Patent classifications
H04M2203/6072
Remote access control
A system that allows a user to access a secured area by confirming location of the user near the secured area and receipt of an access word by the system. A user in possession of a mobile device may be detected at the entrance to a secured location. The system can select a question asking for a passcode corresponding to certain access to the secured location. The question can be spoken to a user through a loudspeaker at the secured location. The user's spoken response can be processed by the system, for example using keyword spotting, to determine if the proper access word is included. If it is, the system can grant access to the secured area.
SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING USER AUTHENTICATION FOR A VOICE-BASED COMMUNICATION SESSION
A method includes: in response to a request from a human user to access account information, authenticating the human user via a graphical user interface (GUI); storing a result of authenticating the human user in a storage system; in response to authenticating the human user, directing the human user to a voice-based communication session; accessing the result of authenticating the human user from the storage system by the voice-based communication session; and providing access by the human user to the account information in the voice-based communication session based on the result of authenticating the human user.
CHANNEL-BASED VOICE CALL METHOD AND APPARATUS
A channel-based voice call method, including: accepting a matching request of a client, acquiring a matching result of the client from a matching pool, and returning the matching result to the client; and acquiring a call matching acceptance instruction of the client, allocating a temporary channel and locking the temporary channel, and sending a successfully accepted matching message, a temporary channel number and a channel password to the client, such that the client enters the temporary channel based on the successfully accepted matching message, the temporary channel number and the channel password to make a call.
SYSTEM AND METHOD FOR SECOND FACTOR AUTHENTICATION TO PERFORM SERVICES
A system and method are disclosed that leverage multi-factor authentication features of a service provider and intelligent call routing to increase security and efficiency at a customer call center. Pre-authentication of customer support requests reduces the potential for misappropriation of sensitive customer data during call handling. A contactless card uniquely associated with a client may provide a second factor of authentication via a backchannel to reduce the potential for malicious third-party impersonation of the client prior to transfer of the call to the customer call center. Pre-authorized customer support calls may be intelligently and efficiently routed directly to call center agents, without incurring further delay. During call handling, call center agents may initiate further client authentication processes, including contactless card authentication requests, over one or more different communication channels for authorizing access to sensitive information or to allay suspicion.
Methods and systems for authenticating a user on a call
Methods and systems described in this disclosure allow customers to quickly be authenticated. In some embodiments, a device and a user verifier are associated with a user profile. When a call is received from the device, the user may be requested to input the user verifier. After verifying that the device is unique to the user and that the user verifier matches the user verifier associated with the user profile, the user may be authenticated to the call or activity.
Secure authentication of a user
A device detects a communication involving a user associated with an account and a service representative, and sends, to a user device associated with the account, an authentication notification that causes the user device to display an authentication field for the user. The device sends, to a service representative device associated with the service representative, a message that indicates that the service representative is to request, via the communication, the user to enter personal information associated with the user into the authentication field, where the user device is configured to generate a first authentication code based on a user input received from the user device in the authentication field. The device generates a second authentication code based on personal information associated with the account from a data structure, receives the first authentication code, and performs an action based on the first authentication code and the second authentication code.
REMOTE ACCESS CONTROL
A system that allows a user to access a secured area by confirming location of the user near the secured area and receipt of an access word by the system. A user in possession of a mobile device may be detected at the entrance to a secured location. The system can select a question asking for a passcode corresponding to certain access to the secured location. The question can be spoken to a user through a loudspeaker at the secured location. The user's spoken response can be processed by the system, for example using keyword spotting, to determine if the proper access word is included. If it is, the system can grant access to the secured area.
SYSTEM AND METHOD FOR INTERRUPTING AN INCOMING UNWANTED CALL ON A MOBILE DEVICE
A method of interrupting an incoming call on a mobile device includes: intercepting an incoming telephone call received by a mobile device; determining one or more parameters of the intercepted telephone call; determining if the intercepted telephone call matches one or more telephone calls associated with a list of prohibited phone numbers by comparing the determined parameters of the intercepted call with parameters of the one or more telephone calls associated with the list of prohibited phone numbers; and in response to determining a match between the intercepted telephone call and the one or more telephone calls associated with the list of prohibited phone numbers: blocking reception of the intercepted telephone call; identifying a calling party associated with the intercepted telephone call; sending an authentication request to the identified calling party; and interrupting the intercepted telephone call in response to unsuccessful authentication.
Methods and systems for inbound and outbound call control
Methods, devices, and systems can include, for example, receiving an incoming call and identification information and determining whether the identification information indicates that the incoming call is legitimate. The identification information is associated with the incoming call. The incoming call is received at a call control unit. The call control unit is associated with a telephone, and the incoming call is directed to the telephone. In response to a determination that the identification information indicates that the incoming call is legitimate, generating an indication that the incoming call is legitimate (where the indication is generated by the call control unit) and communicating the indication that the incoming call is legitimate to the telephone. In response to a determination that the identification information indicates that the incoming call is not legitimate, determining a telephone number of the incoming call and communicating the telephone number and the identification information to a server.
Multi-Factor Message Authentication
Systems, methods, and apparatuses are described for authenticating a user device and/or user application. A user device may receive, based on a first authentication request, a plurality of messages sent over a plurality of channels of communication (e.g., a message to a URL address associated with the user device and a binary Short Message Service (SMS) message). Based on information from the messages, the user device may transmit a second authentication request.