Biometric access to service providers

ABSTRACT

A contact may select to use a biometric input to access help and services related to the contact. On a portable computing device, a user may contact a help service. The help service contact address may be known and an app may execute if the contact attempts to communicate with the contact address. The app may receive the biometric data, compare it to known biometric data for the user and determine if the received biometric data is sufficiently dose to the stored biometric data, the communication may be forwarded to a help or service agent.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation application of U.S. application Ser.No. 17/071,471, entitled “BIOMETRIC ACCESS TO SERVICE PROVIDERS”, filedon Oct. 15, 2020, the entirety of which is hereby incorporated byreference.

BACKGROUND

Obtaining help or services can be a frustrating experience for bothcustomers and for service providers. Service providers may be frustratedthat they are not confident that a contact is a customer. Further, itmay be a challenge to match a contact to specific equipment owned by thecontact and any problems the contact may have had in the past.Similarly, contacts such as customer may be frustrated that they are notimmediately recognized and that they may be required to input complexuser ids, PINS passwords or other details that can be used to verify auser is the actual customer.

SUMMARY

A contact may select to use a biometric input to prequalify for accessto help and services related to the contact if the service provider hasa stored biometric input for the user. On a portable computing device, auser may contact a help service. The help service contact address may beknown and an app may execute if the contact attempts to communicate withthe contact address. The app may receive the biometric data, compare itto known biometric data for the user and determine if the receivedbiometric data is sufficiently close to the stored biometric data, thecommunication may be forwarded to a help or service agent. In addition,a user interface may be created for the contact using data specific tothe contact including equipment used by the contact, previouscommunications to the help service and current status of the account.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 may illustrate a sample environment and equipment;

FIG. 2 may illustrate a method of using biometric inputs to permitaccess to a service;

FIG. 3 may illustrate a method of determining if a biometric input is anacceptable input;

FIG. 4 may illustrate a sample user interface for a service provider;

FIGS. 5A-5H may illustrate a user entering a biometric input to bevalidated to receive service;

FIG. 6 may be an illustration of a portable computing device; and

FIG. 7 may be an illustration of a server type computing device.

Persons of ordinary skill in the art will appreciate that elements inthe figures are illustrated for simplicity and clarity so not allconnections and options have been shown to avoid obscuring the inventiveaspects. For example, common but well-understood elements that areuseful or necessary in a commercially feasible embodiment are not oftendepicted in order to facilitate a less obstructed view of these variousembodiments of the present disclosure. It will be further appreciatedthat certain actions and/or steps may be described or depicted in aparticular order of occurrence while those skilled in the art willunderstand that such specificity with respect to sequence is notactually required. It will also be understood that the terms andexpressions used herein are to be defined with respect to theircorresponding respective areas of inquiry and study except wherespecific meaning have otherwise been set forth herein.

SPECIFICATION

The present invention now will be described more fully hereinafter withreference to the accompanying drawings, which form a part hereof, andwhich show, by way of illustration, specific exemplary embodiments bywhich the invention may be practiced. These illustrations and exemplaryembodiments are presented with the understanding that the presentdisclosure is an exemplification of the principles of one or moreinventions and is not intended to limit any one of the inventions to theembodiments illustrated. The system and method may be embodied in manydifferent forms and should not be construed as limited to theembodiments set forth herein; rather, these embodiments are provided sothat this disclosure will be thorough and complete, and will fullyconvey the scope of the invention to those skilled in the art. Amongother things, the present invention may be embodied as methods ordevices. Accordingly, the present invention may take the form of anentirely hardware embodiment, an entirely software embodiment or anembodiment combining software and hardware aspects. The followingdetailed description is, therefore, not to be taken in a limiting sense.

Obtaining help or services can be a frustrating experience for bothcustomers and for service providers. Service providers may be frustratedthat they are not confident that a contact is a customer. Further, itmay be a challenge to match a contact to specific equipment owned by thecontact and any problems the contact may have had in the past.Similarly, contacts such as customer may be frustrated that they are notimmediately recognized and that they may be required to input complexuser ids, PINS passwords or other details that may be used to verify auser is the actual customer.

A contact may select to use a biometric input to access help andservices related to the contact if the service provider has a storedbiometric input for the user. On a portable computing device, a user maycontact a help service. The help service contact address may be knownand an app may execute if the contact attempts to communicate with thecontact address. The app may receive the biometric data, compare it toknown biometric data for the user and determine if the receivedbiometric data is sufficiently close to the stored biometric data, thecommunication may be forwarded to a help or service agent. In addition,a user interface may be created for the contact using data specific tothe contact including equipment used by the contact, previouscommunications to the help service and current status of the account.

