Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYSTEM AND METHOD OF AUTHENTICATING CANDIDATES FOR JOB POSITIONS
Document Type and Number:
WIPO Patent Application WO/2022/169931
Kind Code:
A1
Abstract:
A talent management system includes an artificial intelligence engine effectuating operations including receiving a request associated with an open position, analyzing resume data from a plurality of resumes in view of the open position to identify a plurality of candidates for the open position, obtaining third-party data from a third-party source for each candidate of the plurality of candidates, receiving interview data for each candidate from a first interview and a second interview, creating a candidate skills model for each candidate based on the resume data, the third-party data, and the interview data, ranking each candidate for the open position based on the candidate skills model using predictive analytics, and generating a report based on the ranking step.

Inventors:
DANGI KOMAL (US)
Application Number:
PCT/US2022/015038
Publication Date:
August 11, 2022
Filing Date:
February 03, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
DANGI KOMAL (US)
International Classes:
G06Q10/10; G06Q10/06; G06F21/32
Domestic Patent References:
WO2020192890A12020-10-01
Foreign References:
US20140359722A12014-12-04
US20140279516A12014-09-18
US20200042773A12020-02-06
US20200259827A12020-08-13
Other References:
MATTHEW A. RUSSELL: "Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, GitHub, and More", 20 October 2013, O'REILLY, ISBN: 978-1-4493-6761-9, pages: ToC,Ch01 - Ch08,App,Ind, XP055387163
Attorney, Agent or Firm:
ARENA, Christopher, M. (US)
Download PDF:
Claims:
What is claimed:

1. A talent management system comprising: an input-output interface; and an artificial intelligence engine having a processor coupled to the input-output interface, wherein the processor is further coupled to a memory, the memory having stored thereon executable instructions that when executed by the processor cause the processor to effectuate operations comprising: receiving a request associated with an open position; analyzing resume data from a plurality of resumes in view of the open position to identify a plurality of candidates for the open position; obtaining third-party data from a third-party source for each candidate of the plurality of candidates; receiving interview data for each candidate from a first interview and a second interview; creating a candidate skills model for each candidate based on the resume data, the third-party data, and the interview data; ranking each candidate for the open position based on the candidate skills model using predictive analytics; and generating a report based on the ranking step.

2. The talent management system of claim 1 further comprising an historical data base wherein the analyzing step comprises using data from the historical database ingested into an artificial intelligence algorithm to identify the plurality of candidates.

3. The talent management system of claim 1 wherein the interview data includes a technical assessment of each candidate and the candidate skills model includes the technical assessment.

4. The talent management system of claim 1 further comprising a verification system, wherein the verification system includes a voice recorder and a biometric processor, wherein the voice recorder is configured to record the first interview and the second interview and the biometric processor is configured to compare each candidates voice signature recorded in the first interview and the second interview.

5. The talent management system of claim 4 wherein the verification system further comprising a video recorder configured to record one of the first interview and the second interview and an image processor configured to compare an image of a candidate obtained from an identification card and an image captured from the first interview or the second interview. The talent management system of claim 5 further comprising an experience verification module configured to compare an age of each candidate to the years of experience of each candidate identified on each candidate’s resume and identifying a fault if the years of experience is outside of a range of years of experience based on the age of each candidate. The talent management system of claim 1 further comprising an historical data base containing skills models associated with previously successful candidates and the predictive analytics comprises comparing the candidate skills model to skills models associated with previously successful candidates. The talent management system of claim 1 further comprising an historical data base containing skills models of previous candidates and wherein the skills models of previous candidates are updated with additional information that becomes available for the previous candidates. The talent management system of claim 1 wherein the third-party data comprises data collected from publicly available databases relating to each candidate. The talent management system of claim 1 wherein the third-party data comprised data from social media sites associated with each candidate. The talent management system of claim 1 wherein the operations further comprise compiling geographic information relating to each candidate and assessing whether the geographic information is consistent with geographic restraints associated with the open position. A system comprising: a requisition interface configured to receive a job description; an external server interface configured to receive a plurality of resumes associated with a plurality of candidates; an artificial intelligence engine configured to select one or more of the plurality of resumes that match the job description, the artificial intelligence engine further configured to create a candidate skills model for each candidate associated with the one or more of the plurality of resumes; a telephony interface configured to establish a first call and a second call to a candidate associated with the one or more of the plurality of resumes; a voice recorder configured to record a first voice of a person on a first call and a second voice of the person on a second call, wherein at least one of the first call and the second call is a video call; a verification system comprising: an image processor configured to compare a face of the person on the video call to a document image; a voice biometrics processor configured to compare the first voice and the second voice: and an experience verification processor configured to compare an age of the candidate with a claimed experience level of the candidate; a scoring system configured to evaluate the candidate based on criteria associated with the candidate skills model candidate using predictive analytics; and a publishing system configured to display results of the scoring system.

