Computer-implemented system and method for protecting sensitive information within a call center in real time
First Claim
1. A computer-implemented system for protecting sensitive information within a call center in real time, comprising:
- a computer readable storage medium storing executable code;
a central processing unit in communication with the computer readable storage medium, wherein the central processing unit when executing the executable code;
receives a call from a caller;
assigns the call to an agent;
receives non-sensitive information from the caller entered via a user interface by the agent;
transfers the caller to an automated voice response system to which sensitive information is provided;
places the agent on hold while the caller is transferred to the automated voice response system;
maintains the call while the agent is on hold;
provides a status of the sensitive information to the agent;
transfers the caller to the agent, wherein the agent provides the caller with the status of the sensitive information;
automatically populates at least one field within the user interface based on the status of the sensitive information; and
terminates the call.
16 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented system and method for protecting sensitive information within a call center in real time is provided. A call from a caller is received within a call center. The call is assigned to an agent and a determination is made as to when the caller is to provide sensitive information. The user is transferred to an automated voice response system to which the sensitive information is provided, while maintaining the call with the agent. The caller is returned to the agent upon providing the sensitive information. A notification regarding a status of the sensitive information is sent and the call is terminated.
21 Citations
16 Claims
-
1. A computer-implemented system for protecting sensitive information within a call center in real time, comprising:
-
a computer readable storage medium storing executable code; a central processing unit in communication with the computer readable storage medium, wherein the central processing unit when executing the executable code; receives a call from a caller; assigns the call to an agent; receives non-sensitive information from the caller entered via a user interface by the agent; transfers the caller to an automated voice response system to which sensitive information is provided; places the agent on hold while the caller is transferred to the automated voice response system; maintains the call while the agent is on hold; provides a status of the sensitive information to the agent; transfers the caller to the agent, wherein the agent provides the caller with the status of the sensitive information; automatically populates at least one field within the user interface based on the status of the sensitive information; and terminates the call. - View Dependent Claims (2, 3, 4, 5, 6, 7, 15)
-
-
8. A computer-implemented method for protecting sensitive information within a call center in real time, comprising:
-
receiving, by a central processing unit, a call from a caller; assigning, by the central processing unit, the call to an agent; receiving, by the central processing unit, via a user interface non sensitive information from the caller and entered in the user interface by the agent; transferring, by the central processing unit, the caller to the automated voice response system to which sensitive information is provided; placing, by the central processing unit, the agent on hold while the caller is transferred to the automated voice response system; maintaining, by the central processing unit, the call while the agent is on hold; providing, by the central processing unit, a status of the sensitive information to the agent; transferring, by the central processing unit, the caller to the agent, wherein the agent provides the caller with the status of the sensitive information; automatically populating, by the central processing unit, at least one field within the user interface based on the status of the sensitive information; and terminating, by the central processing unit, the call. - View Dependent Claims (9, 10, 11, 12, 13, 14, 16)
-
Specification