| CPC H04M 3/527 (2013.01) [H04M 3/5183 (2013.01); H04W 12/06 (2013.01)] | 17 Claims |

|
1. A method of authenticating a user to a live agent and transferring context information of a session from a network-based service application of a network-based service to the live agent, the method comprising:
at a first computing device of an interaction routing system (IRS):
receiving a request for a first security token during the session of the network-based service application, and responsive to the request, identifying: the context information of the session of the network-based service application, an identifier of a second computing device where the session of the network-based service application occurred, and authentication information describing an authentication status of the user of the second computing device with the network-based service separate from the IRS;
generating the first security token;
determining an interaction routing target based upon the context information;
receiving a call from a caller on a calling device, and after the call is connected, receiving a second security token;
determining that an identifier of the calling device matches the identifier of the second computing device where the session of the network-based service application occurred and that the first and second security tokens match;
responsive to determining that an identifier of the calling device matches the identifier of the second computing device where the session of the network-based service application occurred and that the first and second security tokens match, transferring the call to the interaction routing target;
providing, to the interaction routing target, the authentication information and the context information;
receiving a second request for a third security token, and responsive to the second request, identifying: second context information of a second user determined during a second session of a second instance of the network-based service application, a second identifier of a third computing device where the second session occurred, and second authentication information describing a second authentication status of a second user of the third computing device with the network-based service;
generating the third security token;
determining a second interaction routing target;
receiving a second call from a second caller on a second calling device;
after the second call is connected, receiving a fourth security token;
determining that an identifier of the second calling device does not match the second identifier of the third computing device where the second session occurred but the third security token does match the fourth security token;
in response:
transferring the call to the second interaction routing target;
stripping the authentication information from an interaction record; and
providing, to a second target agent the second context information and an indication that the second caller is to be authenticated.
|