Systems and methods for authenticating a caller using biometric authentication
First Claim
Patent Images
1. A method comprising:
- receiving, via a first network, a call from a device associated with a caller;
determining whether the caller is qualified for authentication via a first method of authentication,wherein determining whether the caller is qualified for authentication via the first method of authentication comprises determining whether a mobile application of an organization has been downloaded to the device;
in response to the caller being qualified for authentication via the first method of authentication, collecting authentication credentials via the first method of authentication;
in response to the caller being unqualified for authentication via the first method of authentication, determining whether the caller is qualified for authentication via a second method of authentication;
in response to the caller being qualified for authentication via the second method of authentication;
sending, via a second network, to an issuer of the device, a request to initiate a biometric authentication process on the device, wherein biometric credentials are received by the device;
receiving, via the second network from the issuer of the device, an indication of whether the biometric credentials were verified; and
authenticating the caller to the call or requiring additional authentication credentials based on whether the biometric credentials were verified.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems described in this disclosure receive a call from a device associated with a caller and determine whether the caller is eligible for biometric authentication via the device by sending, via a communications network, an eligibility determination request to an issuer of the device. In response to the caller being eligible for biometric authentication, a request to initiate a biometric authentication process on the device is sent to an issuer of the device, where biometric credentials are received by the device and an indication of whether the biometric credentials were verified is received from the issuer of the device.
20 Citations
17 Claims
-
1. A method comprising:
-
receiving, via a first network, a call from a device associated with a caller; determining whether the caller is qualified for authentication via a first method of authentication, wherein determining whether the caller is qualified for authentication via the first method of authentication comprises determining whether a mobile application of an organization has been downloaded to the device; in response to the caller being qualified for authentication via the first method of authentication, collecting authentication credentials via the first method of authentication; in response to the caller being unqualified for authentication via the first method of authentication, determining whether the caller is qualified for authentication via a second method of authentication; in response to the caller being qualified for authentication via the second method of authentication; sending, via a second network, to an issuer of the device, a request to initiate a biometric authentication process on the device, wherein biometric credentials are received by the device; receiving, via the second network from the issuer of the device, an indication of whether the biometric credentials were verified; and authenticating the caller to the call or requiring additional authentication credentials based on whether the biometric credentials were verified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An authentication platform comprising:
-
one or more processors; and a computer readable storage medium having instructions stored thereon, which when executed by the one or more processors cause the authentication platform to; receive, via a first network, a call from a device associated with a caller, determine whether the caller is qualified for authentication via a first method of authentication, wherein determining whether the caller is qualified for authentication via the first method of authentication comprises determining whether a mobile application of an organization has been downloaded to the device, in response to the caller being qualified for authentication via the first method of authentication, collect authentication credentials via the first method of authentication, in response to the caller being unqualified for authentication via the first method of authentication, determine whether the caller is qualified for authentication via a second method of authentication, in response to the caller being qualified for authentication via the second method of authentication; send, via a second network, to an issuer of the device a request to initiate a biometric authentication process on the device, wherein biometric credentials are received by the device, receive, via the second network from the issuer of the device, an indication of whether the biometric credentials were verified, and authenticate the caller to the call or require additional authentication credentials based on whether the biometric credentials were verified. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable storage medium comprising a set of instructions stored thereon, that when executed by a processor, perform operations comprising:
-
receiving, via a first network, a call from a device associated with a caller; determining whether the caller is qualified for authentication via a first method of authentication, wherein determining whether the caller is qualified for authentication via the first method of authentication comprises determining whether a mobile application of an organization has been downloaded to the device; in response to the caller being qualified for authentication via the first method of authentication, collecting authentication credentials via the first method of authentication; in response to the caller being unqualified for authentication via the first method of authentication, determining whether the caller is qualified for authentication via a second method of authentication; in response to the caller being qualified for authentication via the second method of authentication; sending, via a second network, to an issuer of the device a request to initiate a biometric authentication process on the device, wherein biometric credentials are received by the device; receiving, via the second network from the issuer of the device, an indication of whether the biometric credentials were verified; and authenticating the caller to the call or require additional authentication credentials based on whether the biometric credentials were verified.
-
Specification