Patents by Inventor Roman FRENKEL
Roman FRENKEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220246153Abstract: A system and method may classify a plurality of interactions, by: obtaining a plurality of voiceprints of the plurality of interactions, wherein each voiceprint of the plurality of voiceprints represents a speaker participating in an interaction of the plurality of interactions; calculating, for each interaction, a plurality of scores, wherein each score of the plurality of scores is indicative of a similarity between the voiceprint of the interaction and one voiceprint of a set of benchmark voiceprints; calculating, for each interaction, statistics of the scores; and determining that a plurality of interactions pertain to a single cluster of interactions based on statistics of the scores of the interactions in the cluster.Type: ApplicationFiled: February 3, 2021Publication date: August 4, 2022Applicant: Nice Ltd.Inventors: Roman FRENKEL, Yarden HAZUT, Rotem SHUSTER RADASHKEVICH
-
Patent number: 11375063Abstract: Systems for and methods of determining the priority of a call interaction include receiving a call interaction from a call center; validating, by a validation and transcription engine, that the call interaction is authentic; converting, by the validation and transcription engine, the call interaction into text; extracting, by a data calculation engine, organization, location, and time information from the text; calculating, by the data calculation engine, a priority of the call interaction from the extracted information and the text; determining that the call interaction should be transmitted to a queue of the call center for initial handling by a call center agent; and transmitting the call interaction, the calculated priority, and the extracted information to the call center.Type: GrantFiled: March 10, 2021Date of Patent: June 28, 2022Assignee: NICE LTD.Inventors: Roman Frenkel, Tal Raskin, Adi Ben Zeev, Stav Mishory, Dan Teplitski, Hadas Katz
-
Publication number: 20220182485Abstract: Systems for and methods of training a spoofing detection model include receiving a plurality of customer call interactions; classifying each of the plurality of customer call interactions as a spoofed call or a non-spoofed call using a spoofing detection model; generating a voiceprint for each of the plurality of customer call interactions; comparing the generated voiceprints; grouping the generated voiceprints into one or more clusters based on the comparing, wherein each cluster represents a single speaker; locating a cluster containing a spoofed call and a non-spoofed call, thereby indicating that the non-spoofed call was misclassified by the spoofing detection model; and updating the spoofing detection model with the non-spoofed call.Type: ApplicationFiled: December 4, 2020Publication date: June 9, 2022Inventors: Roman FRENKEL, Matan KERET, Amit SHARON
-
Publication number: 20220124198Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.Type: ApplicationFiled: December 30, 2021Publication date: April 21, 2022Inventors: Roman FRENKEL, Matan Keret, Roman Shternharts, Itay Kalman Harel, Galya Julya Bar, Yaara Bar, Michal Daisey Momika
-
Patent number: 11252279Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.Type: GrantFiled: July 15, 2021Date of Patent: February 15, 2022Assignee: NICE LTD.Inventors: Roman Frenkel, Matan Keret, Roman Shternharts, Itay Kalman Harel, Galya Julya Bar, Yaara Bar, Michal Daisey Momika
-
Publication number: 20210344801Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.Type: ApplicationFiled: July 15, 2021Publication date: November 4, 2021Inventors: Roman FRENKEL, Matan KERET, Roman SHTERNHARTS, Itay KALMAN HAREL, Galya Julya BAR, Yaara BAR, Michal DAISEY MOMIKA
-
Publication number: 20210319085Abstract: A system and method may adjust the threshold or other settings in a biometric comparison system, or provide a report or display of parameters. Over a series of comparisons of authentication biometric samples (e.g. authentication VPs) to enrollment biometric samples (e.g. enrollment VPs), the authentication samples may be stored, and scores resulting from the biometric comparisons may be stored in a first set of scores. A second set of biometric comparisons may be created, each using a pairing of a stored authentication biometric sample and an enrollment biometric sample, each biometric comparison resulting in a score, the scores forming a second set of scores. The first and second sets of scores may be combined to produce a third set of scores, and an iterative process may be performed over the third set of scores to update the parameters of the Gaussian distribution of the third set of scores.Type: ApplicationFiled: April 14, 2020Publication date: October 14, 2021Applicant: Nice Ltd.Inventors: Roman FRENKEL, Matan KERET, Amit SHARON
-
Patent number: 11108910Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) collecting call interaction; (ii) storing the collected call interactions; (iii) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (iv) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (v) retrieving from the ranked clusters, a list of fraudsters; and (vi) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.Type: GrantFiled: December 22, 2020Date of Patent: August 31, 2021Assignee: NICE LTDInventors: Roman Frenkel, Matan Keret, Roman Shternharts, Itay Kalman Harel, Galya Julya Bar, Yaara Bar, Michal Daisey Momika
-
Publication number: 20210264922Abstract: Methods for voice authentication include receiving a plurality of mono telephonic interactions between customers and agents; creating a mapping of the plurality of mono telephonic interactions that illustrates which agent interacted with which customer in each of the interactions; determining how many agents each customer interacted with; identifying one or more customers an agent has interacted with that have the fewest interactions with other agents; and selecting a predetermined number of interactions of the agent with each of the identified customers. In some embodiments, the methods further include creating a voice print from first and second speaker components of each interaction; comparing the voice prints of a first selected interaction to the voice prints from a second selected interaction; calculating a similarity score between the voice prints; aggregating scores; and identifying the voice prints that are associated with the agent.Type: ApplicationFiled: May 7, 2021Publication date: August 26, 2021Inventors: Alon Menahem SHOA, Roman FRENKEL, Tamir CASPI
-
Publication number: 20210258423Abstract: A computer-implemented method for analyzing call interactions in an interactions database by a Proactive Fraud Exposure (PFE) engine is provided herein. The computer-implemented method may generate a voiceprint for each call interaction; (ii) use a machine learning technique to group the call interactions into one or more clusters based on respective voiceprints in the voiceprints database; (iii) store the one or more clusters; and (iv) rank and classifying the one or more clusters to yield a list of potential fraudsters. The computer-implemented method may further transmit the list of potential fraudsters to a user to enable the user to review said list of potential fraudsters and to add fraudsters from the list to a watchlist database.Type: ApplicationFiled: May 5, 2021Publication date: August 19, 2021Inventors: Levan MICHAELI, Zvika Weingarten, Itay Harel, Roman Frenkel, Matan Keret, Amit Sharon, Sigal Lev
-
Patent number: 11039012Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center having multiple service channels is provided herein. The computer-implemented method may collect call interactions based on predefined rules by a calls collection engine and store the collected call interactions. The computer-implemented method may further analyze the call interactions by a Proactive Fraud Exposure engine by: (i) generating a voiceprint for each call interaction; (ii) using machine learning technique to group the call interactions into one or more clusters based on respective voiceprints in the voiceprints database; (iii) storing the one or more clusters; and (iv) ranking and classifying the one or more clusters to yield a list of potential fraudsters. The computer-implemented method may further transmit the list of potential fraudsters to a user to enable the user to review said list of potential fraudsters and to add fraudsters from the list to a watchlist database.Type: GrantFiled: July 30, 2019Date of Patent: June 15, 2021Assignee: NICE LTDInventors: Levan Michaeli, Zvika Weingarten, Itay Harel, Roman Frenkel, Matan Keret, Amit Sharon, Sigal Lev
-
Patent number: 11031016Abstract: Methods for voice authentication include receiving a plurality of mono telephonic interactions between customers and agents; creating a mapping of the plurality of mono telephonic interactions that illustrates which agent interacted with which customer in each of the interactions; determining how many agents each customer interacted with; identifying one or more customers an agent has interacted with that have the fewest interactions with other agents; and selecting a predetermined number of interactions of the agent with each of the identified customers. In some embodiments, the methods further include creating a voice print from first and second speaker components of each interaction; comparing the voice prints of a first selected interaction to the voice prints from a second selected interaction; calculating a similarity score between the voice prints; aggregating scores; and identifying the voice prints that are associated with the agent.Type: GrantFiled: June 26, 2019Date of Patent: June 8, 2021Assignee: NICE LTD.Inventors: Alon Menahem Shoa, Roman Frenkel, Tamir Caspi
-
Publication number: 20210112163Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) collecting call interaction; (ii) storing the collected call interactions; (iii) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (iv) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (v) retrieving from the ranked clusters, a list of fraudsters; and (vi) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.Type: ApplicationFiled: December 22, 2020Publication date: April 15, 2021Inventors: Roman FRENKEL, Matan KERET, Roman SHTERNHARTS, ltay KALMAN HAREL, Galya Julya BAR, Yaara BAR, Michal DAISEY MOMIKA
-
Publication number: 20210074303Abstract: A method for separating and authenticating speech of a speaker on an audio stream of speakers over an audio channel may include receiving audio stream data of the audio stream with speech from a speaker to be authenticated speaking with a second speaker. A voiceprint may be generated for each data chunk in the audio stream data divided into a plurality of data chunks. The voiceprint for each data chunk may be assessed as to whether the voiceprint has speech belonging to the speaker to be authenticated or to the second speaker using representative voiceprints of both speakers. An accumulated voiceprint may be generated using the verified data chunks with speech of the speaker to be authenticated. The accumulated voiceprint may be compared to the reference voiceprint of the speaker to be authenticated for authenticating the speaker speaking with the second speaker over the audio channel.Type: ApplicationFiled: November 17, 2020Publication date: March 11, 2021Inventors: Alon Menahem SHOA, Roman FRENKEL, Matan KERET
-
