Patent Issued for Independent notification system for authentication (USPTO 11503154): United Services Automobile Association - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
December 7, 2022 Newswires
Share
Share
Post
Email

Patent Issued for Independent notification system for authentication (USPTO 11503154): United Services Automobile Association

Insurance Daily News

2022 DEC 07 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- United Services Automobile Association (San Antonio, Texas, United States) has been issued patent number 11503154, according to news reporting originating out of Alexandria, Virginia, by NewsRx editors.

The patent’s inventors are Huggar, Stacy Callaway (San Antonio, TX, US), Khmelev, Yevgeniy Viatcheslavovich (San Antonio, TX, US), Krebs, Emily Kathleen (San Antonio, TX, US), Lopez, Mark Anthony (Helotes, TX, US), Pollack, Jeffrey Neal (San Antonio, TX, US), Russell, Ryan Thomas (San Antonio, TX, US).

This patent was filed on March 23, 2021 and was published online on November 15, 2022.

From the background information supplied by the inventors, news correspondents obtained the following quote: “When a customer calls an organization’s customer service phone number, he or she is asked to provide certain personal information about himself or herself so that a customer service representative can determine that the customer is who he or she says. In this way, a customer service representative can authenticate the identity of the customer calling. In some cases, customer service representatives call customers for marketing purposes (e.g., to sell additional products or finalize transaction), for notification purposes (e.g., to notify a customer of a suspected credit card fraud) or to collect information for a service or product they are providing. Customers who receive such calls may implicitly trust the customer service representative at least because the customer service representative’s claim that he or she belongs to a trustworthy organization (e.g., the customer’s bank) or because of the reason for the customer service perspective’s call (e.g., to notify of a credit card fraud). Fraudsters know about this phenomenon and call the customers pretending to be affiliated with the organization that the customer trusts. Thus, customers who receive such calls are susceptible to having their personal sensitive information stolen by the fraudsters.

“The techniques introduced here may be better understood by referring to the following Detailed Description in conjunction with the accompanying drawings, in which like reference numerals indicate identical or functionally similar elements. Moreover, while the technology is amenable to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and are described in detail below. The intention, however, is not to limit the technology to the particular embodiments described. On the contrary, the technology is intended to cover all modifications, equivalents, and alternatives falling within the scope of the technology as defined by the appended claims.”

Supplementing the background information on this patent, NewsRx reporters also obtained the inventors’ summary information for this patent: “When a customer receives a call from a customer service representative (CSR) of a trustworthy organization (e.g., the customer’s bank) the customer is unable to verify that the CSR is who he or she says. In some cases, fraudsters have been known to steal personal information and use it for nefarious purposes (e.g., taking out loans, filing fake tax returns, having a credit card sent to the fraudster’s address).

“To address at least this problem, this patent document describes technology that can allow a first person (e.g., a customer) to determine whether a call received from a second person (e.g., a CSR) is coming from a phone number associated with a trustworthy source (e.g., the customer’s bank). For example, when a second person initiates a call via a call and notification server and the call is received by a first person, the call and notification server can also send a notification message to a user device associated with the first person. The notification message can be displayed on the user device, which allows the first person to determine whether the call received by the user device is associated with a trustworthy source. In some embodiments, the notification message can be sent simultaneously or near simultaneously with the initiation or reception of the call. For example, if a call is initiated at a certain time, the notification message can be sent within a pre-determined window of time (e.g., 30 seconds) immediately before or immediately after the time when the call is initiated via a call and notification server or the notification message can be sent within a pre-determined window of time (e.g., 30 seconds) immediately before or immediately after the time when the call is received by the user device. By sending the notification message within a pre-determined time window immediately before or after the initiation of the call, the CSR 102 can authenticate himself or herself to the customer 102 within the context of a call that the customer will receive or has received from the CSR.

“In this patent document, the terms “customer service representative” and “customer” are used to simplify the description of the example authentication techniques. However, the authentication techniques described in this patent document can be applied in context other than where a customer service representative belonging to an organization (e.g., company) calls a customer of that organization. For example, by using the authentication techniques described in this patent document, a person can verify that it is indeed a governmental agency calling to verify benefits or obtain information when a governmental agency calls the person.”

The claims supplied by the inventors are:

“1. A computing system for performing authentication, comprising: a server comprising a processor configured to initiate a call with a first device associated with a first person, wherein the call facilitates a communication between the first device and a second device associated with a second person; wherein the first device comprises a processor configured to: receive the call; receive a first indication to answer the call; after the call is answered, trigger authentication with the second device; display a prompt on a graphical user interface (GUI) that enables a first passcode to be entered via the first device; and send the first passcode to the second device via the server; wherein the second device comprises a processor configured to: receive the first passcode; receive a text or an audio of a second passcode provided to the second device; and send the text or the audio of the second passcode to the first device; and wherein the processor of the first device comprising is further configured to: receive the text or the audio of the second passcode; and perform authentication of the call by: presenting the second passcode on the first device, including: presenting the second passcode by A) displaying the text of the second passcode on the GUI of the first device or B) playing the audio of the second passcode on a speaker of the first device; and receiving, via the GUI of the first device and after the second passcode is presented, an indication that a source of the call is authenticated; or comparing the second passcode to the first passcode, including: determining that the first passcode matches the second passcode; and in response to the determining that the first passcode matches the second passcode, providing a message that indicates that a source of the call is authenticated.

“2. The computing system of claim 1, wherein the performing the authentication of the call includes the presenting the second passcode on the first device; and wherein the indication that the source of the call is authenticated is received via a selection of a button that indicates that the source of the call is authenticated.

“3. The computing system of claim 1, wherein the triggering the authentication with the second device includes: displaying a button on the GUI of the first device; and in response to a selection of the button, triggering the authentication with the second device.

“4. The computing system of claim 3, wherein the prompt that enables the first passcode to be entered is displayed in response to the selection of the button.

“5. The computing system of claim 1, wherein the first passcode includes letters, numbers, or a shape.

“6. The computing system of claim 1, wherein the performing the authentication of the call includes the comparing the second passcode to the first passcode; and wherein the message is sent via a telecommunications service provider of the call.

“7. The computing system of claim 1, wherein the performing the authentication of the call includes the comparing the second passcode to the first passcode; and wherein the message includes verification information for a telecommunications service provider of the call.

“8. A method of performing authentication, comprising: receiving, by a first device, a call initiated by a server, wherein the call facilitates a communication between the first device and a second device; after the call is answered, triggering authentication with the second device; displaying a prompt on a graphical user interface (GUI) that enables a first passcode to be entered via the first device; sending the first passcode to the second device; receiving a text or an audio of a second passcode sent by the second device; and performing authentication of the call by: presenting the second passcode on the first device, including: presenting the second passcode by A) displaying the text of the second passcode on the GUI of the first device or B) playing the audio of the second passcode on a speaker of the first device; and receiving, via the GUI of the first device and after the second passcode is presented, an indication that a source of the call is authenticated; or comparing the second passcode to the first passcode, including: determining that the first passcode matches the second passcode; and in response to the determining that the first passcode matches the second passcode, providing a message that indicates that a source of the call is authenticated.

“9. The method of claim 8, wherein the performing the authentication of the call includes the presenting the second passcode; and wherein the indication that the source of the call is authenticated is received via a selection of a button that indicates that the source of the call is authenticated.

“10. The method of claim 8, wherein the triggering the authentication with the second device includes: displaying a button on the GUI of the first device; and in response to a selection of the button, triggering the authentication with the second device.

“11. The method of claim 10, wherein the prompt that enables the first passcode to be entered is displayed in response to the selection of the button.

“12. The method of claim 8, wherein the second passcode includes letters, numbers, or a shape.

“13. The method of claim 8, wherein the performing the authentication of the call includes the comparing the second passcode to the first passcode; and wherein the message is sent via a telecommunications service provider of the call.

“14. The method of claim 13, wherein the message includes verification information for the telecommunications service provider.

“15. A computer-readable memory having machine executable instructions stored thereon that, when executed by one or more processors, direct the one or more processors to perform a process comprising: receiving, by a first device, a call initiated by a server, wherein the call facilitates a communication between the first device and a second device; after the call is answered, triggering authentication with the second device; displaying a prompt on a graphical user interface (GUI) that enables a first passcode to be entered via the first device; sending the first passcode to the second device; receiving a text or an audio of a second passcode sent by the second device; and performing authentication of the call by: presenting the second passcode on the first device, including: presenting the second passcode by A) displaying the text of the second passcode on the GUI of the first device or B) playing the audio of the second passcode on a speaker of the first device; and receiving, after the second passcode is presented, an indication that a source of the call is authenticated; or comparing the second passcode to the first passcode, including: determining that source of the call is authenticated by determining that the first passcode matches the second passcode.

