Call authentication using call forwarding

    公开(公告)号:US10375248B2

    公开(公告)日:2019-08-06

    申请号:US16026498

    申请日:2018-07-03

    Abstract: The invention may verify calls to a telephone device by activating call forwarding to redirect calls for the telephone device to a prescribed destination; receiving a message from a server verifying the call; deactivating call forwarding to receive the call; and reactivating call forwarding when the call is concluded. In another embodiment, the invention may, in response to a telephone device initiating a call to a second telephone device installed with a particular application or software, transmit a message to a server causing it to instruct the second telephone device to deactivate call forwarding. In yet another embodiment, the invention may cause a server to receive a message from a prescribed location indicating that a call was received via call forwarding, and in response to the message, transmit an instruction to the intended recipient to deactivate the call forwarding if the call is verified as legitimate.

    METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS SIGNALING, EVENTS, AND PARTICIPANTS

    公开(公告)号:US20190141184A1

    公开(公告)日:2019-05-09

    申请号:US16200379

    申请日:2018-11-26

    Inventor: Lance DOUGLAS

    Abstract: Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.

    SYSTEM AND METHOD FOR CLUSTER-BASED AUDIO EVENT DETECTION

    公开(公告)号:US20170372725A1

    公开(公告)日:2017-12-28

    申请号:US15610378

    申请日:2017-05-31

    CPC classification number: G10L25/45 G10L25/27 G10L25/51 G10L25/78

    Abstract: Methods, systems, and apparatuses for audio event detection, where the determination of a type of sound data is made at the cluster level rather than at the frame level. The techniques provided are thus more robust to the local behavior of features of an audio signal or audio recording. The audio event detection is performed by using Gaussian mixture models (GMMs) to classify each cluster or by extracting an i-vector from each cluster. Each cluster may be classified based on an i-vector classification using a support vector machine or probabilistic linear discriminant analysis. The audio event detection significantly reduces potential smoothing error and avoids any dependency on accurate window-size tuning. Segmentation may be performed using a generalized likelihood ratio and a Bayesian information criterion, and the segments may be clustered using hierarchical agglomerative clustering. Audio frames may be clustered using K-means and GMMs.

    Systems and methods for authentication using browser fingerprinting

    公开(公告)号:US12301753B2

    公开(公告)日:2025-05-13

    申请号:US17378567

    申请日:2021-07-16

    Abstract: Embodiments described herein provide for authenticating callers to call centers using browser fingerprinting. A call center system or third-party analytics system includes a server that transmits notifications to a caller device that includes an interactive hyperlink or URL to a particular webpage. When a browser of the caller device navigates to the webpage, the server captures certain types of information about the caller device and generates a browser fingerprint for the caller device. The browser fingerprint is compared against a database of registered browser fingerprints to verify that the caller device of the current call is the registered, expected caller device. The server transmits the notification via any number of communication channels and protocols, such as text messages (e.g., SMS messages, MMS messages), emails, and push notifications associated with client-side software, among others.

    SPEAKER RECOGNITION WITH QUALITY INDICATORS

    公开(公告)号:US20250124945A1

    公开(公告)日:2025-04-17

    申请号:US18989690

    申请日:2024-12-20

    Abstract: Embodiments described herein provide for a machine-learning architecture for modeling quality measures for enrollment signals. Modeling these enrollment signals enables the machine-learning architecture to identify deviations from expected or ideal enrollment signal in future test phase calls. These differences can be used to generate quality measures for the various audio descriptors or characteristics of audio signals. The quality measures can then be fused at the score-level with the speaker recognition's embedding comparisons for verifying the speaker. Fusing the quality measures with the similarity scoring essentially calibrates the speaker recognition's outputs based on the realities of what is actually expected for the enrolled caller and what was actually observed for the current inbound caller.

Patent Agency Ranking