FIG. 1 may illustrate a sample environment for the system and method. Auser may have a computing device 204, which may be a portable computingdevice, such as a smart phone, tablet, laptop, etc. The computing device204 may be further describe in FIG. 6 .

The base station 120 may receive calls and data over a radio network andmay communicate with other users. The base station 120 may have aprocessor physically configured to communicate signals from a usercomputing device 204 to a service computing device 202 if service isrequest by the user.

The service agent computer 202 may be further described in FIG. 7 . Theservice agent computer 202 may operate contain a processor 1500 that isphysically configured to respond to service requests which may be speechor data related.

Referring to FIG. 2 , a method of pre-authenticating a user for servicesmay be illustrated. The services may be any services such as helpservices or account questions or equipment problems. At block 205, arequest may be received from a user to a service input. The request maybe a voice request or a text request or any other appropriate form ofcommunication. The request may be for any assistance where authorizationto receive help may be needed. Some examples, which are not meant to belimiting, would be requesting help with software, for an account balanceor for technical help with a device. As is known, some services requireauthorization. For example, checking for a balance on a phone planshould require that the user be authorized to learn the balance.Logically, the same authorization would be needed to check the balanceon a credit card, bank account, airline mile account. Similarly,providing services may be costly and thus may only be available toauthorized users to avoid the cost of providing the service to beexcessive.

A service input may take on a variety of forms. In some embodiments, itmay be a phone number or a domain address or ip address which is knownto provide services that require authorization. As will be explained,the service input may be matched against a list of known service inputswhich require authorization. In other embodiments, the service input mayalso be keywords such as “utility help” or “computer service.”

At block 210, the system or method may determine if the service requestis directed to a known help address. As mentioned above, some servicesrequire authorization to make sure that security is maintained and thatthe cost of providing services does not become excessive. The serviceinput may be matched to a list of known service addresses to determineif authorization may be needed. The list of known service addresses maybe stored locally or the service input may be communicated to anadditional verification function or verification device to determine ifthe service address is for a service that requires authentication. Thecommunication of the service input to the additional verificationfunction or device may use an API to ensure that the input is correctlyunderstood and that the response is communicated in a consistent manner.By using the verification function or device, the list of service inputsmay be updated at a single source and would not need to be communicatedto a plurality of individual user devices.

At block 215, in response to the service request being directed to aknown service address, a biometric verification app may be executed. Insome embodiments, the use of the verification app may be opted into by auser. Some users may not be comfortable with using a verification appand may prefer to proceed with a traditional system that uses user namesand passwords, for example. In some embodiments, the app may already beinstalled on a user's computing device and the user may be given theoption to use or not use the verification app. In other embodiments, auser may download and install the app. In some embodiments, the matchingof the service request to a known service address may start the app andthe user may have several options such as be permitted to close the app,set up the app, ignore the app this time, delete the app or use the appif it has already been set up.

FIG. 3 may illustrate one system and method for determining if the userdesires to use biometric input to obtain services. In general, biometricinputs are known. A biometric input may be any input that represents acharacteristic of the user that may be difficult to replicate. Forexample, fingerprints are considered to be unique to each individual andmay be a biometric input. In addition, facial features may create aunique pattern and may be a biometric input. Voices also may be anappropriate biometric input. The biometric input may also be acombination of inputs such as a plurality of fingerprints, iris scan,ear scan, the back of a user's hand alone, voice, etc. In addition, theinputs may be used in combination such as a facial image along withanother input for additional security. FIGS. 5A-5G may illustrate sampleuser interfaces on a computing device 204 which may be used by thesystem and method.

At block 310, in response to the user desiring to use biometric input,the system and method may access a biometric input for the user. Thebiometric input may be accessed in a variety of ways. In one embodiment,the use may be requested to prove a biometric input and it may becaptured. In another embodiment, the biometric input may already bestored in a secure storage either in the user device or remotely. Byobtaining user verification through a traditional manner such as apassword or a second channel verification code, access may be granted tothe previously obtained biometric input.

