Methods and systems for relaying a sensitive information detail during a telephone call between a user&#39;s telephone and a recipient&#39;s telephone

ABSTRACT

There is provided a method for relaying a sensitive information detail during a telephone call between a user&#39;s telephone and a recipient&#39;s telephone, the user&#39;s telephone storing the sensitive information detail therein, the method comprising: initiating a telephone call between the user and the recipient; the user&#39;s telephone receiving a predetermined input; during the telephone call, the user&#39;s telephone accessing the sensitive information detail stored in the user&#39;s telephone based on the predetermined input; and the user&#39;s telephone audibly relaying to the recipient the accessed sensitive information detail, wherein audibly relaying to the recipient the accessed sensitive information detail comprises the user&#39;s telephone converting, using at least one text-to-speech algorithm, the accessed sensitive information detail to an audible message containing the sensitive information detail and audibly relaying the audible message during the telephone call.

This application is a continuation-in-part of International Application No. PCT/GB2019/052697, filed on Sep. 25, 2019, entitled “METHODS AND SYSTEMS FOR RELAYING A PAYMENT CARD DETAIL DURING A TELEPHONE CALL BETWEEN A CUSTOMER'S TELEPHONE AND A VENDOR'S TELEPHONE,” the disclosure of which is incorporated by reference herein in its entirety.

TECHNICAL FIELD

The present disclosure relates to a method for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone, and particularly to a method for audibly relaying the sensitive information detail by the user's telephone converting, using at least one text-to-speech algorithm, the sensitive information detail to an audible message containing the sensitive information detail and audibly relaying the audible message during the telephone call. The present disclosure also relates to a non-transitory computer readable medium tangibly carrying computer executable instructions for carrying out the same.

BACKGROUND

In many situations, a user may be required to transmit sensitive information, for example providing payment details, during a telephone call with a recipient. For example, this may be required when making a purchase for goods or services during a telephone call with the recipient, where the recipient is a vendor. In these situations, with the methods and systems currently known in the art, the user is required to retrieve, during the call, their sensitive information and relay the sensitive information, which in this example could be payment card details required by the recipient to authorize the payment.

However, as this is carried out during the telephone call with the recipient and therefore usually whilst the user is holding their telephone, this normally results in a physical limitation during the call as the user has to retrieve the payment card and hold their telephone at the same time. As the payment card is typically initially stored within a wallet, retrieving the payment card during the call tends to prove physically challenging, especially if the user is involved in other activities during the phone call such as walking, running or cycling.

A similar problem occurs when a user wishes to transmit other types of sensitive user details to a recipient. The sensitive detail could be any other type of information that may need to be transmitted but is extremely desirable to keep confidential. Examples of such sensitive information details could include (but are not limited to): a passport number or other passport information; a driving license number or other driving license information; national insurance numbers or similar; social security numbers or similar; full names; dates of birth; a user's medical information; addresses; answers to security questions, etc.

Furthermore, with currently known methods and systems, the user is required to read the sensitive information details aloud into their phone to relay the sensitive information details to the recipient. This presents significant security risks especially if the user is attempting to hold the telephone call in a public space as a third party who is standing or sitting in close proximity to the user may eavesdrop and obtain the user's sensitive information details.

In view of the above, there is a need for a physically convenient and secure method for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone. There is also a need for a physically convenient and secure system for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone.

SUMMARY OF THE DISCLOSURE

Accordingly, it is an object of the present disclosure to provide a physically convenient and secure method for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone. It is also an object of the present disclosure to provide a physically convenient and secure system for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone.

These objectives and others are achieved with the method of Claim 1 and the non-transitory computer readable medium of Claim 10.

Preferred embodiments are recited in the dependent claims.

According to a first aspect, there is provided a method for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone, the user's telephone storing the sensitive information detail therein, the method comprising: initiating a telephone call between the user and the recipient; the user's telephone receiving a predetermined input; during the telephone call, the user's telephone accessing the sensitive information detail stored in the user's telephone based on the predetermined input; and the user's telephone audibly relaying to the recipient the accessed sensitive information detail, wherein audibly relaying to the recipient the accessed sensitive information detail comprises the user's telephone converting, using at least one text-to-speech algorithm, the accessed sensitive information detail to an audible message containing the sensitive information detail and audibly relaying the audible message during the telephone call.

