US Patent Application 17661776. SYSTEMS AND METHODS FOR DETECTING AND/OR PREVENTING VISHING ATTACKS USING USER-GENERATED AUTHENTICATION INFORMATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR DETECTING AND/OR PREVENTING VISHING ATTACKS USING USER-GENERATED AUTHENTICATION INFORMATION

Organization Name

Capital One Services, LLC


Inventor(s)

Jennifer Kwok of Brooklyn NY (US)

Dwij Trivedi of Oakton VA (US)

Abhay Donthi of Arlington VA (US)

Leeyat Bracha Tessler of Arlington VA (US)

Salik Shah of Bethesda MD (US)

SYSTEMS AND METHODS FOR DETECTING AND/OR PREVENTING VISHING ATTACKS USING USER-GENERATED AUTHENTICATION INFORMATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17661776 titled 'SYSTEMS AND METHODS FOR DETECTING AND/OR PREVENTING VISHING ATTACKS USING USER-GENERATED AUTHENTICATION INFORMATION

Simplified Explanation

The abstract describes a computer-implemented method for authenticating the source of a telephone call to the recipient of the call. Here are the key points:

  • The method involves receiving a request to input first authentication information before receiving the telephone call.
  • The first authentication information can be a passcode or a selection of a security question.
  • The user device sends the first authentication information to a computing device associated with the source of the call.
  • The telephone call is received from the source, and the recipient answers the call.
  • The computing device sends second authentication information, which can be the passcode or an answer to the security question.
  • The second authentication information is outputted.

Overall, this method aims to provide a secure way to authenticate the source of a telephone call before the recipient answers it, using a combination of first and second authentication information.


Original Abstract Submitted

A computer-implemented method for authenticating a source of a telephone call to a recipient of the telephone call may include receiving, prior to receiving the telephone call, a request to input first authentication information. The first authentication information may include a passcode or a selection of a security question. The method may include receiving input of the first authentication information and sending, by the user device, the first authentication information to a computing device associated with the source of the telephone call. The method may include receiving the telephone call from the source and receiving input from the recipient of the telephone call to answer the telephone call. The method may include receiving second authentication information from the computing device, where the second authentication information may include the passcode or an answer to the security question. The method may include outputting the second authentication information.