-
公开(公告)号:US20230007120A1
公开(公告)日:2023-01-05
申请号:US17943893
申请日:2022-09-13
Applicant: Pindrop Security, Inc.
Inventor: Lance Douglas
Abstract: Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
-
公开(公告)号:US20220301569A1
公开(公告)日:2022-09-22
申请号:US17746832
申请日:2022-05-17
Applicant: Pindrop Security, Inc.
Inventor: Elie KHOURY , Matthew GARLAND
IPC: G10L17/26 , H04L9/40 , G06F21/32 , G06K9/62 , G10L25/30 , G10L17/18 , G10L17/04 , G10L15/26 , G06V40/10 , G06V40/16
Abstract: A score indicating a likelihood that a first subject is the same as a second subject may be calibrated to compensate for aging of the first subject between samples of age-sensitive biometric characteristics. Age of the first subject obtained at a first sample time and age of the second subject obtained at a second sample time may be averaged, and an age approximation may be generated based on at least the age average and an interval between the first and second samples. The age approximation, the interval between the first and second sample times, and an obtained gender of the subject are used to calibrate the likelihood score.
-
公开(公告)号:US11445060B2
公开(公告)日:2022-09-13
申请号:US16927464
申请日:2020-07-13
Applicant: PINDROP SECURITY, INC.
Inventor: Lance Douglas
Abstract: Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
-
公开(公告)号:US20220070292A1
公开(公告)日:2022-03-03
申请号:US17201849
申请日:2021-03-15
Applicant: PINDROP SECURITY, INC.
Inventor: Ricardo CASAL , Theo WALKER , Kailash PATIL , John CORNWELL
Abstract: Embodiments described herein provide for performing a risk assessment using graph-derived features of a user interaction. A computer receives interaction information and infers information from the interaction based on information provided to the computer by a communication channel used in transmitting the interaction information. The computer may determine a claimed identity of the user associated with the user interaction. The computer may extract features from the inferred identity and claimed identity. The computer generates a graph representing the structural relationship between the communication channels and claimed identities associated with the inferred identity and claimed identity. The computer may extract additional features from the inferred identity and claimed identity using the graph. The computer may apply the features to a machine learning model to generate a risk score indicating the probability of a fraudulent interaction associated with the user interaction.
-
15.
公开(公告)号:US20210280171A1
公开(公告)日:2021-09-09
申请号:US17192464
申请日:2021-03-04
Applicant: PINDROP SECURITY, INC.
Inventor: Kedar PHATAK , Elie KHOURY
Abstract: Embodiments described herein provide for audio processing operations that evaluate characteristics of audio signals that are independent of the speaker's voice. A neural network architecture trains and applies discriminatory neural networks tasked with modeling and classifying speaker-independent characteristics. The task-specific models generate or extract feature vectors from input audio data based on the trained embedding extraction models. The embeddings from the task-specific models are concatenated to form a deep-phoneprint vector for the input audio signal. The DP vector is a low dimensional representation of the each of the speaker-independent characteristics of the audio signal and applied in various downstream operations.
-
公开(公告)号:US20210110813A1
公开(公告)日:2021-04-15
申请号:US17066210
申请日:2020-10-08
Applicant: PINDROP SECURITY, INC.
Inventor: Elie KHOURY , Ganesh SIVARAMAN , Tianxiang CHEN , Amruta VIDWANS
Abstract: Described herein are systems and methods for improved audio analysis using a computer-executed neural network having one or more in-network data augmentation layers. The systems described herein help ease or avoid unwanted strain on computing resources by employing the data augmentation techniques within the layers of the neural network. The in-network data augmentation layers will produce various types of simulated audio data when the computer applies the neural network on an inputted audio signal during a training phase, enrollment phase, and/or testing phase. Subsequent layers of the neural network (e.g., convolutional layer, pooling layer, data augmentation layer) ingest the simulated audio data and the inputted audio signal and perform various operations.
-
公开(公告)号:US20210058507A1
公开(公告)日:2021-02-25
申请号:US16992789
申请日:2020-08-13
Applicant: PINDROP SECURITY, INC.
Inventor: John CORNWELL , Terry NELMS, II
Abstract: Embodiments described herein provide for passive caller verification and/or passive fraud risk assessments for calls to customer call centers. Systems and methods may be used in real time as a call is coming into a call center. An analytics server of an analytics service looks at the purported Caller ID of the call, as well as the unaltered carrier metadata, which the analytics server then uses to generate or retrieve one or more probability scores using one or more lookup tables and/or a machine-learning model. A probability score indicates the likelihood that information derived using the Caller ID information has occurred or should occur given the carrier metadata received with the inbound call. The one or more probability scores be used to generate a risk score for the current call that indicates the probability of the call being valid (e.g., originated from a verified caller or calling device, non-fraudulent).
-
公开(公告)号:US10904643B2
公开(公告)日:2021-01-26
申请号:US16378286
申请日:2019-04-08
Applicant: PINDROP SECURITY, INC.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
IPC: H04M1/56 , H04M15/06 , H04Q3/70 , H04M3/22 , H04M7/12 , H04Q1/45 , G10L25/51 , H04L25/02 , H04M3/493
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
公开(公告)号:US20200294510A1
公开(公告)日:2020-09-17
申请号:US16889337
申请日:2020-06-01
Applicant: PINDROP SECURITY, INC.
Inventor: Elie KHOURY , Matthew GARLAND
IPC: G10L17/26 , G10L15/26 , H04L29/06 , G06K9/00 , G06F21/32 , G06K9/62 , G10L25/30 , G10L17/18 , G10L17/04
Abstract: A score indicating a likelihood that a first subject is the same as a second subject may be calibrated to compensate for aging of the first subject between samples of age-sensitive biometric characteristics. Age of the first subject obtained at a first sample time and age of the second subject obtained at a second sample time may be averaged, and an age approximation may be generated based on at least the age average and an interval between the first and second samples. The age approximation, the interval between the first and second sample times, and an obtained gender of the subject are used to calibrate the likelihood score.
-
公开(公告)号:US20200252506A1
公开(公告)日:2020-08-06
申请号:US16784071
申请日:2020-02-06
Applicant: PINDROP SECURITY, INC.
Inventor: AKANKSHA , Terry NELMS, II , Kailash PATIL , Chirag TAILOR , Khaled LAKHDHAR
Abstract: Embodiments described herein provide for detecting whether an Automatic Number Identification (ANI) associated with an incoming call is a gateway, according to rules-based models and machine learning models generated by the computer using call data stored in one or more databases.
-
-
-
-
-
-
-
-
-