US20210192067A1 - User interface for interacting with multiple databases - Google Patents
User interface for interacting with multiple databases Download PDFInfo
- Publication number
- US20210192067A1 US20210192067A1 US17/172,975 US202117172975A US2021192067A1 US 20210192067 A1 US20210192067 A1 US 20210192067A1 US 202117172975 A US202117172975 A US 202117172975A US 2021192067 A1 US2021192067 A1 US 2021192067A1
- Authority
- US
- United States
- Prior art keywords
- entities
- user interface
- lock
- entity
- data access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims description 52
- 238000004891 communication Methods 0.000 claims description 46
- 230000004044 response Effects 0.000 claims description 34
- 238000013475 authorization Methods 0.000 claims description 15
- 238000012546 transfer Methods 0.000 claims description 12
- 230000003993 interaction Effects 0.000 claims 4
- 230000004913 activation Effects 0.000 claims 3
- 238000010586 diagram Methods 0.000 description 19
- 230000006870 function Effects 0.000 description 14
- 230000008569 process Effects 0.000 description 9
- 230000008878 coupling Effects 0.000 description 7
- 238000010168 coupling process Methods 0.000 description 7
- 238000005859 coupling reaction Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 238000007726 management method Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 6
- 230000008859 change Effects 0.000 description 6
- 238000004590 computer program Methods 0.000 description 6
- 230000004048 modification Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 6
- 230000001413 cellular effect Effects 0.000 description 5
- 208000001970 congenital sucrase-isomaltase deficiency Diseases 0.000 description 5
- 238000001514 detection method Methods 0.000 description 4
- 230000033001 locomotion Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 239000007789 gas Substances 0.000 description 3
- 230000014509 gene expression Effects 0.000 description 3
- 230000006872 improvement Effects 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 238000007792 addition Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000007613 environmental effect Effects 0.000 description 2
- 238000007710 freezing Methods 0.000 description 2
- 230000008014 freezing Effects 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000036772 blood pressure Effects 0.000 description 1
- 230000036760 body temperature Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 230000010267 cellular communication Effects 0.000 description 1
- 238000001816 cooling Methods 0.000 description 1
- 238000013497 data interchange Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000003344 environmental pollutant Substances 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000008921 facial expression Effects 0.000 description 1
- 231100001261 hazardous Toxicity 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 239000000543 intermediate Substances 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 231100000719 pollutant Toxicity 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000002207 retinal effect Effects 0.000 description 1
- 230000008786 sensory perception of smell Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 230000001755 vocal effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/547—Remote procedure calls [RPC]; Web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0246—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
- H04L41/0273—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using web services for network management, e.g. simple object access protocol [SOAP]
Definitions
- the subject matter disclosed herein generally relates to network communications and user interfaces. Specifically, in some example embodiments, the present disclosure addresses systems and methods for providing a user interface for interacting with multiple databases.
- FIG. 1 is a network diagram illustrating a network environment suitable for a user interface for interacting with multiple databases, according to some example embodiments.
- FIG. 2 is an architectural diagram illustrating components of a user interface server in communication with other systems, according to some example embodiments.
- FIG. 3 is a block diagram illustrating components of a user interface server, according to some example embodiments.
- FIG. 4 is a block diagram illustrating a user interface for interacting with multiple databases, according to some example embodiments.
- FIG. 5 is a block diagram illustrating a user interface for interacting with multiple databases, according to some example embodiments.
- FIG. 6 is a block diagram illustrating user interfaces for interacting with multiple databases, according to some example embodiments.
- FIG. 7 is a block diagram illustrating a user authentication interface, according to some example embodiments.
- FIG. 8 is a block diagram illustrating a database schema suitable for supporting a user interface for interacting with multiple databases, according to some example embodiments.
- FIG. 9 is a flowchart illustrating operations of a computing device in performing a method of providing a user interface for interacting with multiple databases, according to some example embodiments.
- FIG. 10 is a flowchart illustrating operations of a computing device in performing a method of providing a user interface for interacting with multiple databases, according to some example embodiments.
- FIG. 11 is a block diagram illustrating an example of a software architecture that may be installed on a machine, according to some example embodiments.
- FIG. 12 is a diagrammatic representation of a machine in the form of a computer system within which a set of instructions may be executed for causing the machine to perform any one or more of the methodologies discussed herein, according to an example embodiment.
- Example methods and systems are directed to a user interface for interacting with multiple databases. Examples merely typify possible variations. Unless explicitly stated otherwise, components and functions are optional and may be combined or subdivided, and operations may vary in sequence or be combined or subdivided. In the following description, for purposes of explanation, numerous specific details are set forth to provide a thorough understanding of example embodiments. It will be evident to one skilled in the art, however, that the present subject matter may be practiced without these specific details.
- Databases of different entities have independent locking features to control access to a user's data.
- a user interface for interacting with multiple databases allows the user to lock or unlock access to their data with multiple entities simultaneously.
- a user interface (UI) server communicates with servers corresponding to each of the different entities request that the data access be locked or unlocked. The UI server may also report to the consumer the data access status of the for the user's data with each of the different entities.
- the user interface for interacting with multiple databases may provide one or more authentication prompts prior to allowing the user to lock or unlock their data.
- the authentication prompts may be provided by one or more of the multiple entities.
- Locking and freezing credit both result in a credit reporting agency refusing to provide credit data to the third-parties.
- the processes for locking and freezing credit may be different in terms of time to process a modification request, fees charged, frequency that changing the locked or frozen status is permitted, or in other ways.
- the user interface for interacting with multiple databases is an improvement over existing interfaces, which require the consumer to authenticate, check lock status, and request the locking or unlocking of credit with each credit reporting agency individually.
- the existing process is comparatively error-prone, since a consumer may easily overlook an agency, and time consuming, since the consumer must perform each step multiple times.
- FIG. 1 is a network diagram illustrating a network environment 100 suitable for a user interface for interacting with multiple databases (e.g., a user interface for interacting with multiple databases), according to some example embodiments.
- the network environment 100 includes a UI server 110 , database servers 120 A, 120 B, and 120 C, and devices 130 A and 130 B, all communicatively coupled to each other via a network 160 .
- the database servers 120 A- 120 C may be collectively referred to as “database servers 120 ,” or generically referred to as a “database server 120 .”
- the devices 130 A and 130 B may be collectively referred to as “devices 130 ,” or generically referred to as a “device 130 .”
- the UI server 110 is a network-based system.
- the devices 130 may interact with the UI server 110 using a web client 140 A or an app client 140 B.
- the UI server 110 and the devices 130 may each be implemented in a computer system, in whole or in part, as described below
- the UI server 110 provides a user interface for interacting with multiple databases to other machines (e.g., the devices 130 ) via the network 160 .
- the user interface for interacting with multiple databases may provide a way for users to lock and unlock accessibility of data with multiple entities by communication with the database servers 120 .
- the database servers 120 may be credit reporting agency servers and the user may lock and unlock accessibility of credit data with each of multiple credit reporting agencies.
- the user 150 may be a human user (e.g., a human being), a machine user (e.g., a computer configured by a software program to interact with the devices 130 and the UI server 110 ), or any suitable combination thereof (e.g., a human assisted by a machine or a machine supervised by a human).
- the user 150 is not part of the network environment 100 , but is associated with the devices 130 and may be a user of the devices 130 (e.g., an owner of the devices 130 A and 130 B).
- the device 130 may be a desktop computer, a vehicle computer, a tablet computer, a navigational device, a portable media device, or a smart phone belonging to the user 150 .
- the UI server 110 receives a selection from a device 130 to lock access to data of multiple entities, each of the multiple entities (e.g., multiple credit reporting agencies) providing one of the database servers 120 .
- the UI server 110 generates, for each of the database servers 120 , a request to lock access to data (e.g., to lock credit) and transmits the request to the database server.
- Each database server 120 responds to the request, indicating whether the request was successful or not.
- the UI server 110 may update the user interface for interacting with multiple databases provided on the device 130 to show the updated data access status for each entity.
- any of the machines, databases, or devices shown in FIG. 1 may be implemented in a general-purpose computer modified (e.g., configured or programmed) by software to be a special-purpose computer to perform the functions described herein for that machine, database, or device.
- a computer system able to implement any one or more of the methodologies described herein is discussed below with respect to FIGS. 11-12 .
- a “database” is a data storage resource and may store data structured as a text file, a table, a spreadsheet, a relational database (e.g., an object-relational database), a triple store, a hierarchical data store, or any suitable combination thereof.
- any two or more of the machines, databases, or devices illustrated in FIG. 1 may be combined into a single machine, database, or device, and the functions described herein for any single machine, database, or device may be subdivided among multiple machines, databases, or devices.
- the network 160 may be any network that enables communication between or among machines, databases, and devices (e.g., the UI server 110 and the devices 130 ). Accordingly, the network 160 may be a wired network, a wireless network (e.g., a mobile or cellular network), or any suitable combination thereof. The network 160 may include one or more portions that constitute a private network, a public network (e.g., the Internet), or any suitable combination thereof.
- FIG. 2 is an architectural diagram 200 illustrating components of a UI server 110 suitable for providing a user interface for interacting with multiple databases, according to some example embodiments.
- the UI server 110 includes an Apache Docker container 210 E that serves a web site, via a hypertext transfer protocol (HTTP) connection, to the device 130 A.
- the web browser of the device 130 A is in communication, via a representational state transfer (REST) application programming interface (API), with an authorization Docker container 210 A, a member Docker container 210 B, a SalesForceTM Docker container 210 C, and a CSID ExperianTM Docker container 210 D.
- the member Docker container 210 B accesses a database 230 using the Simple Queue Service (SQS).
- SQL Simple Queue Service
- the SalesforceTM Docker container 210 C accesses a SalesForceTM server 240 using the SalesForceTM API.
- the CSID ExperianTM Docker container 210 D accesses the database server 120 B using a proprietary API.
- the database 120 A is accessed by the device 130 A using another proprietary API.
- SQL Structured Query Language
- NoSQL is used to refer to databases other than standard relational databases.
- Dynamo NoSQL is a particular type of NoSQL based on key-value pairs.
- the authorization Docker container 210 A uses Dynamo NoSQL to access data files 220 A and 220 B.
- the data files 220 A and 220 B may store usernames, passwords, authentication questions, user profiles, or any suitable combination thereof.
- a user may enter identifying information into a web page served by the Apache Docker container 210 E, and the user's web browser may send the entered information to the authorization Docker container 210 A (e.g., using Angular 5 code embedded in the web page and running on the user's web browser).
- the authorization Docker container 210 A may verify the information against the data stored in one or both of the data files 220 A and 220 B to identify or authorize the user.
- Docker provides containerization (also referred to as operating-system-level virtualization) of applications, reducing overhead compared to running each application in a separate virtual machine (VM), but providing comparable isolation of the containerized applications (also referred to as containers).
- the member Docker container 210 B accesses the database 230 using SQS to retrieve and store user data. For example, a user's name, social security number, birthdate, address, previous addresses, phone number, bank account numbers, or any suitable combination thereof may be stored in the database 230 .
- the SalesForceTM server 240 may be accessed by the SalesForceTM Docker container 210 C using the SalesForceTM API.
