US 12,438,874 B2
Artificial intelligence-supported proxy worker detection using voice authentication
Edward Lee Traywick, Bellbrook, OH (US); Ava Elizabeth Wallace, Charlotte, NC (US); and Christopher D. Nobile, Charlotte, NC (US)
Assigned to Bank of America Corporation, Charlotte, NC (US)
Filed by Bank of America Corporation, Charlotte, NC (US)
Filed on Jan. 6, 2023, as Appl. No. 18/094,102.
Prior Publication US 2024/0236086 A1, Jul. 11, 2024
Int. Cl. H04L 9/40 (2022.01); G10L 17/04 (2013.01); G10L 17/06 (2013.01); G10L 17/22 (2013.01)
CPC H04L 63/0861 (2013.01) [G10L 17/04 (2013.01); G10L 17/06 (2013.01); G10L 17/22 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
at a computing platform comprising at least one processor, a communication interface, and memory:
monitoring remote communications between a first user device and an enterprise user device, wherein monitoring the remote communications comprises gathering voice information corresponding to a first user;
identifying, based on the gathered voice information corresponding to the first user, a first voice sample;
configuring a user profile corresponding to the first user, wherein configuring the user profile comprises linking the first voice sample to the user profile;
training, based on the first voice sample, a voice authentication model, wherein training the voice authentication model configures the voice authentication model to output similarity scores indicating a degree of similarity between voice samples and the user profile;
monitoring a second user device, wherein monitoring the second user device comprises continuously gathering voice information corresponding to a second user;
identifying, based on the continuously gathered voice information corresponding to the second user, a second voice sample;
executing the voice authentication model using the second voice sample as input;
generating, based on executing the voice authentication model, a first similarity score corresponding to the second voice sample, wherein generating the first similarity score comprises comparing the first voice sample to the second voice sample to identify a similarity between the first voice sample and the second voice sample;
comparing the first similarity score to a threshold value;
identifying, based on the comparing, whether or not the first similarity score meets or exceeds the threshold value;
in response to identifying that the first similarity score meets or exceeds the threshold value, updating, based on the second voice sample, the user profile;
in response to identifying that the first similarity score does not meet or exceed the threshold value, initiating a security action, wherein initiating the security action comprises:
suspending access, for the second user device, to a network;
sending one or more commands to display a user interface to the enterprise user device; and
receiving, from the enterprise user device, user input, wherein the user input directs the computing platform to:
override the security action by reinstating access, for the second user device, to the network; and
initiate one or more additional security actions; and
refining the voice authentication model based on the second voice sample and the first similarity score.