As the user's telephone stores the sensitive information detail therein and audibly relays the sensitive information detail to the recipient during the telephone call, the user does not need to retrieve their sensitive information and therefore does not need to physically handle any separate physical record of their sensitive information detail during the telephone call. Where the sensitive information detail is a payment card detail, the separate physical record may be a bank card. Where the sensitive information detail is another type of sensitive information detail, the separate physical record may be any appropriate item. For example, where the sensitive information detail is passport information, the separate physical record could be a passport. Where the sensitive information detail is driving license information, the separate physical record could be a driving license. Where the sensitive information detail is a national insurance number or a social security number, the separate physical record could be a national insurance card or social security card. This means that the user may audibly relay their sensitive information detail whilst only interacting with their telephone. This therefore provides for a physically convenient method for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone.

Additionally, as the user's telephone itself audibly relays the sensitive information detail to the recipient, the user themselves need not speak the sensitive information detail. This therefore provides for increased security in a public space as a third party standing or sitting in close proximity to the user cannot eavesdrop and obtain the relayed sensitive information detail. Hence, the method is also a secure method for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone.

In certain implementations, receiving the predetermined input comprises the user inputting the predetermined input using the user's telephone.

With such implementations, the user may physically conveniently select when to audibly relay their sensitive information detail without having to physically obtain their payment card. For example, upon prompting from the recipient, the user may input the predetermined input into their phone such that the phone audibly relays the payment card detail. Such implementations provide for a physically convenient manner to selectively relay payment card details.

In certain implementations, the predetermined input comprises the user selecting a key or a sequence of keys on the user's telephone.

With such implementations, the user may select in a physically conveniently manner when to audibly relay their payment card detail without having to physically obtain their payment card. Such implementations provide for a physically convenient manner to selectively relay payment card details.

In certain implementations, receiving the predetermined input comprises the recipient inputting the predetermined input using the recipient's telephone and the recipient's telephone relaying the inputted predetermined input to the user's telephone.

With such implementations, the recipient may select when to audibly receive the user's sensitive information detail without having to request the sensitive information detail from the user or without having the user physically obtain their physical record of their sensitive information. For example, once the recipient is ready to receive the sensitive information detail, the recipient may input the predetermined input into their phone thereby triggering the user's phone to audibly relay the sensitive information detail to the recipient. Such implementations provide for a physically convenient manner to selectively relay sensitive information details within minimum physical requirements from the user.

In certain implementations, the predetermined input comprises the recipient selecting a key or a sequence of keys on the recipient's telephone.

With such implementations, the recipient may select in a physically conveniently manner when to audibly receive the user's sensitive information detail without requiring the user to physically obtain their separate physical record of their sensitive information. Such implementations provide for a physically convenient manner to selectively relay sensitive information details.

In certain implementations, the method further comprises: the user's telephone receiving a second predetermined input; during the telephone call, the user's telephone accessing a second sensitive information detail stored in the user's telephone based on the second predetermined input; and the user's telephone audibly relaying to the recipient the accessed second sensitive information detail, wherein audibly relaying to the recipient the accessed second sensitive information detail comprises the user's telephone converting, using at least one text-to-speech algorithm, the accessed second sensitive information detail to a second audible message containing the second sensitive information detail and audibly relaying the second audible message during the telephone call.

With such implementations, two different sensitive information details may be relayed to the recipient each being selectively relayed by input of the two different predetermined inputs. This results in a convenient way for the recipient to receive the various sensitive information details when the various details are required.

In certain implementations, the method comprises receiving security authorization from the user using the user's telephone, and, optionally, wherein the security authorization is in the form of receiving a passcode/password, a fingerprint, a retinal-recognition image and/or a facial-recognition image from the user using the user's telephone.

With such implementations, any sensitive information detail is only relayed once the security authorization from the user has been received. Accordingly, this increases security as the recipient cannot access any sensitive information until the user specifically authorizes the release of information.

In certain implementations, receiving the predetermined input comprises receiving the security authorization.

