Abstract
Reporters obtained the following quote from the background information supplied by the inventors: “Typically, a fraudulent caller may take advantage of suscepti ble users using phone calls to procure funds from the user in the form of gift c ards, which are very difficult to trace, by gaining the trust and proprietary in formation associated with the user through a plurality of phone calls called vis hing attacks.”