-
1.
公开(公告)号:US20230342771A1
公开(公告)日:2023-10-26
申请号:US18139482
申请日:2023-04-26
Applicant: FMR LLC
Inventor: Eoghan Considine , Luella Gergen Wong , Aidan Fogarty , Rosaleen Gilligan , Shane Tully , Eamonn Fox , Seemanthini Jois , Jenson Joy
CPC classification number: G06Q20/40 , H04M3/2236 , G10L25/66 , G10L25/30
Abstract: Systems and methods are described herein for identifying diminished capacity of a voice call participant based on audio data analysis. A server generates an audio image based on an audio file comprising speech data corresponding to a first user on a voice call. The server determines a diminished capacity score based on one or more characteristics of the audio image analyzed using a deep learning classification model. The server applies a security protocol to an account associated with the first user when the diminished capacity score is at or above a threshold value. The server receives a transaction request corresponding to the account from the first user. The server processes the transaction request based on the security protocol applied to the account.
-
公开(公告)号:US20190180039A1
公开(公告)日:2019-06-13
申请号:US15838691
申请日:2017-12-12
Applicant: FMR LLC
Inventor: Eoghan Considine , John Egan , Anthony Lernihan
Abstract: A computerized method is provided for automatically authorizing an access request from a user to perform a task with respect to a computing application of an application lifecycle management (ALM) system. The computerized method includes receiving, by a computing device, the access request from the user to perform the task with respect to the application in the ALM system and calculating, by the computing device, a risk score associated with the access request. Calculating the risk score includes determining a plurality of factors including: (i) at least one factor associated with the application indicative of an importance level of the application and (ii) at least one factor characterizing technical experience of the user, and computing the risk score as a weighted sum of the plurality of factors. The method further includes determining, by the computing device, whether to authorize the user access request based on the risk score.
-
公开(公告)号:US12039531B2
公开(公告)日:2024-07-16
申请号:US18139482
申请日:2023-04-26
Applicant: FMR LLC
Inventor: Eoghan Considine , Luella Gergen Wong , Aidan Fogarty , Rosaleen Gilligan , Shane Tully , Eamonn Fox , Seemanthini Jois , Jenson Joy
CPC classification number: G06Q20/40 , G10L25/30 , G10L25/66 , H04M3/2236
Abstract: Systems and methods are described herein for identifying diminished capacity of a voice call participant based on audio data analysis. A server generates an audio image based on an audio file comprising speech data corresponding to a first user on a voice call. The server determines a diminished capacity score based on one or more characteristics of the audio image analyzed using a deep learning classification model. The server applies a security protocol to an account associated with the first user when the diminished capacity score is at or above a threshold value. The server receives a transaction request corresponding to the account from the first user. The server processes the transaction request based on the security protocol applied to the account.
-
公开(公告)号:US10803186B2
公开(公告)日:2020-10-13
申请号:US15838691
申请日:2017-12-12
Applicant: FMR LLC
Inventor: Eoghan Considine , John Egan , Anthony Lernihan
Abstract: A computerized method is provided for automatically authorizing an access request from a user to perform a task with respect to a computing application of an application lifecycle management (ALM) system. The computerized method includes receiving, by a computing device, the access request from the user to perform the task with respect to the application in the ALM system and calculating, by the computing device, a risk score associated with the access request. Calculating the risk score includes determining a plurality of factors including: (i) at least one factor associated with the application indicative of an importance level of the application and (ii) at least one factor characterizing technical experience of the user, and computing the risk score as a weighted sum of the plurality of factors. The method further includes determining, by the computing device, whether to authorize the user access request based on the risk score.
-
-
-