System and method for securing transactions in a contact center environment
First Claim
1. A method for protecting confidential user information employed in an electronic user transaction comprising:
- initiating a user transaction in an electronic transactional system employing confidential user information of a user;
associating with the confidential user information a limited-use indicator indicating a limited use of the confidential user information to produce an authorization indicator;
transmitting the authorization indicator to a recipient for use in conducting the user transaction;
receiving an agent identifier of a contact center agent, wherein the agent identifier is provided by a provider to a user device;
communicating, by the user device to the provider, the agent identifier and the confidential user information; and
transmitting the authorization indicator to the provider for verifying whether the limited use is met and whether the transaction should therefore be authorized in accordance with the limited use.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for protecting confidential user information employed in an electronic transaction. The system and method provide for associating an expiration time/time period, use or other use-limiting authorization indicator with a credit card or other user information to be transferred to a user information recipient, in conjunction with a product/service payment or other business transaction with a hosted contact center. Embodiments of the invention further provide for forming a limited-use indicator, such as a use-limiting token, by associating a transaction agent indicator and a use-limiting indicator with the user information, and for verifying a limited use indicator received from a contact center agent and determining according to such indicator, in addition to any ordinary verification that might also be conducted, whether the use limitation has been met and whether the transaction should be authorized in accordance with the use limitation.
-
Citations
23 Claims
-
1. A method for protecting confidential user information employed in an electronic user transaction comprising:
-
initiating a user transaction in an electronic transactional system employing confidential user information of a user; associating with the confidential user information a limited-use indicator indicating a limited use of the confidential user information to produce an authorization indicator; transmitting the authorization indicator to a recipient for use in conducting the user transaction; receiving an agent identifier of a contact center agent, wherein the agent identifier is provided by a provider to a user device; communicating, by the user device to the provider, the agent identifier and the confidential user information; and transmitting the authorization indicator to the provider for verifying whether the limited use is met and whether the transaction should therefore be authorized in accordance with the limited use. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
initiating a transaction with an agent in a contact center; receiving an agent identifier for the agent from the contact center; determining a limited use indicator, the limited use indicator received from a provider and corresponding to the agent identifier; sending the limited use indicator with confidential information to the contact center for authorization in the transaction, wherein the contact center communicates the limited use indicator and the confidential information to the provider for verifying whether the limited use is met in the transaction; and receiving, from the contact center, an authorization indication whether the limited use is met. - View Dependent Claims (16, 17)
-
-
18. A method comprising:
-
sending, from a contact center, an agent identifier to a user device for a transaction being conducted between the user device and the contact center, wherein the user device associates confidential information and a limited use indicator that is received from a provider and corresponds to the agent identifier; receiving the limited use indicator and the confidential information from the user device; sending the limited use indicator and the confidential information to the provider for verifying whether the limited use is met and whether the transaction should be authorized in accordance with the limited use; and receiving a response from the provider indicating whether the transaction should be authorized in accordance with the limited use. - View Dependent Claims (19, 20)
-
-
21. A method comprising:
-
sending a limited use indicator to a user device, wherein the user device associates the limited use indicator with confidential information and an agent identifier for an agent of a call center for a transaction, wherein the limited use indicator corresponds to the agent identifier; receiving a verification request from the call center, the verification request including the limited use indicator and the confidential information; verifying whether the limited use is met and whether the transaction should be authorized in accordance with the limited use based on the limited use indicator and the confidential information; and sending a response to the call center indicating whether the transaction is authorized in accordance with the limited use. - View Dependent Claims (22, 23)
-
Specification