13. The system of claim 12 wherein the candidate skills model comprises data from a resume and data from a third-party source.

14. The system of claim 13 wherein the third-party source comprises a government server.

15. The system of claim 12 wherein the candidate skills model further comprises a technical assessment of the candidate based on interviews with the candidate.

16. A method comprising: receiving, by a processor, a request associated with an open position; analyzing, by the processor using an artificial intelligence algorithm, resume data from a plurality of resumes in view of the open position to identify a plurality of candidates for the open position; obtaining, by the processor, third-party data from a third-party source for each candidate of the plurality of candidates; receiving, by the processor, interview data for each candidate from a first interview and a second interview; creating, by the processor, a candidate skills model for each candidate based on the resume data, the third-party data, and the interview data;

- 19 - ranking, by the processor, each candidate for the open position based on the candidate skills model using predictive analytics; and generating a report based on the ranking step. The method of claim 16 further comprising creating a data set associated with successful candidates applying for a plurality of open positions and training the artificial intelligence algorithm and the predictive analytics using the data set and wherein the artificial intelligence algorithm and the predictive analytics algorithm are updated based on use. The method of claim 16 wherein the interview data includes a technical assessment of each candidate and the candidate skills model includes the technical assessment. The method of claim 16 further comprising recording the first interview and the second interview and using a biometric processor to compare each candidates voice signature recorded in the first interview and the second interview. The method of claim 16 further wherein the ranking is based in part by comparing the candidate skills model to skills models associated with previously successful candidates.

- 20 -

Description:
SYSTEM AND METHOD OF AUTHENTICATING CANDIDATES FOR JOB POSITIONS

BACKGROUND

[0001] The present disclosure relates to verification of candidates for job positions using voice and face biometrics.

[0002] Recruitment is a core function of human resource management. It is the first step of appointment. Recruitment refers to the overall process of attracting, selecting and appointing suitable candidates for jobs (either permanent or temporary) within an organization. Managers, human resource generalists and recruitment specialists may be tasked with carrying out recruitment, but in some cases public-sector employment agencies, commercial recruitment agencies, or specialist search consultancies are used to undertake parts of the process. Internet-based technologies to support all aspects of recruitment have become widespread.

[0003] The human resource industry is currently facing challenges regarding the authenticity of candidates for job positions. For example, candidates may falsify their resumes and/or have proxy interviews, in which individuals other than the candidate perform the interview.

[0004] As can be seen, there is a need for a system and method of authenticating candidates for job positions. SUMMARY

[0005] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Furthermore, the claimed subject matter is not limited to limitations that solve any or all disadvantages noted in any part of this disclosure.

[0006] In one aspect of the present disclosure, a system of verifying a candidate comprises a database hosting a web server, wherein the web server comprises: a search portal for a first client to search the database for candidate profiles based on entered search criteria; a list portal for consolidating selected candidate profiles from the search, initiating the first client to call each of the selected candidates for a first interview, recording the first interview and saving a recorded first interview to the database, initiating the first client to call each of the selected candidates for a second interview, recording the second interview and saving a recording of the second interview to the database; and a voice verification module to determine if a voice from the recording of the first interview matches a voice from the recording of the second interview.

[0007] In another aspect of the present disclosure, a computer implemented method of verifying a candidate comprises the steps of: searching, by a first client, a database for candidate profiles by entering search criteria on a web server wherein a plurality of results of the candidate profiles are displayed; selecting, by the first client, at least one of the candidate profiles within the plurality of results; calling, by the first client, a candidate of the candidate profile, wherein the web server automatically records a first interview and saves a first interview recording on a web server database; calling, by the first client, the candidate of the candidate profile, wherein the web server automatically records a second interview and saves a second interview recording on the web server database; comparing a first interview recording with the second interview recording using voice recognition software to determine if a voice from the first interview recording matches a voice from the second interview recording.

[0008] These and other features, aspects and advantages of the present disclosure will become better understood with reference to the following drawings, description and claims.

