H04M2203/6027

METHODS AND SYSTEMS FOR AUTOMATIC DISCOVERY OF FRAUDULENT CALLS USING SPEAKER RECOGNITION

A computer-implemented method for determining potentially undesirable voices, according to some embodiments, includes: receiving a plurality of audio recordings, the plurality of audio recordings comprising voices associated with undesirable activity, and determining a plurality of audio components of each of the plurality of audio recordings. The method may further comprise generating a multi-dimensional vector of audio components, from the plurality of audio components, for each of the plurality of audio recordings to generate a plurality of multi-dimensional vectors of audio components, and comparing audio components between the plurality of multi-dimensional vectors of audio components to determine a plurality of clusters of multi-dimensional vectors, each cluster of the plurality of clusters comprising two or more of the plurality of multi-dimensional vectors of audio components, wherein each cluster of the plurality of clusters corresponds to a blacklisted voice. The method may further comprise receiving an audio recording or audio stream, and determining whether the audio recording or audio stream is associated with a voice associated with undesirable activity based on a comparison to the plurality of clusters.

Conversation print system and method

Conversation Print: A method, computer program product, and computing system for receiving voice-based content from a third-party. The voice-based content is processed to define a text-based transcript for the voice-based content. The voice-based content is processed to define speech-pattern indicia for the voice-based content. A conversation print for the voice-based content is generated based, at least in part, upon the text-based transcript and the speech-pattern indicia.

Conversation print system and method
11275854 · 2022-03-15 · ·

A method, computer program product, and computing system for defining a conversation print for each of a plurality of known entities, thus defining a plurality of conversation prints. Voice-based content is received from a third-party. The voice-based content is compared to at least one of the plurality of conversation prints to identify the third party.

Conversation print system and method
11275855 · 2022-03-15 · ·

A method, computer program product, and computing system for defining a conversation print for each of a plurality of known fraudsters, thus defining a plurality of fraudster conversation prints. The plurality of fraudster conversation prints is processed to identify one or more fraudster commonalities. A fraudster conversation template is generated based, at least in part, upon the one or more fraudster commonalities.

Call authorization and verification via a service provider code

One example method of operation may include extracting a calling device telephone number from a received call message, querying a verification table for the calling device telephone number, identifying the calling device telephone number and a corresponding service provider network identifier from the verification table, querying a mapping table for the service provider network identifier, and identifying whether a match between the service provider network identifier and a service provider code exists as an entry in the mapping table.

System and method for managing an automated voicemail

A system, method and computer-readable storage device are disclosed signing a voicemail and confirming an identity of the speaker. A method includes receiving a request to verify a speaker associated with a communication to a recipient, receiving first data from the speaker in connection with the communication, accessing second data associated with the speaker to verify the speaker, determining whether a match exists between the first data and the second data to yield a determination, retrieving a communication address of the recipient, generating a notification for the recipient, wherein the notification reports on the determination and transmitting the notification to the recipient at the communication address.

SYSTEM AND METHOD FOR HANDLING UNWANTED TELEPHONE CALLS
20220094784 · 2022-03-24 ·

Disclosed herein are systems and methods for handling unwanted telephone calls. In one aspect, an exemplary method comprises, intercepting a call request for a call from a terminal device of a calling party to a terminal device of a called party, generating a call recording containing media data transmitted within a connection established by the intercepted call request, determining attributes of the generated call recording, classifying the call as an unwanted call based on the determined attributes, wherein the classification is performed by a classifier trained on previously collected unwanted calls, and wherein the call is classified as unwanted when the attributes belong to an unwanted call class that is known, and handling the call in accordance with the classification of the call, the handling including at least securing information of the call.

System and methods thereof for real-time fraud detection of a telephone call transaction

A method for detecting of fraudulent calls is provided. The method includes initiating, by an origin node, a call to a target node, and generating, by the origin node, a first call data record (CDR) for the call, wherein the CDR includes at least one call parameter of the call recorded by the origin node upon termination of the call. The method also includes generating, by the origin node, a first secure CDR that contains the first CDR, sending, by the origin node, the first secure CDR to the target node, and generating, by the origin node, a fraud notification based on a second secure CDR received from a first node and the first secure CDR.

Systems for verifying identities of parties participating in distributed network communication

Verification of the identities of parties participating in network-based communication, such as telephone communication, including SMS/text communication, email communication and the like is provided. Communication identifiers (IDs) (e.g., telephone numbers, email addresses or the like) are verified as being associated with one or more communication parties and, in response, a verified communication (ID) database is established. The verified communication ID database is relied upon when a user/communication is selecting a communication ID as an address for an impending communication or receiving a communication for determining whether the communication ID is verifiably associated with a known communication party. If the communication ID is determined to be verifiably associated with a known communication party, a visual or audible output may be provided on the user's device or within the communication that indicates that the communication ID is verifiably associated with the known communication party.

Method and system for transmission of a session initiation protocol (SIP) identity header in an out-of-band verification network
11297189 · 2022-04-05 · ·

A computer-implemented network verification system includes a second device situated in a terminating call network and configured to receive a call signal from a first device situated in an originating network. The first device is coupled to a first registry that stores originating call records. The first registry is configured to obtain, from the first device, and store call data and a SIP identity header associated with the call signal. The system also includes a second registry coupled to the second device and configured to receive, from the first registry over an out-of-band verification network, a first verification request that contains the originating call record, including the SIP identity header associated with the call signal. The second registry is further configured to send the SIP identity header contained in the first verification request to the second device.