Patents by Inventor Roman FRENKEL

Roman FRENKEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220246153
    Abstract: A system and method may classify a plurality of interactions, by: obtaining a plurality of voiceprints of the plurality of interactions, wherein each voiceprint of the plurality of voiceprints represents a speaker participating in an interaction of the plurality of interactions; calculating, for each interaction, a plurality of scores, wherein each score of the plurality of scores is indicative of a similarity between the voiceprint of the interaction and one voiceprint of a set of benchmark voiceprints; calculating, for each interaction, statistics of the scores; and determining that a plurality of interactions pertain to a single cluster of interactions based on statistics of the scores of the interactions in the cluster.
    Type: Application
    Filed: February 3, 2021
    Publication date: August 4, 2022
    Applicant: Nice Ltd.
    Inventors: Roman FRENKEL, Yarden HAZUT, Rotem SHUSTER RADASHKEVICH
  • Patent number: 11375063
    Abstract: Systems for and methods of determining the priority of a call interaction include receiving a call interaction from a call center; validating, by a validation and transcription engine, that the call interaction is authentic; converting, by the validation and transcription engine, the call interaction into text; extracting, by a data calculation engine, organization, location, and time information from the text; calculating, by the data calculation engine, a priority of the call interaction from the extracted information and the text; determining that the call interaction should be transmitted to a queue of the call center for initial handling by a call center agent; and transmitting the call interaction, the calculated priority, and the extracted information to the call center.
    Type: Grant
    Filed: March 10, 2021
    Date of Patent: June 28, 2022
    Assignee: NICE LTD.
    Inventors: Roman Frenkel, Tal Raskin, Adi Ben Zeev, Stav Mishory, Dan Teplitski, Hadas Katz
  • Publication number: 20220182485
    Abstract: Systems for and methods of training a spoofing detection model include receiving a plurality of customer call interactions; classifying each of the plurality of customer call interactions as a spoofed call or a non-spoofed call using a spoofing detection model; generating a voiceprint for each of the plurality of customer call interactions; comparing the generated voiceprints; grouping the generated voiceprints into one or more clusters based on the comparing, wherein each cluster represents a single speaker; locating a cluster containing a spoofed call and a non-spoofed call, thereby indicating that the non-spoofed call was misclassified by the spoofing detection model; and updating the spoofing detection model with the non-spoofed call.
    Type: Application
    Filed: December 4, 2020
    Publication date: June 9, 2022
    Inventors: Roman FRENKEL, Matan KERET, Amit SHARON
  • Publication number: 20220124198
    Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
    Type: Application
    Filed: December 30, 2021
    Publication date: April 21, 2022
    Inventors: Roman FRENKEL, Matan Keret, Roman Shternharts, Itay Kalman Harel, Galya Julya Bar, Yaara Bar, Michal Daisey Momika
  • Patent number: 11252279
    Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
    Type: Grant
    Filed: July 15, 2021
    Date of Patent: February 15, 2022
    Assignee: NICE LTD.
    Inventors: Roman Frenkel, Matan Keret, Roman Shternharts, Itay Kalman Harel, Galya Julya Bar, Yaara Bar, Michal Daisey Momika
  • Publication number: 20210344801
    Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
    Type: Application
    Filed: July 15, 2021
    Publication date: November 4, 2021
    Inventors: Roman FRENKEL, Matan KERET, Roman SHTERNHARTS, Itay KALMAN HAREL, Galya Julya BAR, Yaara BAR, Michal DAISEY MOMIKA
  • Publication number: 20210319085
    Abstract: A system and method may adjust the threshold or other settings in a biometric comparison system, or provide a report or display of parameters. Over a series of comparisons of authentication biometric samples (e.g. authentication VPs) to enrollment biometric samples (e.g. enrollment VPs), the authentication samples may be stored, and scores resulting from the biometric comparisons may be stored in a first set of scores. A second set of biometric comparisons may be created, each using a pairing of a stored authentication biometric sample and an enrollment biometric sample, each biometric comparison resulting in a score, the scores forming a second set of scores. The first and second sets of scores may be combined to produce a third set of scores, and an iterative process may be performed over the third set of scores to update the parameters of the Gaussian distribution of the third set of scores.
    Type: Application
    Filed: April 14, 2020
    Publication date: October 14, 2021
    Applicant: Nice Ltd.
