in response to the message, transmit an instruction to the intended recipient to deactivate the call forwarding if the call is verified as legitimate.
-
97.
公开(公告)号:US20180041631A1
公开(公告)日:2018-02-08
申请号:US15666917
申请日:2017-08-02
Applicant: PINDROP SECURITY, INC.
Inventor: Lance DOUGLAS
IPC: H04M3/22
CPC classification number: H04M3/2281 , H04L63/00 , H04M3/2254 , H04M3/436 , H04M7/0078 , H04M7/0093 , H04M2203/6027 , H04M2207/12 , H04Q2213/13139 , H04Q2213/13345 , H04Q2213/13515
Abstract: Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
-
公开(公告)号:US20170111506A1
公开(公告)日:2017-04-20
申请号:US15294538
申请日:2016-10-14
Applicant: PINDROP SECURITY, INC.
Inventor: Scott STRONG , Kailash PATIL , David DEWEY , Raj BANDYOPADHYAY , Telvis CALHOUN , Vijay BALASUBRAMANIYAN
CPC classification number: H04M3/527 , G06F21/32 , G06F21/552 , G06N99/005 , H04M3/493 , H04M7/0078 , H04M15/41 , H04M2203/551 , H04M2203/6027 , H04W12/12
Abstract: Systems and methods for call detail record (CDR) analysis to determine a risk score for a call and identify fraudulent activity and for fraud detection in Interactive Voice Response (IVR) systems. An example method may store information extracted from received calls. Queries of the stored information may be performed to select data using keys, wherein each key relates to one of the received calls, and wherein the queries are parallelized. The selected data may be transformed into feature vectors, wherein each feature vector relates to one of the received calls and includes a velocity feature and at least one of a behavior feature or a reputation feature. A risk score for the call may be generated during the call based on the feature vectors.
-
公开(公告)号:US20250159080A1
公开(公告)日:2025-05-15
申请号:US19023199
申请日:2025-01-15
Applicant: Pindrop Security, Inc.
Inventor: John Cornwell , Terry Nelms, II
IPC: H04M3/51 , G06F18/214 , H04M3/22 , H04M3/42
Abstract: Embodiments described herein provide for passive caller verification and/or passive fraud risk assessments for calls to customer call centers. Systems and methods may be used in real time as a call is coming into a call center. An analytics server of an analytics service looks at the purported Caller ID of the call, as well as the unaltered carrier metadata, which the analytics server then uses to generate or retrieve one or more probability scores using one or more lookup tables and/or a machine-learning model. A probability score indicates the likelihood that information derived using the Caller ID information has occurred or should occur given the carrier metadata received with the inbound call. The one or more probability scores be used to generate a risk score for the current call that indicates the probability of the call being valid (e.g., originated from a verified caller or calling device, non-fraudulent).
-
公开(公告)号:US12256040B2
公开(公告)日:2025-03-18
申请号:US18317799
申请日:2023-05-15
Applicant: PINDROP SECURITY, INC.
Inventor: Payas Gupta
Abstract: A method of obtaining and automatically providing secure authentication information includes registering a client device over a data line, storing information and a changeable value for authentication in subsequent telephone-only transactions. In the subsequent transactions, a telephone call placed from the client device to an interactive voice response server is intercepted and modified to include dialing of a delay and at least a passcode, the passcode being based on the unique information and the changeable value, where the changeable value is updated for every call session. The interactive voice response server forwards the passcode and a client device identifier to an authentication function, which compares the received passcode to plural passcodes generated based on information and iterations of a value stored in correspondence with the client device identifier. Authentication is confirmed when a generated passcode matches the passcode from the client device.
-
-
-
-
-
-
-
-
-