Abstract: Systems and methods for authenticating callers are disclosed that may obtain identifying data and a voice print, and compare the voice print to one or more stored voice prints. Further, one or more initial scores may be calculated based on the data and the comparison, and a confidence interval score may also be calculated. The systems and methods may determine whether to authenticate based on the one or more initial scores and the confidence interval score.
Type:
Application
Filed:
February 24, 2014
Publication date:
September 11, 2014
Applicant:
Victrio, Inc.
Inventors:
Torsten Zeppenfeld, Joseph James Schmid, Manish Brijkishor Sharma, Lisa Marie Guerra, Richard Gutierrez, Mark Andrew Lazar, Vipul Niranjan Vyas
Abstract: Disclosed is a method for enrolling a voiceprint in a fraudster database, the method comprising: a) defining a fraud model comprising at least one hypothesis indicative of a fraudulent transaction; b) processing audio data based on the fraud model to identify at least one suspect voiceprint in the audio data suspected of belonging to a fraudster; and c) enrolling the at least one suspect voiceprint in the fraudster database.
Type:
Grant
Filed:
August 13, 2010
Date of Patent:
August 13, 2013
Assignee:
Victrio, Inc.
Inventors:
Richard Gutierrez, Anthony Rajakumar, Lisa Marie Guerra, David Hartig
Abstract: In one embodiment, the invention provides a method, comprising: (a) maintaining a database of known fraudsters, wherein each fraudster has a voice signature and metadata associated therewith; (b) performing a screening operation to match a candidate with a fraudster in the database based on matching a voice signature and metadata for the candidate with a voice signature and metadata for the fraudster in the database.
Abstract: In one embodiment, the invention provides a method, comprising: (a) maintaining a database of known fraudsters, wherein each fraudster has a voice signature and metadata associated therewith; (b) performing a screening operation to match a candidate with a fraudster in the database based on matching a voice signature and metadata for the candidate with a voice signature and metadata for the fraudster in the database.
Abstract: In one embodiment, the invention provides a method, comprising: (a) maintaining a database of known fraudsters, wherein each fraudster has a voice signature and metadata associated therewith; (b) performing a screening operation to match a candidate with a fraudster in the database based on matching a voice signature and metadata for the candidate with a voice signature and metadata for the fraudster in the database.