BRIEF DESCRIPTION OF THE DRAWINGS

[0009] FIG. la is a schematic view of an embodiment of the present disclosure;

[0010] FIG. lb is an exemplary functional block diagram of a total talent management system in accordance with the present disclosure

[0011] FIG. 1c is an exemplary functional block diagram of an exemplary architecture of a total talent management system.

[0012] FIG. Id is an exemplary architecture showing various application programming interfaces between a management system and external servers.

[0013] FIG. le is an exemplary diagram illustrating the building of a candidate skills model.

[0014] FIG. 2 is a flow chart of an exemplary method of the present disclosure;

[0015] FIG. 3 is a continuation of the flow chart of FIG. 2; [0016] FIG. 4 is a block diagram of an embodiment of the present disclosure; and [0017] FIG. 5 is a continuation of the block diagram of FIG. 4.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

[0018] System Overview. The present disclosure is directed to an end-to-end talent management system, which includes artificial intelligent engines, data base management tools and biometric and other forms of personal identification, verification and authentication methods. As such, the disclosure provides a practical application that solves a persistent problem in the recruitment functions for companies. Specifically, the present disclosure provides for the efficient identification of qualified candidates, proactively manage the recruitment process, and verify the identity and resume of the candidates from end-to-end. The total talent management system provides interview-ready candidates to hiring managers.

[0019] The present disclosure includes a system and method of authenticating candidates using voice mapping, bio metrics and multi call functions. The voice verification for interviews includes mapped audio inputs from multiple interviews. The identification card verification may be verified by a third party. The experience verification includes a system that calculates expected actual experience by identifying the age of the candidate and comparing the age with the experience listed on the resume. The present disclosure may further include a predictive dialer for recruiters to cut down their time on dialing resources to find their availability.

[0020] The present disclosure permits the formation and execution of smart hiring campaigns. There may be a direct sourcing engine by which select job openings are proactively distributed to agencies and individuals using mapping tools and supported by voice sample collections and technical assessments of potential candidates. The smart hiring campaigns may include smart dialer technology for calling and text messaging using SMS or MMS messaging. An analytics engine may be used to populate data relating to recruiting resources and identify resumes using artificial intelligence / machine learning tools and with the help of AI/ML and GIS implementation. Moreover, reports may be generated using predictive analytics.

[0021] The present disclosure may leverage big data analytics and AI/ML algorithms to provide an end-to-end total talent management acquisition that combines all aspects of the search, interview and fulfillment processes with all relevant data accessible from one central hub. [0022] System Operating Environment. Referring to FIG. 1 , the system and method includes a database 10 and a web server 12 having access to the database 10. Multiple clients 16, 18 may access the web server 12 over a communications network 14, such as a telecommunications network, the Internet and the like. The clients 16, 18 may use the web server 12 to conduct interviews of the candidates 20, record and save the interviews to the database 10, and verify the identity of the candidates by comparing the recorded interviews.

[0023] System Architecture. With reference to FIG. lb, there is shown an exemplary functional block diagram of the total talent management system 21 which may, for example, comprise one or more web servers 12 and be a combination of hardware and software modules which provide the functionality. It shall be noted that this is exemplary only and that not all components are needed and there may be other components not shown or described herein. It shall also be understood that not all interconnection lines between functions and subfunctions within the management system 21 are shown, indicating that it is possible that any function or subfunction may communicate with any other function or subfunction.

[0024] The management system 21 may communicate with an external requisition system 22 through APIs 26a, 26b. The requisition system 22 may be operated by a third party seeking to hire qualified candidates, a recruiter looking to match qualified candidates to specific positions, or by an internal operator of the management system 21. While shown as an external requisition system 22, the requisition system 21 may also form part of the management system. The requisition system 27 may provide a user interface that permits the hiring party to manage the talent acquisition process from start to finish, including accessing the results of the pre-screening of candidates from the publishing system 28. The requisition system 22 may receive as inputs HR hiring campaigns, vertical hiring openings and direct sourcing of candidates. Such inputs may, for example, include one or more job postings or descriptions for one or more employers.

[0025] The management system 21 may also be in communication with one or more external servers 23. Such external servers 23 may, for example, be operated by third-party vendors that accumulate and curate resumes or job listings. The management system 21 may also be in communication with one or more internal or external databases 10. [0026] With the management system 21, there is shown an artificial intelligence / machine learning (AI/ML) engine 27. For the purposes of this disclosure, unless otherwise specified, artificial intelligence and machine learning will be used interchangeably and referred to generally by the designation AI/ML. The AI/ML engine 27may serve multiple functions as set forth herein. For example, external servers 37 may be connected to job message boards or third-party databases of resumes. The AI/ML engine 27 may use its algorithms to match resumes from the external servers 37 to postings from the requisition system 22. By way of example, the AI/ML engine 27 may associate experience listed on resumes to qualifications of successful employees at the firm. Likewise, the AI/ML engine 27 may associate an applicant to a pool of applicants that have previously applied for the sought-after position. The AI/ML engine 27 may collect data in a database relating to the reference pool and continue to refine its association algorithms. To do so, AI/ML engine 27 may use linear regression analysis or multiple regression analysis to predict the best matches of resumes to positions. It will be understood that the foregoing algorithms are exemplary only and one or more other AI/ML algorithms may be used.

[0027] The AI/ML engine 27 may also work in conjunction with the authentication or verification system 31. As an initial matter, the AI/ML engine 27 may score the resume and discount those with misspelled words or grammatical errors. Moreover, as set forth above, the AI/ML engine 27 may cull the candidate resume information to provide the top “x” number of matches. Thereafter, the AI/ML powered verification system assists in the review of candidate information, screens and background checks candidates and assists in the shortlisting of qualified talent. The AI/ML engine 27 allows scaling of the system which otherwise cannot be achieved.

[0028] The authentication system 31 may use voice recognition and voice mapping software to confirm the identity of a candidate during an interview as described in more detail below. The authentication system 31 may also use facial recognition software to verify the candidate on a video interview matches the uploaded photograph from a driver’s license or other official document such as a government-issued passport in a process described in more detail below. The authentication system 31 may also use the birthdate information from the driver’s license and/or other official document to gauge whether the candidate’s age matches the level of experience listed on the resume. [0029] The management system 31 may have a telecommunications system interface 30 that interacts with an audio / video telecommunications system (not shown) to schedule audio/video calls for interviews. The telecommunications system interface 30 may also interact with the verification system 31 as described in more detail with reference to FIG 1c.

[0030] The verification system 31 may receive content from an audio/video device 32 through telecommunications systems interface 30. The verification system 31 may have a recorder 37 configured to record interviews and other audio and/or video communications with a candidate. Those videos may be stored and later used by the voice biometrics processor 38 and image processor 39 to verify the identity of the candidate by matching a first voice recording to a second voice recording and matching the image to the stored image obtained from an identification card as set forth below. Unless otherwise specified herein, use of the term voice biometrics processor 38 is synonymous with the term voice verification module.

[0031] The functionality of the voice biometrics processor 38 may, for example, be known in the art. In an aspect, the voice biometrics processor may digitize a profile of a person’s speech to produce a stored voice print similar to storage of a person’s fingerprint. The technology reduces each spoken word to segments having tones comprised of several dominant frequencies which can be compared to other voice samples to determine if the voice sample is from the same or a different person. Applying this known technique, voice biometrics can be used to discriminate between speakers.

[0032] Likewise, the image processor 39 is able to use known techniques in the art to discriminate between two different individuals and to verify that the video of a candidate during the interview matches the photograph of the candidate on the identification card.

[0033] The verification system 31 may interface with an optical scanner 33 and use an optical character recognition processor 35 or the equivalent in order to receive and extract information from an identification card such as a driver’s license or other official document. Such functionality will provide the verification system candidate information including, for example, birthdate (to calculate age), a photograph, address and other information which may be used to verify the authenticity of the resume or the identity of the candidate during subsequent interviews. [0034] The management system 21 may have a rating system 29 that creates a score for each candidate based on one or more factors, including, for example, the similarities of the candidate’s resume to the job description, an evaluation of the candidate by an interviewer, the verification of the identity of the candidate by the verification system 31, and other factors relevant to the hiring decision.

[0035] The management system 21 may have a publishing system 28 which provides an output to internal or external users of the management system 21. Such output may include the top candidates and their respective evaluation scores, the resumes of the top candidates, a recommendation for next steps, an identity certification for the top candidates, a summary of the search process, fees associated with the search process and the external resume databases, if any, and other information that may be relevant to the user.

[0036] The management system 21 may provide other automated or semi-automated functions in addition to those described above. For example, the management system 31 may include candidate reference checking. The management system 21 may include technical screening of candidates, which may, for example, include administering online aptitude or competency testing. The management system 21 may be accessible from a desktop computer or a mobile application.

[0037] The management system 21 may have a memory 6, processor 7 and an input/output interface 8. In an aspect, the processor 7 may be coupled to the input-output interface 8 and further coupled to a memory 6. The memory 6 may have stored thereon executable instructions that when executed by the processor 7 cause the processor 7 to effectuate operations that perform the various exemplary methods of use set forth herein and in the appended claims.

[0038] Application Programming Interfaces. FIG. lb shows an application programming interface between API 26a and API 26b between the management system 21 and the requisition system 22. This provides access for businesses, professional recruiting firms, and other third parties to create an access point to the management system by which job openings or recruiting initiatives may post job requisitions utilize the functionality of the management system 21.

[0039] While only one exemplary API is shown in FIG. lb, additional APIs may be included, examples of which are shown in FIG. Id. Shown is the management system 21 and associated example of a generic API 26 integral with or in communication with the management system 21. There is also shown various APIs 26c through 26i, in communication with API 26, it being understood that API 26 may be adapted to interface with any of the various APIs 26c through 26i or there may be multiple APIs 26 which are customized to interface with APIs 26c through 26i. Also shown is the external servers 23 which may support functionality supported by management system 21 and accessed through API 26 and one or more APIs 26c through 26i. It should be understood that this list of APIs and the system configuration of FIG. Id is exemplary only and there may be additional or less APIs in any given system and there may be different system configurations than that shown.

[0040] Continuing with the description of FIG. Id, there may be an API to one or more job boards wherein operators of such job boards may provide candidate resumes or profiles to meet open requisitions.

[0041] There may also be an API to one or more Applicant Tracking Systems (ATS). Many talent acquisition firms or human resource departments use ATS functionality to assist in automating talent acquisition needs to improve the overall experience of recruiters as well as candidates.

[0042] There may also be a vendor management system (VMS) API, which may, for example include SAP Field glass, Beeline, and other functions. The VMS may, for example, be a web-based, cloud application that acts as a mechanism for businesses to manage and procure staffing services, including temporary or permanent placement services, as well as outside contract or contingent labor. Typical features of a VMS may include, for example, requisition and bid management, timekeeping, consolidated billing, comprehensive reporting and automation workflows to streamline processes while minimizing risks of errors.

[0043] There may be additional APIs for voice biometrics, credit reporting agencies, data and technology programming platforms, and payment processing gateways.

[0044] The API’s may also define standard data formats for ingestion into the management system 21. As such, data from disparate sources such as that from various resume sites can be used by the management system 21. Similarly, data from other third- party sources such as state Departments of Motor Vehicles (DMVs) from various states can be standardized and normalized. It will be understood that each API may translate data from any external third-party source to a format recognized by the management system 21 or such data format translation may occur prior to such data being transmitted to the API. [0045] Candidate Skills Model. FIG le illustrates an exemplary candidate skills model 50 and various inputs which may be considered to build the candidate skills model 50. A candidate’s resume 51 may be used as an initial source input to the candidate skills model 50. In certain embodiments, a potential employer or a staffing agency may have its own application or questionnaire - shown as employer application 57 - to be completed by a candidate which may also serve as a source input to the candidate skills model 50. The employer application may include information typically included in a resume as well as additional information particular to the position being sought, including but not limited to general interests and hobbies, skills assessment data, candidate goals, and any other information which may be relevant to a potential employer.

[0046] Additional inputs to the candidate skills model 50 may be experience levels

52 relevant to the position being sought. Such information may be extracted from a resume, employer application, or other source. For example, a candidate may have 20 years of professional experience, but only 3 years of that experience in the relevant industry. The experience level 52 input may include one or both of such experience levels. A geographical profile input 54 may be included in the candidate skills model 50. Here, a history of the geographic locations a candidate has lived and worked may be included or a geographic preference of the candidate may be included. Such geographic data may, for example be extracted from a resume 51 or employer application 57 or as an input provided by an interviewee to an interviewer. The geographic profile 54 input may also match the geographical history or preferences of a candidate with the geographic limitations or preferences identified by an employer in the position requisition.

[0047] Geographic profile 54 inputs may also be provided as part of third party data 53 input. Third party data 53 may come from external servers and may, for example, include other public information about the candidate’s geographic history. Third party data

53 may also include information from social media posts associated with a candidate, memberships in organizations, driver information, public records, and other information available from external servers 23 deemed to be relevant based on the requisition.

[0048] Often a candidate may provide references which may serve as reference input 58 to the candidate skills model 50. References may come from a former employer, a teacher, a co-worker or other persons that know the candidate well. Other reference inputs may be based on a networking contact that the candidate has within the hiring organization. [0049] As the interview process progresses, communication skills 55 and technical assessments 56 of the candidate may be provided as inputs to the candidate skills model 50.

[0050] The candidate skills model 50 provides a holistic view of the candidate as may be relevant to the position requisition. Moreover, as the candidate skills model 50 is able to ingest additional data as it becomes available, the candidate skills model 50 for any individual candidate may be revised - positively or negatively - at any time.

[0051] Artificial Intelligence and Machine Learning. In an aspect, the direct sourcing and verification engine 42, whereby open job requisitions may be distributed to placement agencies and individual recruiters, may be powered by AI/ML algorithms. The direct sourcing engine may receive input resumes 51 from such placement agencies or individual recruiters which may trigger the development of the candidate skills model 50. Relevant information may be extracted from the resume inputs 51through use of the analytics engine to populate data of resources and resume with the help of Al or ML algorithms and geographic inputs. Al or ML algorithms may be used to create the candidates’ skills models 50. Further support may thereafter be provided by providing voice samples and candidate skills models. In an aspect, smart campaigns are supported by a telecommunications interface to facilitate calling and texting via short message systems (SMS) and multi-media systems (MMS).

[0052] The candidate skills model 50 may then be used as an input to a predictive analytics model which would identify, match and rank qualified candidates to open positions and generate reports to the campaign managers.

[0053] Methods of Use. The following is an exemplary method of the present disclosure with reference to FIGs. 2, 3 and 4. Clients 16, 18 may initially register to access the web server 12 by creating a username and password. The client 16, 18 may do so using a computer accessing the web server 12 over the Internet. The computer includes software, such as an Internet browser, that enables the computer to display information received from the web server 12 on a display device of the computer. The computer may include input devices such as a mouse and a keyboard that allows the client 16, 18 to input data. In certain embodiments, the computer may be a smart device with a touch screen interface, such as a smart phone or a tablet. The smart device may include a software application (app) loaded on a memory. The app allows the clients 16, 18 to sign onto the web server 12 and access the web server over the Internet. [0054] The clients 16, 18 may include at least a first client 16 and a second client 18. The first client 16 may be a recruitment company. The recruitment company may include a recruiter and a recruiter manager. The second client 18 may be a company in search for the employee, i.e. an employer.

[0055] The first client 16 signs into the web server 12 and begins to search for potential candidates via a search portal of the web server 12. In certain embodiments, the database 10 may store a plurality of candidates’ names linked to additional information, such as their geographic location and specialty skills. The web server 12 provides the search portal in which the first client 16 may perform a search of the plurality of candidates within the database 10. In alternative embodiments, the search portal may access external servers 23 associated with other job searching third party websites’ databases, such as, but not limited to DICE™, MONSTER™, CAREERBUILDING™, TECHFETCH™ and the like via the Internet. The first client 10 may thereby search for a candidate using the search portal and in response thereto, the web server 12 pulls candidate profiles from the job searching websites and presents the candidate profiles to the user.

[0056] As set forth above, AI/ML engine 27 may assist with the screening and selection of candidate profiles. The AI/ML engine 27 may include an algorithm that parses resumes to extract information relevant to the position requisition. Alternatively, the AI/ML engine may access and assess parsed resume data received through an API. The AI/ML engine 27 may also access database 10 to access data that may include similar position requisitions and data associated with successful candidates that filled such similar position, such as educational background, years of experience, industry classifications and other data. The algorithm may be seeded with such data and continually leam which candidate profiles tend to be most successful. The AI/ML engine 27, after selecting such candidate profiles, may then receive additional inputs such as those described above with reference to FIG. le, to form a candidate skills model 50 for each candidate profile. The AI/ML engine 27 may then use predictive analytics models, such as forecast models, to predict which candidates will likely be most successful and to rank those candidate profiles based on a numerical score value. Other predictive analytics models may also be used, including, for example, a classification model in which the AI/ML engine 27 separates the data into categories that are applicable to previously successful candidates and then compares the data associated with the current selection of candidate profiles to the data classifications to determine whether a particular candidate is likely to be successful. Clustering models and others may also be used by the AI/ML engine 27.

[0057] Once the search has been performed, the web server 12 provides a list of candidate profiles that either match the search entered by the first client 16 or that were ranked the highest by the AI/ML engine 27. For example, the list may be in the form of cascading style sheet (CSS) files. Each of the candidate profiles may include the candidates name and a brief overview of the candidate. The web server 12 may also display the location of user as well as the time zone to increase recruiter efficiency. The first client 16 may select the candidates name and an expanded candidate profile may be generated. The expanded candidate profile may include additional details of the candidate, and may, for example, include the candidate skills model 50. The additional details may include, but not are limited to, specialty skills, years of experience, location, willingness to relocate, desired job position, hourly rate, salary request and any other data that may be pulled from the job searching websites or that is already stored on the database 10. The first client 16 may review the expanded candidate profile. If the first client 16 is interested in interviewing the candidate, the first client 16 may save the profile to a manage list portal.

[0058] The manage list portal provides a list of all of the candidate profiles which the first client 16 has saved. For example, the list may be in the form of cascading style sheet (CSS) files. When the first client 16 has saved the candidate, the web server 12 prompts the first client 16 to call the candidate 20 and retrieve additional information. The telecom systems interface 30 which may include a smart dialer 41, may be engaged to automatically schedule and call each prospective candidate to be interviewed. In such embodiments, the recruiter of the recruiting company may call the candidate 20 to retrieve additional information. The first client 16 calls the candidate 20 and retrieves the additional information, such as, but not limited to, the candidate’s date of birth, address, email address, a resume to upload, and pictures of the front and back of the candidate’s identification card (state driver’s license/ passport). The first client 16 may enter the information to the web server 12 via the manage list portal. Alternatively, the information may be scanned via an optical scanner 33 and read by the OCR processor 35. The additional information is saved to the database 10. The first interview may be automatically recorded by A/V recorder 37 and saved to the database 10. [0059] Once the additional information has been added, the lists of the candidate profiles, including the most up-to-date candidate skills model 50, may be moved to a candidate list portal. The candidate list portal allows the first client 16 to verify the candidates voice with a voice verification using the voice biometrics processor 38, verify the candidates age with an age verification engine 42 and verify the candidate’s identification card with an identification card verification module (not shown).

[0060] The manager of the recruiter may use the candidate list portal to call the candidate 20 for an interview. The manager may randomly call the candidate to ask technical questions. A second phone call is automatically recorded and saved to the database 10. The manager may select a verify voice button which prompts the web server 12 to use voice recognition software of the voice biometrics processor 38 to compare the first recorded phone call and the second recorded phone call. If the voice verification module determines that the first recorded phone call matches the voice of the second recorded phone call, the web server 12 indicates the same candidate 20 conducted both interviews. If the voice biometrics processor 38 determines that the first recorded phone call does not match the voice of the second recorded phone call, the web server 12 indicates the candidate profile is fraudulent.

[0061] The first client 16 may further verify the user’s identification card and the user’s experience. The manager may further select a verify identification card button which prompts the web server 12 to send the picture of the candidate’s identification card to a third- party verification server. The third-party verification server 37 may communicate with the web server 12 over the communications network 14 and verify that the identification card is not fraudulent. Once the identification card has been verified, the manager may further select a verify experience button, which prompts the web server 12 to compare the age of the candidate 20 with the user’s listed years of experience, which may, for example, be gleaned from the candidate’s resume or employer application 57. The age of the candidate 20 may be pulled by parsing a copy of the identification card. If the listed years of experience is within a possible range of experience based on the candidates age, the web server lists the candidate profile as verified. If the listed years of experience is outside of a possible range of experience based on the candidates age, the web server lists the candidate profile as possibly fraudulent. Because the age of the candidate may be confidential and not used in evaluating candidates, the experience verification in the verification engine may only return a “positive” or “negative” result as to whether the age and experience are within an acceptable range. It may be that the years of experience listed too high for the age of the candidate prompting a negative result. Likewise, the years of experience listed may be too low for the age of the candidate (i.e., 10 years-experience for a 55-year-old) may also prompt a negative result, potentially flagging significant gaps in work experience.