Publication number: 20210037136Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center having multiple service channels is provided herein. The computer-implemented method may collect call interactions based on predefined rules by a calls collection engine and store the collected call interactions. The computer-implemented method may further analyze the call interactions by a Proactive Fraud Exposure engine by: (i) generating a voiceprint for each call interaction; (ii) using machine learning technique to group the call interactions into one or more clusters based on respective voiceprints in the voiceprints database; (iii) storing the one or more clusters; and (iv) ranking and classifying the one or more clusters to yield a list of potential fraudsters. The computer-implemented method may further transmit the list of potential fraudsters to a user to enable the user to review said list of potential fraudsters and to add fraudsters from the list to a watchlist database.Type: ApplicationFiled: July 30, 2019Publication date: February 4, 2021Inventors: Levan MICHAELI, Zvika WEINGARTEN, ltay HAREL, Roman FRENKEL, Matan KERET, Amit SHARON, Sigal LEV
-
Publication number: 20210037137Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) collecting call interaction; (ii) storing the collected call interactions; (iii) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (iv) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa, (v) enabling a user to repeat steps (iii) and (iv); (vi) retrieving from the ranked clusters, a list of fraudsters; and transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.Type: ApplicationFiled: January 13, 2020Publication date: February 4, 2021Inventors: Roman FRENKEL, Matan KERET, Roman SHTERNHARTS, ltay KALMAN HAREL, Galya Julya BAR, Yaara BAR, Michal DAISEY MOMIKA
-
Patent number: 10911600Abstract: A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) collecting call interaction; (ii) storing the collected call interactions; (iii) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (iv) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa, (v) enabling a user to repeat steps (iii) and (iv); (vi) retrieving from the ranked clusters, a list of fraudsters; and transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.Type: GrantFiled: January 13, 2020Date of Patent: February 2, 2021Assignee: NICE LTD.Inventors: Roman Frenkel, Matan Keret, Roman Shternharts, Itay Kalman Harel, Galya Julya Bar, Yaara Bar, Michal Daisey Momika
-
Patent number: 10885920Abstract: A method for separating and authenticating speech of a speaker on an audio stream of speakers over an audio channel may include receiving audio stream data of the audio stream with speech from a speaker to be authenticated speaking with a second speaker. A voiceprint may be generated for each data chunk in the audio stream data divided into a plurality of data chunks. The voiceprint for each data chunk may be assessed as to whether the voiceprint has speech belonging to the speaker to be authenticated or to the second speaker using representative voiceprints of both speakers. An accumulated voiceprint may be generated using the verified data chunks with speech of the speaker to be authenticated. The accumulated voiceprint may be compared to the reference voiceprint of the speaker to be authenticated for authenticating the speaker speaking with the second speaker over the audio channel.Type: GrantFiled: December 31, 2018Date of Patent: January 5, 2021Assignee: NICE LTDInventors: Alon Menahem Shoa, Roman Frenkel, Matan Keret
-
Publication number: 20200411010Abstract: Methods for voice authentication include receiving a plurality of mono telephonic interactions between customers and agents; creating a mapping of the plurality of mono telephonic interactions that illustrates which agent interacted with which customer in each of the interactions; determining how many agents each customer interacted with; identifying one or more customers an agent has interacted with that have the fewest interactions with other agents; and selecting a predetermined number of interactions of the agent with each of the identified customers. In some embodiments, the methods further include creating a voice print from first and second speaker components of each interaction; comparing the voice prints of a first selected interaction to the voice prints from a second selected interaction; calculating a similarity score between the voice prints; aggregating scores; and identifying the voice prints that are associated with the agent.Type: ApplicationFiled: June 26, 2019Publication date: December 31, 2020Inventors: Alon Menahem SHOA, Roman FRENKEL, Tamir CASPI
-
Publication number: 20200211571Abstract: A method for separating and authenticating speech of a speaker on an audio stream of speakers over an audio channel may include receiving audio stream data of the audio stream with speech from a speaker to be authenticated speaking with a second speaker. A voiceprint may be generated for each data chunk in the audio stream data divided into a plurality of data chunks. The voiceprint for each data chunk may be assessed as to whether the voiceprint has speech belonging to the speaker to be authenticated or to the second speaker using representative voiceprints of both speakers. An accumulated voiceprint may be generated using the verified data chunks with speech of the speaker to be authenticated. The accumulated voiceprint may be compared to the reference voiceprint of the speaker to be authenticated for authenticating the speaker speaking with the second speaker over the audio channel.Type: ApplicationFiled: December 31, 2018Publication date: July 2, 2020Inventors: Alon Menahem SHOA, Roman FRENKEL, Matan KERET