-
公开(公告)号:US11675885B2
公开(公告)日:2023-06-13
申请号:US17485647
申请日:2021-09-27
申请人: NICE Ltd.
摘要: In a system and method for audio analysis in a cloud-based computerized an authentication (RTA) manager micro-service may send an audio packet to a voice processor micro-service. The voice processor may extract features of the audio. The RTA manager may obtain the extracted features from the voice processor; calculate, based on the extracted features, a quality grade of the audio packet, and send the extracted features to an at least one voice biometrics engine if the quality grade is above a threshold. Each of the at least one voice biometrics engines may be configured to generate a voiceprint of the audio packet, based on the extracted features of the audio packet and to perform at least one of: authenticate a speaker, detect fraudsters, and enrich a previously stored voiceprint of the speaker with the voiceprint of the audio packet.
-
公开(公告)号:US11625467B2
公开(公告)日:2023-04-11
申请号:US17329425
申请日:2021-05-25
申请人: Nice Ltd.
发明人: Matan Keret , Amnon Buzaglo
摘要: A computerized method for voice authentication of a customer in a self-service system is provided. A request for authentication of the customer is received and the customer is enrolled in the self-service system with a text-independent voice print. A passphrase from a plurality of passphrases to transmit to the customer is determined based on comparing each of the plurality of passphrases to a text-dependent or text-independent voice biometric model. The passphrase is transmitted to the customer, and when the customer responds, an audio stream of the passphrase is received. The customer is authenticated by comparing the audio stream of the passphrase against the text-independent voice print. If the customer is authenticated, then the audio stream of the passphrase and the topic of the passphrase may be stored.
-
公开(公告)号:US20210258423A1
公开(公告)日:2021-08-19
申请号:US17308065
申请日:2021-05-05
申请人: NICE LTD
发明人: Levan MICHAELI , Zvika Weingarten , Itay Harel , Roman Frenkel , Matan Keret , Amit Sharon , Sigal Lev
摘要: A computer-implemented method for analyzing call interactions in an interactions database by a Proactive Fraud Exposure (PFE) engine is provided herein. The computer-implemented method may generate a voiceprint for each call interaction; (ii) use a machine learning technique to group the call interactions into one or more clusters based on respective voiceprints in the voiceprints database; (iii) store the one or more clusters; and (iv) rank and classifying the one or more clusters to yield a list of potential fraudsters. The computer-implemented method may further transmit the list of potential fraudsters to a user to enable the user to review said list of potential fraudsters and to add fraudsters from the list to a watchlist database.
-
公开(公告)号:US11545159B1
公开(公告)日:2023-01-03
申请号:US17344650
申请日:2021-06-10
申请人: NICE LTD.
发明人: Roman Frenkel , Matan Keret , Michal Daisey Lerer
摘要: A digital audio quality monitoring device uses a deep neural network (DNN) to provide accurate estimates of signal-to-noise ratio (SNR) from a limited set of features extracted from incoming audio. Some embodiments improve the SNR estimate accuracy by selecting a DNN model from a plurality of available models based on a codec used to compress/decompress the incoming audio. Each model has been trained on audio compressed/decompressed by a codec associated with the model, and the monitoring device selects the model associated with the codec used to compress/decompress the incoming audio. Other embodiments are also provided.
-
公开(公告)号:US20220232035A1
公开(公告)日:2022-07-21
申请号:US17711228
申请日:2022-04-01
申请人: NICE LTD.
发明人: Matan Keret , Itay Harel , Amit Sharon
IPC分类号: H04L9/40
摘要: Systems and methods for generating and implementing a real-time multi-factor authentication policy across multiple channels, are configured to: during a pre-authentication stage: receive, via a user interface, information defining one or more scenarios; receive, via the user interface, information defining one or more authentication flows; for each of the one or more scenarios, map one of the one or more authentication flows to a given scenario; and generate a multi-factor authentication policy associated with each of the one or more scenarios; and during a real-time authentication stage: upon receiving an interaction, identify, by a decision engine, a relevant scenario of the one or more scenarios; implement, by the decision engine, the multi-factor authentication policy associated with the relevant scenario; and determine, by the decision engine, an authentication result.
-
公开(公告)号:US11336682B2
公开(公告)日:2022-05-17
申请号:US16506683
申请日:2019-07-09
申请人: NICE LTD.