- the SalesForceTM server 240 provides case management and task management services. For example, a task to periodically reattempt to change credit status with a credit reporting agency may be created using SalesForceTM in the event that an immediate attempt to change the credit status in response to a user request fails.
- Some entities provide a proprietary API that may be accessed by the UI server 110 to retrieve and modify credit status.
- CSID ExperianTM provides such an API.
- the CSID ExperianTM Docker container 210 D may access a database server (e.g., the database server 120 B) using the CSID ExperianTM proprietary API.
- Other entities provide a proprietary API for access by the user's device (e.g., the device 130 A).
- TransUnionTM provides this type of API.
- the device 130 A may access a database server (e.g., the database server 120 A) using the TransUnionTM proprietary API.
- the device 130 A may be configured, using Angular 5 or another scripting language, by the UI server 110 to communicate with one or more of the entities without using the UI server 110 as an intermediary.
- the device 130 A provides updated status information to the UI server 110 (e.g., for storage by the member Docker container 210 B in the database 230 ).
- FIG. 3 is a block diagram illustrating components of the UI server 110 , according to some example embodiments.
- the UI server 110 is shown as including a communication module 310 , an authentication module 320 , a data lock module 330 , an alert module 340 , a user interface module 350 , and a storage module 360 , all configured to communicate with each other (e.g., via a bus, shared memory, a switch, or APIs).
- Any one or more of the modules described herein may be implemented using hardware (e.g., a processor of a machine) or a combination of hardware and software.
- any module described herein may configure a processor to perform the operations described herein for that module.
- modules described herein as being implemented within a single machine, database, or device may be distributed across multiple machines, databases, or devices.
- the communication module 310 is configured to send and receive data.
- the communication module 310 may receive, over the network 160 , a request for a user interface for interacting with multiple databases from a device 130 .
- the communication module 310 may provide the request to the user interface module 350 , transmit a user interface provided by the user interface module 350 to the device 130 , and receive user selections of options in the user interface for processing by the authentication module 320 or the data lock module 330 , storage by the storage module 360 , or any suitable combination thereof.
- the authentication module 320 is configured to authenticate a user. For example, a question that only the user is expected to know the answer to may be presented to the user and the user authenticated only if the response is correct. In some example embodiments, multiple such questions are presented and the responses evaluated. The user may be permitted to proceed to view data access status information, lock access to data, unlock access to data, or any suitable combination thereof, only after authentication is successful.
- the data lock module 330 is configured to lock or unlock access to the user's data with multiple entities. For example, a request to lock or unlock access to the user's data may be sent, using the communication module 310 , to a database server 120 , by the credit lock module 330 . A response to the request may be received and used to update a user interface provided by the user interface module 350 , used to cause an alert to be generated by the alert module 340 , stored for later reference by the storage module 360 , or any suitable combination thereof.
- the alert module 340 is configured to generate alerts.
- the generated alerts may be provided to users (e.g., to report data access status changes, such as credit status changes, to report data breaches, to report suspected identity theft, or any suitable combination thereof) or to administrators (e.g., to report error conditions in communications with one or more database servers).
- Each alert may be in the form of e-mail, text message, automated voice message, or another suitable method of notification.
- the user interface module 350 is configured to provide a user interface for interacting with multiple databases.
- the user interface for interacting with multiple databases may include information regarding a user's current credit data access status, provide options to lock or unlock data access with multiple entities, or both.
- one or more of the user interface for interacting with multiple databases s 400 , 500 , 600 , and 650 , described below with respect to FIGS. 4-6 may be presented by the user interface module 350 , and selections may be received via an application interface or a web interface.
- the user interface module 350 may provide a user interface to authenticate the user, such as a user authentication interface 700 , described below with respect to FIG. 7 .
- the storage module 360 is configured to store data regarding users, entities, data access status, or any suitable combination thereof.
- FIG. 4 is a block diagram illustrating a user interface 400 for interacting with multiple databases, according to some example embodiments.
- the user interface 400 includes a name 410 , a credit status area 420 , and buttons 430 and 440 .
- the user interface 400 may be displayed in response to a user initiating a unified data access lock process (e.g., a unified credit lock process).
- the name 410 indicates a name of the user.
- the data access status area 420 shows the current data access status (e.g., locked, unlocked, or frozen) for each of a plurality of entities (e.g., credit reporting agencies).
- the button 430 is operable to cause the UI server 110 to request each of the entities to lock the user's data.
- the button 440 is operable to cause the UI server 110 to request each of the entities to unlock the user's credit.
- the user interface 400 is provided by the UI server 110 dynamically.
- the UI server 110 may be a web server that communicates with one or more of the database servers 120 to determine the current data access status.
- a web page served by the UI server 110 may include the data access status information and be rendered by the web client 140 A.
- the user interface 400 is generated by the device 130 .
- the app client 140 B may communicate with one or more of the database servers 120 to determine the current data access status. Using the information gathered from the database servers 120 , the app client 140 B may generate and provide the user interface for interacting with multiple databases 400 . The app client 140 B may inform the UI server 110 of changes in data access status.
- the user interface 400 may also include some information provided by the database servers 120 to the device 130 via the server 110 and some information provided by the database servers 120 directly to the device 130 .
- the UI server 110 receives data access status information only from a subset of the database servers 120 .
- the user interface 400 allows the user to monitor and change the data access status with the multiple entities even though the communication paths to the various database servers 120 are distinct (e.g., because the UI server 110 intermediates only a subset of the communications).
- FIG. 5 is a block diagram illustrating a user interface 500 for interacting with multiple databases, according to some example embodiments.
- the user interface 500 includes the name 410 , a data access status area 520 , and the button 440 .
- the user interface 500 may be displayed after the user has opted to lock data access with all entities, showing an updated status in the data access status area 520 . Since all entities have locked the user's data (as shown in the data access status area 520 ), the button 430 is disabled or removed from the user interface 500 .
- the credit status area may report a single status for all entities instead of an individual status for each entity.
- FIG. 6 is a block diagram illustrating user interfaces 600 and 650 for interacting with multiple databases, according to some example embodiments.
- the user interfaces 600 and 650 each include the name 410 , the data access status area 520 , and a tray 630 .
- a portion of the tray 630 is operable to open and close the tray 630 .
- a user may open or close the tray 630 by clicking or double-clicking, on the arrow shown in the tray 630 , touching the right edge of the tray 630 on a touch screen, clicking on the tray 630 and dragging the tray 630 to the right or left, or any suitable combination thereof.
- the tray 630 is closed and the credit status area 520 indicates that data access is locked by all entities (e.g., that credit is locked by all credit reporting agencies).
- the credit status area 520 indicates that credit is locked by two entities, and the tray 630 is open, revealing the data access status with each entity as a slider.
- the corresponding slider is in the left position if data access is not locked and in the right position if data access is locked.
- Each slider may be operable by the user to request a change in data access status for the corresponding entity. For example, the user may click and drag the slider next to “TransUnion” to initiate a request to the TransUnionTM credit reporting agency to lock credit for the user by locking access to the user's credit data stored in a database controlled by TransUnionTM.
- FIG. 7 is a block diagram illustrating a user authentication interface 700 , according to some example embodiments.
- the user authentication interface 700 includes the name 410 , an authentication area 720 , and a button 730 .
- the user authentication interface 700 may be displayed prior to the display of a user interface for interacting with multiple databases (e.g., the user interface 400 , 500 , 600 , or 650 ), to authenticate the user before allowing the user to view or modify data access status with multiple entities.
- multiple databases e.g., the user interface 400 , 500 , 600 , or 650
- the authentication area 720 displays an authentication prompt to the user.
- the user selects one of the presented radio buttons to indicate the desired response, such as a current or prior address of the user, then presses the button 730 to submit the response.
- other forms of authentication may be used, such as handwriting analysis, password entry, identifying particular financial transactions, or any suitable combination thereof.
- FIG. 8 is a block diagram illustrating a database schema 800 suitable for supporting a user interface for interacting with multiple databases, according to some example embodiments.
- the database schema 800 includes a user table 810 and a status table 840 .
- the user table 810 is defined by a table definition 820 , including a user identifier field, a name field, and a social security number (SSN) field, and includes rows 830 A, 830 B, and 830 C.
- the status table 840 is defined by a table definition 850 , including a user identifier field, an entity identifier field, and a status field, and includes rows 860 A, 860 B, and 860 C.
- Each of the rows 830 A- 830 C stores information for a user.
- the user identifier field stores a unique identifier for the user.
- the name field stores a name of the user.
- the SSN field stores a social security number of the user.
- additional or different fields are stored in the user table 810 . For example, an address field, a birthdate field, a phone number field, or any suitable combination thereof may be stored.
- Each of the rows 860 A- 860 C stores the data access status of a user with an entity.
- the rows 860 A- 860 C indicate that the user having the identifier of 1234 (and named “Adam Smith,” as determined by reference to the user table 810 ) has data access locked with one entity and unlocked with two entities.
- FIG. 9 is a flowchart illustrating operations of a server computer in performing a method 900 of providing a user interface for interacting with multiple databases, according to some example embodiments.
- operations in the method 900 are described as being performed by the UI server 110 , using modules described above with respect to FIG. 3 .
- the user interface module 350 causes a user interface to be presented that comprises an option to modify data access status (e.g., to lock access, unlock access, freeze access, unfreeze access, or any suitable combination thereof) by a plurality of entities (e.g., as credit reporting agencies).
- the plurality of entities are at least three entities.
- the user interface module 350 of the UI server 110 may transmit a web page via the network 160 to the web client 140 A of the device 130 A for presentation on a display of the device 130 A to the user 150 .
- the web page When rendered by the web client 140 A, the web page may be presented in the form of the user interface 400 , comprising a single lock option in the form of the button 430 , operable to lock data access in the databases of the three entities shown in the data access status area 420 .
- Operation 910 may be performed in response to a request received by the UI server 110 , transmitted via an electronic communication network, to lock data access functionality in multiple databases (e.g., in at least three databases), each database corresponding to a different entity.
- the request may identify a person having data in each of the databases.
- the person may be identified by user name, name, email address, social security number, by another identifier, or any suitable combination thereof.
- the data lock module 330 for each of the plurality of entities, transmits, to a database server corresponding to the entity, a request for the entity to modify data access status.
- the data lock module 330 of the UI server 110 may transmit a request to each of the database servers 120 A- 120 C to request that the three entities shown in the data access status area 420 lock data access for the user 150 .
- the method used to transmit the request to each of the database servers 120 A- 120 C may be selected based on the server.
- the database server 120 A may make use of RESTful APIs with a primary data format based on JavaScript object notation (JSON).
- JSON JavaScript object notation
- a RESTful API is one that uses the representational state transfer (REST) architectural style, and is often implemented using hypertext transfer protocol (HTTP) requests.
- the database server 120 B may use the simple object access protocol (SOAP), in conjunction with remote procedure calls (RPC), REST, and data formatted using extended markup language (XML).
- RPC remote procedure calls
- XML extended markup language
- the database server 120 C may use a blend of RPC and REST with support for data formatted using JSON and XML.
- Another database server may use the WebServices application programming interface (API).
- API WebServices application programming interface
- any combination of data exchange standards such as SOAP, RPC over HTTP, REST, file transfer protocol (FTP), WebServices API, or secure FTP (SFTP) may be used, using any data transmission formats such as XML, JSON, electronic data interchange (EDI), or health level 7 (HL7).
