Systems and methods for prioritizing emergency calls

    公开(公告)号:US11659093B2

    公开(公告)日:2023-05-23

    申请号:US17837094

    申请日:2022-06-10

    Applicant: NICE LTD.

    Abstract: Systems for and methods of determining the priority of a call interaction include receiving a call interaction from a call center; validating, by a validation and transcription engine, that the call interaction is authentic; converting, by the validation and transcription engine, the call interaction into text; extracting, by a data calculation engine, organization, location, and time information from the text; calculating, by the data calculation engine, a priority of the call interaction from the extracted information and the text by determining an important of words in the text and correlating the words to a priority class using a pre-trained algorithm that is trained on emergency-type and emergency services-type language; determining that the call interaction should be transmitted to a queue of the call center for initial handling by a call center agent; and transmitting the call interaction, the calculated priority, and the extracted information to the call center.

    Computerized monitoring of digital audio signals

    公开(公告)号:US11545159B1

    公开(公告)日:2023-01-03

    申请号:US17344650

    申请日:2021-06-10

    Applicant: NICE LTD.

    Abstract: A digital audio quality monitoring device uses a deep neural network (DNN) to provide accurate estimates of signal-to-noise ratio (SNR) from a limited set of features extracted from incoming audio. Some embodiments improve the SNR estimate accuracy by selecting a DNN model from a plurality of available models based on a codec used to compress/decompress the incoming audio. Each model has been trained on audio compressed/decompressed by a codec associated with the model, and the monitoring device selects the model associated with the codec used to compress/decompress the incoming audio. Other embodiments are also provided.

    Method and system for fraud clustering by content and biometrics analysis

    公开(公告)号:US10911600B1

    公开(公告)日:2021-02-02

    申请号:US16740518

    申请日:2020-01-13

    Applicant: NICE LTD

    Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) collecting call interaction; (ii) storing the collected call interactions; (iii) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (iv) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa, (v) enabling a user to repeat steps (iii) and (iv); (vi) retrieving from the ranked clusters, a list of fraudsters; and transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.

    Method and system for separating and authenticating speech of a speaker on an audio stream of speakers

    公开(公告)号:US11646038B2

    公开(公告)日:2023-05-09

    申请号:US17099803

    申请日:2020-11-17

    Applicant: NICE LTD

    CPC classification number: G10L17/22

    Abstract: A method for separating and authenticating speech of a speaker on an audio stream of speakers over an audio channel may include receiving audio stream data of the audio stream with speech from a speaker to be authenticated speaking with a second speaker. A voiceprint may be generated for each data chunk in the audio stream data divided into a plurality of data chunks. The voiceprint for each data chunk may be assessed as to whether the voiceprint has speech belonging to the speaker to be authenticated or to the second speaker using representative voiceprints of both speakers. An accumulated voiceprint may be generated using the verified data chunks with speech of the speaker to be authenticated. The accumulated voiceprint may be compared to the reference voiceprint of the speaker to be authenticated for authenticating the speaker speaking with the second speaker over the audio channel.

    Method for training a spoofing detection model using biometric clustering

    公开(公告)号:US11606461B2

    公开(公告)日:2023-03-14

    申请号:US17112352

    申请日:2020-12-04

    Applicant: NICE LTD.

    Abstract: Systems for and methods of training a spoofing detection model include receiving a plurality of customer call interactions; classifying each of the plurality of customer call interactions as a spoofed call or a non-spoofed call using a spoofing detection model; generating a voiceprint for each of the plurality of customer call interactions; comparing the generated voiceprints; grouping the generated voiceprints into one or more clusters based on the comparing, wherein each cluster represents a single speaker; locating a cluster containing a spoofed call and a non-spoofed call, thereby indicating that the non-spoofed call was misclassified by the spoofing detection model; and updating the spoofing detection model with the non-spoofed call.

    Graph-based approach for voice authentication

    公开(公告)号:US11031016B2

    公开(公告)日:2021-06-08

    申请号:US16453497

    申请日:2019-06-26

    Applicant: NICE LTD.

    Abstract: Methods for voice authentication include receiving a plurality of mono telephonic interactions between customers and agents; creating a mapping of the plurality of mono telephonic interactions that illustrates which agent interacted with which customer in each of the interactions; determining how many agents each customer interacted with; identifying one or more customers an agent has interacted with that have the fewest interactions with other agents; and selecting a predetermined number of interactions of the agent with each of the identified customers. In some embodiments, the methods further include creating a voice print from first and second speaker components of each interaction; comparing the voice prints of a first selected interaction to the voice prints from a second selected interaction; calculating a similarity score between the voice prints; aggregating scores; and identifying the voice prints that are associated with the agent.

Patent Agency Ranking