Patent Issued for Data access system for representatives (USPTO 11758039): United Services Automobile Association - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
September 29, 2023 Newswires
Share
Share
Post
Email

Patent Issued for Data access system for representatives (USPTO 11758039): United Services Automobile Association

Insurance Daily News

2023 SEP 29 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- From Alexandria, Virginia, NewsRx journalists report that a patent by the inventors Adam, Patrick (Helotes, TX, US), Anaruk, Andrew L. (San Antonio, TX, US), Fernandez, Gabriel Carlos (San Antonio, TX, US), Goos, Benjamin (San Antonio, TX, US), Maldonado, Ana (San Antonio, TX, US), filed on November 10, 2021, was published online on September 12, 2023.

The patent’s assignee for patent number 11758039 is United Services Automobile Association (San Antonio, Texas, United States).

News editors obtained the following quote from the background information supplied by the inventors: “Companies constantly try to find the proper amount of data access for employees. That is, employees need to have enough access to perform their job duties but generally do not need access to all information. Data access for employees such as customer service representatives is becoming increasingly important as privacy becomes a further concern for companies.

“The techniques introduced here may be better understood by referring to the following Detailed Description in conjunction with the accompanying drawings, in which like reference numerals indicate identical or functionally similar elements. Moreover, while the technology is amenable to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and are described in detail below. The intention, however, is not to limit the technology to the particular embodiments described. On the contrary, the technology is intended to cover all modifications, equivalents, and alternatives falling within the scope of the technology as defined by the appended claims.”

As a supplement to the background information on this patent, NewsRx correspondents also obtained the inventors’ summary information for this patent: “As privacy becomes a focus for many companies, companies that store customer information are being forced to control data access to customer information. That is, some employees have access to customer data while others will have little or no access to customer data. There are easy cases in which access does not need to be granted to employees. For example, property inspectors do not need access to the homeowner’s personal information such as social security number, mortgage, employment status and birthday. However, a customer or member service representative (“representative”) may, during the course of a call with a customer, need access to various information to better serve the customer.

“Current systems lack to the technology to adequately protect customer information and allow representatives to perform their job duties. Current systems provide access to all customer information to representatives, regardless of the type of information being requested or discussed. While convenient, providing such uncontrolled access can cause issues. For example, in some circumstances, representatives may use the information carelessly or nefariously. Should the representative notice something interesting in the customer’s profile, the representative may review the user’s social media pages or finances out of curiosity. In other circumstances, the representative could collect a customer’s information and sell it or otherwise partake in illegal activities. Even if the representative does nothing with the customer data, providing access to the customer data can put the company and/or employee at risk of claims. Another issue of providing unlimited customer data to representatives is that fraudsters may trick the representative into giving out customer data. For example, a fraudster may ask the representative about some of the customer’s past or personal information to use in other scenarios (e.g., “What color was my last Honda?” or “What birth date do you have for me in the system?”). In many cases, much of the user’s personal information is not relevant to the call (e.g., the user’s birth date, social security number).

“Systems and methods disclosed herein address the challenge of adequately protecting customer information and yet allowing a representative to perform his or her duties. In some embodiments, an organization receives a call from a user. The call can be received by an interactive voice response (IVR) system and the user can provide identification and, in some cases, authentication information. The IVR system can determine the subject matter the user is calling about (e.g., home insurance, property claim). When the call is routed to a representative, the system can monitor the call between the user and the representative. The user can have an associated profile with data about the user (e.g., birthday, family members, salary, employment status, products or services with the organization). Such data can be locked such that the representative cannot access the data. As the user and the representative converse, the system can continuously convert the speech from the call into text. The system can determine an intent of the call and what information the representative needs to know based on an analysis of the text. A portion of the data form the user’s profile can be unlocked based on the determined intent of the call. Such unlocked data can be displayed on a display screen of the representative or the representative can access the unlocked data in another way. As the user and the representative continue conversing, additional data can be unlocked as needed.

“The user may request additional information about a product or about himself or herself that is outside of the initial subject matter of the call. Assuming the data is unlocked, the representative can provide such information to the user. As the conversation continues and the speech is determined and analyzed for intent, the system can indicate to the representative the information by flashing the information on the screen or highlighting a certain portion of the screen or bringing up an automated chat box with the answer.

“If, on the other hand, the user asks for information that is still part of the locked data, the representative can ask the user to provide authentication data (e.g., birthday) to further verify the user’s identity before handing out additional or more sensitive information. The authentication data can be input into a one-way function such as a hash function. The system can compare the output of the authentication data after being hashed with the output of previously provided and hashed data using the same hash function. If the outputs (hashes) are the same, then the user has provided correct information and the user’s trust level has been elevated such that additional data can be unlocked and displayed on the representatives display screen or otherwise provided to the representative. Thus, the sensitive data can stay protected if the user cannot provide the proper credentials. In response to the user not providing the proper authentication information, the call can be transferred to a fraud unit or other service equipped to handle calls needing additional authentication.”