- the user interface module 350 updates the user interface to identify a modified data access status (e.g., by communicating, via the electronic communication network, an update message to cause the user interface to confirm that the data access functionality has been locked). For example, one or more of the entity servers 120 A- 120 C may respond to the request to lock data access with an indication that data access has been locked by the corresponding entity.
- the updated user interface indicates which of the entities have locked data access for the user 150 . For example, the user interface 500 shows that all entities have locked the user's data.
- the UI server 110 may store the user's request for retrying later.
- the row in the status table 840 for the user's data access status with the entity corresponding to the unresponsive server may be updated to indicate both the current status (e.g., unlocked) and the requested status (e.g., locked).
- a process may periodically (e.g., hourly) query the status table 840 to identify rows in which the current status and the requested status are different. For each identified row, the process may resubmit the change status request for the user, and update the status in the status table 840 once the request is successful.
- FIG. 10 is a flowchart illustrating operations of a computing device in performing a method 1000 of providing a user interface for interacting with multiple databases, according to some example embodiments.
- operations in the method 1000 are described as being performed by the UI server 110 , using modules described above with respect to FIG. 3 .
- the authentication module 320 requests an authentication prompt for an individual from a server.
- a server For example, one of the database servers 120 A- 120 C may be requested to provide the authentication prompt
- the authentication module 320 causes a user interface comprising the authentication prompt to be presented on a client device (e.g., the device 130 ).
- a client device e.g., the device 130
- a programmatic interface of the UI server 110 may provide the user authentication interface 700 for display by the app client 140 B on the device 130 B.
- a response to the authentication prompt is received by the authentication module 320 in operation 1030 , and the response is transmitted to the server that provided the prompt in operation 1040 .
- a request is received by the UI server 110 , transmitted via an electronic communication network from a client device, to lock data access functionality in multiple databases.
- the request may identify a person having data in each of the databases.
- the UI server 110 may authenticate a user of the client device via the electronic communication network, using operations 1010 - 1040 .
- the server After validating the response, the server provides an authorization to modify the data access status (e.g., to lock data access, to unlock data access, to freeze data access, or any suitable combination thereof) for the individual, and, in operation 1050 , the authentication module 320 receives the authorization.
- operations 1010 - 1050 are repeated for additional servers of the database servers 120 A- 120 C.
- the authorization received in operation 1050 from one of the database servers 120 A- 120 C is sufficient to allow modification of data access status from one or more additional database servers 120 A- 120 C.
- the method 900 in response to receiving the authorization (or authorizations), the method 900 is performed.
- a user is authenticated before being permitted to modify data access status (e.g., to lock data access) with multiple entities using a user interface for interacting with multiple databases.
- one or more of the methodologies described herein may facilitate efficient modification of data access status (e.g., credit reporting status).
- data access status e.g., credit reporting status
- one or more of the methodologies described herein may facilitate locking or unlocking data access with multiple entities (e.g., credit reporting agencies) without requiring the user to connect to multiple servers and respond to multiple prompts.
- one or more of the methodologies described herein may obviate a need for certain efforts or resources that otherwise would be involved in locking or unlocking data access with multiple entities. Efforts expended by a user in modifying credit reporting status may be reduced by one or more of the methodologies described herein. Computing resources used by one or more machines, databases, or devices (e.g., within the network environment 100 ) may similarly be reduced. Examples of such computing resources include processor cycles, network traffic, memory usage, data storage capacity, power consumption, and cooling capacity.
- Modules may constitute either software modules (e.g., code embodied on a non-transitory machine-readable medium) or hardware-implemented modules.
- a hardware-implemented module is a tangible unit capable of performing certain operations and may be configured or arranged in a certain manner.
- one or more computer systems e.g., a standalone, client, or server computer system
- one or more processors may be configured by software (e.g., an application or application portion) as a hardware-implemented module that operates to perform certain operations as described herein.
- a hardware-implemented module may be implemented mechanically or electronically.
- a hardware-implemented module may comprise dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC)) to perform certain operations.
- a hardware-implemented module may also comprise programmable logic or circuitry (e.g., as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware-implemented module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.
- the term “hardware-implemented module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily or transitorily configured (e.g., programmed) to operate in a certain manner and/or to perform certain operations described herein.
- hardware-implemented modules are temporarily configured (e.g., programmed)
- each of the hardware-implemented modules need not be configured or instantiated at any one instance in time.
- the hardware-implemented modules comprise a general-purpose processor configured using software
- the general-purpose processor may be configured as respective different hardware-implemented modules at different times.
- Software may accordingly configure a processor, for example, to constitute a particular hardware-implemented module at one instance of time and to constitute a different hardware-implemented module at a different instance of time.
- Hardware-implemented modules can provide information to, and receive information from, other hardware-implemented modules. Accordingly, the described hardware-implemented modules may be regarded as being communicatively coupled. Where multiple of such hardware-implemented modules exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses that connect the hardware-implemented modules). In embodiments in which multiple hardware-implemented modules are configured or instantiated at different times, communications between such hardware-implemented modules may be achieved, for example, through the storage and retrieval of information in memory structures to which the multiple hardware-implemented modules have access. For example, one hardware-implemented module may perform an operation, and store the output of that operation in a memory device to which it is communicatively coupled.
- a further hardware-implemented module may then, at a later time, access the memory device to retrieve and process the stored output.
- Hardware-implemented modules may also initiate communications with input or output devices, and can operate on a resource (e.g., a collection of information).
- processors may be temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions.
- the modules referred to herein may, in some example embodiments, comprise processor-implemented modules.
- the methods described herein may be at least partially processor-implemented. For example, at least some of the operations of a method may be performed by one or more processors or processor-implemented modules. The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the processor or processors may be located in a single location (e.g., within a home environment, an office environment, or a server farm), while in other embodiments the processors may be distributed across a number of locations.
- the one or more processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). For example, at least some of the operations may be performed by a group of computers (as examples of machines including processors), these operations being accessible via a network (e.g., the Internet) and via one or more appropriate interfaces (e.g., application programming interfaces (APIs)).
- SaaS software as a service
- Example embodiments may be implemented in digital electronic circuitry, in computer hardware, firmware, or software, or in combinations of them.
- Example embodiments may be implemented using a computer program product, e.g., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable medium for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers.
- a computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a standalone program or as a module, subroutine, or other unit suitable for use in a computing environment.
- a computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
- operations may be performed by one or more programmable processors executing a computer program to perform functions by operating on input data and generating output.
- Method operations can also be performed by, and apparatus of example embodiments may be implemented as, special-purpose logic circuitry, e.g., a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC).
- FPGA field programmable gate array
- ASIC application-specific integrated circuit
- the computing system can include clients and servers.
- a client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
- both hardware and software architectures merit consideration. Specifically, it will be appreciated that the choice of whether to implement certain functionality in permanently configured hardware (e.g., an ASIC), in temporarily configured hardware (e.g., a combination of software and a programmable processor), or in a combination of permanently and temporarily configured hardware may be a design choice.
- hardware e.g., machine
- software architectures that may be deployed, in various example embodiments.
- FIG. 11 is a block diagram 1100 illustrating a software architecture 1102 , which may be installed on any one or more of the devices described above.
- FIG. 11 is merely a non-limiting example of a software architecture, and it will be appreciated that many other architectures may be implemented to facilitate the functionality described herein.
- the software architecture 1102 may be implemented by hardware such as a machine 1200 of FIG. 12 that includes processors 1210 , memory 1230 , and I/O components 1250 .
- the software architecture 1102 may be conceptualized as a stack of layers where each layer may provide a particular functionality.
- the software architecture 1102 includes layers such as an operating system 1104 , libraries 1106 , frameworks 1108 , and applications 1110 .
- the applications 1110 invoke application programming interface (API) calls 1112 through the software stack and receive messages 1114 in response to the API calls 1112 , according to some implementations.
- API application programming interface
- the operating system 1104 manages hardware resources and provides common services.
- the operating system 1104 includes, for example, a kernel 1120 , services 1122 , and drivers 1124 .
- the kernel 1120 acts as an abstraction layer between the hardware and the other software layers in some implementations.
- the kernel 1120 provides memory management, processor management (e.g., scheduling), component management, networking, and security settings, among other functionality.
- the services 1122 may provide other common services for the other software layers.
- the drivers 1124 may be responsible for controlling or interfacing with the underlying hardware.
- the drivers 1124 may include display drivers, camera drivers, Bluetooth® drivers, flash memory drivers, serial communication drivers (e.g., Universal Serial Bus (USB) drivers), Wi-Fi® drivers, audio drivers, power management drivers, and so forth.
- USB Universal Serial Bus
- the libraries 1106 provide a low-level common infrastructure that may be utilized by the applications 1110 .
- the libraries 1106 may include system libraries 1130 (e.g., C standard library) that may provide functions such as memory allocation functions, string manipulation functions, mathematic functions, and the like.
- the libraries 1106 may include API libraries 1132 such as media libraries (e.g., libraries to support presentation and manipulation of various media formats such as Moving Picture Experts Group-4 (MPEG4), Advanced Video Coding (H.264 or AVC), Moving Picture Experts Group Layer-3 (MP3), Advanced Audio Coding (AAC), Adaptive Multi-Rate (AMR) audio codec, Joint Photographic Experts Group (JPEG or JPG), or Portable Network Graphics (PNG)), graphics libraries (e.g., an OpenGL framework used to render in two dimensions (2D) and three dimensions (3D) in a graphic context on a display), database libraries (e.g., SQLite to provide various relational database functions), web libraries (e.g., WebKit to provide web browsing functionality), and the like.
- the libraries 1106 may also include a wide variety of other libraries 1134 to provide many other APIs to the applications 1110 .
- the frameworks 1108 provide a high-level common infrastructure that may be utilized by the applications 1110 , according to some implementations.
- the frameworks 1108 provide various graphic user interface (GUI) functions, high-level resource management, high-level location services, and so forth.
- GUI graphic user interface
- the frameworks 1108 may provide a broad spectrum of other APIs that may be utilized by the applications 1110 , some of which may be specific to a particular operating system or platform.
- the applications 1110 include a home application 1150 , a contacts application 1152 , a browser application 1154 , a book reader application 1156 , a location application 1158 , a media application 1160 , a messaging application 1162 , a game application 1164 , and a broad assortment of other applications such as a third-party application 1166 .
- the applications 1110 are programs that execute functions defined in the programs.
- Various programming languages may be employed to create one or more of the applications 1110 , structured in a variety of manners, such as object-orientated programming languages (e.g., Objective-C, Java, or C++) or procedural programming languages (e.g., C or assembly language).
- the third-party application 1166 may be mobile software running on a mobile operating system such as iOSTM, AndroidTM Windows® Phone, or other mobile operating systems.
- the third-party application 1166 may invoke the API calls 1112 provided by the mobile operating system (e.g., the operating system 1104 ) to facilitate functionality described herein.
- FIG. 12 is a block diagram illustrating components of a machine 1200 , according to some example embodiments, able to read instructions from a machine-readable medium (e.g., a machine-readable storage medium) and perform any one or more of the methodologies discussed herein.