At block 320, the biometric input may be stored in relation to the datarelated to user. As the biometric input may be useful to someonenefarious, the biometric input may be subject to security efforts. Inone embodiment, the biometric input may be stored in a secure element onthe user computing device. In an additional embodiment, the biometricinput may be subject to an encryption algorithm. In another embodiment,tokens may be used to communicate the biometric input to any futureverification attempts. Tokens may take a known value (a fingerprintvalue) and using a sophisticated algorithm turn it into a second valuethat has a limited time life. The second value may be communicated to anauthority which also may have the sophisticated algorithm and may beable to determine if the second value represents a valid biometricinput.

In some device, a biometric input may be used to access a variety ofservices and apps on the user device. For example, a biometric input maybe used to open a smart phone or access a banking app. The biometricinput may be accessed and used according to rules and procedures set outby the computing device manufacture, such as in a software developmentkit, an API or a paid subscription. The system and method describedherein may leverage the biometric input already available in the usercomputing device 204 to provide the infrastructure to use biometrics toaccess services.

At block 330, an indication to use the biometric verification app may bestored in response to the user making a service request for helpservices. For example, if a user selects to use help by calling acellular carrier, an indication may be stored in the app to execute theapp when the user calls for services from the cellular carrier.Similarly, if the user selects to not use the biometric system andmethod when calling a utility for help, a negative indication may bestored for the phone number for the utility.

Referring again to FIG. 2 , at block 220, a biometric input may bereceived from the user. A mentioned previously, the biometric input maybe a representation of a physical aspect of a user such as afingerprint, an iris scan, a facial scan, an image of a handprint, etc.In other embodiments, the biometric input may already be stored as adigital file and the biometric input may be the digital file orencrypted version of the digital file or a token which represents thebiometric input stored in the digital file.

At block 225, the system and method may determine whether the biometricinput is over a determined comparison threshold to a known biometricsignature for the user to create a verification indication. At a highlevel, the received biometric input will be compared to the biometricinput previously stored for the user when the app was set up. In someembodiments, the digital value of the submitted biometric input iscompared to the store biometric input for the user and if the comparisonis over a threshold, the submitted biometric input it approved. In otherembodiments, vectors are used to connect common points on the submittedand stored biometric inputs and if the vector comparison is over athreshold, the submitted biometric input is approved. Of course, otherways of comparing submitted to stored biometric inputs are known and arecontemplated.

At block 230, in response to the biometric input being determined toover a determined comparison threshold to a known biometric signaturefor the user, the service request may be connected to a service agent ofthe service provider. Logically, if authorization is required to obtainservices, the user needs to be authorized. Once authorized, the requestfor service may be forwarded to the service agent. As a result of thesystem and method, the user may no longer be required to rememberobscure PIN numbers or trivial facts such as the name of their firstgrade teachers pet, etc., and the user may proceed immediately toreceive services rather than engaging in a prolonged question and answersession with a service agent or automated service. In addition, it ismore difficult to copy biometric inputs meaning the service provider ismore confident the user is the actual user.

At block 235, the verification indication may be communicated to theservice agent 202. As a result, the service agent 202 may be able toimmediately begin offering help to the user rather than asking a seriesof verification questions. The service agent 202 may be a human or anautomated software service system which may use voice or text torespond.

At block 240, data related to the service request may be accessed forthe user. For example, if the call is for cellular communication help,the data may describe the type of phone of the user, when the phone wasput in service, the service plan of the user, the minutes and data usedby the user and any previous service requests of the user, etc.

At block 245, data related to the service request for the user may becommunicated to the service agent. If the service agent is a human, thedata may be displayed on a user interface. The service agent will beable to more quickly understand the needs of the user as the equipmentof the user and the past calls of the user may be displayed to theservice agent. If the service agent is a device, the data may becommunicated according to an API such that the service agent device maysecurely and efficiently receive the data.

Referring to FIG. 4 , a user may be using a voice input to a serviceagent and the FIG. 4 may illustrate a display that is shown to a serviceagent. In some embodiments, this data may be communicated to anautomated agent. The FIG. 4 may show the type of computing device 405the user may have registered with the service provider such as thefictitious Framis XV7. The name of the caller 410 may also be displayedalong with relevant data 415 about the user account. Past inquiries toservice 420 may be displayed to help the service agent anticipateproblems. Past dropped calls 425 may also be displayed to assist theservice agent anticipate problems. Other options for issues to discusswith a caller 430 may also be displayed. Artificial intelligence may beused to anticipate issues that may be of interest to the user bystudying past interest of the user or similar users.

