G06F21/313

System and method for generating an interaction request

A method and system are provided for processing context data for interaction sessions for providing a subset of the context data for a first interaction session. The method includes detecting the first interaction session between a request initiator and a request service provider, and obtaining context data of a plurality of other interaction sessions. The context data is related to activity of the request initiator. The method also includes selecting the subset of the context data based on at least one of relevance, similarities and differences to at least one of the first interaction session and type of interaction channel. The subset of the context data is then provided for the first interaction session.

DISPOSABLE BROWSERS AND AUTHENTICATION TECHNIQUES FOR A SECURE ONLINE USER ENVIRONMENT

Disclosed herein are systems and methods that allow for secure access to websites and web-based applications. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.

Disposable Browsers and Authentication Techniques for a Secure Online User Environment

Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.

Communication Channel Enhancement
20210084144 · 2021-03-18 ·

A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests and/or customer service agent control over a customer's access device. Some embodiments include logic configured to manage and enhance communication channels between devices.

QUEUE MANAGEMENT BASED ON BIOMETRIC AUTHENTICATION
20210084035 · 2021-03-18 ·

A method performed by a user device may include obtaining biometric information relating to a user of the user device using a biometric sensor of the user device; determining that the biometric information is valid; generating a biometric indicator indicating that the biometric information is valid; providing a request for a callback from an entity, wherein the request includes the biometric information indicating that the biometric information is valid; and receiving the callback from the entity, wherein the callback is received based on the biometric information indicating that the biometric information is valid, and wherein the callback is associated with an entity identifier that is not provided to the user.

System And Apparatus For Providing Authenticable Electronic Communication
20210091962 · 2021-03-25 ·

The present disclosure relates to security risk warning system that a recipient may acknowledge and act accordingly. Security insights may be provided explicitly in a security insight panel that may clearly identify vulnerabilities specific to a particular authenticable communication. This may limit risk that a recipient would ignore or not understand the risk. Security insights may be provided for a combination of indicated source, recipients, and content, such as links, text, attachments, and images. Security insights may be provided on site, such as on or proximate to the reviewed portions of the authenticable communication.

Method and a server for authenticating a user with a mobile device
10897711 · 2021-01-19 · ·

The present invention relates to a method for authenticating a user for services, by means of a mobile phone, comprising: receiving, by a server from a service, a request to authenticate a user, assigning an unique access number by the server, presenting the access number from the server to the user via the service, receiving, by the server by means of a terminal device that services the access number, information about a call performed by the user to the access number, the information containing at least the access number and the user's MSISDN, performing, by the server, a basic authentication of the user, comprising at least reading the user's MSISDN and the access number, transferring the result of the basic authentication from the server to the service. The invention also relates to a system authenticating a user, USER, by means of a mobile device.

DEVICE LOCKDOWN
20210012018 · 2021-01-14 ·

Methods, systems, and apparatus, including computer programs encoded on a storage device, for securing device data in response to an event. A method includes receiving an instruction to initiate execution of a user device data protection protocol after a determination by a monitoring unit that an event has occurred at a property, determining whether the user device is located at the property, and in response to a determination that the user device is located at the first location, displaying a prompt that asks if the user device data protection protocol should be canceled. The method also include actions of determining whether user feedback responsive to the prompt has been received by the user device within a predetermined amount of time, and in response to a determination that the predetermined amount of has expired without receiving user feedback, performing one or more data protection operations to protect user device data.

Contact center authentication

A method of authenticating a service agent on behalf of a user, the method performed at a server and including: obtaining a unique identifier associated with a first communication session established over a first communication channel; storing the unique identifier in a data store; receiving, via a second communication channel, a validation request comprising verification information associated with the user; attempting authentication of the service agent by comparing the verification information with the unique identifier, and in response outputting a validation response via the second communication channel. If the verification information corresponds with the unique identifier, the validation response indicates successful authentication of the service agent, and if the verification information does not correspond with the at least one unique identifier, the validation response indicates unsuccessful authentication of the service agent.

SYSTEMS AND METHODS FOR AUTHENTICATION AND FRAUD DETECTION

Systems and methods are provided to stop both external and internal fraud, ensure correct actions are being followed, and information is available to fraud teams for investigation. The system includes components that can address: 1) behavioral analytics (ANI reputation, IVR behavior, account activity)this gives a risk assessment event before a call gets to an agent; 2) fraud detectionthe ability to identify, in real time, if a caller is part of a fraudster cohort and alert the agent and escalate to the fraud team; 3) identity authenticationthe ability to identify through natural language if the caller is who they say they are; and 4) two factor authenticationthe ability to send a text message to the caller and automatically process the response and create a case in the event of suspected fraud.