“16. The computer readable memory of claim 15, wherein the performing the authentication of the call includes the presenting the second passcode; and wherein the indication that the source of the call is authenticated is received via a selection of a button that indicates that the source of the call is authenticated.

“17. The computer readable memory of claim 15, wherein the triggering the authentication with the second device includes: displaying a button on the GUI of the first device; and in response to a selection of the button, triggering the authentication with the second device.

“18. The computer-readable memory of claim 17, wherein the prompt that enables the first passcode to be entered is displayed in response to the selection of the button.

“19. The computer readable memory of claim 15, wherein the first passcode includes letters, numbers, or a shape.

“20. The computer readable memory of claim 15, wherein the message is sent by a telecommunications service provider of the call and includes verification information associated with the telecommunications service provider.”

For the URL and additional information on this patent, see: Huggar, Stacy Callaway. Independent notification system for authentication. U.S. Patent Number 11503154, filed March 23, 2021, and published online on November 15, 2022.

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Patent Application Titled “Information Security By Preventing Unauthorized Data Access” Published Online (USPTO 20220366076): Patent Application

Newer

Researchers Submit Patent Application, “Prevention Of Unauthorized Access To Information”, for Approval (USPTO 20220366075): Patent Application

Advisor News

  • Americans less confident about retirement as worries grow
  • 6 in 10 Americans struggle with financial decisions
  • Trump bets his tax cuts will please Las Vegas voters on his swing West
  • Lifetime income is the missing link to global retirement security
  • Don’t let caregiving derail your clients’ retirement
More Advisor News

Annuity News

  • Allianz Life Adds New Accumulation-Focused Fixed Index Annuities
  • Allianz Life adds new accumulation-focused FIAs
  • Industry objects to ‘tone and tenor’ of draft NAIC Annuity Buyer’s Guide
  • Annuity industry grapples with consolidation, innovation and planning shifts
  • Human connection still key in the new annuity era
More Annuity News

Health/Employee Benefits News

  • How to make a high-deductible health plan work for you
  • How Auburn's retirement incentive for city employees would work
  • Researchers at Harvard Medical School Discuss Findings in Managed Care (Time-Driven, Activity-Based Cost Analysis of Secondary Intraocular Lens Implantation): Managed Care
  • New Endometriosis Study Findings Have Been Reported from Jose Arnaldo Shiomi da Cruz et al (Endometriosis treatment pathways in the largest private health insurance in Brazil: A real-world data study): Uterine Diseases and Conditions – Endometriosis
  • Findings from University of Illinois Broadens Understanding of Managed Care (Variation In Medicaid And Medicare Payment Rates To Community Health Centers, 2023): Managed Care
More Health/Employee Benefits News

Life Insurance News

  • Prudential extends Japan sales ban another 6 months at a total $1B loss
  • AM Best Affirms Credit Ratings of The Wawanesa Mutual Insurance Company and Wawanesa Life Insurance Company
  • Life insurance for gig economy power earners: what advisors need to know
  • Allianz Life Adds New Accumulation-Focused Fixed Index Annuities
  • Milliman Launches Healthcare Inflation ETFs (MHIG & MHIP) to Hedge the Rising Cost of U.S. Healthcare
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Protectors Vegas Arrives Nov 9th - 11th
1,000+ attendees. 150+ speakers. Join the largest event in life & annuities this November.

A FIA Cap That Stays Locked
CapLock™ from Oceanview locks the cap at issue for 5 or 7 years. No resets. Just clarity.

Aim higher with Ascend annuities
Fixed, fixed-indexed, registered index-linked and advisory annuities to help you go above and beyond

Unlock the Future of Index-Linked Solutions
Join industry leaders shaping next-gen index strategies, distribution, and innovation.

Leveraging Underwriting Innovations
See how Pacific Life’s approach to life insurance underwriting can give you a competitive edge.

Bring a Real FIA Case. Leave Ready to Close.
A practical working session for agents who want a clearer, repeatable sales process.

Press Releases

  • RFP #T01325
  • RFP #T01325
  • RFP #T01825
  • RFP #T01825
  • RFP #T01525
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet