-
公开(公告)号:US09883040B2
公开(公告)日:2018-01-30
申请号:US15294538
申请日:2016-10-14
Applicant: PINDROP SECURITY, INC.
Inventor: Scott Strong , Kailash Patil , David Dewey , Raj Bandyopadhyay , Telvis Calhoun , Vijay Balasubramaniyan
CPC classification number: H04M3/527 , G06F21/32 , G06F21/552 , G06N99/005 , H04M3/493 , H04M7/0078 , H04M15/41 , H04M2203/551 , H04M2203/6027 , H04W12/12
Abstract: Systems and methods for call detail record (CDR) analysis to determine a risk score for a call and identify fraudulent activity and for fraud detection in Interactive Voice Response (IVR) systems. An example method may store information extracted from received calls. Queries of the stored information may be performed to select data using keys, wherein each key relates to one of the received calls, and wherein the queries are parallelized. The selected data may be transformed into feature vectors, wherein each feature vector relates to one of the received calls and includes a velocity feature and at least one of a behavior feature or a reputation feature. A risk score for the call may be generated during the call based on the feature vectors.
-
62.
公开(公告)号:US20250095662A1
公开(公告)日:2025-03-20
申请号:US18883681
申请日:2024-09-12
Applicant: Pindrop Security, Inc.
Inventor: David Looney , Nikolay Gaubitch
IPC: G10L19/018 , G10L25/30
Abstract: Embodiments disclosed herein include software processes executed by a computer for encoding and decoding watermarks for a speech signal in a call signal communicated via telephony channels. An encoder uses Linear Predictive Coding (LPC) to analyzes the call signal's spectral envelope and embeds the watermark into the LPC log-spectrum of the speech signal of the call signal. The encoder may reduce the watermark's strength at a formant peak of the speech signal, balancing the watermark's robustness and detectability. A deep decoder includes a neural network architecture trained on watermarked and watermark-free speech signals having various types of degradation to extract a feature vector of a call signal and compute a watermark detection score for one or more frames or for the call signal. At inference time, the deep decoder detects the watermark when the watermark detection score satisfies a detection threshold.
-
公开(公告)号:US20250071200A1
公开(公告)日:2025-02-27
申请号:US18943686
申请日:2024-11-11
Applicant: Pindrop Security, Inc.
Inventor: Lance Douglas
Abstract: Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
-
公开(公告)号:US12143531B2
公开(公告)日:2024-11-12
申请号:US17943893
申请日:2022-09-13
Applicant: Pindrop Security, Inc.
Inventor: Lance Douglas
Abstract: Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
-
公开(公告)号:US12142083B2
公开(公告)日:2024-11-12
申请号:US17503152
申请日:2021-10-15
Applicant: Pindrop Security, Inc.
Inventor: Tianxiang Chen , Elie Khoury
IPC: G06K9/00 , G06F18/21 , G06F18/22 , G06K9/62 , G06V20/40 , G06V40/16 , G06V40/40 , G06V40/70 , G10L17/22
Abstract: The embodiments execute machine-learning architectures for biometric-based identity recognition (e.g., speaker recognition, facial recognition) and deepfake detection (e.g., speaker deepfake detection, facial deepfake detection). The machine-learning architecture includes layers defining multiple scoring components, including sub-architectures for speaker deepfake detection, speaker recognition, facial deepfake detection, facial recognition, and lip-sync estimation engine. The machine-learning architecture extracts and analyzes various types of low-level features from both audio data and visual data, combines the various scores, and uses the scores to determine the likelihood that the audiovisual data contains deepfake content and the likelihood that a claimed identity of a person in the video matches to the identity of an expected or enrolled person. This enables the machine-learning architecture to perform identity recognition and verification, and deepfake detection, in an integrated fashion, for both audio data and visual data.
-
公开(公告)号:US20240363124A1
公开(公告)日:2024-10-31
申请号:US18646431
申请日:2024-04-25
Applicant: Pindrop Security, Inc.
Inventor: Elie KHOURY , Ganesh SIVARAMAN , Tianxiang CHEN , Nikolay GAUBITCH , David LOONEY , Amit GUPTA , Vijay BALASUBRAMANIYAN , Nicholas KLEIN , Anthony STANKUS
Abstract: Disclosed are systems and methods including software processes executed by a server that detect audio-based synthetic speech (“deepfakes”) in a call conversation. Embodiments include systems and methods for detecting fraudulent presentation attacks using multiple functional engines that implement various fraud-detection techniques, to produce calibrated scores and/or fused scores. A computer may, for example, evaluate the audio quality of speech signals within audio signals, where speech signals contain the speech portions having speaker utterances.
-
公开(公告)号:US20240355337A1
公开(公告)日:2024-10-24
申请号:US18388364
申请日:2023-11-09
Applicant: PINDROP SECURITY, INC.
Inventor: Umair Altaf , Sai Pradeep Peri , Lakshay Phatela , Payas Gupta , Yitao Sun , Svetlana Afanaseva , Kailash Patil , Elie Khoury , Bradley Magnetta , Vijay Balasubramaniyan , Tianxiang Chen
IPC: G10L17/24
CPC classification number: G10L17/24
Abstract: Disclosed are systems and methods including software processes executed by a server that detect audio-based synthetic speech (“deepfakes”) in a call conversation. The server applies an NLP engine to transcribe call audio and analyze the text for anomalous patterns to detect synthetic speech. Additionally or alternatively, the server executes a voice “liveness” detection system for detecting machine speech, such as synthetic speech or replayed speech. The system performs phrase repetition detection, background change detection, and passive voice liveness detection in call audio signals to detect liveness of a speech utterance. An automated model update module allows the liveness detection model to adapt to new types of presentation attacks, based on the human provided feedback.
-
公开(公告)号:US20240355336A1
公开(公告)日:2024-10-24
申请号:US18439049
申请日:2024-02-12
Applicant: PINDROP SECURITY, INC.
Inventor: Umair ALTAF , Sai Pradeep PERI , Lakshay PHATELA , Payas GUPTA , Yitao SUN , Svetlana AFANASEVA , Kailash PATIL , Elie KHOURY , Bradley MAGNETTA , Vijay BALASUBRAMANIYAN , Tianxiang CHEN
Abstract: Disclosed are systems and methods including software processes executed by a server that detect audio-based synthetic speech (“deepfakes”) in a call conversation. The server applies an NLP engine to transcribe call audio and analyze the text for anomalous patterns to detect synthetic speech. Additionally or alternatively, the server executes a voice “liveness” detection system for detecting machine speech, such as synthetic speech or replayed speech. The system performs phrase repetition detection, background change detection, and passive voice liveness detection in call audio signals to detect liveness of a speech utterance. An automated model update module allows the liveness detection model to adapt to new types of presentation attacks, based on the human provided feedback.
-
公开(公告)号:US20240323270A1
公开(公告)日:2024-09-26
申请号:US18680327
申请日:2024-05-31
Applicant: Pindrop Security, Inc.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
CPC classification number: H04M1/56 , H04L25/0202 , H04M3/2281 , H04M3/493 , H04M7/1295 , H04Q1/45 , H04Q3/70 , G10L25/51 , H04M2201/18 , H04M2203/60 , H04Q2213/13139 , H04Q2213/13405 , H04Q2213/13515
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
公开(公告)号:US12015731B2
公开(公告)日:2024-06-18
申请号:US17857618
申请日:2022-07-05
Applicant: Pindrop Security, Inc.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
IPC: H04M1/56 , H04L25/02 , H04M3/22 , H04M3/493 , H04M7/12 , H04M15/06 , H04Q1/45 , H04Q3/70 , G10L25/51
CPC classification number: H04M1/56 , H04L25/0202 , H04M3/2281 , H04M3/493 , H04M7/1295 , H04Q1/45 , H04Q3/70 , G10L25/51 , H04M2201/18 , H04M2203/60 , H04Q2213/13139 , H04Q2213/13405 , H04Q2213/13515
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
-
-
-
-
-
-
-
-