The claims supplied by the inventors are:

“1. A computerized method comprising: monitoring a call between a user and a representative regarding a subject matter, wherein the user has a user profile with personal information of the user, and wherein the personal information is locked such that the representative cannot initially access the personal information; at multiple points during the call, converting, by a processor, audio from the call between the user and the representative on the call, into text; determining an intent of the call based on the text; generating a list of at least one product or service to market to the user based on the user profile of the user and the intent of the call, wherein the representative can view the list of the at least one product or service; unlocking a portion of the personal information in the user profile based on the list of the at least one product or service, wherein the representative can view the at least one product or service and the unlocked portion of the personal information in the user profile for the at least one product or service; displaying a visual indication, in the unlocked portion of the personal information in the user profile, to identify at least one item in the user profile related to the list of the at least one product or service; receiving authentication information from the user to unlock an additional portion of the personal information; authenticating the user based on the received authentication information using a one-way function; and in response to authenticating the user, unlocking the additional portion of the personal information for access by the representative.

“2. The computerized method of claim 1, further comprising: training a model to determine, based on text from multi-party speech inputs of multiple calls, call intents by analyzing the text with the model.

“3. The computerized method of claim 1, further comprising: receiving, from the user, a request for information relating to the user; and in response to the information being part of the locked portion of the personal information, requesting the authentication information from the user.

“4. The computerized method of claim 1, wherein the one-way function is a hash function, the method further comprising: verifying the received authentication information based on a comparison of an output of the hash function with an output of the authentication information previously input into the hash function.

“5. The computerized method of claim 1, further comprising: displaying the unlocked additional portion of the personal information on a display screen of the representative.

“6. The computerized method of claim 1, further comprising: inputting the received authentication information into the one-way function; comparing an output of the one-way function with an output of the authentication information previously input into the one-way function; determining, based on the comparison, the output of the one-way function does not match the output of the authentication information; and transferring the call to a different representative based on the output of the one-way function not matching the output of the authentication information.

“7. A non-transitory, computer-readable medium storing instructions that, when executed by a computing system, cause the computing system to perform operations comprising: monitoring a call between a user and a representative regarding a subject matter, wherein the user has a user profile with personal information of the user, and wherein the personal information is locked such that the representative cannot initially access the personal information; at multiple points during the call, converting, by a processor, audio from the call between the user and the representative on the call, into text; determining an intent of the call based on the text; generating a list of at least one product or service to market to the user based on the user profile of the user and the intent of the call, wherein the representative can view the list of the at least one product or service; unlocking a portion of the personal information in the user profile based on the list of the at least one product or service, wherein the representative can view the at least one product or service and the unlocked portion of the personal information in the user profile for the at least one product or service; displaying a visual indication, in the unlocked portion of the personal information in the user profile, to identify at least one item in the user profile related to the list of the at least one product or service; receiving authentication information from the user to unlock an additional portion of the personal information; authenticating the user based on the received authentication information using a one-way function; and in response to authenticating the user, unlocking the additional portion of the personal information for access by the representative.

“8. The non-transitory, computer-readable medium of claim 7, wherein the operations further comprise: training a model to determine, based on text from multi-party speech inputs of multiple calls, call intents by analyzing the text with the model.

“9. The non-transitory, computer-readable medium of claim 7, wherein the operations further comprise: receiving, from the user, a request for information relating to the user; and in response to the information being part of the locked portion of the personal information, requesting the authentication information from the user.

“10. The non-transitory, computer-readable medium of claim 7, wherein the one-way function is a hash-function, wherein the operations further comprise: verifying the received authentication information based on a comparison of the authentication information with previously stored authentication information from the hash-function.

“11. The non-transitory, computer-readable medium of claim 7, wherein the operations further comprise: in response to unlocking the additional portion of the personal information, displaying the unlocked additional portion of the personal information on a display screen of the representative.

“12. The non-transitory, computer-readable medium of claim 7, wherein the operations further comprise: determining the authentication information is not valid; and in response to determining the authentication information is not valid, transferring the call to a different representative.

“13. A computing system comprising: one or more processors; and one or more memories storing instructions that, when executed by the one or more processors, cause the computing system to perform a process comprising: monitoring a call between a user and a representative regarding a subject matter, wherein the user has a user profile with personal information of the user, and wherein the personal information is locked such that the representative cannot initially access the personal information; at multiple points during the call, converting, by a processor, audio from the call between the user and the representative on the call, into text; determining an intent of the call based on the text; generating a list of at least one product or service to market to the user based on the user profile of the user and the intent of the call, wherein the representative can view the list of the at least one product or service; unlocking a portion of the personal information in the user profile based on the list of the at least one product or service, wherein the representative can view the at least one product or service and the unlocked portion of the personal information in the user profile for the at least one product or service; displaying a visual indication, in the unlocked portion of the personal information in the user profile, to identify at least one item in the user profile related to the list of the at least one product or service; receiving authentication information from the user to unlock an additional portion of the personal information; authenticating the user based on the received authentication information using a one-way function; and in response to authenticating the user, unlocking the additional portion of the personal information for access by the representative.