- FIG. 12 shows a diagrammatic representation of the machine 1200 in the example form of a computer system, within which instructions 1216 (e.g., software, a program, an application, an applet, an app, or other executable code) for causing the machine 1200 to perform any one or more of the methodologies discussed herein may be executed.
- the machine 1200 operates as a standalone device or may be coupled (e.g., networked) to other machines.
- the machine 1200 may operate in the capacity of a server machine or a client machine in a server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
- the machine 1200 may comprise, but not be limited to, a server computer, a client computer, a personal computer (PC), a tablet computer, a laptop computer, a netbook, a set-top box (STB), a personal digital assistant (PDA), an entertainment media system, a cellular telephone, a smart phone, a mobile device, a wearable device (e.g., a smart watch), a smart home device (e.g., a smart appliance), other smart devices, a web appliance, a network router, a network switch, a network bridge, or any machine capable of executing the instructions 1216 , sequentially or otherwise, that specify actions to be taken by the machine 1200 .
- the term “machine” shall also be taken to include
- the machine 1200 may include processors 1210 , memory 1230 , and I/O components 1250 , which may be configured to communicate with each other via a bus 1202 .
- the processors 1210 e.g., a Central Processing Unit (CPU), a Reduced Instruction Set Computing (RISC) processor, a Complex Instruction Set Computing (CISC) processor, a Graphics Processing Unit (GPU), a Digital Signal Processor (DSP), an Application-Specific Integrated Circuit (ASIC), a Radio-Frequency Integrated Circuit (RFIC), another processor, or any suitable combination thereof
- the processors 1210 may include, for example, a processor 1212 and a processor 1214 that may execute the instructions 1216 .
- processor is intended to include multi-core processors that may comprise two or more independent processors (also referred to as “cores”) that may execute instructions contemporaneously.
- FIG. 12 shows multiple processors, the machine 1200 may include a single processor with a single core, a single processor with multiple cores (e.g., a multi-core processor), multiple processors with a single core, multiple processors with multiple cores, or any combination thereof.
- the memory 1230 may include a main memory 1232 , a static memory 1234 , and a storage unit 1236 accessible to the processors 1210 via the bus 1202 .
- the storage unit 1236 may include a machine-readable medium 1238 on which are stored the instructions 1216 embodying any one or more of the methodologies or functions described herein.
- the instructions 1216 may also reside, completely or at least partially, within the main memory 1232 , within the static memory 1234 , within at least one of the processors 1210 (e.g., within the processor's cache memory), or any suitable combination thereof, during execution thereof by the machine 1200 . Accordingly, in various implementations, the main memory 1232 ., the static memory 1234 , and the processors 1210 are considered machine-readable media 1238 .
- the term “memory” refers to a machine-readable medium 1238 able to store data temporarily or permanently and may be taken to include, but not be limited to, random-access memory (RAM), read-only memory (ROM), buffer memory, flash memory, and cache memory. While the machine-readable medium 1238 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, or associated caches and servers) able to store the instructions 1216 .
- machine-readable medium shall also be taken to include any medium, or combination of multiple media, that is capable of storing instructions (e.g., instructions 1216 ) for execution by a machine (e.g., machine 1200 ), such that the instructions, when executed by one or more processors of the machine (e.g., processors 1210 ), cause the machine to perform any one or more of the methodologies described herein.
- a “machine-readable medium” refers to a single storage apparatus or device, as well as “cloud-based” storage systems or storage networks that include multiple storage apparatus or devices.
- machine-readable medium shall accordingly be taken to include, but not be limited to, one or more data repositories in the form of a solid-state memory (e.g., flash memory), an optical medium, a magnetic medium, other non-volatile memory (e.g., Erasable Programmable Read-Only Memory (EPROM)), or any suitable combination thereof.
- solid-state memory e.g., flash memory
- EPROM Erasable Programmable Read-Only Memory
- machine-readable medium specifically excludes non-statutory signals per se.
- the I/O components 1250 include a wide variety of components to receive input, provide output, produce output, transmit information, exchange information, capture measurements, and so on. In general, it will be appreciated that the I/O components 1250 may include many other components that are not shown in FIG. 12 .
- the I/O components 1250 are grouped according to functionality merely for simplifying the following discussion and the grouping is in no way limiting. In various example embodiments, the I/O components 1250 include output components 1252 and input components 1254 .
- the output components 1252 include visual components (e.g., a display such as a plasma display panel (PDP), a light emitting diode (LED) display, a liquid crystal display (LCD), a projector, or a cathode ray tube (CRT)), acoustic components (e.g., speakers), haptic components (e.g., a vibratory motor), other signal generators, and so forth.
- visual components e.g., a display such as a plasma display panel (PDP), a light emitting diode (LED) display, a liquid crystal display (LCD), a projector, or a cathode ray tube (CRT)
- acoustic components e.g., speakers
- haptic components e.g., a vibratory motor
- the input components 1254 include alphanumeric input components (e.g., a keyboard, a touch screen configured to receive alphanumeric input, a photo-optical keyboard, or other alphanumeric input components), point-based input components (e.g., a mouse, a touchpad, a trackball, a joystick, a motion sensor, or other pointing instruments), tactile input components (e.g., a physical button, a touch screen that provides location and force of touches or touch gestures, or other tactile input components), audio input components (e.g., a microphone), and the like.
- alphanumeric input components e.g., a keyboard, a touch screen configured to receive alphanumeric input, a photo-optical keyboard, or other alphanumeric input components
- point-based input components e.g., a mouse, a touchpad, a trackball, a joystick, a motion sensor, or other pointing instruments
- tactile input components e.g., a physical button, a touch
- the 110 components 1250 include biometric components 1256 , motion components 1258 , environmental components 1260 , or position components 1262 , among a wide array of other components.
- the biometric components 1256 include components to detect expressions (e.g., hand expressions, facial expressions, vocal expressions, body gestures, or eye tracking), measure biosignals (e.g., blood pressure, heart rate, body temperature, perspiration, or brain waves), identify a person (e.g., voice identification, retinal identification, facial identification, fingerprint identification, or electroencephalogram-based identification), and the like.
- the motion components 1258 include acceleration sensor components (e.g., accelerometer), gravitation sensor components, rotation sensor components (e.g., gyroscope), and so forth.
- the environmental components 1260 include, for example, illumination sensor components (e.g., photometer), temperature sensor components (e.g., one or more thermometers that detect ambient temperature), humidity sensor components, pressure sensor components (e.g., barometer), acoustic sensor components (e.g., one or more microphones that detect background noise), proximity sensor components (e.g., infrared sensors that detect nearby objects), gas sensors (e.g., machine olfaction detection sensors, gas detection sensors to detect concentrations of hazardous gases for safety or to measure pollutants in the atmosphere), or other components that may provide indications, measurements, or signals corresponding to a surrounding physical environment.
- illumination sensor components e.g., photometer
- temperature sensor components e.g., one or more thermometers that detect ambient temperature
- humidity sensor components e.g., pressure sensor components (e
- the position components 1262 include location sensor components (e.g., a Global Positioning System (GPS) receiver component), altitude sensor components (e.g., altimeters or barometers that detect air pressure from which altitude may be derived), orientation sensor components (e.g., magnetometers), and the like.
- location sensor components e.g., a Global Positioning System (GPS) receiver component
- altitude sensor components e.g., altimeters or barometers that detect air pressure from which altitude may be derived
- orientation sensor components e.g., magnetometers
- the I/O components 1250 may include communication components 1264 operable to couple the machine 1200 to a network 1280 or devices 1270 via a coupling 1282 and a coupling 1272 , respectively.
- the communication components 1264 include a network interface component or another suitable device to interface with the network 1280 .
- the communication components 1264 include wired communication components, wireless communication components, cellular communication components, Near Field Communication (NFC) components, Bluetooth® components (e.g., Bluetooth® Low Energy), Wi-Fi® components, and other communication components to provide communication via other modalities.
- the devices 1270 may be another machine or any of a wide variety of peripheral devices (e.g., a peripheral device coupled via a USB).
- the communication components 1264 detect identifiers or include components operable to detect identifiers.
- the communication components 1264 include Radio Frequency Identification (RFID) tag reader components, NFC smart tag detection components, optical reader components (e.g., an optical sensor to detect one-dimensional bar codes such as Universal Product Code (UPC) bar code, multi-dimensional bar codes such as Quick Response (QR) code, Aztec code, Data Matrix, Dataglyph, MaxiCode, PDF417, Ultra Code, Uniform Commercial Code Reduced Space Symbology (UCC RSS)-2D bar code, and other optical codes), acoustic detection components (e.g., microphones to identify tagged audio signals), or any suitable combination thereof.
- RFID Radio Frequency Identification
- NFC smart tag detection components e.g., NFC smart tag detection components
- optical reader components e.g., an optical sensor to detect one-dimensional bar codes such as Universal Product Code (UPC) bar code, multi-dimensional bar codes such as Quick Response (QR) code, Aztec code, Data Matr
- IP Internet Protocol
- Wi-Fi® Wireless Fidelity
- NFC beacon a variety of information can be derived via the communication components 1264 , such as location via Internet Protocol (IP) geolocation, location via Wi-Fi® signal triangulation, location via detecting an NFC beacon signal that may indicate a particular location, and so forth.
- IP Internet Protocol
- one or more portions of the network 1280 may be an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), a metropolitan area network (MAN), the Internet, a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a plain old telephone service (POTS) network, a cellular telephone network, a wireless network, a Wi-Fi® network, another type of network, or a combination of two or more such networks.
- VPN virtual private network
- LAN local area network
- WLAN wireless LAN
- WAN wide area network
- WWAN wireless WAN
- MAN metropolitan area network
- PSTN Public Switched Telephone Network
- POTS plain old telephone service
- the network 1280 or a portion of the network 1280 may include a wireless or cellular network and the coupling 1282 may be a Code Division Multiple Access (CDMA) connection, a Global System for Mobile communications (GSM) connection, or another type of cellular or wireless coupling.
- CDMA Code Division Multiple Access
- GSM Global System for Mobile communications
- the coupling 1282 may implement any of a variety of types of data transfer technology, such as Single Carrier Radio Transmission Technology (1xRTT), Evolution-Data Optimized (EVDO) technology, General Packet Radio Service (CPRS) technology, Enhanced Data rates for GSM Evolution (EDGE) technology, third Generation Partnership Project (3GPP) including 3G, fourth generation wireless (4G) networks, Universal Mobile Telecommunications System (UMTS), High Speed Packet Access (HSPA), Worldwide Interoperability for Microwave Access (WiMAX), Long Term Evolution (LTE) standard, others defined by various standard-setting organizations, other long range protocols, or other data transfer technology.
- 1xRTT Single Carrier Radio Transmission Technology
- CPRS General Packet Radio Service
- EDGE Enhanced Data rates for GSM Evolution
- 3GPP Third Generation Partnership Project
- 4G fourth generation wireless (4G) networks
- Universal Mobile Telecommunications System (UMTS) Universal Mobile Telecommunications System
- HSPA High Speed Packet Access
- WiMAX Worldwide Interoperability for Microwave Access
- the instructions 1216 are transmitted or received over the network 1280 using a transmission medium via a network interface device (e.g., a network interface component included in the communication components 1264 ) and utilizing any one of a number of well-known transfer protocols (e.g., Hypertext Transfer Protocol (HTTP)).
- a network interface device e.g., a network interface component included in the communication components 1264
- HTTP Hypertext Transfer Protocol
- the instructions 1216 are transmitted or received using a transmission medium via the coupling 1272 (e.g., a peer-to-peer coupling) to the devices 1270 .
- the term “transmission medium” shall be taken to include any intangible medium that is capable of storing, encoding, or carrying the instructions 1216 for execution by the machine 1200 , and includes digital or analog communications signals or other intangible media to facilitate communication of such software.
- the machine-readable medium 1238 is non-transitory (in other words, not having any transitory signals) in that it does not embody a propagating signal.
- labeling the machine-readable medium 1238 as “non-transitory” should not be construed to mean that the medium is incapable of movement; the medium should be considered as being transportable from one physical location to another.
- the machine-readable medium 1238 is tangible, the medium may be considered to be a machine-readable device.
- inventive subject matter has been described with reference to specific example embodiments, various modifications and changes may be made to these embodiments without departing from the broader scope of embodiments of the present disclosure.
- inventive subject matter may be referred to herein, individually or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single disclosure or inventive concept if more than one is, in fact, disclosed.
- the term “or” may be construed in either an inclusive or exclusive sense. Moreover, plural instances may be provided for resources, operations, or structures described herein as a single instance. Additionally, boundaries between various resources, operations, modules, engines, and data stores are somewhat arbitrary, and particular operations are illustrated in a context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within a scope of various embodiments of the present disclosure. In general, structures and functionality presented as separate resources in the example configurations may be implemented as a combined structure or resource. Similarly, structures and functionality presented as a single resource may be implemented as separate resources. These and other variations, modifications, additions, and improvements fall within a scope of embodiments of the present disclosure as represented by the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- User Interface Of Digital Computer (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
- This application is a continuation of and claims priority to U.S. patent application Ser. No. 15/986,284, filed May 22, 2018, the content of which is incorporated herein by reference in its entirety.
- The subject matter disclosed herein generally relates to network communications and user interfaces. Specifically, in some example embodiments, the present disclosure addresses systems and methods for providing a user interface for interacting with multiple databases.
- Some embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings.
-
FIG. 1 is a network diagram illustrating a network environment suitable for a user interface for interacting with multiple databases, according to some example embodiments. -
FIG. 2 is an architectural diagram illustrating components of a user interface server in communication with other systems, according to some example embodiments. -
FIG. 3 is a block diagram illustrating components of a user interface server, according to some example embodiments. -
FIG. 4 is a block diagram illustrating a user interface for interacting with multiple databases, according to some example embodiments. -
FIG. 5 is a block diagram illustrating a user interface for interacting with multiple databases, according to some example embodiments. -
FIG. 6 is a block diagram illustrating user interfaces for interacting with multiple databases, according to some example embodiments. -
FIG. 7 is a block diagram illustrating a user authentication interface, according to some example embodiments. -
FIG. 8 is a block diagram illustrating a database schema suitable for supporting a user interface for interacting with multiple databases, according to some example embodiments. -
FIG. 9 is a flowchart illustrating operations of a computing device in performing a method of providing a user interface for interacting with multiple databases, according to some example embodiments. -
FIG. 10 is a flowchart illustrating operations of a computing device in performing a method of providing a user interface for interacting with multiple databases, according to some example embodiments. -
FIG. 11 is a block diagram illustrating an example of a software architecture that may be installed on a machine, according to some example embodiments. -
FIG. 12 is a diagrammatic representation of a machine in the form of a computer system within which a set of instructions may be executed for causing the machine to perform any one or more of the methodologies discussed herein, according to an example embodiment. - Example methods and systems are directed to a user interface for interacting with multiple databases. Examples merely typify possible variations. Unless explicitly stated otherwise, components and functions are optional and may be combined or subdivided, and operations may vary in sequence or be combined or subdivided. In the following description, for purposes of explanation, numerous specific details are set forth to provide a thorough understanding of example embodiments. It will be evident to one skilled in the art, however, that the present subject matter may be practiced without these specific details.
- Databases of different entities have independent locking features to control access to a user's data. A user interface for interacting with multiple databases allows the user to lock or unlock access to their data with multiple entities simultaneously. A user interface (UI) server communicates with servers corresponding to each of the different entities request that the data access be locked or unlocked. The UI server may also report to the consumer the data access status of the for the user's data with each of the different entities.
- To authenticate the user, the user interface for interacting with multiple databases may provide one or more authentication prompts prior to allowing the user to lock or unlock their data. The authentication prompts may be provided by one or more of the multiple entities.
- Users wishing to lock, unlock, freeze, or unfreeze credit with credit reporting agencies using existing interfaces contact each credit reporting agency to request the change in credit status. Locking and freezing credit both result in a credit reporting agency refusing to provide credit data to the third-parties. The processes for locking and freezing credit may be different in terms of time to process a modification request, fees charged, frequency that changing the locked or frozen status is permitted, or in other ways. The user interface for interacting with multiple databases is an improvement over existing interfaces, which require the consumer to authenticate, check lock status, and request the locking or unlocking of credit with each credit reporting agency individually. The existing process is comparatively error-prone, since a consumer may easily overlook an agency, and time consuming, since the consumer must perform each step multiple times. Furthermore, by reducing the time spent by the consumer in locking or unlocking access to data with multiple databases, processor cycles are saved on the consumer's device and, as a result, power consumption by the device is reduced. For battery-powered devices, a reduction in power consumption also results in an extension of battery life.
-
FIG. 1 is a network diagram illustrating anetwork environment 100 suitable for a user interface for interacting with multiple databases (e.g., a user interface for interacting with multiple databases), according to some example embodiments. Thenetwork environment 100 includes aUI server 110,database servers devices network 160. Thedatabase servers 120A-120C may be collectively referred to as “database servers 120,” or generically referred to as a “database server 120.” Thedevices UI server 110 is a network-based system. The devices 130 may interact with theUI server 110 using aweb client 140A or anapp client 140B. TheUI server 110 and the devices 130 may each be implemented in a computer system, in whole or in part, as described below with respect toFIGS. 11-12 . - The
UI server 110 provides a user interface for interacting with multiple databases to other machines (e.g., the devices 130) via thenetwork 160. The user interface for interacting with multiple databases may provide a way for users to lock and unlock accessibility of data with multiple entities by communication with the database servers 120. For example, the database servers 120 may be credit reporting agency servers and the user may lock and unlock accessibility of credit data with each of multiple credit reporting agencies. - Also shown in
FIG. 1 is auser 150. Theuser 150 may be a human user (e.g., a human being), a machine user (e.g., a computer configured by a software program to interact with the devices 130 and the UI server 110), or any suitable combination thereof (e.g., a human assisted by a machine or a machine supervised by a human). Theuser 150 is not part of thenetwork environment 100, but is associated with the devices 130 and may be a user of the devices 130 (e.g., an owner of thedevices user 150. - In some example embodiments, the
UI server 110 receives a selection from a device 130 to lock access to data of multiple entities, each of the multiple entities (e.g., multiple credit reporting agencies) providing one of the database servers 120. TheUI server 110 generates, for each of the database servers 120, a request to lock access to data (e.g., to lock credit) and transmits the request to the database server. Each database server 120 responds to the request, indicating whether the request was successful or not. TheUI server 110 may update the user interface for interacting with multiple databases provided on the device 130 to show the updated data access status for each entity. - Any of the machines, databases, or devices shown in
FIG. 1 may be implemented in a general-purpose computer modified (e.g., configured or programmed) by software to be a special-purpose computer to perform the functions described herein for that machine, database, or device. For example, a computer system able to implement any one or more of the methodologies described herein is discussed below with respect toFIGS. 11-12 . As used herein, a “database” is a data storage resource and may store data structured as a text file, a table, a spreadsheet, a relational database (e.g., an object-relational database), a triple store, a hierarchical data store, or any suitable combination thereof. Moreover, any two or more of the machines, databases, or devices illustrated inFIG. 1 may be combined into a single machine, database, or device, and the functions described herein for any single machine, database, or device may be subdivided among multiple machines, databases, or devices. - The
network 160 may be any network that enables communication between or among machines, databases, and devices (e.g., theUI server 110 and the devices 130). Accordingly, thenetwork 160 may be a wired network, a wireless network (e.g., a mobile or cellular network), or any suitable combination thereof. Thenetwork 160 may include one or more portions that constitute a private network, a public network (e.g., the Internet), or any suitable combination thereof. -
FIG. 2 is an architectural diagram 200 illustrating components of aUI server 110 suitable for providing a user interface for interacting with multiple databases, according to some example embodiments. TheUI server 110 includes anApache Docker container 210E that serves a web site, via a hypertext transfer protocol (HTTP) connection, to thedevice 130A. The web browser of thedevice 130A is in communication, via a representational state transfer (REST) application programming interface (API), with anauthorization Docker container 210A, a member Docker container 210B, a SalesForce™ Docker container 210C, and a CSID Experian™ Docker container 210D. The member Docker container 210B accesses adatabase 230 using the Simple Queue Service (SQS). The Salesforce™ Docker container 210C accesses aSalesForce™ server 240 using the SalesForce™ API. The CSID Experian™ Docker container 210D accesses thedatabase server 120B using a proprietary API. Thedatabase 120A is accessed by thedevice 130A using another proprietary API. - Structured Query Language (SQL) is used to access standard relational databases. NoSQL is used to refer to databases other than standard relational databases. Dynamo NoSQL is a particular type of NoSQL based on key-value pairs. The
authorization Docker container 210A uses Dynamo NoSQL to access data files 220A and 220B. For example, the data files 220A and 220B may store usernames, passwords, authentication questions, user profiles, or any suitable combination thereof. Accordingly, a user may enter identifying information into a web page served by theApache Docker container 210E, and the user's web browser may send the entered information to theauthorization Docker container 210A (e.g., using Angular 5 code embedded in the web page and running on the user's web browser). Theauthorization Docker container 210A may verify the information against the data stored in one or both of the data files 220A and 220B to identify or authorize the user. - Docker provides containerization (also referred to as operating-system-level virtualization) of applications, reducing overhead compared to running each application in a separate virtual machine (VM), but providing comparable isolation of the containerized applications (also referred to as containers). The member Docker container 210B accesses the
database 230 using SQS to retrieve and store user data. For example, a user's name, social security number, birthdate, address, previous addresses, phone number, bank account numbers, or any suitable combination thereof may be stored in thedatabase 230. - The
SalesForce™ server 240 may be accessed by the SalesForce™ Docker container 210C using the SalesForce™ API. TheSalesForce™ server 240 provides case management and task management services. For example, a task to periodically reattempt to change credit status with a credit reporting agency may be created using SalesForce™ in the event that an immediate attempt to change the credit status in response to a user request fails. - Some entities provide a proprietary API that may be accessed by the
UI server 110 to retrieve and modify credit status. For example, CSID Experian™ provides such an API. Thus, the CSID Experian™ Docker container 210D may access a database server (e.g., thedatabase server 120B) using the CSID Experian™ proprietary API. Other entities provide a proprietary API for access by the user's device (e.g., thedevice 130A). For example, TransUnion™ provides this type of API. Thus, thedevice 130A may access a database server (e.g., thedatabase server 120A) using the TransUnion™ proprietary API. Thedevice 130A may be configured, using Angular 5 or another scripting language, by theUI server 110 to communicate with one or more of the entities without using theUI server 110 as an intermediary. In some example embodiments, thedevice 130A provides updated status information to the UI server 110 (e.g., for storage by the member Docker container 210B in the database 230). -
FIG. 3 is a block diagram illustrating components of theUI server 110, according to some example embodiments. TheUI server 110 is shown as including acommunication module 310, anauthentication module 320, adata lock module 330, analert module 340, auser interface module 350, and astorage module 360, all configured to communicate with each other (e.g., via a bus, shared memory, a switch, or APIs). Any one or more of the modules described herein may be implemented using hardware (e.g., a processor of a machine) or a combination of hardware and software. For example, any module described herein may configure a processor to perform the operations described herein for that module. Moreover, any two or more of these modules may be combined into a single module, and the functions described herein for a single module may be subdivided among multiple modules. Furthermore, according to various example embodiments, modules described herein as being implemented within a single machine, database, or device may be distributed across multiple machines, databases, or devices. - The
communication module 310 is configured to send and receive data. For example, thecommunication module 310 may receive, over thenetwork 160, a request for a user interface for interacting with multiple databases from a device 130. Thecommunication module 310 may provide the request to theuser interface module 350, transmit a user interface provided by theuser interface module 350 to the device 130, and receive user selections of options in the user interface for processing by theauthentication module 320 or thedata lock module 330, storage by thestorage module 360, or any suitable combination thereof. - The
