US 12,113,929 B2
Systems and methods for detecting and/or preventing vishing attacks using user-generated authentication information
Jennifer Kwok, Brooklyn, NY (US); Dwij Trivedi, Oakton, VA (US); Abhay Donthi, Arlington, VA (US); Leeyat Bracha Tessler, Arlington, VA (US); and Salik Shah, Bethesda, MD (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on May 3, 2022, as Appl. No. 17/661,776.
Prior Publication US 2023/0362298 A1, Nov. 9, 2023
Int. Cl. H04W 12/06 (2021.01); H04M 3/38 (2006.01); H04M 3/42 (2006.01); H04W 12/08 (2021.01); H04W 12/12 (2021.01); H04W 88/02 (2009.01)
CPC H04M 3/382 (2013.01) [H04M 3/42034 (2013.01); H04M 2203/60 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for authenticating a source of a telephone call to a recipient of the telephone call, comprising:
receiving, by a user device associated with the recipient of the telephone call and prior to receiving the telephone call, a request to input first authentication information,
wherein the first authentication information comprises a passcode or a selection of a security question;
receiving, by the user device, input of the first authentication information;
sending, by the user device, the first authentication information to a computing device associated with the source of the telephone call;
receiving, by the user device, the telephone call from the source;
receiving, by the user device, input from the recipient of the telephone call to answer the telephone call;
receiving, by the user device, second authentication information from the computing device,
wherein the second authentication information comprises the passcode or an answer to the security question; and
outputting, by the user device, the second authentication information.