“14. The computing system according to claim 13, wherein the process further comprises: training a model to determine, based on text from multi-party speech inputs of multiple calls, call intents by analyzing the text with the model.

“15. The computing system according to claim 13, wherein the process further comprises: receiving, from the user, a request for information relating to the user; and in response to the information being part of the locked portion of the personal information, requesting authentication information from the user.

“16. The computing system according to claim 13, wherein the process further comprises: inputting the received authentication information into the one-way function; and verifying the received authentication information based on a comparison of an output of the one-way function with an output of the authentication information previously input into the one-way function.

“17. The computing system according to claim 13, wherein the process further comprises: in response to unlocking the additional portion of the personal information, displaying the unlocked additional portion of the personal information on a display screen of the representative.”

For additional information on this patent, see: Adam, Patrick. Data access system for representatives. U.S. Patent Number 11758039, filed November 10, 2021, and published online on September 12, 2023. Patent URL (for desktop use only): https://ppubs.uspto.gov/pubwebapp/external.html?q=(11758039)&db=USPAT&type=ids

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Patent Issued for Systems and methods for homeowner-directed risk of property damage mitigation (USPTO 11756134): State Farm Mutual Automobile Insurance Company

Newer

Reports Outline Risk Management Study Results from Chinese Academy of Engineering (Food Security Resilience and Risk Management Strategy in China in the Context of “Dual Circulation”): Risk Management

Advisor News

  • Advisors must lead the policy risk conversation
  • Gen X more anxious than baby boomers about retirement
  • Taxing trend: How the OBBBA is breaking the standard deduction reliance
  • 6 in 10 Americans struggle with financial decisions
  • New Trump administration rule seeks to bail out private equity, credit with workers’ 401(k) savings
More Advisor News

Annuity News

  • ‘I get confused:’ Regulators ponder increasing illustration complexities
  • Three ways the Corebridge/Equitable merger could shake up the annuity market
  • Corebridge, Equitable merge to create potential new annuity sales king
  • LIMRA: Final retail annuity sales total $464.1 billion in 2025
  • How annuities can enhance retirement income for post-pension clients
More Annuity News

Health/Employee Benefits News

  • Findings from Tufts Medical Center Has Provided New Information about Cancer (“Nothing Is as Great a Learning Experience as Getting a $15,000 Bill”A Mixed-Methods Study of Young Adult Cancer Survivors’ Experience With Insurance Coverage): Cancer
  • Layin' It on the Line: The long-term care crisis in Utah: Why national plans fail here and how to shield your assets (Part 1)
  • Guardian Completes Integration With FINEOS to Expand Digital Capabilities and Deliver a Simplified Leave Experience
  • Your health plan may cover more during pregnancy than you think
  • Wyoming's BearCare health plan for emergencies dies, for now
More Health/Employee Benefits News

Life Insurance News

  • AM Best Affirms Credit Ratings of MetLife, Inc. and Its Life/Health Subsidiaries
  • Guardian Completes Integration With FINEOS to Expand Digital Capabilities and Deliver a Simplified Leave Experience
  • From marathons to mountaineering: Ranking which sports and hobbies affect life insurance the most
  • AMERICA'S CREDIT UNIONS HIRES VETERAN WASHINGTON ADVOCATE TO LEAD POLICY STRATEGY
  • Society of Actuaries announces Clar Rosso as next CEO
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Protectors Vegas Arrives Nov 9th - 11th
1,000+ attendees. 150+ speakers. Join the largest event in life & annuities this November.

An FIA Cap That Stays Locked
CapLock™ from Oceanview locks the cap at issue for 5 or 7 years. No resets. Just clarity.

Aim higher with Ascend annuities
Fixed, fixed-indexed, registered index-linked and advisory annuities to help you go above and beyond

Unlock the Future of Index-Linked Solutions
Join industry leaders shaping next-gen index strategies, distribution, and innovation.

Leveraging Underwriting Innovations
See how Pacific Life’s approach to life insurance underwriting can give you a competitive edge.

Press Releases

  • RFP #T01525
  • RFP #T01725
  • Insurate expands workers’ comp into: CA, FL, LA, NC, NJ, PA, VA
  • LifeSecure Insurance Company Announces Retirement of Brian Vestergaard, Additions to Executive Leadership
  • RFP #T02226
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet