-
公开(公告)号:US20210258423A1
公开(公告)日:2021-08-19
申请号:US17308065
申请日:2021-05-05
Applicant: NICE LTD
Inventor: Levan MICHAELI , Zvika Weingarten , Itay Harel , Roman Frenkel , Matan Keret , Amit Sharon , Sigal Lev
Abstract: A computer-implemented method for analyzing call interactions in an interactions database by a Proactive Fraud Exposure (PFE) engine is provided herein. The computer-implemented method may generate a voiceprint for each call interaction; (ii) use a machine learning technique to group the call interactions into one or more clusters based on respective voiceprints in the voiceprints database; (iii) store the one or more clusters; and (iv) rank and classifying the one or more clusters to yield a list of potential fraudsters. The computer-implemented method may further transmit the list of potential fraudsters to a user to enable the user to review said list of potential fraudsters and to add fraudsters from the list to a watchlist database.
-
公开(公告)号:US11659093B2
公开(公告)日:2023-05-23
申请号:US17837094
申请日:2022-06-10
Applicant: NICE LTD.
Inventor: Roman Frenkel , Tal Raskin , Adi Ben Zeev , Stav Mishory , Dan Teplitski , Hadas Katz
IPC: H04M3/523 , G06F40/295 , G10L15/02 , G10L15/26 , H04M3/51
CPC classification number: H04M3/5235 , G06F40/295 , G10L15/02 , G10L15/26 , H04M3/5116 , H04M3/5166 , H04M3/5183 , H04M2201/405
Abstract: Systems for and methods of determining the priority of a call interaction include receiving a call interaction from a call center; validating, by a validation and transcription engine, that the call interaction is authentic; converting, by the validation and transcription engine, the call interaction into text; extracting, by a data calculation engine, organization, location, and time information from the text; calculating, by the data calculation engine, a priority of the call interaction from the extracted information and the text by determining an important of words in the text and correlating the words to a priority class using a pre-trained algorithm that is trained on emergency-type and emergency services-type language; determining that the call interaction should be transmitted to a queue of the call center for initial handling by a call center agent; and transmitting the call interaction, the calculated priority, and the extracted information to the call center.
-
公开(公告)号:US11545159B1
公开(公告)日:2023-01-03
申请号:US17344650
申请日:2021-06-10
Applicant: NICE LTD.
Inventor: Roman Frenkel , Matan Keret , Michal Daisey Lerer
Abstract: A digital audio quality monitoring device uses a deep neural network (DNN) to provide accurate estimates of signal-to-noise ratio (SNR) from a limited set of features extracted from incoming audio. Some embodiments improve the SNR estimate accuracy by selecting a DNN model from a plurality of available models based on a codec used to compress/decompress the incoming audio. Each model has been trained on audio compressed/decompressed by a codec associated with the model, and the monitoring device selects the model associated with the codec used to compress/decompress the incoming audio. Other embodiments are also provided.
-
公开(公告)号:US10911600B1
公开(公告)日:2021-02-02
申请号:US16740518
申请日:2020-01-13
Applicant: NICE LTD
Inventor: Roman Frenkel , Matan Keret , Roman Shternharts , Itay Kalman Harel , Galya Julya Bar , Yaara Bar , Michal Daisey Momika
Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) collecting call interaction; (ii) storing the collected call interactions; (iii) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (iv) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa, (v) enabling a user to repeat steps (iii) and (iv); (vi) retrieving from the ranked clusters, a list of fraudsters; and transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
-
公开(公告)号:US11895272B2
公开(公告)日:2024-02-06
申请号:US18175253
申请日:2023-02-27
Applicant: NICE LTD.
Inventor: Roman Frenkel , Tal Raskin , Adi Ben Zeev , Stav Mishory , Dan Teplitski , Hadas Katz
IPC: H04M3/523 , G06F40/295 , G10L15/02 , G10L15/26 , H04M3/51
CPC classification number: H04M3/5235 , G06F40/295 , G10L15/02 , G10L15/26 , H04M3/5116 , H04M3/5166 , H04M3/5183 , H04M2201/405
Abstract: Systems for and methods of determining the priority of a call interaction include receiving a call interaction from a call center; validating, by a validation and transcription engine, that the call interaction is authentic; converting, by the validation and transcription engine, the call interaction into text; calculating, by the data calculation engine, a priority of the call interaction from the text and organization, location, and time information in the text by determining an important of words in the text and correlating the words to a priority class using a pre-trained algorithm that is trained on emergency-type and emergency services-type language; determining that the call interaction should be transmitted to the call center for initial handling by a call center agent; and transmitting the call interaction, the calculated priority, and the extracted information to the call center.
