-
公开(公告)号:US11895264B2
公开(公告)日:2024-02-06
申请号:US17365970
申请日:2021-07-01
Applicant: PINDROP SECURITY, INC.
Inventor: Kedar Phatak , Jayaram Raghuram
CPC classification number: H04M3/2281 , G06N20/00 , H04L63/1483
Abstract: Embodiments described herein provide for a fraud detection engine for detecting various types of fraud at a call center and a fraud importance engine for tailoring the fraud detection operations to relative importance of fraud events. Fraud importance engine determines which fraud events are comparative more important than others. The fraud detection engine comprises machine-learning models that consume contact data and fraud importance information for various anti-fraud processes. The fraud importance engine calculates importance scores for fraud events based on user-customized attributes, such as fraud-type or fraud activity. The fraud importance scores are used in various processes, such as model training, model selection, and selecting weights or hyper-parameters for the ML models, among others. The fraud detection engine uses the importance scores to prioritize fraud alerts for review. The fraud importance engine receives detection feedback, which contacts involved false negatives, where fraud events were undetected but should have been detected.
-
公开(公告)号:US20230284016A1
公开(公告)日:2023-09-07
申请号:US18117134
申请日:2023-03-03
Applicant: PINDROP SECURITY, INC.
Inventor: MohammedAli Merchant , Yitao Sun
IPC: H04W12/069 , H04W12/40 , H04W12/72
CPC classification number: H04W12/069 , H04W12/40 , H04W12/72
Abstract: Embodiments described herein provide for evaluating call metadata and certificates of inbound calls for authentication. The computer identifies a service provider indicated by the SPID and/or the ANI (or other identifier) of the metadata and identifies a service provider indicated by the SPID and/or ANI (or other identifier) of the certificate, then compares identities of the service providers and/or compares the data values associated with the service providers (e.g., SPIDs, ANIs). Based on this comparison, the computer determines whether the service provider that signed the certificate is first-party signer (e.g., carrier) for the ANI or a third-party signer that is signing certificates as the first-party signer for the ANI.
-
公开(公告)号:US11748463B2
公开(公告)日:2023-09-05
申请号:US17157837
申请日:2021-01-25
Applicant: PINDROP SECURITY, INC.
Inventor: Scott Strong , Kailash Patil , David Dewey , Raj Bandyopadhyay , Telvis Calhoun , Vijay Balasubramaniyan
IPC: G06F21/32 , G06N20/00 , G06F21/55 , H04M3/493 , H04W12/128 , H04M3/527 , H04M15/00 , H04W12/12 , H04M7/00
CPC classification number: G06F21/32 , G06F21/552 , G06N20/00 , H04M3/493 , H04M3/527 , H04M15/41 , H04W12/12 , H04W12/128 , H04M7/0078 , H04M2203/551 , H04M2203/6027
Abstract: Systems and methods for call detail record (CDR) analysis to determine a risk score for a call and identify fraudulent activity and for fraud detection in Interactive Voice Response (IVR) systems. An example method may store information extracted from received calls. Queries of the stored information may be performed to select data using keys, wherein each key relates to one of the received calls, and wherein the queries are parallelized. The selected data may be transformed into feature vectors, wherein each feature vector relates to one of the received calls and includes a velocity feature and at least one of a behavior feature or a reputation feature. A risk score for the call may be generated during the call based on the feature vectors.
-
74.
公开(公告)号:US20230262161A1
公开(公告)日:2023-08-17
申请号:US18109095
申请日:2023-02-13
Applicant: Pindrop Security, Inc.
Inventor: Mohammed Ali Merchant , Yitao Sun
CPC classification number: H04M3/42059 , H04M3/2281 , H04M3/42357 , H04M2203/6027
Abstract: Embodiments described herein provide for systems and methods for verifying authentic JIPs associated with ANIs using CLLIs known to be associated with the ANIs, allowing a computer to authenticate calls using the verified JIPs, among various factors. The computer builds a trust model for JIPs by correlating unique CLLIs to JIPs. A malicious actor might spoof numerous ANIs mapped to a single CLLI, but the malicious actor is unlikely to spoof multiple CLLIs due to the complexity of spoofing the volumes of ANIs associated with multiple CLLIs, so the CLLIs can be trusted when determining whether a JIP is authentic. The computer identifies an authentic JIP when the trust model indicates that a number of CLLIs associated with the JIP satisfies one or more thresholds. A machine-learning architecture references the fact that the JIP is authentic as an authentication factor for downstream call authentication functions.
-
公开(公告)号:US20230254403A1
公开(公告)日:2023-08-10
申请号:US18301897
申请日:2023-04-17
Applicant: PINDROP SECURITY, INC.