authentication module 320 is configured to authenticate a user. For example, a question that only the user is expected to know the answer to may be presented to the user and the user authenticated only if the response is correct. In some example embodiments, multiple such questions are presented and the responses evaluated. The user may be permitted to proceed to view data access status information, lock access to data, unlock access to data, or any suitable combination thereof, only after authentication is successful. - The data lock
module 330 is configured to lock or unlock access to the user's data with multiple entities. For example, a request to lock or unlock access to the user's data may be sent, using thecommunication module 310, to a database server 120, by thecredit lock module 330. A response to the request may be received and used to update a user interface provided by theuser interface module 350, used to cause an alert to be generated by thealert module 340, stored for later reference by thestorage module 360, or any suitable combination thereof. - The
alert module 340 is configured to generate alerts. The generated alerts may be provided to users (e.g., to report data access status changes, such as credit status changes, to report data breaches, to report suspected identity theft, or any suitable combination thereof) or to administrators (e.g., to report error conditions in communications with one or more database servers). Each alert may be in the form of e-mail, text message, automated voice message, or another suitable method of notification. - The
user interface module 350 is configured to provide a user interface for interacting with multiple databases. The user interface for interacting with multiple databases may include information regarding a user's current credit data access status, provide options to lock or unlock data access with multiple entities, or both. For example, one or more of the user interface for interacting with multiple databases s 400, 500, 600, and 650, described below with respect toFIGS. 4-6 , may be presented by theuser interface module 350, and selections may be received via an application interface or a web interface. Additionally or alternatively, theuser interface module 350 may provide a user interface to authenticate the user, such as auser authentication interface 700, described below with respect toFIG. 7 . Thestorage module 360 is configured to store data regarding users, entities, data access status, or any suitable combination thereof. -
FIG. 4 is a block diagram illustrating auser interface 400 for interacting with multiple databases, according to some example embodiments. As can be seen inFIG. 4 , theuser interface 400 includes aname 410, acredit status area 420, andbuttons - The
user interface 400 may be displayed in response to a user initiating a unified data access lock process (e.g., a unified credit lock process). Thename 410 indicates a name of the user. The dataaccess status area 420 shows the current data access status (e.g., locked, unlocked, or frozen) for each of a plurality of entities (e.g., credit reporting agencies). Thebutton 430 is operable to cause theUI server 110 to request each of the entities to lock the user's data. Thebutton 440 is operable to cause theUI server 110 to request each of the entities to unlock the user's credit. - In some example embodiments, the
user interface 400 is provided by theUI server 110 dynamically. For example, theUI server 110 may be a web server that communicates with one or more of the database servers 120 to determine the current data access status. A web page served by theUI server 110 may include the data access status information and be rendered by theweb client 140A. - In other example embodiments, the
user interface 400 is generated by the device 130. For example, theapp client 140B may communicate with one or more of the database servers 120 to determine the current data access status. Using the information gathered from the database servers 120, theapp client 140B may generate and provide the user interface for interacting withmultiple databases 400. Theapp client 140B may inform theUI server 110 of changes in data access status. - The
user interface 400 may also include some information provided by the database servers 120 to the device 130 via theserver 110 and some information provided by the database servers 120 directly to the device 130. Thus, in these example embodiments, theUI server 110 receives data access status information only from a subset of the database servers 120. Theuser interface 400 allows the user to monitor and change the data access status with the multiple entities even though the communication paths to the various database servers 120 are distinct (e.g., because theUI server 110 intermediates only a subset of the communications). -
FIG. 5 is a block diagram illustrating auser interface 500 for interacting with multiple databases, according to some example embodiments. As can be seen inFIG. 5 , theuser interface 500 includes thename 410, a dataaccess status area 520, and thebutton 440. Theuser interface 500 may be displayed after the user has opted to lock data access with all entities, showing an updated status in the dataaccess status area 520. Since all entities have locked the user's data (as shown in the data access status area 520), thebutton 430 is disabled or removed from theuser interface 500. As can be seen by comparison of the dataaccess status area 520 and the dataaccess status area 420, when all entities are reporting the same status, the credit status area may report a single status for all entities instead of an individual status for each entity. -
FIG. 6 is a block diagram illustratinguser interfaces FIG. 6 , theuser interfaces name 410, the dataaccess status area 520, and atray 630. A portion of thetray 630 is operable to open and close thetray 630. For example, a user may open or close thetray 630 by clicking or double-clicking, on the arrow shown in thetray 630, touching the right edge of thetray 630 on a touch screen, clicking on thetray 630 and dragging thetray 630 to the right or left, or any suitable combination thereof. In theuser interface 600, thetray 630 is closed and thecredit status area 520 indicates that data access is locked by all entities (e.g., that credit is locked by all credit reporting agencies). - In the
user interface 650, thecredit status area 520 indicates that credit is locked by two entities, and thetray 630 is open, revealing the data access status with each entity as a slider. For each of the three entities, the corresponding slider is in the left position if data access is not locked and in the right position if data access is locked. Each slider may be operable by the user to request a change in data access status for the corresponding entity. For example, the user may click and drag the slider next to “TransUnion” to initiate a request to the TransUnion™ credit reporting agency to lock credit for the user by locking access to the user's credit data stored in a database controlled by TransUnion™. -
FIG. 7 is a block diagram illustrating auser authentication interface 700, according to some example embodiments. As can be seen inFIG. 7 , theuser authentication interface 700 includes thename 410, anauthentication area 720, and abutton 730. Theuser authentication interface 700 may be displayed prior to the display of a user interface for interacting with multiple databases (e.g., theuser interface - The
authentication area 720 displays an authentication prompt to the user. In the example shown, the user selects one of the presented radio buttons to indicate the desired response, such as a current or prior address of the user, then presses thebutton 730 to submit the response. In other example embodiments, other forms of authentication may be used, such as handwriting analysis, password entry, identifying particular financial transactions, or any suitable combination thereof. Once the user is successfully authenticated, the data access lock process may proceed with presentation of one of theuser interfaces -
FIG. 8 is a block diagram illustrating adatabase schema 800 suitable for supporting a user interface for interacting with multiple databases, according to some example embodiments. Thedatabase schema 800 includes a user table 810 and a status table 840. The user table 810 is defined by atable definition 820, including a user identifier field, a name field, and a social security number (SSN) field, and includesrows table definition 850, including a user identifier field, an entity identifier field, and a status field, and includesrows - Each of the
rows 830A-830C stores information for a user. The user identifier field stores a unique identifier for the user. The name field stores a name of the user. The SSN field stores a social security number of the user. In various example embodiments, additional or different fields are stored in the user table 810. For example, an address field, a birthdate field, a phone number field, or any suitable combination thereof may be stored. - Each of the
rows 860A-860C stores the data access status of a user with an entity. In the example shown, therows 860A-860C indicate that the user having the identifier of 1234 (and named “Adam Smith,” as determined by reference to the user table 810) has data access locked with one entity and unlocked with two entities. -
FIG. 9 is a flowchart illustrating operations of a server computer in performing amethod 900 of providing a user interface for interacting with multiple databases, according to some example embodiments. By way of example and not limitation, operations in themethod 900 are described as being performed by theUI server 110, using modules described above with respect toFIG. 3 . - In
operation 910, theuser interface module 350 causes a user interface to be presented that comprises an option to modify data access status (e.g., to lock access, unlock access, freeze access, unfreeze access, or any suitable combination thereof) by a plurality of entities (e.g., as credit reporting agencies). In some example embodiments, the plurality of entities are at least three entities. Theuser interface module 350 of theUI server 110 may transmit a web page via thenetwork 160 to theweb client 140A of thedevice 130A for presentation on a display of thedevice 130A to theuser 150. When rendered by theweb client 140A, the web page may be presented in the form of theuser interface 400, comprising a single lock option in the form of thebutton 430, operable to lock data access in the databases of the three entities shown in the dataaccess status area 420. -
Operation 910 may be performed in response to a request received by theUI server 110, transmitted via an electronic communication network, to lock data access functionality in multiple databases (e.g., in at least three databases), each database corresponding to a different entity. The request may identify a person having data in each of the databases. For example, the person may be identified by user name, name, email address, social security number, by another identifier, or any suitable combination thereof. - In
operation 920, in response to the operation of the option, thedata lock module 330, for each of the plurality of entities, transmits, to a database server corresponding to the entity, a request for the entity to modify data access status. For example, thedata lock module 330 of theUI server 110 may transmit a request to each of thedatabase servers 120A-120C to request that the three entities shown in the dataaccess status area 420 lock data access for theuser 150. - The method used to transmit the request to each of the
database servers 120A-120C may be selected based on the server. For example, thedatabase server 120A may make use of RESTful APIs with a primary data format based on JavaScript object notation (JSON). A RESTful API is one that uses the representational state transfer (REST) architectural style, and is often implemented using hypertext transfer protocol (HTTP) requests. Thedatabase server 120B may use the simple object access protocol (SOAP), in conjunction with remote procedure calls (RPC), REST, and data formatted using extended markup language (XML). Thedatabase server 120C may use a blend of RPC and REST with support for data formatted using JSON and XML. Another database server may use the WebServices application programming interface (API). Thus, any combination of data exchange standards such as SOAP, RPC over HTTP, REST, file transfer protocol (FTP), WebServices API, or secure FTP (SFTP) may be used, using any data transmission formats such as XML, JSON, electronic data interchange (EDI), or health level 7 (HL7). - The
user interface module 350, inoperation 930, updates the user interface to identify a modified data access status (e.g., by communicating, via the electronic communication network, an update message to cause the user interface to confirm that the data access functionality has been locked). For example, one or more of theentity servers 120A-120C may respond to the request to lock data access with an indication that data access has been locked by the corresponding entity. The updated user interface indicates which of the entities have locked data access for theuser 150. For example, theuser interface 500 shows that all entities have locked the user's data. - If a database server 120 fails to respond, the
UI server 110 may store the user's request for retrying later. For example, the row in the status table 840 for the user's data access status with the entity corresponding to the unresponsive server may be updated to indicate both the current status (e.g., unlocked) and the requested status (e.g., locked). A process may periodically (e.g., hourly) query the status table 840 to identify rows in which the current status and the requested status are different. For each identified row, the process may resubmit the change status request for the user, and update the status in the status table 840 once the request is successful. -
FIG. 10 is a flowchart illustrating operations of a computing device in performing amethod 1000 of providing a user interface for interacting with multiple databases, according to some example embodiments. By way of example and not limitation, operations in themethod 1000 are described as being performed by theUI server 110, using modules described above with respect toFIG. 3 . - In
operation 1010, theauthentication module 320 requests an authentication prompt for an individual from a server. For example, one of thedatabase servers 120A-120C may be requested to provide the authentication prompt - In operation 1020, the
authentication module 320 causes a user interface comprising the authentication prompt to be presented on a client device (e.g., the device 130). For example, a programmatic interface of theUI server 110 may provide theuser authentication interface 700 for display by theapp client 140B on thedevice 130B. - A response to the authentication prompt is received by the
authentication module 320 inoperation 1030, and the response is transmitted to the server that provided the prompt inoperation 1040. - In some example embodiments, a request is received by the
UI server 110, transmitted via an electronic communication network from a client device, to lock data access functionality in multiple databases. The request may identify a person having data in each of the databases. In response to the request, theUI server 110 may authenticate a user of the client device via the electronic communication network, using operations 1010-1040. - After validating the response, the server provides an authorization to modify the data access status (e.g., to lock data access, to unlock data access, to freeze data access, or any suitable combination thereof) for the individual, and, in
operation 1050, theauthentication module 320 receives the authorization. In some example embodiments, operations 1010-1050 are repeated for additional servers of thedatabase servers 120A-120C. In other example embodiments, the authorization received inoperation 1050 from one of thedatabase servers 120A-120C is sufficient to allow modification of data access status from one or moreadditional database servers 120A-120C. - In
operation 1060, in response to receiving the authorization (or authorizations), themethod 900 is performed. Thus, by use of themethod 1000 in combination with themethod 900, a user is authenticated before being permitted to modify data access status (e.g., to lock data access) with multiple entities using a user interface for interacting with multiple databases. - According to various example embodiments, one or more of the methodologies described herein may facilitate efficient modification of data access status (e.g., credit reporting status). Hence, one or more of the methodologies described herein may facilitate locking or unlocking data access with multiple entities (e.g., credit reporting agencies) without requiring the user to connect to multiple servers and respond to multiple prompts.
- When these effects are considered in aggregate, one or more of the methodologies described herein may obviate a need for certain efforts or resources that otherwise would be involved in locking or unlocking data access with multiple entities. Efforts expended by a user in modifying credit reporting status may be reduced by one or more of the methodologies described herein. Computing resources used by one or more machines, databases, or devices (e.g., within the network environment 100) may similarly be reduced. Examples of such computing resources include processor cycles, network traffic, memory usage, data storage capacity, power consumption, and cooling capacity.
- Certain embodiments are described herein as including logic or a number of components, modules, or mechanisms. Modules may constitute either software modules (e.g., code embodied on a non-transitory machine-readable medium) or hardware-implemented modules. A hardware-implemented module is a tangible unit capable of performing certain operations and may be configured or arranged in a certain manner. In example embodiments, one or more computer systems (e.g., a standalone, client, or server computer system) or one or more processors may be configured by software (e.g., an application or application portion) as a hardware-implemented module that operates to perform certain operations as described herein.
- In various embodiments, a hardware-implemented module may be implemented mechanically or electronically. For example, a hardware-implemented module may comprise dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC)) to perform certain operations. A hardware-implemented module may also comprise programmable logic or circuitry (e.g., as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware-implemented module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.
- Accordingly, the term “hardware-implemented module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily or transitorily configured (e.g., programmed) to operate in a certain manner and/or to perform certain operations described herein. Considering embodiments in which hardware-implemented modules are temporarily configured (e.g., programmed), each of the hardware-implemented modules need not be configured or instantiated at any one instance in time. For example, where the hardware-implemented modules comprise a general-purpose processor configured using software, the general-purpose processor may be configured as respective different hardware-implemented modules at different times. Software may accordingly configure a processor, for example, to constitute a particular hardware-implemented module at one instance of time and to constitute a different hardware-implemented module at a different instance of time.
- Hardware-implemented modules can provide information to, and receive information from, other hardware-implemented modules. Accordingly, the described hardware-implemented modules may be regarded as being communicatively coupled. Where multiple of such hardware-implemented modules exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses that connect the hardware-implemented modules). In embodiments in which multiple hardware-implemented modules are configured or instantiated at different times, communications between such hardware-implemented modules may be achieved, for example, through the storage and retrieval of information in memory structures to which the multiple hardware-implemented modules have access. For example, one hardware-implemented module may perform an operation, and store the output of that operation in a memory device to which it is communicatively coupled. A further hardware-implemented module may then, at a later time, access the memory device to retrieve and process the stored output. Hardware-implemented modules may also initiate communications with input or output devices, and can operate on a resource (e.g., a collection of information).
- The various operations of example methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions. The modules referred to herein may, in some example embodiments, comprise processor-implemented modules.
- Similarly, the methods described herein may be at least partially processor-implemented. For example, at least some of the operations of a method may be performed by one or more processors or processor-implemented modules. The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the processor or processors may be located in a single location (e.g., within a home environment, an office environment, or a server farm), while in other embodiments the processors may be distributed across a number of locations.
- The one or more processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). For example, at least some of the operations may be performed by a group of computers (as examples of machines including processors), these operations being accessible via a network (e.g., the Internet) and via one or more appropriate interfaces (e.g., application programming interfaces (APIs)).
- Example embodiments may be implemented in digital electronic circuitry, in computer hardware, firmware, or software, or in combinations of them. Example embodiments may be implemented using a computer program product, e.g., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable medium for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers.
- A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a standalone program or as a module, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
- In example embodiments, operations may be performed by one or more programmable processors executing a computer program to perform functions by operating on input data and generating output. Method operations can also be performed by, and apparatus of example embodiments may be implemented as, special-purpose logic circuitry, e.g., a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC).
- The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. In embodiments deploying a programmable computing system, it will be appreciated that both hardware and software architectures merit consideration. Specifically, it will be appreciated that the choice of whether to implement certain functionality in permanently configured hardware (e.g., an ASIC), in temporarily configured hardware (e.g., a combination of software and a programmable processor), or in a combination of permanently and temporarily configured hardware may be a design choice. Below are set out hardware (e.g., machine) and software architectures that may be deployed, in various example embodiments.
-
FIG. 11 is a block diagram 1100 illustrating asoftware architecture 1102, which may be installed on any one or more of the devices described above.FIG. 11 is merely a non-limiting example of a software architecture, and it will be appreciated that many other architectures may be implemented to facilitate the functionality described herein. Thesoftware architecture 1102 may be implemented by hardware such as amachine 1200 ofFIG. 12 that includesprocessors 1210,memory 1230, and I/O components 1250. In this example, thesoftware architecture 1102 may be conceptualized as a stack of layers where each layer may provide a particular functionality. For example, thesoftware architecture 1102 includes layers such as anoperating system 1104,libraries 1106,frameworks 1108, andapplications 1110. Operationally, theapplications 1110 invoke application programming interface (API) calls 1112 through the software stack and receivemessages 1114 in response to the API calls 1112, according to some implementations. - In various implementations, the
operating system 1104 manages hardware resources and provides common services. Theoperating system 1104 includes, for example, akernel 1120,services 1122, anddrivers 1124. Thekernel 1120 acts as an abstraction layer between the hardware and the other software layers in some implementations. For example, thekernel 1120 provides memory management, processor management (e.g., scheduling), component management, networking, and security settings, among other functionality. Theservices 1122 may provide other common services for the other software layers. Thedrivers 1124 may be responsible for controlling or interfacing with the underlying hardware. For instance, thedrivers 1124 may include display drivers, camera drivers, Bluetooth® drivers, flash memory drivers, serial communication drivers (e.g., Universal Serial Bus (USB) drivers), Wi-Fi® drivers, audio drivers, power management drivers, and so forth. - In some implementations, the
libraries 1106 provide a low-level common infrastructure that may be utilized by theapplications 1110. Thelibraries 1106 may include system libraries 1130 (e.g., C standard library) that may provide functions such as memory allocation functions, string manipulation functions, mathematic functions, and the like. In addition, thelibraries 1106 may includeAPI libraries 1132 such as media libraries (e.g., libraries to support presentation and manipulation of various media formats such as Moving Picture Experts Group-4 (MPEG4), Advanced Video Coding (H.264 or AVC), Moving Picture Experts Group Layer-3 (MP3), Advanced Audio Coding (AAC), Adaptive Multi-Rate (AMR) audio codec, Joint Photographic Experts Group (JPEG or JPG), or Portable Network Graphics (PNG)), graphics libraries (e.g., an OpenGL framework used to render in two dimensions (2D) and three dimensions (3D) in a graphic context on a display), database libraries (e.g., SQLite to provide various relational database functions), web libraries (e.g., WebKit to provide web browsing functionality), and the like. Thelibraries 1106 may also include a wide variety ofother libraries 1134 to provide many other APIs to theapplications 1110. - The
frameworks 1108 provide a high-level common infrastructure that may be utilized by theapplications 1110, according to some implementations. For example, theframeworks 1108 provide various graphic user interface (GUI) functions, high-level resource management, high-level location services, and so forth. Theframeworks 1108 may provide a broad spectrum of other APIs that may be utilized by theapplications 1110, some of which may be specific to a particular operating system or platform. - In an example embodiment, the
applications 1110 include ahome application 1150, acontacts application 1152, abrowser application 1154, abook reader application 1156, alocation application 1158, amedia application 1160, amessaging application 1162, agame application 1164, and a broad assortment of other applications such as a third-party application 1166. According to some embodiments, theapplications 1110 are programs that execute functions defined in the programs. Various programming languages may be employed to create one or more of theapplications 1110, structured in a variety of manners, such as object-orientated programming languages (e.g., Objective-C, Java, or C++) or procedural programming languages (e.g., C or assembly language). In a specific example, the third-party application 1166 (e.g., an application developed using the Android™ or iOS™ software development kit (SDK) by an entity other than the vendor of the particular platform) may be mobile software running on a mobile operating system such as iOS™, Android™ Windows® Phone, or other mobile operating systems. In this example, the third-party application 1166 may invoke the API calls 1112 provided by the mobile operating system (e.g., the operating system 1104) to facilitate functionality described herein. -
FIG. 12 is a block diagram illustrating components of amachine 1200, according to some example embodiments, able to read instructions from a machine-readable medium (e.g., a machine-readable storage medium) and perform any one or more of the methodologies discussed herein. Specifically,FIG. 12 shows a diagrammatic representation of themachine 1200 in the example form of a computer system, within which instructions 1216 (e.g., software, a program, an application, an applet, an app, or other executable code) for causing themachine 1200 to perform any one or more of the methodologies discussed herein may be executed. In alternative embodiments, themachine 1200 operates as a standalone device or may be coupled (e.g., networked) to other machines. In a networked deployment, themachine 1200 may operate in the capacity of a server machine or a client machine in a server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. Themachine 1200 may comprise, but not be limited to, a server computer, a client computer, a personal computer (PC), a tablet computer, a laptop computer, a netbook, a set-top box (STB), a personal digital assistant (PDA), an entertainment media system, a cellular telephone, a smart phone, a mobile device, a wearable device (e.g., a smart watch), a smart home device (e.g., a smart appliance), other smart devices, a web appliance, a network router, a network switch, a network bridge, or any machine capable of executing theinstructions 1216, sequentially or otherwise, that specify actions to be taken by themachine 1200. Further, while only asingle machine 1200 is illustrated, the term “machine” shall also be taken to include a collection ofmachines 1200 that individually or jointly execute theinstructions 1216 to perform any one or more of the methodologies discussed herein. - The