For example, a Framis smart phone 202 may have a common issue ofconnecting to WiFi for phone calls. A patch may be available to addressthe problem. By automatically verifying the user, and pulling up therelevant user equipment 204, and determining that the patch has not yetbeen installed, the service agent 202 may be prepared to offer usefuladvice by anticipating problems that are specific to the user equipmentand may have been addressed by other service agents previously.

Similarly, machine learning may be used to anticipate problems andprovide proposed solutions which may be available to a service agent202. Past problems with past equipment may be collected along with pastsolutions and a machine learning algorithm may be used to determine themost effective solution from a plurality of solutions. In addition, ifthere is not an exact match, the machine learning may be able to providematches that are most similar. For example, a Framis XV6 may have aMosquito chip as a processor and it may have difficultly playing videos.A Simarf phone may also have a Mosquito chip as a processor and machinelearning may recognize that any phone with the Mosquito chip as aprocessor may have difficulty playing videos.

As mentioned previously, the service agent 202 may be automated in partor in whole. For example, the service agent 202 may receive an automatedreport from the user device 204 reporting a problem and the serviceagent computer 202 may communicate a response automatically if thereport is understood and a known solution is available. For example, areport of an app crash may be fixed by communicating a patch to the app.

As an example and not limitation, a use case may be when a cell phoneuser calls for account help to the cell phone provider. The user mayhave to first add a biometric input to their account which may beaccomplished through a user interface on the cellular device or bypermitting access to the cellular provider of a previously storedbiometric input. The biometric input may be encrypted and stored in asecure manner either on the device or remotely by the service provider.On future calls, the user may be presented the option to use biometricinputs to be pre-authorized to access help on their cellular account. Ifthe user selects to use the pre-authorization app and the biometricinput is verified, the user may immediately be put in touch with aservice agent for the cellular provider who may have a display whichcontains the user's data such as phone type, plan type, payment history,previous calls, previous issues, etc. As a result, the technical problemof accurately verifying users is addressed by using an app to accept andanalyze a more secure input which may be the biometric input.

FIGS. 5A-5H may display a sample user interface flow from a userperspective. In FIG. 5A, a user may have dialed a number recognized asbeing a number for assistance that requires authentication and the appexecutes. A user is given the option to select the authentication app510 as the default for future calls to this service agent that requiresauthentication 505. In FIG. 5B, two options are provided to a user toselect to use the app 510 or cancel the use of the app. In FIG. 5C, theuser selects to use the app 515 and set it as the default for futureservice calls to this service number.

In FIG. 5D, the app continues to execute and request a biometric inputfrom a user, in this case, a fingerprint 520. In FIG. 5E, a user beginsto move the pointer to select either “MAYBE NEXT TIME” or thefingerprint icon 520 to use the biometric input and the fingerprintbegins to be read 525. In FIG. 5F, the user hovers over the fingerprinticon 52 while the fingerprint is read 525 and in FIG. 5G, the userselects to use the biometric input 520 and the fingerprint iconhighlights 525. At FIG. 5H, the app will be set to execute on futureinquiries to this service agent 530 and the inquiry may be forwarded tothe service agent.

As a result of the system, the technical problem of verifying users andobtaining data on the users to understand the problems of the user priorto connecting the users to a service agent will be addressed through thetechnical solution of using biometrics to verify users. Biometrics areharder to guess or steal than traditional name and password typesystems. The biometrics are communicated using encryption or tokens tofurther ensure the biometrics have not been stolen or compromised.Further, users will be pre-qualified, saving server computing time, usertime and service agent time as trivial questions about

FIG. 6 may be a simplified illustration of the physical elements thatmake up an embodiment of a computing device, such as the client device204, and FIG. 7 is a simplified illustration of the physical elementsthat make up an embodiment of a server type computing device, such asmay be used by the service agent. Referring to FIG. 6 , a samplecomputing device is illustrated that is physically configured to be partof the systems and method for using biometrics for verification to aservice system. The computing device 204 may have a processor 1451 thatis physically configured according to computer executable instructions.In some embodiments, the processor may be specially designed orconfigured to optimize communication between a server such as systemserver 202 and the computing device 204 relating to the system describedherein. The computing device 204 may have a portable power supply 1455such as a battery, which may be rechargeable. It may also have a soundand video module 1461 which assists in displaying video and sound andmay turn off when not in use to conserve power and battery life. Thecomputing device 204 may also have volatile memory 1465 and non-volatilememory 1471. The computing device 204 may have GPS capabilities that maybe a separate circuit or may be part of the processor 1451. There alsomay be an input/output bus 1475 that shuttles data to and from thevarious user input/output devices such as a microphone, a camera, afingerprint reader, a display, or other input/output devices. Thecomputing device 202 also may control communicating with networks eitherthrough wireless or wired devices. Of course, this is just oneembodiment of a computing device 204 and the number and types ofcomputing devices 202 is limited only by the imagination.