With such implementations, the predetermined input includes the security authorization from the user. Therefore, the first sensitive information detail cannot be related unless the user has authorized the relaying of it. Accordingly, this increases security as the recipient cannot access the first sensitive information detail until the user specifically authorizes the payment.

In certain implementations, the method comprises audibly relaying to the user the accessed sensitive information detail whilst audibly relaying to the recipient the accessed sensitive information detail.

With such implementations, the user can at all times hear via their telephone which information is being relayed to the recipient by their telephone. This means that the user can verify the correct information is being relayed to the recipient and can stop the relaying of information at any time during the call for security reasons.

In certain implementations, the user's telephone stores a first set of sensitive information details associated with a first piece of sensitive information and comprising the accessed sensitive information detail and a second set of sensitive information details associated with a second piece of sensitive information.

With such implementations, the user's telephone can store two or more pieces of sensitive information therein. Accordingly, the user has greater freedom in choosing which information they can provide securely.

According to a second aspect, there is provided a non-transitory computer readable medium tangibly carrying computer executable instructions for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone, the user's telephone storing the sensitive information detail therein, the instructions being executable to implement: initiating a telephone call between the user and the recipient; the user's telephone receiving a predetermined input; during the telephone call, the user's telephone accessing the sensitive information detail stored in the user's telephone based on the predetermined input; and the user's telephone audibly relaying to the recipient the accessed sensitive information detail, wherein audibly relaying to the recipient the accessed sensitive information detail comprises the user's telephone converting, using at least one text-to-speech algorithm, the accessed sensitive information detail to an audible message containing the sensitive information detail and audibly relaying the audible message during the telephone call.

As the user's telephone stores the sensitive information detail therein and audibly relays the sensitive information detail to the recipient during the telephone call, the user does not need to retrieve their physical record of their sensitive information and therefore does not need to physically handle the physical record of their sensitive information during the telephone call. This means that the user may audibly relay their payment card detail whilst only interacting with their telephone. This therefore provides for a physically convenient method for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone.

Additionally, as the user's telephone itself audibly relays the sensitive information detail to the recipient, the user themselves need not speak the sensitive information detail. This therefore provides for increased security in a public space as a third party who is standing or sitting in close proximity to the user cannot eavesdrop and obtain the relayed sensitive information detail. Hence, the executable method is also a secure method for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone.

BRIEF DESCRIPTION OF THE DRAWINGS

For a better understanding of the present disclosure and to show how the same may be carried into effect, reference will now be made, by way of example only, to the accompanying drawings, in which:

FIG. 1 shows a first implementation of a method for relaying a payment card detail during a telephone call between a user's telephone and a recipient's telephone;

FIG. 2 shows a second implementation of a method for relaying a payment card detail during a telephone call between a user's telephone and a recipient's telephone; and

FIG. 3 shows an example of a telephone which may be used in accordance with the present disclosure, the telephone showing a first selection screen; and

FIG. 4 shows the telephone of FIG. 3 with a second selection screen.

DETAILED DESCRIPTION

FIG. 1 shows a first implementation of a method for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone. In FIG. 1, the sensitive information detail is a payment card detail, but it will be appreciated that the following described method could be used to transmit other sensitive information details in the same manner.

In step 110, a telephone call is initiated between a user and a recipient using the user's telephone and the recipient's telephone.

In certain implementations, during the telephone call, the user and the recipient may agree that an information transfer is required over the telephone. Accordingly, in certain implementations, the user may wish to provide at least one sensitive information detail to the recipient during the telephone call. The at least one sensitive information detail may, when it is a payment detail, be used to complete payment for goods/services or for securing a booking.

Thereafter, in step 120, the user's telephone receives a predetermined input. In the implementation shown in FIG. 1, the user's telephone receives the predetermined input by the user inputting the predetermined input using the user's telephone. For example, the predetermined input may be entered using the user's telephone's user interface such as a touchscreen, microphone and/or camera.

As shown in FIG. 1, the user's telephone receiving the predetermined input in step 120 comprises, in step 120 a, the user's telephone receiving security authorization from the user. In certain implementations, the security authorization may be in the form of receiving a passcode/password, a fingerprint, a retinal-recognition image and/or a facial-recognition image from the user using the user's telephone.

Receiving security authorization from the user in step 120 a may be the first element of the overall predetermined input received in step 120.

In certain implementations, if the security authorization from the user is unsuccessful, the user's telephone may output an error message to the user.

If the security authorization from the user is unsuccessful, the input received by the user's telephone would not match the required predetermined input and the user's telephone would not proceed to step 130 (described below).

As shown in FIG. 1, the user's telephone receiving the predetermined input in step 120 further comprises, in step 120 b, the user's telephone receiving a selection of a payment card from the user.

The user's telephone stores one or more sets of sensitive information details therein. For example, the user's telephone may store one, two, three, four or five sets of payment card details therein.

The one or more sets of payment card details are each associated with a payment card. The user's telephone may additionally or alternatively store other types of sensitive information details, for example passport information, driving license information, social security number(s), national insurance number(s), addresses, and/or date(s) of birth.

For example, at least one set of payment card details or each set of payment card details comprises at least one number and/or at least one date.

In certain implementations, at least one set of payment card details or each set of payment card details comprises: a first number, a second number and a date. Optionally, the first number may be a sixteen-digit number, the second number may be a three-digit number. The at least one set of payment card details or each set of payment card details may optionally further comprise: a second date and/or a string of text, for example, a name.

In step 120 b, the user may select which payment card out of the one or more payment cards that should be relayed to the recipient. For example, the user may select a numerical key on their telephone to select which payment card to proceed with and/or the user may select a visual prompt on a screen of the user's telephone which represents the payment card, for example, an image of the payment card.

As shown in FIG. 1, the user's telephone receiving the predetermined input in step 120 further comprises, in step 120 c, the user's telephone receiving an input associated with a payment card detail of the selected payment card.

For example, the user may select an input on their phone which is associated with one of the payment card details in the set of payment card details of the selected payment card.

Thereafter, in step 130, the user's telephone accesses the associated payment card detail stored therein and in step 140 relays this accessed payment card detail to the recipient.

Specifically, step 140 comprises, in step 140 a, converting the accessed payment card detail from a string (for example containing text and/or numbers) to an audible message using at least one text-to-speech algorithm.

Thereafter, in step 140 b, the audible message containing the payment card detail is audibly relayed to the recipient during the telephone call. As used herein, ‘audibly relayed’ refers to relaying a message containing speech which is understood by a human being.

In step 140 b, the audible message may also be relayed to the user whilst audibly relaying the accessed payment card detail to the recipient.

Thereafter, the recipient may request another type of payment card detail and therefore the method may return to step 120 c in which another input associated with another payment card detail of the selected payment card is received.

A return to step 120 c may be performed until the recipient has received all required payment card details of the selected payment card.

Once the final payment card detail is received, the recipient may process the payment using the received payment card detail(s). Thereafter, in step 150, the telephone call between the user and the recipient may be terminated.

With the above-described method, as the user's telephone stores the payment card detail therein and audibly relays the payment card detail to the recipient during the telephone call, the user does not need to retrieve their payment card and therefore does not need to physically handle the payment card during the telephone call. This means that the user may audibly relay their payment card detail whilst only interacting with their telephone. This therefore provides for a physically convenient method for relaying a payment card detail during a telephone call between a user's telephone and a recipient's telephone.

Additionally, as the user's telephone itself audibly relays the payment card detail to the recipient, the user themselves need not speak the payment card detail. This therefore provides for increased security in a public space as a third party standing or sitting in close proximity to the user cannot eavesdrop and obtain the relayed payment card detail. Hence, the method is also a secure method for relaying a payment card detail during a telephone call between a user's telephone and a recipient's telephone.

Moreover, as the user does not manually read out the payment card details, the potential for an error made during the relaying of the payment card details as a result of misreading, poor eyesight and/or accent, is eliminated. This method therefore provides for an improved accuracy in relaying payment card details over the telephone. As the potential for an error has been eliminated from the user's side, the chances for restarting the payment process due to an error is greatly reduced thereby further improving the convenience of making a payment over the telephone.

Throughout the entire method, the user may terminate the telephone call between the user and the recipient. Additionally or alternatively, throughout the entire method, the user may terminate the relaying of the payment card detail to the recipient at any stage.

