US 11,943,383 B2
Methods and systems for automatic discovery of fraudulent calls using speaker recognition
Zhiyuan Guan, McLean, VA (US); Carl S. Ashby, Montpelier, VA (US); Isabelle Alice Yvonne Moulinier, Richfield, MN (US); and Mark E. Dickison, Falls Church, VA (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on Dec. 20, 2021, as Appl. No. 17/645,179.
Application 17/645,179 is a continuation of application No. 16/845,171, filed on Apr. 10, 2020, granted, now 11,240,360.
Application 16/845,171 is a continuation of application No. 16/360,783, filed on Mar. 21, 2019, granted, now 10,659,588, issued on May 19, 2020.
Prior Publication US 2022/0116493 A1, Apr. 14, 2022
Int. Cl. H04M 1/67 (2006.01); G10L 17/00 (2013.01); H04M 3/38 (2006.01)
CPC H04M 1/67 (2013.01) [G10L 17/00 (2013.01); H04M 3/385 (2013.01); H04M 2201/41 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for identifying a voice associated with undesirable activity, comprising:
receiving an audio recording or audio stream associated with a voice;
determining a plurality of audio components of the audio recording or audio stream;
comparing the voice, using the determined plurality of audio components, with a library of voices, each voice in the library of voices defined by a cluster of audio recordings clustered together based on audio components of the audio recordings such that audio recordings associated with a same voice but different accounts are associated with a same cluster;
based on the comparing of the voice to the library of voices, identifying a cluster likely to correspond to a same voice as the voice associated with the received audio recording or audio stream;
determining, based on account information associated with the received audio recording or audio stream and metadata associating each audio recording in the identified cluster with a respective account, whether the voice associated with the identified cluster is associated with a plurality of accounts associated with different people; and
in response to determining that the identified cluster is associated with a plurality of accounts associated with different people, identifying the received audio recording or audio stream as associated with undesirable activity.