H04M2201/41

COMPUTER-IMPLEMENTED DETECTION OF ANOMALOUS TELEPHONE CALLS

Computer-implemented detection of anomalous telephone calls, for example detection of interconnect bypass fraud, is disclosed. A telephone call associated with user devices is analyzed remote from the user devices. A first set of multiple features, for example Mel Frequency Cepstral Coefficients, is derived from a call audio stream. The first set is converted to an embedding vector, for example via a model based on a Universal Background Model comprising a Gaussian Mixture Model, which model is preferably configured based on a training plurality of first sets of multiple features derived form a corresponding training plurality of audio streams. Occurrence, or probability of occurrence, of an anomalous telephone call is determined based on the embedding vector, for example via a back-end classifier, such as a Gaussian Backend Model, which classifier is preferably configured based on labels associated with the training plurality of audio streams.

Systems and methods for voice identification and analysis
11580986 · 2023-02-14 ·

Obtaining configuration audio data including voice information for a plurality of meeting participants. Generating localization information indicating a respective location for each meeting participant. Generating a respective voiceprint for each meeting participant. Obtaining meeting audio data. Identifying a first meeting participant and a second meeting participant. Linking a first meeting participant identifier of the first meeting participant with a first segment of the meeting audio data. Linking a second meeting participant identifier of the second meeting participant with a second segment of the meeting audio data. Generating a GUI indicating the respective locations of the first and second meeting participants, and the GUI indicating a first transcription of the first segment and a second transcription of the second segment. The first transcription is associated with the first meeting participant in the GUI, and the second transcription is associated with the second meeting participant in the GUI.

SYSTEM AND METHOD FOR GENDER BASED AUTHENTICATION OF A CALLER
20230041266 · 2023-02-09 · ·

A system and method for authenticating a caller may include receiving an incoming call from the caller, determining a gender of the caller, and selecting, based on the determined gender, to search for the caller in one of: a watchlist of untrustworthy female callers, and a watchlist of untrustworthy male callers.

SYSTEM AND METHOD FOR DETECTING FRAUD RINGS

A system and method may identify a fraud ring based on call or interaction data by analyzing by a computer processor interaction data including audio recordings to identify clusters of interactions which are suspected of involving fraud each cluster including the same speaker; analyzing by the computer processor the clusters, in combination with metadata associated with the interaction data, to identify fraud rings, each fraud ring describing a plurality of different speakers, each fraud ring defined by a set of speakers and a set of metadata corresponding to interactions including that speaker; and for each fraud ring, creating a relevance value defining the relative relevance of the fraud ring.

Multicast task assignment
11711466 · 2023-07-25 · ·

A server transmits a task to client devices using push-to-talk (PTT). The server receives a response accepting the task from a device of the client devices. The server assigns the task to a user of the device. The server transmits an indication that the task was assigned to the user of the device to at least a subset of the client devices.

SYSTEM AND METHOD FOR ASSESSING SECURITY THREATS AND CRIMINAL PROCLIVITIES
20230231947 · 2023-07-20 · ·

A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.

Voice and speech recognition for call center feedback and quality assurance

A computer-implemented method for providing an objective evaluation to a customer service representative regarding his performance during an interaction with a customer may include receiving a digitized data stream corresponding to a spoken conversation between a customer and a representative; converting the data stream to a text stream; generating a representative transcript that includes the words from the text stream that are spoken by the representative; comparing the representative transcript with a plurality of positive words and a plurality of negative words; and generating a score that varies according to the occurrence of each word spoken by the representative that matches one of the positive words, and/or the occurrence of each word spoken by the representative that matches one of the negative words. Tone of voice, as well as response time, during the interaction may also be monitored and analyzed to adjust the score, or generate a separate score.

Caller deflection and response system and method

Provided are a call deflection and response system and method, wherein a voice call from a caller device is received, a skill group is determined to resolve an issue associated with the call, and a text response to the issue is sent to the caller device, providing a context-based personalized response. A caller leaves a detailed voicemail explaining an issue needing resolution, which is electronically transcribed and then run through a classifier to determine concepts and intents associated with the call. Based on the concepts and intents, responsibility for the call and associated files are transferred to a particular skill group on a chat platform for resolution. A chat entity from the appropriate skill group determines and provides an issue response via text message to the caller device, e.g., to the caller's mobile phone.

System and method for communication analysis for use with agent assist within a cloud-based contact center

Methods to reduce agent effort and improve customer experience quality through artificial intelligence. The Agent Assist tool provides contact centers with an innovative tool designed to reduce agent effort, improve quality and reduce costs by minimizing search and data entry tasks The Agent Assist tool is natively built and fully unified within the agent interface while keeping all data internally protected from third-party sharing.

Analysis and matching of voice signals
11558506 · 2023-01-17 · ·

Methods for detecting fraud include receiving a plurality of call interactions; extracting a voice print of a caller from each of the call interactions; determining which call interactions are associated with a single caller by comparing and matching pairs of voice prints of the call interactions; organizing the call interactions associated with a single caller into a group; and determining that a matching phrase was spoken by the single caller in a first call interaction and second call interaction in the group.