FIG. 2 shows a second implementation of a method for relaying a payment card detail during a telephone call between a user's telephone and a recipient's telephone. The second implementation is similar to that shown in FIG. 1 and therefore only the differences will be discussed below.

In particular, the second implementation differs in that step 220 comprises, in step 220 c, the user's telephone receiving an input associated with a payment card detail of the selected payment card, in which the input is received from the recipient.

Specially, in step 220 c, the recipient may select an input on the recipient's telephone, said input then being relayed to the user's telephone and being received by the user's telephone as an input.

In certain implementations, the recipient's telephone may relay the input of the user's telephone using dual-tone multi-frequency signaling or any other means of communication.

FIG. 3 shows an example of a telephone which may be used in accordance with the present disclosure. In FIG. 3, the telephone is illustrated as showing a first selection screen.

The telephone shown in FIG. 3 is a mobile telephone 300 comprising a screen 310, optionally being a touchscreen, and three pushbuttons 320. The mobile telephone 300 may be used by the user.

The mobile telephone 300 includes a non-transitory computer readable medium (not shown) carrying executable instructions for carrying out any of the methods disclosed herein.

The mobile telephone 300 stores therein at least one set of sensitive information details.

In the configuration shown in FIG. 3, the screen 310 shows a first selection screen which can be used in step 120 b or 220 b of the methods described above. In particular, the sensitive information details are payment details in this example, and the first selection screen shown on screen 310 allows the user to select a payment card out of a first payment card and a second payment card by selecting the first payment card button 310 a and the second payment card button 310 b respectively.

FIG. 4 shows the telephone of FIG. 3 with a second selection screen shown on the screen 310.

In the configuration shown in FIG. 4, the screen 310 shows the second selection screen which can be used in step 120 c of the methods described above. In particular, the second selection screen shown on screen 310 allows the user to select a payment card detail out of the set of payment card details associated with the selected payment card. The second selection screen allows the user to select a first payment card detail or a second payment card detail by selecting the first payment card detail button 310 c and the second payment card detail button 310 d respectively.

Although the above explanation is considered to fully clarify how the present invention may straightforwardly be put into effect by those skilled in the art, it is to be regarded as purely exemplary.

For example, even though FIGS. 3 and 4 show a mobile telephone, the present disclosure may be implemented using a landline telephone which does not comprise a screen or touchscreen. For example, all inputs may be entered using a physical keypad and all outputs may be given using the telephones speaker.

Furthermore, the sensitive information details do not need to be audibly relayed in isolation as in FIGS. 1 and 2. Instead, after receiving a predetermined input, the user's telephone may access all sensitive information details associated with the selected sensitive information and audibly relay all sensitive information details in a single audible message to the recipient.

Any of the above methods may be implemented using software being part of the user's telephone's operating system (such as Android or iOS) or being part of an application installed on the user's telephone.

In any of the above methods, when the sensitive information detail is a payment card detail, the user's telephone may store any of the payment card details associated with payment cards on an application which is part of the user's telephone's operating system (such as Android or iOS) or being part of an application installed on the user's telephone. For example, the user's payment card details may be stored on Apple Pay, Google Pay or any other application of the like.

All of the above are fully within the scope of the present disclosure and are considered to form the basis for alternative embodiments in which one or more combinations of the above-described features are applied, without limitation to the specific combinations disclosed above.

In light of this, there will be many alternatives which implement the teaching of the present disclosure. It is expected that one skilled in the art will be able to modify and adapt the above disclosure to suite its own circumstances and requirements within the scope of the present disclosure, while retaining some or all technical effects of the same, either disclosed or derivable from the above, in light of his comment general knowledge in this art. All such equivalents, modifications or adaptations fall within the scope of the invention hereby defined and claimed. 