The physical elements that make up an embodiment of a server, such asthe service system server 202, are further illustrated in FIG. 7 . Insome embodiments, the client system server may be specially configuredto run the system and methods for the service system and relatedoperations as disclosed herein. At a high level, the service systemserver 202 may include a digital storage such as a magnetic disk, anoptical disk, flash storage, non-volatile storage, etc. Structured datamay be stored in the digital storage a database. More specifically, theserver 202 may have a processor 1500 that is physically configuredaccording to computer executable instructions. In some embodiments, theprocessor 1500 may be specially designed or configured to optimizecommunication between a computing device, such as computing device 204,or between other system nodes such as a requesting node, and the server202 relating to the system as described herein. The server 202 may alsohave a sound and video module 1505 which assists in displaying video andsound and may turn off when not in use to conserve power and batterylife. The server 202 may also have volatile memory 1510 and non-volatilememory 1515.

A database 1525 for digitally storing structured data may be stored inthe memory 1510 or 1515 or may be separate. The database 1525 may alsobe part of a cloud of servers and may be stored in a distributed manneracross a plurality of servers. There also may be an input/output bus1520 that shuttles data to and from the various user input devices suchas a microphone, a camera, a display monitor or screen, etc. Theinput/output bus 1520 also may control communicating with networkseither through wireless or wired devices. In some embodiments, a userdata controller for running a user data API may be located on thecomputing device 204. However, in other embodiments, the user datacontroller may be located on server 202, or both the computing device204 and the server 202. Of course, this is just one embodiment of theclient system server 202 and additional types of servers arecontemplated herein.

The figures depict preferred embodiments for purposes of illustrationonly. One skilled in the art will readily recognize from the followingdiscussion that alternative embodiments of the structures and methodsillustrated herein may be employed without departing from the principlesdescribed herein.

Upon reading this disclosure, those of skill in the art will appreciatestill additional alternative structural and functional designs for thesystems and methods described herein through the disclosed principlesherein. Thus, while particular embodiments and applications have beenillustrated and described, it is to be understood that the disclosedembodiments are not limited to the precise construction and componentsdisclosed herein. Various modifications, changes and variations, whichwill be apparent to those skilled in the art, may be made in thearrangement, operation and details of the systems and methods disclosedherein without departing from the spirit and scope defined in anyappended claims.