Inventor: Ricardo CASAL , Theo WALKER , Kailash PATIL , John CORNWELL
IPC: H04M3/22 , G06N20/00 , G06F18/214
CPC classification number: H04M3/2281 , G06N20/00 , G06F18/214 , H04M2203/551 , H04M2203/556
Abstract: Embodiments described herein provide for performing a risk assessment using graph-derived features of a user interaction. A computer receives interaction information and infers information from the interaction based on information provided to the computer by a communication channel used in transmitting the interaction information. The computer may determine a claimed identity of the user associated with the user interaction. The computer may extract features from the inferred identity and claimed identity. The computer generates a graph representing the structural relationship between the communication channels and claimed identities associated with the inferred identity and claimed identity. The computer may extract additional features from the inferred identity and claimed identity using the graph. The computer may apply the features to a machine learning model to generate a risk score indicating the probability of a fraudulent interaction associated with the user interaction.
-
公开(公告)号:US20230015189A1
公开(公告)日:2023-01-19
申请号:US17953156
申请日:2022-09-26
Applicant: Pindrop Security, Inc.
Inventor: David Looney , Nikolay D. Gaubitch
Abstract: A computer may train a single-class machine learning using normal speech recordings. The machine learning model or any other model may estimate the normal range of parameters of a physical speech production model based on the normal speech recordings. For example, the computer may use a source-filter model of speech production, where voiced speech is represented by a pulse train and unvoiced speech by a random noise and a combination of the pulse train and the random noise is passed through an auto-regressive filter that emulates the human vocal tract. The computer leverages the fact that intentional modification of human voice introduces errors to source-filter model or any other physical model of speech production. The computer may identify anomalies in the physical model to generate a voice modification score for an audio signal. The voice modification score may indicate a degree of abnormality of human voice in the audio signal.
-
公开(公告)号:US11495244B2
公开(公告)日:2022-11-08
申请号:US16375785
申请日:2019-04-04
Applicant: PINDROP SECURITY, INC.
Inventor: David Looney , Nikolay D. Gaubitch
Abstract: A computer may train a single-class machine learning using normal speech recordings. The machine learning model or any other model may estimate the normal range of parameters of a physical speech production model based on the normal speech recordings. For example, the computer may use a source-filter model of speech production, where voiced speech is represented by a pulse train and unvoiced speech by a random noise and a combination of the pulse train and the random noise is passed through an auto-regressive filter that emulates the human vocal tract. The computer leverages the fact that intentional modification of human voice introduces errors to source-filter model or any other physical model of speech production. The computer may identify anomalies in the physical model to generate a voice modification score for an audio signal. The voice modification score may indicate a degree of abnormality of human voice in the audio signal.
-
公开(公告)号:US11488605B2
公开(公告)日:2022-11-01
申请号:US16907951
申请日:2020-06-22
Applicant: PINDROP SECURITY, INC.
Inventor: Elie Khoury , Parav Nagarsheth , Kailash Patil , Matthew Garland
IPC: G10L17/02 , G10L17/04 , G10L25/24 , G10L17/18 , G10L19/02 , G10L17/06 , G10L17/00 , G10L25/51 , G10L25/30
Abstract: An automated speaker verification (ASV) system incorporates a first deep neural network to extract deep acoustic features, such as deep CQCC features, from a received voice sample. The deep acoustic features are processed by a second deep neural network that classifies the deep acoustic features according to a determined likelihood of including a spoofing condition. A binary classifier then classifies the voice sample as being genuine or spoofed.
-
公开(公告)号:US11470194B2
公开(公告)日:2022-10-11
申请号:US16992789
申请日:2020-08-13
Applicant: PINDROP SECURITY, INC.
Inventor: John Cornwell , Terry Nelms, II
Abstract: Embodiments described herein provide for passive caller verification and/or passive fraud risk assessments for calls to customer call centers. Systems and methods may be used in real time as a call is coming into a call center. An analytics server of an analytics service looks at the purported Caller ID of the call, as well as the unaltered carrier metadata, which the analytics server then uses to generate or retrieve one or more probability scores using one or more lookup tables and/or a machine-learning model. A probability score indicates the likelihood that information derived using the Caller ID information has occurred or should occur given the carrier metadata received with the inbound call. The one or more probability scores be used to generate a risk score for the current call that indicates the probability of the call being valid (e.g., originated from a verified caller or calling device, non-fraudulent).
-
公开(公告)号:US11388490B2
公开(公告)日:2022-07-12
申请号:US17157848
申请日:2021-01-25
Applicant: PINDROP SECURITY, INC.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
IPC: H04M1/56 , H04M15/06 , H04Q3/70 , H04M3/22 , H04M7/12 , H04Q1/45 , G10L25/51 , H04L25/02 , H04M3/493
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
-
-
-
-
-
-
-
-