    Inventors: Roman FRENKEL, Matan KERET, Amit SHARON
  • Patent number: 11108910
    Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) collecting call interaction; (ii) storing the collected call interactions; (iii) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (iv) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (v) retrieving from the ranked clusters, a list of fraudsters; and (vi) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: August 31, 2021
    Assignee: NICE LTD
    Inventors: Roman Frenkel, Matan Keret, Roman Shternharts, Itay Kalman Harel, Galya Julya Bar, Yaara Bar, Michal Daisey Momika
  • Publication number: 20210264922
    Abstract: Methods for voice authentication include receiving a plurality of mono telephonic interactions between customers and agents; creating a mapping of the plurality of mono telephonic interactions that illustrates which agent interacted with which customer in each of the interactions; determining how many agents each customer interacted with; identifying one or more customers an agent has interacted with that have the fewest interactions with other agents; and selecting a predetermined number of interactions of the agent with each of the identified customers. In some embodiments, the methods further include creating a voice print from first and second speaker components of each interaction; comparing the voice prints of a first selected interaction to the voice prints from a second selected interaction; calculating a similarity score between the voice prints; aggregating scores; and identifying the voice prints that are associated with the agent.
    Type: Application
    Filed: May 7, 2021
    Publication date: August 26, 2021
    Inventors: Alon Menahem SHOA, Roman FRENKEL, Tamir CASPI
  • Publication number: 20210258423
    Abstract: A computer-implemented method for analyzing call interactions in an interactions database by a Proactive Fraud Exposure (PFE) engine is provided herein. The computer-implemented method may generate a voiceprint for each call interaction; (ii) use a machine learning technique to group the call interactions into one or more clusters based on respective voiceprints in the voiceprints database; (iii) store the one or more clusters; and (iv) rank and classifying the one or more clusters to yield a list of potential fraudsters. The computer-implemented method may further transmit the list of potential fraudsters to a user to enable the user to review said list of potential fraudsters and to add fraudsters from the list to a watchlist database.
    Type: Application
    Filed: May 5, 2021
    Publication date: August 19, 2021
    Inventors: Levan MICHAELI, Zvika Weingarten, Itay Harel, Roman Frenkel, Matan Keret, Amit Sharon, Sigal Lev
  • Patent number: 11039012
    Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center having multiple service channels is provided herein. The computer-implemented method may collect call interactions based on predefined rules by a calls collection engine and store the collected call interactions. The computer-implemented method may further analyze the call interactions by a Proactive Fraud Exposure engine by: (i) generating a voiceprint for each call interaction; (ii) using machine learning technique to group the call interactions into one or more clusters based on respective voiceprints in the voiceprints database; (iii) storing the one or more clusters; and (iv) ranking and classifying the one or more clusters to yield a list of potential fraudsters. The computer-implemented method may further transmit the list of potential fraudsters to a user to enable the user to review said list of potential fraudsters and to add fraudsters from the list to a watchlist database.
    Type: Grant
    Filed: July 30, 2019
    Date of Patent: June 15, 2021
    Assignee: NICE LTD
    Inventors: Levan Michaeli, Zvika Weingarten, Itay Harel, Roman Frenkel, Matan Keret, Amit Sharon, Sigal Lev
  • Patent number: 11031016
    Abstract: Methods for voice authentication include receiving a plurality of mono telephonic interactions between customers and agents; creating a mapping of the plurality of mono telephonic interactions that illustrates which agent interacted with which customer in each of the interactions; determining how many agents each customer interacted with; identifying one or more customers an agent has interacted with that have the fewest interactions with other agents; and selecting a predetermined number of interactions of the agent with each of the identified customers. In some embodiments, the methods further include creating a voice print from first and second speaker components of each interaction; comparing the voice prints of a first selected interaction to the voice prints from a second selected interaction; calculating a similarity score between the voice prints; aggregating scores; and identifying the voice prints that are associated with the agent.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: June 8, 2021
    Assignee: NICE LTD.
    Inventors: Alon Menahem Shoa, Roman Frenkel, Tamir Caspi
  • Publication number: 20210112163
    Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) collecting call interaction; (ii) storing the collected call interactions; (iii) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (iv) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (v) retrieving from the ranked clusters, a list of fraudsters; and (vi) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
    Type: Application
    Filed: December 22, 2020
    Publication date: April 15, 2021
    Inventors: Roman FRENKEL, Matan KERET, Roman SHTERNHARTS, ltay KALMAN HAREL, Galya Julya BAR, Yaara BAR, Michal DAISEY MOMIKA
  • Publication number: 20210074303
    Abstract: A method for separating and authenticating speech of a speaker on an audio stream of speakers over an audio channel may include receiving audio stream data of the audio stream with speech from a speaker to be authenticated speaking with a second speaker. A voiceprint may be generated for each data chunk in the audio stream data divided into a plurality of data chunks. The voiceprint for each data chunk may be assessed as to whether the voiceprint has speech belonging to the speaker to be authenticated or to the second speaker using representative voiceprints of both speakers. An accumulated voiceprint may be generated using the verified data chunks with speech of the speaker to be authenticated. The accumulated voiceprint may be compared to the reference voiceprint of the speaker to be authenticated for authenticating the speaker speaking with the second speaker over the audio channel.
    Type: Application
    Filed: November 17, 2020
    Publication date: March 11, 2021
    Inventors: Alon Menahem SHOA, Roman FRENKEL, Matan KERET
  • Publication number: 20210037136
    Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center having multiple service channels is provided herein. The computer-implemented method may collect call interactions based on predefined rules by a calls collection engine and store the collected call interactions. The computer-implemented method may further analyze the call interactions by a Proactive Fraud Exposure engine by: (i) generating a voiceprint for each call interaction; (ii) using machine learning technique to group the call interactions into one or more clusters based on respective voiceprints in the voiceprints database; (iii) storing the one or more clusters; and (iv) ranking and classifying the one or more clusters to yield a list of potential fraudsters. The computer-implemented method may further transmit the list of potential fraudsters to a user to enable the user to review said list of potential fraudsters and to add fraudsters from the list to a watchlist database.
    Type: Application
    Filed: July 30, 2019
    Publication date: February 4, 2021
    Inventors: Levan MICHAELI, Zvika WEINGARTEN, ltay HAREL, Roman FRENKEL, Matan KERET, Amit SHARON, Sigal LEV
  • Publication number: 20210037137
    Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) collecting call interaction; (ii) storing the collected call interactions; (iii) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (iv) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa, (v) enabling a user to repeat steps (iii) and (iv); (vi) retrieving from the ranked clusters, a list of fraudsters; and transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
    Type: Application
    Filed: January 13, 2020
    Publication date: February 4, 2021
    Inventors: Roman FRENKEL, Matan KERET, Roman SHTERNHARTS, ltay KALMAN HAREL, Galya Julya BAR, Yaara BAR, Michal DAISEY MOMIKA
  • Patent number: 10911600
    Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) collecting call interaction; (ii) storing the collected call interactions; (iii) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (iv) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa, (v) enabling a user to repeat steps (iii) and (iv); (vi) retrieving from the ranked clusters, a list of fraudsters; and transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
    Type: Grant
    Filed: January 13, 2020
    Date of Patent: February 2, 2021
    Assignee: NICE LTD.
    Inventors: Roman Frenkel, Matan Keret, Roman Shternharts, Itay Kalman Harel, Galya Julya Bar, Yaara Bar, Michal Daisey Momika
  • Patent number: 10885920
    Abstract: A method for separating and authenticating speech of a speaker on an audio stream of speakers over an audio channel may include receiving audio stream data of the audio stream with speech from a speaker to be authenticated speaking with a second speaker. A voiceprint may be generated for each data chunk in the audio stream data divided into a plurality of data chunks. The voiceprint for each data chunk may be assessed as to whether the voiceprint has speech belonging to the speaker to be authenticated or to the second speaker using representative voiceprints of both speakers. An accumulated voiceprint may be generated using the verified data chunks with speech of the speaker to be authenticated. The accumulated voiceprint may be compared to the reference voiceprint of the speaker to be authenticated for authenticating the speaker speaking with the second speaker over the audio channel.
    Type: Grant
    Filed: December 31, 2018
    Date of Patent: January 5, 2021
    Assignee: NICE LTD
    Inventors: Alon Menahem Shoa, Roman Frenkel, Matan Keret
  • Publication number: 20200411010
    Abstract: Methods for voice authentication include receiving a plurality of mono telephonic interactions between customers and agents; creating a mapping of the plurality of mono telephonic interactions that illustrates which agent interacted with which customer in each of the interactions; determining how many agents each customer interacted with; identifying one or more customers an agent has interacted with that have the fewest interactions with other agents; and selecting a predetermined number of interactions of the agent with each of the identified customers. In some embodiments, the methods further include creating a voice print from first and second speaker components of each interaction; comparing the voice prints of a first selected interaction to the voice prints from a second selected interaction; calculating a similarity score between the voice prints; aggregating scores; and identifying the voice prints that are associated with the agent.
    Type: Application
    Filed: June 26, 2019
    Publication date: December 31, 2020
    Inventors: Alon Menahem SHOA, Roman FRENKEL, Tamir CASPI
  • Publication number: 20200211571
    Abstract: A method for separating and authenticating speech of a speaker on an audio stream of speakers over an audio channel may include receiving audio stream data of the audio stream with speech from a speaker to be authenticated speaking with a second speaker. A voiceprint may be generated for each data chunk in the audio stream data divided into a plurality of data chunks. The voiceprint for each data chunk may be assessed as to whether the voiceprint has speech belonging to the speaker to be authenticated or to the second speaker using representative voiceprints of both speakers. An accumulated voiceprint may be generated using the verified data chunks with speech of the speaker to be authenticated. The accumulated voiceprint may be compared to the reference voiceprint of the speaker to be authenticated for authenticating the speaker speaking with the second speaker over the audio channel.
    Type: Application
    Filed: December 31, 2018
    Publication date: July 2, 2020
    Inventors: Alon Menahem SHOA, Roman FRENKEL, Matan KERET