1. A method for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone, the user's telephone storing the sensitive information detail therein, the method comprising: (a) initiating a telephone call between the user and the recipient; (b) the user's telephone receiving a predetermined input; (c) during the telephone call, a processor of the user's telephone accessing the sensitive information detail stored in the user's telephone based on the predetermined input; and (d) the processor causing the user's telephone to transmit a signal for audibly relaying to the recipient the accessed sensitive information detail via the recipient's telephone; wherein audibly relaying to the recipient the accessed sensitive information detail comprises the user's telephone converting, using at least one text-to-speech algorithm, the accessed sensitive information detail to an audible message containing the sensitive information detail and audibly relaying the audible message during the telephone call.
 2. The method of claim 1, wherein receiving the predetermined input comprises the user inputting the predetermined input using the user's telephone.
 3. The method of claim 2, wherein the predetermined input comprises the user selecting a key or a sequence of keys on the user's telephone.
 4. The method of claim 1, wherein receiving the predetermined input comprises the recipient inputting the predetermined input using the recipient's telephone and the recipient's telephone relaying the inputted predetermined input to the user's telephone.
 5. The method of claim 4, wherein the predetermined input comprises the recipient selecting a key or a sequence of keys on the recipient's telephone.
 6. The method of claim 1, further comprising: the user's telephone receiving a second predetermined input; (a) during the telephone call, the user's telephone accessing a second sensitive information detail stored in the user's telephone based on the second predetermined input; and (b) the user's telephone audibly relaying to the recipient the accessed second sensitive information detail, wherein audibly relaying to the recipient the accessed second sensitive information detail comprises the user's telephone converting, using at least one text-to-speech algorithm, the accessed second sensitive information detail to a second audible message containing the second sensitive information detail and audibly relaying the second audible message during the telephone call.
 7. The method of claim 1, further comprising receiving security authorization from the user using the user's telephone, wherein the security authorization is in the form of receiving one or more of a password, a fingerprint, a retinal-recognition image, or a facial-recognition image from the user's telephone.
 8. The method of claim 7, wherein receiving the predetermined input comprises receiving the security authorization.
 9. The method of claim 1, further comprising audibly relaying to the user the accessed sensitive information detail whilst audibly relaying to the recipient the accessed sensitive information detail.
 10. A user device comprising: (a) a processor and a memory, wherein the memory is configured to store one or more payment card details, including at least a first payment card detail; (b) a display; (c) a user interface usable by a user to provide input; and (d) a telephone communication device configured to provide two-way audio communication; wherein the processor is configured to, as part of a payment detail relay process: (i) establish a communication channel with a recipient via the telephone communication device; (ii) in response to a predetermined input that indicates the start of a transaction, cause one or more graphics associated with the one or more payment card details to display via the display; (iii) create an audible message based on the first payment card detail, wherein the audible message comprises synthesized speech describing the first payment card detail; and (iv) in response to the user selecting a first graphic of the one or more graphics that is associated with the first payment card detail, via the user interface, audibly relay the audible message over the communication channel.
 11. The user device of claim 10, wherein the predetermined input is received from the recipient.
 12. The user device of claim 10, wherein the predetermined input is received: (i) from the recipient via an alternate communication channel other than the communication channel; and (ii) while the recipient is still connected via the communication channel.
 13. The user device of claim 10, wherein the predetermined input is received from the user via the user interface.
 14. The user device of claim 10, wherein the payment detail relay process is configured on the user device after installation of a standalone software application on the user device.
 15. The user device of claim 10, wherein the payment detail relay process is configured on the user device as an integrated feature of an operating system installed on the user device.
 16. The user device of claim 10, wherein the processor is further configured to cause each of the one or more graphics to display via the display as an image of a payment card associated with that graphic.
 17. The user device of claim 10, wherein the processor is further configured to audibly relay the audible message over the communication channel so that it is audible to the recipient and the user.
 18. The user device of claim 10, wherein the processor is further configured to audibly relay the audible message over the communication channel so that it is audible to the recipient but not the user.
 19. A method for providing a payment detail relay process for a user device, the method comprising, with a processor of the user device: (a) storing one or more payment card details, including at least a first payment card detail, on a memory of the user device; (b) establishing a communication channel with a recipient via a telephone communication device of the user device; (c) in response to a predetermined input that indicates the start of a transaction, displaying one or more graphics associated with the one or more payment card details via a display of the user device; (d) creating an audible message based on the first payment card detail, wherein the audible message comprises synthesized speech describing the first payment card detail; and (e) in response to a user selecting a first graphic of the one or more graphics that is associated with the first payment card detail, via a user interface of the user device, audibly relaying the audible message over the communication channel. 