-
公开(公告)号:US20230041266A1
公开(公告)日:2023-02-09
申请号:US17393977
申请日:2021-08-04
Applicant: NICE Ltd.
Inventor: Guy EARMAN , Matan Keret , Roman Frenkel
Abstract: A system and method for authenticating a caller may include receiving an incoming call from the caller, determining a gender of the caller, and selecting, based on the determined gender, to search for the caller in one of: a watchlist of untrustworthy female callers, and a watchlist of untrustworthy male callers.
-
公开(公告)号:US20220124198A1
公开(公告)日:2022-04-21
申请号:US17565464
申请日:2021-12-30
Applicant: NICE LTD.
Inventor: Roman FRENKEL , Matan Keret , Roman Shternharts , Itay Kalman Harel , Galya Julya Bar , Yaara Bar , Michal Daisey Momika
Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
-
公开(公告)号:US20220012321A1
公开(公告)日:2022-01-13
申请号:US17485647
申请日:2021-09-27
Applicant: NICE Ltd.
Inventor: Matan Keret , William Mark Finlay , Peter S. Cardillo
Abstract: In a system and method for audio analysis in a cloud-based computerized an authentication (RTA) manager micro-service may send an audio packet to a voice processor micro-service. The voice processor may extract features of the audio. The RTA manager may obtain the extracted features from the voice processor; calculate, based on the extracted features, a quality grade of the audio packet, and send the extracted features to an at least one voice biometrics engine if the quality grade is above a threshold. Each of the at least one voice biometrics engines may be configured to generate a voiceprint of the audio packet, based on the extracted features of the audio packet and to perform at least one of: authenticate a speaker, detect fraudsters, and enrich a previously stored voiceprint of the speaker with the voiceprint of the audio packet.
-
公开(公告)号:US20210358503A1
公开(公告)日:2021-11-18
申请号:US15931892
申请日:2020-05-14
Applicant: Nice Ltd.
Inventor: Matan Keret , Anat Malin , Natan Katz , Shunit Metz , Sigal Lev , Jeremy Hoyland
Abstract: A system and method may identify a fraud ring based on call or interaction data by analyzing by a computer processor interaction data including audio recordings to identify clusters of interactions which are suspected of involving fraud each cluster including the same speaker; analyzing by the computer processor the clusters, in combination with metadata associated with the interaction data, to identify fraud rings, each fraud ring describing a plurality of different speakers, each fraud ring defined by a set of speakers and a set of metadata corresponding to interactions including that speaker; and for each fraud ring, creating a relevance value defining the relative relevance of the fraud ring.
-
公开(公告)号:US11062712B2
公开(公告)日:2021-07-13
申请号:US16785158
申请日:2020-02-07
Applicant: Nice Ltd.
Inventor: Matan Keret , Omer Kochba , Amnon Buzaglo
Abstract: Methods and systems for transforming a text-independent enrollment of a customer in a self-service system into a text-dependent enrollment are provided. A request for authentication of a customer that is enrolled in the self-service system with a text-independent voice print is received. A request is transmitted to the customer to repeat a passphrase and the customer's response is received as an audio stream of the passphrase. The customer is authenticated by comparing the audio stream of the passphrase against the text-independent voice print and if the customer is authenticated then a text-dependent voice print is created based on the passphrase, otherwise discard the audio stream of the passphrase.
-
公开(公告)号:US11039012B2
公开(公告)日:2021-06-15
申请号:US16525606
申请日:2019-07-30
Applicant: NICE LTD
Inventor: Levan Michaeli , Zvika Weingarten , Itay Harel , Roman Frenkel , Matan Keret , Amit Sharon , Sigal Lev
Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center having multiple service channels is provided herein. The computer-implemented method may collect call interactions based on predefined rules by a calls collection engine and store the collected call interactions. The computer-implemented method may further analyze the call interactions by a Proactive Fraud Exposure engine by: (i) generating a voiceprint for each call interaction; (ii) using machine learning technique to group the call interactions into one or more clusters based on respective voiceprints in the voiceprints database; (iii) storing the one or more clusters; and (iv) ranking and classifying the one or more clusters to yield a list of potential fraudsters. The computer-implemented method may further transmit the list of potential fraudsters to a user to enable the user to review said list of potential fraudsters and to add fraudsters from the list to a watchlist database.
-
37.
公开(公告)号:US10885920B2
公开(公告)日:2021-01-05
申请号:US16236655
申请日:2018-12-31
Applicant: NICE LTD
Inventor: Alon Menahem Shoa , Roman Frenkel , Matan Keret
IPC: G10L17/22
Abstract: A method for separating and authenticating speech of a speaker on an audio stream of speakers over an audio channel may include receiving audio stream data of the audio stream with speech from a speaker to be authenticated speaking with a second speaker. A voiceprint may be generated for each data chunk in the audio stream data divided into a plurality of data chunks. The voiceprint for each data chunk may be assessed as to whether the voiceprint has speech belonging to the speaker to be authenticated or to the second speaker using representative voiceprints of both speakers. An accumulated voiceprint may be generated using the verified data chunks with speech of the speaker to be authenticated. The accumulated voiceprint may be compared to the reference voiceprint of the speaker to be authenticated for authenticating the speaker speaking with the second speaker over the audio channel.
-
-
-
-
-
-