-
公开(公告)号:US10904643B2
公开(公告)日:2021-01-26
申请号:US16378286
申请日:2019-04-08
Applicant: PINDROP SECURITY, INC.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
IPC: H04M1/56 , H04M15/06 , H04Q3/70 , H04M3/22 , H04M7/12 , H04Q1/45 , G10L25/51 , H04L25/02 , H04M3/493
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
公开(公告)号:US10362172B2
公开(公告)日:2019-07-23
申请号:US15880287
申请日:2018-01-25
Applicant: PINDROP SECURITY, INC.
Inventor: Scott Strong , Kailash Patil , David Dewey , Raj Bandyopadhyay , Telvis Calhoun , Vijay Balasubramaniyan
Abstract: Systems and methods for call detail record (CDR) analysis to determine a risk score for a call and identify fraudulent activity and for fraud detection in Interactive Voice Response (IVR) systems. An example method may store information extracted from received calls. Queries of the stored information may be performed to select data using keys, wherein each key relates to one of the received calls, and wherein the queries are parallelized. The selected data may be transformed into feature vectors, wherein each feature vector relates to one of the received calls and includes a velocity feature and at least one of a behavior feature or a reputation feature. A risk score for the call may be generated during the call based on the feature vectors.
-
公开(公告)号:US10027816B2
公开(公告)日:2018-07-17
申请号:US15445569
申请日:2017-02-28
Applicant: PINDROP SECURITY, INC.
Inventor: Payas Gupta , David Dewey
Abstract: The invention may verify calls to a telephone device by activating call forwarding to redirect calls for the telephone device to a prescribed destination; receiving a message from a server verifying the call; deactivating call forwarding to receive the call; and reactivating call forwarding when the call is concluded. In another embodiment, the invention may, in response to a telephone device initiating a call to a second telephone device installed with a particular application or software, transmit a message to a server causing it to instruct the second telephone device to deactivate call forwarding. In yet another embodiment, the invention may cause a server to receive a message from a prescribed location indicating that a call was received via call forwarding, and in response to the message, transmit an instruction to the intended recipient to deactivate the call forwarding if the call is verified as legitimate.
-
公开(公告)号:US09883040B2
公开(公告)日:2018-01-30
申请号:US15294538
申请日:2016-10-14
Applicant: PINDROP SECURITY, INC.
Inventor: Scott Strong , Kailash Patil , David Dewey , Raj Bandyopadhyay , Telvis Calhoun , Vijay Balasubramaniyan
CPC classification number: H04M3/527 , G06F21/32 , G06F21/552 , G06N99/005 , H04M3/493 , H04M7/0078 , H04M15/41 , H04M2203/551 , H04M2203/6027 , H04W12/12
Abstract: Systems and methods for call detail record (CDR) analysis to determine a risk score for a call and identify fraudulent activity and for fraud detection in Interactive Voice Response (IVR) systems. An example method may store information extracted from received calls. Queries of the stored information may be performed to select data using keys, wherein each key relates to one of the received calls, and wherein the queries are parallelized. The selected data may be transformed into feature vectors, wherein each feature vector relates to one of the received calls and includes a velocity feature and at least one of a behavior feature or a reputation feature. A risk score for the call may be generated during the call based on the feature vectors.
-
公开(公告)号:US20220337924A1
公开(公告)日:2022-10-20
申请号:US17857618
申请日:2022-07-05
Applicant: Pindrop Security, Inc.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
公开(公告)号:US09930186B2
公开(公告)日:2018-03-27
申请号:US15294576
申请日:2016-10-14
Applicant: PINDROP SECURITY, INC.
Inventor: Raj Bandyopadhyay , Kailash Patil , David Dewey , Scott Strong , Telvis Calhoun , Vijay Balasubramaniyan
CPC classification number: H04M3/527 , G06F21/32 , G06F21/552 , G06N99/005 , H04M3/493 , H04M7/0078 , H04M15/41 , H04M2203/551 , H04M2203/6027 , H04W12/12
Abstract: Systems and methods for call detail record (CDR) analysis to determine a risk score for a call and identify fraudulent activity and for fraud detection in Interactive Voice Response (IVR) systems. An example method may store information extracted from received calls. Queries of the stored information may be performed to select data using keys, wherein each key relates to one of the received calls, and wherein the queries are parallelized. The selected data may be transformed into feature vectors, wherein each feature vector relates to one of the received calls and includes a velocity feature and at least one of a behavior feature or a reputation feature. A risk score for the call may be generated during the call based on the feature vectors.
-
公开(公告)号:US10666792B1
公开(公告)日:2020-05-26
申请号:US15217780
申请日:2016-07-22
Applicant: PINDROP SECURITY, INC.
Inventor: Aude Marzuoli , Hassan Kingravi , David Dewey
Abstract: Methods and systems for detecting new calls from an existing spam or robocaller and aggregating calls that originate from the same infrastructure using a telephony honeypot are disclosed. An example method may receive a telephone call to a telephony honeypot and store metadata and a call audio recording associated with the telephone call. A transcript may be created of the call audio recording. Audio features may be extracted from the call audio recording. The transcript may be compared to other previously-received transcripts in order to determine a similarity between the call and previously-received calls. Audio features and metadata may also be compared to determine whether the call is similar to other previously-received calls. If a call is similar, the call may be identified with the same spam campaign or robocaller as the similar, previously-received call.
-
公开(公告)号:US10375248B2
公开(公告)日:2019-08-06
申请号:US16026498
申请日:2018-07-03
Applicant: PINDROP SECURITY, INC.
Inventor: Payas Gupta , David Dewey
Abstract: The invention may verify calls to a telephone device by activating call forwarding to redirect calls for the telephone device to a prescribed destination; receiving a message from a server verifying the call; deactivating call forwarding to receive the call; and reactivating call forwarding when the call is concluded. In another embodiment, the invention may, in response to a telephone device initiating a call to a second telephone device installed with a particular application or software, transmit a message to a server causing it to instruct the second telephone device to deactivate call forwarding. In yet another embodiment, the invention may cause a server to receive a message from a prescribed location indicating that a call was received via call forwarding, and in response to the message, transmit an instruction to the intended recipient to deactivate the call forwarding if the call is verified as legitimate.
-
公开(公告)号:US10257591B2
公开(公告)日:2019-04-09
申请号:US15600625
申请日:2017-05-19
Applicant: PINDROP SECURITY, INC.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
IPC: H04M1/56 , H04M15/06 , H04Q3/70 , G10L25/51 , H04L25/02 , H04M3/493 , H04M3/22 , H04M7/12 , H04Q1/45
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
公开(公告)号:US20240323270A1
公开(公告)日:2024-09-26
申请号:US18680327
申请日:2024-05-31
Applicant: Pindrop Security, Inc.
Inventor: Nick Gaubitch , Scott Strong , John Cornwell , Hassan Kingravi , David Dewey
CPC classification number: H04M1/56 , H04L25/0202 , H04M3/2281 , H04M3/493 , H04M7/1295 , H04Q1/45 , H04Q3/70 , G10L25/51 , H04M2201/18 , H04M2203/60 , H04Q2213/13139 , H04Q2213/13405 , H04Q2213/13515
Abstract: Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.
-
-
-
-
-
-
-
-
-