US 12,464,075 B1
Transitional handoff from a digital communication device to a designated interaction routing system
Venkatesan Chinnaraju, Fremont, CA (US); Brad E. Ingles, Saint Paul, MN (US); Casey William Landvatter, Amherst, NH (US); Chris L. Lieu, San Francisco, CA (US); Jassen Andrew McNulty, Richmond, CA (US); Mikhail Shimberg, Walnut Creek, CA (US); Ling Yee Lindy Sin, San Francisco, CA (US); Richard Glen Smith, Des Moines, IA (US); Nishit Kumar Thakur, Fremont, CA (US); and Srinivasa Gupta Vudathv, Chandler, AZ (US)
Assigned to Wells Fargo Bank, N.A., San Francisco, CA (US)
Filed by Wells Fargo Bank, N.A., San Francisco, CA (US)
Filed on Nov. 30, 2022, as Appl. No. 18/060,241.
Claims priority of provisional application 63/381,172, filed on Oct. 27, 2022.
Int. Cl. H04M 3/527 (2006.01); H04M 3/51 (2006.01); H04W 12/06 (2021.01)
CPC H04M 3/527 (2013.01) [H04M 3/5183 (2013.01); H04W 12/06 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A method of authenticating a user to a live agent and transferring context information of a session from a network-based service application of a network-based service to the live agent, the method comprising:
at a first computing device of an interaction routing system (IRS):
receiving a request for a first security token during the session of the network-based service application, and responsive to the request, identifying: the context information of the session of the network-based service application, an identifier of a second computing device where the session of the network-based service application occurred, and authentication information describing an authentication status of the user of the second computing device with the network-based service separate from the IRS;
generating the first security token;
determining an interaction routing target based upon the context information;
receiving a call from a caller on a calling device, and after the call is connected, receiving a second security token;
determining that an identifier of the calling device matches the identifier of the second computing device where the session of the network-based service application occurred and that the first and second security tokens match;
responsive to determining that an identifier of the calling device matches the identifier of the second computing device where the session of the network-based service application occurred and that the first and second security tokens match, transferring the call to the interaction routing target;
providing, to the interaction routing target, the authentication information and the context information;
receiving a second request for a third security token, and responsive to the second request, identifying: second context information of a second user determined during a second session of a second instance of the network-based service application, a second identifier of a third computing device where the second session occurred, and second authentication information describing a second authentication status of a second user of the third computing device with the network-based service;
generating the third security token;
determining a second interaction routing target;
receiving a second call from a second caller on a second calling device;
after the second call is connected, receiving a fourth security token;
determining that an identifier of the second calling device does not match the second identifier of the third computing device where the second session occurred but the third security token does match the fourth security token;
in response:
transferring the call to the second interaction routing target;
stripping the authentication information from an interaction record; and
providing, to a second target agent the second context information and an indication that the second caller is to be authenticated.