Secure remote data submission for IVR systems

    公开(公告)号:US11677872B2

    公开(公告)日:2023-06-13

    申请号:US17400435

    申请日:2021-08-12

    IPC分类号: H04M3/493 H04L9/40

    CPC分类号: H04M3/4936 H04L63/0861

    摘要: Apparatus and methods for enhancing security of an authentication process of a caller that initiated a call in an Interactive Voice Response (“IVR”) system are provided. The methods may include routing the call through the IVR system to a headset. After the routing, the methods may include retrieving data associated with the caller. In response to the retrieved data meeting one or more predetermined conditions, a graphical user interface of an agent computer paired to the headset may display a plurality of validation information for validating the caller. Selection by the agent of validation information may trigger methods for transmitting a request to the caller, via a caller mobile phone, to input the validation information selected by the agent. The methods may additionally include authenticating the caller based at least in part on the information input into the mobile phone.

    SECURE REMOTE DATA SUBMISSION FOR IVR SYSTEMS

    公开(公告)号:US20230050098A1

    公开(公告)日:2023-02-16

    申请号:US17400435

    申请日:2021-08-12

    IPC分类号: H04M3/493 H04L29/06

    摘要: Apparatus and methods for enhancing security of an authentication process of a caller that initiated a call in an Interactive Voice Response (“IVR”) system are provided. The methods may include routing the call through the IVR system to a headset. After the routing, the methods may include retrieving data associated with the caller. In response to the retrieved data meeting one or more predetermined conditions, a graphical user interface of an agent computer paired to the headset may display a plurality of validation information for validating the caller. Selection by the agent of validation information may trigger methods for transmitting a request to the caller, via a caller mobile phone, to input the validation information selected by the agent. The methods may additionally include authenticating the caller based at least in part on the information input into the mobile phone.