1. A method of authenticating a user for services comprising: receivinga service request for the services from a user at a service receiver;determining if the service request is directed to a known help address;determining if authorization is needed by matching the service requestto a list of known service addresses; receiving, via a displayinterface, an indication of an acceptance to use a biometricverification app to access the services; providing, via the displayinterface, an option to select the biometric verification app as adefault authentication app for future service requests to the known helpaddress that require authentication; receiving a selection form theuser, via the display interface, to set the biometric verification appas the default authentication app for future service requests to theknown help address that require authentication; setting the biometricverification app as the default authentication app for future servicerequests to the known help address that require authentication; inresponse to the service request being directed to the known helpaddress, receiving a biometric input from the user via the biometricverification app; determining whether the biometric input is over adetermined comparison threshold to a known biometric signature for theuser; connecting the service request to a service agent; accessing datarelated to the service request for the user to present to the serviceagent; and displaying data related to the service request for the userto the service agent on a user interface.
 2. The method of claim 1,further comprising: determining if the user agrees to use the biometricinput to obtain services; in response to the user agreeing to use thebiometric input: accessing the biometric input of the user; storing thebiometric input in relation to the data related to user; and storing anindication to use the biometric verification app in response to the usermaking the service request for the services.
 3. The method of claim 1,further comprising determining if the user has indicated acceptance touse the biometric verification app to access the services.
 4. The methodof claim 1, wherein the biometric input is an electronic file.
 5. Themethod of claim 1, wherein the biometric input is at least one of: afacial recognition scan, a fingerprint scan or an iris scan.
 6. Themethod of claim 1, wherein the help address is a phone address or an IPaddress.
 7. The method of claim 1, further comprising: obtaining dataabout user services and user equipment; determining most common problemsfor the user services and the user equipment; and preparing to respondwith predetermined response to the most common problems for the userservices and the user equipment.
 8. The method of claim 7, wherein thepredetermined response is determined using machine learning on pastproblems and past solutions for the user services and the userequipment.
 9. A non-transitory computer storage medium comprisingcomputer executable instructions to physically configure a processor toauthenticate a user for services comprising computer executableinstructions for: receiving a service request for the services from auser at a service receiver; determining if the service request isdirected to a known help address; determining if authorization is neededby matching the service request to a list of known service addresses:receiving, via a display interface, an indication of an acceptance touse a biometric verification app to access the services; providing, viathe display interface, an option to select the biometric verificationapp as a default authentication app for future service requests to theknown help address that require authentication; receiving a selectionform the user, via the display interface, to set the biometricverification app as the default authentication app for future servicerequests to the known help address that require authentication; settingthe biometric verification app as the default authentication app forfuture service requests to the known help address that requireauthentication; in response to the service request being directed to theknown help address, receiving a biometric input from the user via thebiometric verification app; determining whether the biometric input isover a determined comparison threshold to a known biometric signaturefor the user; connecting the service request to a service agent;accessing data related to the service request for the user to present othe service agent; and displaying data related to the service requestfor the user to the service agent on a user interface.
 10. Thenon-transitory computer storage medium of claim 9, further comprisingcomputer executable instructions for: determining if the user agrees touse the biometric input to obtain the services; in response to the useragreeing to the use the biometric input: accessing the biometric inputof the user; storing the biometric input in relation to the data relatedto user; and storing an indication to use the biometric verification appin response to the user making the service request for the services. 11.The non-transitory computer storage medium of claim 9, furthercomprising computer executable instructions for determining if the userhas indicated acceptance to use the biometric verification app to accessthe services.
 12. The non-transitory computer storage medium of claim 9,wherein the biometric input is an electronic file.
 13. Thenon-transitory computer storage medium of claim 9, wherein the biometricinput is at least one of: a facial recognition scan, a fingerprint scanor an iris scan.
 14. The non-transitory computer storage medium of claim9, wherein the help address is a phone address or an IP address.
 15. Thenon-transitory computer storage medium of claim 9, further comprisingcomputer executable instructions for: obtaining data about userequipment and user services; determining most common problems for theuser services and the user equipment; and preparing to respond withpredetermined response to the most common problems for the user servicesand the user equipment.
 16. The non-transitory computer storage mediumof claim 15, wherein the predetermined response is determined usingmachine learning on past problems and past solutions for the userservices and the user equipment.
 17. A computer system comprising aservice server comprising: a processor physically configured accordingto computer executable instructions, a memory to store computerexecutable instructions and an input-output circuit, the computerexecutable instructions which physically configure the processor toauthenticate a user for services comprising computer executableinstructions for: receiving a service request for the services from auser at a service receiver; determining if the service request isdirected to a known help address; determining if authorization is neededby matching the service request to a list of known service addresses;receiving, via a display interface, an indication of an acceptance touse a biometric verification app to access the services; providing, viathe display interface, an option to select the biometric verificationapp as a default authentication app for future service requests to theknown help address that require authentication; receiving a selectionform the user, via the display interface, to set the biometricverification app as the default authentication app for future servicerequests to the known help address that require authentication; settingthe biometric verification app as the default authentication app forfuture service requests to the known help address that requireauthentication: in response to the service request being directed to theknown help address, receiving a biometric input from the user;determining whether the biometric input is over a determined comparisonthreshold to a known biometric signature for the user; connecting theservice request to a service agent; accessing data related to theservice request for the user to present to the service agent; anddisplaying data related to the service request for the user to theservice agent on a user interface.
 18. The computer system of claim 17,further comprising computer executable instructions for: determining ifthe user agrees to use the biometric input to obtain the services; inresponse to the user agreeing to use the biometric input: accessing thebiometric input of the user; storing the biometric input in relation tothe data related to user; and storing an indication to use the biometricverification app in response to the user making the service request forthe services.
 19. The computer system of claim 17, further comprisingcomputer executable instructions for determining if the user hasindicated acceptance to use the biometric verification app to access theservices.
 20. The computer system of claim 17, wherein the biometricinput is an electronic file.