-
公开(公告)号:US12282533B2
公开(公告)日:2025-04-22
申请号:US18093064
申请日:2023-01-04
Applicant: Nice Ltd.
Inventor: Maria Michaela Kunin , Cijo Mathew , Jesse Goldblatt
Abstract: A computerized system and method may detect potentially fraudulent events where agent access credentials are used by an unauthorized party, based on calculations, comparisons, and analyses performed using recorded audio data, and execute corrective actions based on calculated results. A computerized system including a processor or a plurality of processors, a communication interface to communicate via a communication network with one or more remote computing devices, and a memory including a data store of a plurality of data items—which may, e.g., describe the remote computing devices and/or interactions involving the remote computing devices—may compare a plurality of voice signatures, which may describe calls from a plurality of remote computers, to a plurality of corresponding voice models—and, if the comparison results in a mismatch, perform a plurality of corrective actions (which may include, e.g., terminating one or more calls involving one or more remote computers).
-
公开(公告)号:US20240220592A1
公开(公告)日:2024-07-04
申请号:US18093064
申请日:2023-01-04
Applicant: Nice Ltd.
Inventor: Maria Michaela KUNIN , Cijo Mathew , Goldblatt Jesse
CPC classification number: G06F21/32 , G06F21/554 , G06F2221/033
Abstract: A computerized system and method may detect potentially fraudulent events where agent access credentials are used by an unauthorized party, based on calculations, comparisons, and analyses performed using recorded audio data, and execute corrective actions based on calculated results. A computerized system including a processor or a plurality of processors, a communication interface to communicate via a communication network with one or more remote computing devices, and a memory including a data store of a plurality of data items—which may, e.g., describe the remote computing devices and/or interactions involving the remote computing devices—may compare a plurality of voice signatures, which may describe calls from a plurality of remote computers, to a plurality of corresponding voice models—and, if the comparison results in a mismatch, perform a plurality of corrective actions (which may include, e.g., terminating one or more calls involving one or more remote computers).
-