发明人: Matan Keret , Itay Harel , Amit Sharon
摘要: Systems and methods for generating and implementing a real-time multi-factor authentication policy across multiple channels, are configured to: during a pre-authentication stage: receive, via a user interface, information defining one or more scenarios; receive, via the user interface, information defining one or more authentication flows; for each of the one or more scenarios, map one of the one or more authentication flows to a given scenario; and generate a multi-factor authentication policy associated with each of the one or more scenarios; and during a real-time authentication stage: upon receiving an interaction, identify, by a decision engine, a relevant scenario of the one or more scenarios; implement, by the decision engine, the multi-factor authentication policy associated with the relevant scenario; and determine, by the decision engine, an authentication result.
-
公开(公告)号:US10911600B1
公开(公告)日:2021-02-02
申请号:US16740518
申请日:2020-01-13
申请人: NICE LTD
发明人: Roman Frenkel , Matan Keret , Roman Shternharts , Itay Kalman Harel , Galya Julya Bar , Yaara Bar , Michal Daisey Momika
摘要: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) collecting call interaction; (ii) storing the collected call interactions; (iii) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (iv) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa, (v) enabling a user to repeat steps (iii) and (iv); (vi) retrieving from the ranked clusters, a list of fraudsters; and transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
-
公开(公告)号:US10255923B2
公开(公告)日:2019-04-09
申请号:US15660452
申请日:2017-07-26
申请人: NICE LTD.
发明人: Matan Keret , Omer Kochba , Amnon Buzaglo
摘要: Methods and systems for transforming a text-independent enrolment of a customer in a self-service system into a text-dependent enrolment are provided. A request for authentication of a customer that is enrolled in the self-service system with a text-independent voice print is received. A request is transmitted to the customer to repeat a passphrase and the customer's response is received as an audio stream of the passphrase. The customer is authenticated by comparing the audio stream of the passphrase against the text-independent voice print and if the customer is authenticated then a text-dependent voice print is created based on the passphrase, otherwise discard the audio stream of the passphrase.
-
公开(公告)号:US11800014B2
公开(公告)日:2023-10-24
申请号:US17308065
申请日:2021-05-05
申请人: NICE LTD
发明人: Levan Michaeli , Zvika Weingarten , Itay Harel , Roman Frenkel , Matan Keret , Amit Sharon , Sigal Lev
CPC分类号: H04M3/5175 , G06F21/43 , G06N20/00 , G10L15/22 , G10L15/26 , G10L17/00 , G10L17/04 , H04M3/5166 , H04M3/5191 , H04M2203/6027 , H04M2203/6045 , H04M2203/6054
摘要: A computer-implemented method for analyzing call interactions in an interactions database by a Proactive Fraud Exposure (PFE) engine is provided herein. The computer-implemented method may generate a voiceprint for each call interaction; (ii) use a machine learning technique to group the call interactions into one or more clusters based on respective voiceprints in the voiceprints database; (iii) store the one or more clusters; and (iv) rank and classifying the one or more clusters to yield a list of potential fraudsters. The computer-implemented method may further transmit the list of potential fraudsters to a user to enable the user to review said list of potential fraudsters and to add fraudsters from the list to a watchlist database.
-
公开(公告)号:US11735188B2
公开(公告)日:2023-08-22
申请号:US17943049
申请日:2022-09-12
申请人: Nice Ltd.
发明人: Matan Keret , Anat Malin , Natan Katz , Shunit Metz , Sigal Lev , Jeremy Hoyland
CPC分类号: G10L17/00 , G06N5/04 , G06N20/00 , G06Q50/265 , G10L17/06 , H04M3/2281 , H04M3/42221 , H04M2201/41 , H04M2203/30 , H04M2203/40 , H04M2203/6027
摘要: A system and method may identify a fraud ring based on call or interaction data by analyzing by a computer processor interaction data including audio recordings to identify clusters of interactions which are suspected of involving fraud each cluster including the same speaker; analyzing by the computer processor the clusters, in combination with metadata associated with the interaction data, to identify fraud rings, each fraud ring describing a plurality of different speakers, each fraud ring defined by a set of speakers and a set of metadata corresponding to interactions including that speaker; and for each fraud ring, creating a relevance value defining the relative relevance of the fraud ring.
-
-
-
-
-
-
-
-
-