[0062] If the candidate’s identification card, voice and amount of experience has been verified by the web server 12, the first client 16 may then send an email and transfer the record to a second client 18 via a transfer portal. The first client 16 may do so by selecting a transfer button which prompts the first client 16 to enter the second client’s 18 and identifier, such as an email address, phone number, username and the like. The first client 16 enters the second client’s 18 identifier and selects a send button. The web server 12 then transfers the records of the verified candidate profile from the first client 16 to the second client 18. The second client 18 may then interview the candidate 20 and use the voice verification module. The web server 12 allows the second client 18 to dial the phone number of the candidate and automatically records and stores a third recorded phone call. The second client 18 may select a verify voice button which prompts the web server 12 to use the voice recognition software of the voice verification module to compare the third recorded phone call with the first and second recorded phone call. If the voice verification module determines that the third recorded phone call matches the voice of the first and second recorded phone call, the web server 12 may indicate the voice of the candidate 20 has been verified to the second client 18. If the voice verification module determines that the third recorded phone call does not match the voice of the first and second recorded phone call, the web server 12 may indicate the voice of the candidate 20 is fraudulent to the second client 18.

[0063] In certain embodiments, the present disclosure may include a facial recognition module to further authenticate candidates 20. For example, interviews may be conducted via video chat. In such embodiments, a first interview is conducted in which a snapshot of the client is taken, or a recorded video chat is saved to the database 10. The clients 16, 18 may select a verify facial button which prompts the web server 12 to use facial recognition software, such as face biometrics, of the facial verification module, to compare the recorded video chat or snapshot with the picture on the identification card. If the facial verification module determines that the face of the recorded video or snapshot matches the face of the picture on the identification card, the web server 12 indicates the same candidate 20 conducted both interviews. If the facial verification module determines that the recorded video chat or the snapshot does not match the picture on the identification card, the web server 12 indicates the candidate is fraudulent.

[0064] The present disclosure may further include an automatic dialer module. In such embodiments, when the first client 16 adds the candidate profiles from the search results to the manage list portal each of the candidates’ names and phone numbers may be uploaded to a spreadsheet. The automatic dialer module then automatically calls each of the candidates 20 in the order on the spreadsheet. If the candidate 20 answers the phone, the automatic dialer module automatically transfers the candidate to the recruiter (first client 16). If the phone call goes to a voice mail, the automatic dialer module may leave a prerecorded voicemail for the candidate to call a phone number back.

[0065] The computer-based data processing system and method described above is for purposes of example only and may be implemented in any type of computer system or programming or processing environment, or in a computer program, alone or in conjunction with hardware. The present disclosure may also be implemented in software stored on a computer-readable medium and executed as a computer program on a general purpose or special purpose computer. For clarity, only those aspects of the system germane to the disclosure are described, and product details well known in the art are omitted. For the same reason, the computer hardware is not described in further detail. It should thus be understood that the disclosure is not limited to any specific computer language, program, or computer. It is further contemplated that the present disclosure may be run on a stand-alone computer system, or may be run from a server computer system that can be accessed by a plurality of client computer systems interconnected over an intranet network, or that is accessible to clients over the Internet. In addition, many embodiments of the present disclosure have application to a wide range of industries. To the extent the present application discloses a system, the method implemented by that system, as well as software stored on a computer- readable medium and executed as a computer program to perform the method on a general purpose or special purpose computer, are within the scope of the present disclosure. Further, to the extent the present application discloses a method, a system of apparatuses configured to implement the method are within the scope of the present disclosure.

[0066] It should be understood, of course, that the foregoing relates to exemplary embodiments of the disclosure and that modifications may be made without departing from the spirit and scope of the disclosure as set forth in the following claims. [0067] In describing preferred methods, systems, or apparatuses of the subject matter of the present disclosure as illustrated in the Figures, specific terminology is employed for the sake of clarity. The claimed subject matter, however, is not intended to be limited to the specific terminology so selected, and it is to be understood that each specific element includes all technical equivalents that operate in a similar manner to accomplish a similar purpose. In addition, the use of the word “or” is generally used inclusively unless otherwise provided herein.

[0068] This written description uses examples to enable any person skilled in the art to practice the claimed subject matter, including making and using any devices or systems and performing any incorporated methods. The patentable scope of the disclosed subject matter is defined by the claims and may include other examples that occur to those skilled in the art (e.g., skipping steps, combining steps, or adding steps between exemplary methods disclosed herein). Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements with insubstantial differences from the literal languages of the claims.