-
公开(公告)号:US11800014B2
公开(公告)日:2023-10-24
申请号:US17308065
申请日:2021-05-05
Applicant: NICE LTD
Inventor: Levan Michaeli , Zvika Weingarten , Itay Harel , Roman Frenkel , Matan Keret , Amit Sharon , Sigal Lev
CPC classification number: H04M3/5175 , G06F21/43 , G06N20/00 , G10L15/22 , G10L15/26 , G10L17/00 , G10L17/04 , H04M3/5166 , H04M3/5191 , H04M2203/6027 , H04M2203/6045 , H04M2203/6054
Abstract: A computer-implemented method for analyzing call interactions in an interactions database by a Proactive Fraud Exposure (PFE) engine is provided herein. The computer-implemented method may generate a voiceprint for each call interaction; (ii) use a machine learning technique to group the call interactions into one or more clusters based on respective voiceprints in the voiceprints database; (iii) store the one or more clusters; and (iv) rank and classifying the one or more clusters to yield a list of potential fraudsters. The computer-implemented method may further transmit the list of potential fraudsters to a user to enable the user to review said list of potential fraudsters and to add fraudsters from the list to a watchlist database.
-
公开(公告)号:US11646038B2
公开(公告)日:2023-05-09
申请号:US17099803
申请日:2020-11-17
Applicant: NICE LTD
Inventor: Alon Menahem Shoa , Roman Frenkel , Matan Keret
IPC: G10L17/22
CPC classification number: G10L17/22
Abstract: A method for separating and authenticating speech of a speaker on an audio stream of speakers over an audio channel may include receiving audio stream data of the audio stream with speech from a speaker to be authenticated speaking with a second speaker. A voiceprint may be generated for each data chunk in the audio stream data divided into a plurality of data chunks. The voiceprint for each data chunk may be assessed as to whether the voiceprint has speech belonging to the speaker to be authenticated or to the second speaker using representative voiceprints of both speakers. An accumulated voiceprint may be generated using the verified data chunks with speech of the speaker to be authenticated. The accumulated voiceprint may be compared to the reference voiceprint of the speaker to be authenticated for authenticating the speaker speaking with the second speaker over the audio channel.
-
公开(公告)号:US11606461B2
公开(公告)日:2023-03-14
申请号:US17112352
申请日:2020-12-04
Applicant: NICE LTD.
Inventor: Roman Frenkel , Matan Keret , Amit Sharon
Abstract: Systems for and methods of training a spoofing detection model include receiving a plurality of customer call interactions; classifying each of the plurality of customer call interactions as a spoofed call or a non-spoofed call using a spoofing detection model; generating a voiceprint for each of the plurality of customer call interactions; comparing the generated voiceprints; grouping the generated voiceprints into one or more clusters based on the comparing, wherein each cluster represents a single speaker; locating a cluster containing a spoofed call and a non-spoofed call, thereby indicating that the non-spoofed call was misclassified by the spoofing detection model; and updating the spoofing detection model with the non-spoofed call.
-
公开(公告)号:US11252279B2
公开(公告)日:2022-02-15
申请号:US17376209
申请日:2021-07-15
Applicant: NICE LTD
Inventor: Roman Frenkel , Matan Keret , Roman Shternharts , Itay Kalman Harel , Galya Julya Bar , Yaara Bar , Michal Daisey Momika
Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
-
公开(公告)号:US11031016B2
公开(公告)日:2021-06-08
申请号:US16453497
申请日:2019-06-26
Applicant: NICE LTD.
Inventor: Alon Menahem Shoa , Roman Frenkel , Tamir Caspi
Abstract: Methods for voice authentication include receiving a plurality of mono telephonic interactions between customers and agents; creating a mapping of the plurality of mono telephonic interactions that illustrates which agent interacted with which customer in each of the interactions; determining how many agents each customer interacted with; identifying one or more customers an agent has interacted with that have the fewest interactions with other agents; and selecting a predetermined number of interactions of the agent with each of the identified customers. In some embodiments, the methods further include creating a voice print from first and second speaker components of each interaction; comparing the voice prints of a first selected interaction to the voice prints from a second selected interaction; calculating a similarity score between the voice prints; aggregating scores; and identifying the voice prints that are associated with the agent.
-
-
-
-
-
-
-
-
-