machine 1200 may includeprocessors 1210,memory 1230, and I/O components 1250, which may be configured to communicate with each other via a bus 1202. In an example embodiment, the processors 1210 (e.g., a Central Processing Unit (CPU), a Reduced Instruction Set Computing (RISC) processor, a Complex Instruction Set Computing (CISC) processor, a Graphics Processing Unit (GPU), a Digital Signal Processor (DSP), an Application-Specific Integrated Circuit (ASIC), a Radio-Frequency Integrated Circuit (RFIC), another processor, or any suitable combination thereof) may include, for example, aprocessor 1212 and aprocessor 1214 that may execute theinstructions 1216. The term “processor” is intended to include multi-core processors that may comprise two or more independent processors (also referred to as “cores”) that may execute instructions contemporaneously. AlthoughFIG. 12 shows multiple processors, themachine 1200 may include a single processor with a single core, a single processor with multiple cores (e.g., a multi-core processor), multiple processors with a single core, multiple processors with multiple cores, or any combination thereof. - The
memory 1230 may include amain memory 1232, astatic memory 1234, and astorage unit 1236 accessible to theprocessors 1210 via the bus 1202. Thestorage unit 1236 may include a machine-readable medium 1238 on which are stored theinstructions 1216 embodying any one or more of the methodologies or functions described herein. Theinstructions 1216 may also reside, completely or at least partially, within themain memory 1232, within thestatic memory 1234, within at least one of the processors 1210 (e.g., within the processor's cache memory), or any suitable combination thereof, during execution thereof by themachine 1200. Accordingly, in various implementations, the main memory 1232., thestatic memory 1234, and theprocessors 1210 are considered machine-readable media 1238. - As used herein, the term “memory” refers to a machine-
readable medium 1238 able to store data temporarily or permanently and may be taken to include, but not be limited to, random-access memory (RAM), read-only memory (ROM), buffer memory, flash memory, and cache memory. While the machine-readable medium 1238 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, or associated caches and servers) able to store theinstructions 1216. The term “machine-readable medium” shall also be taken to include any medium, or combination of multiple media, that is capable of storing instructions (e.g., instructions 1216) for execution by a machine (e.g., machine 1200), such that the instructions, when executed by one or more processors of the machine (e.g., processors 1210), cause the machine to perform any one or more of the methodologies described herein. Accordingly, a “machine-readable medium” refers to a single storage apparatus or device, as well as “cloud-based” storage systems or storage networks that include multiple storage apparatus or devices. The term “machine-readable medium” shall accordingly be taken to include, but not be limited to, one or more data repositories in the form of a solid-state memory (e.g., flash memory), an optical medium, a magnetic medium, other non-volatile memory (e.g., Erasable Programmable Read-Only Memory (EPROM)), or any suitable combination thereof. The term “machine-readable medium” specifically excludes non-statutory signals per se. - The I/
O components 1250 include a wide variety of components to receive input, provide output, produce output, transmit information, exchange information, capture measurements, and so on. In general, it will be appreciated that the I/O components 1250 may include many other components that are not shown inFIG. 12 . The I/O components 1250 are grouped according to functionality merely for simplifying the following discussion and the grouping is in no way limiting. In various example embodiments, the I/O components 1250 includeoutput components 1252 andinput components 1254. Theoutput components 1252 include visual components (e.g., a display such as a plasma display panel (PDP), a light emitting diode (LED) display, a liquid crystal display (LCD), a projector, or a cathode ray tube (CRT)), acoustic components (e.g., speakers), haptic components (e.g., a vibratory motor), other signal generators, and so forth. Theinput components 1254 include alphanumeric input components (e.g., a keyboard, a touch screen configured to receive alphanumeric input, a photo-optical keyboard, or other alphanumeric input components), point-based input components (e.g., a mouse, a touchpad, a trackball, a joystick, a motion sensor, or other pointing instruments), tactile input components (e.g., a physical button, a touch screen that provides location and force of touches or touch gestures, or other tactile input components), audio input components (e.g., a microphone), and the like. - In some further example embodiments, the 110
components 1250 includebiometric components 1256,motion components 1258,environmental components 1260, orposition components 1262, among a wide array of other components. For example, thebiometric components 1256 include components to detect expressions (e.g., hand expressions, facial expressions, vocal expressions, body gestures, or eye tracking), measure biosignals (e.g., blood pressure, heart rate, body temperature, perspiration, or brain waves), identify a person (e.g., voice identification, retinal identification, facial identification, fingerprint identification, or electroencephalogram-based identification), and the like. Themotion components 1258 include acceleration sensor components (e.g., accelerometer), gravitation sensor components, rotation sensor components (e.g., gyroscope), and so forth. Theenvironmental components 1260 include, for example, illumination sensor components (e.g., photometer), temperature sensor components (e.g., one or more thermometers that detect ambient temperature), humidity sensor components, pressure sensor components (e.g., barometer), acoustic sensor components (e.g., one or more microphones that detect background noise), proximity sensor components (e.g., infrared sensors that detect nearby objects), gas sensors (e.g., machine olfaction detection sensors, gas detection sensors to detect concentrations of hazardous gases for safety or to measure pollutants in the atmosphere), or other components that may provide indications, measurements, or signals corresponding to a surrounding physical environment. Theposition components 1262 include location sensor components (e.g., a Global Positioning System (GPS) receiver component), altitude sensor components (e.g., altimeters or barometers that detect air pressure from which altitude may be derived), orientation sensor components (e.g., magnetometers), and the like. - Communication may be implemented using a wide variety of technologies. The I/
O components 1250 may includecommunication components 1264 operable to couple themachine 1200 to anetwork 1280 ordevices 1270 via acoupling 1282 and acoupling 1272, respectively. For example, thecommunication components 1264 include a network interface component or another suitable device to interface with thenetwork 1280. In further examples, thecommunication components 1264 include wired communication components, wireless communication components, cellular communication components, Near Field Communication (NFC) components, Bluetooth® components (e.g., Bluetooth® Low Energy), Wi-Fi® components, and other communication components to provide communication via other modalities. Thedevices 1270 may be another machine or any of a wide variety of peripheral devices (e.g., a peripheral device coupled via a USB). - Moreover, in some implementations, the
communication components 1264 detect identifiers or include components operable to detect identifiers. For example, thecommunication components 1264 include Radio Frequency Identification (RFID) tag reader components, NFC smart tag detection components, optical reader components (e.g., an optical sensor to detect one-dimensional bar codes such as Universal Product Code (UPC) bar code, multi-dimensional bar codes such as Quick Response (QR) code, Aztec code, Data Matrix, Dataglyph, MaxiCode, PDF417, Ultra Code, Uniform Commercial Code Reduced Space Symbology (UCC RSS)-2D bar code, and other optical codes), acoustic detection components (e.g., microphones to identify tagged audio signals), or any suitable combination thereof. In addition, a variety of information can be derived via thecommunication components 1264, such as location via Internet Protocol (IP) geolocation, location via Wi-Fi® signal triangulation, location via detecting an NFC beacon signal that may indicate a particular location, and so forth. - In various example embodiments, one or more portions of the
network 1280 may be an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), a metropolitan area network (MAN), the Internet, a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a plain old telephone service (POTS) network, a cellular telephone network, a wireless network, a Wi-Fi® network, another type of network, or a combination of two or more such networks. For example, thenetwork 1280 or a portion of thenetwork 1280 may include a wireless or cellular network and thecoupling 1282 may be a Code Division Multiple Access (CDMA) connection, a Global System for Mobile communications (GSM) connection, or another type of cellular or wireless coupling. In this example, thecoupling 1282 may implement any of a variety of types of data transfer technology, such as Single Carrier Radio Transmission Technology (1xRTT), Evolution-Data Optimized (EVDO) technology, General Packet Radio Service (CPRS) technology, Enhanced Data rates for GSM Evolution (EDGE) technology, third Generation Partnership Project (3GPP) including 3G, fourth generation wireless (4G) networks, Universal Mobile Telecommunications System (UMTS), High Speed Packet Access (HSPA), Worldwide Interoperability for Microwave Access (WiMAX), Long Term Evolution (LTE) standard, others defined by various standard-setting organizations, other long range protocols, or other data transfer technology. - In example embodiments, the
instructions 1216 are transmitted or received over thenetwork 1280 using a transmission medium via a network interface device (e.g., a network interface component included in the communication components 1264) and utilizing any one of a number of well-known transfer protocols (e.g., Hypertext Transfer Protocol (HTTP)). Similarly, in other example embodiments, theinstructions 1216 are transmitted or received using a transmission medium via the coupling 1272 (e.g., a peer-to-peer coupling) to thedevices 1270. The term “transmission medium” shall be taken to include any intangible medium that is capable of storing, encoding, or carrying theinstructions 1216 for execution by themachine 1200, and includes digital or analog communications signals or other intangible media to facilitate communication of such software. - Furthermore, the machine-
readable medium 1238 is non-transitory (in other words, not having any transitory signals) in that it does not embody a propagating signal. However, labeling the machine-readable medium 1238 as “non-transitory” should not be construed to mean that the medium is incapable of movement; the medium should be considered as being transportable from one physical location to another. Additionally, since the machine-readable medium 1238 is tangible, the medium may be considered to be a machine-readable device. - Throughout this specification, plural instances may implement components, operations, or structures described as a single instance. Although individual operations of one or more methods are illustrated and described as separate operations, one or more of the individual operations may be performed concurrently, and nothing requires that the operations be performed in the order illustrated. Structures and functionality presented as separate components in example configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements fall within the scope of the subject matter herein.
- Although an overview of the inventive subject matter has been described with reference to specific example embodiments, various modifications and changes may be made to these embodiments without departing from the broader scope of embodiments of the present disclosure. Such embodiments of the inventive subject matter may be referred to herein, individually or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single disclosure or inventive concept if more than one is, in fact, disclosed.
- The embodiments illustrated herein are described in sufficient detail to enable those skilled in the art to practice the teachings disclosed. Other embodiments may be used and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. The Detailed Description, therefore, is not to be taken in a limiting sense, and the scope of various embodiments is defined only by the appended claims, along with the full range of equivalents to which such claims are entitled.
- As used herein, the term “or” may be construed in either an inclusive or exclusive sense. Moreover, plural instances may be provided for resources, operations, or structures described herein as a single instance. Additionally, boundaries between various resources, operations, modules, engines, and data stores are somewhat arbitrary, and particular operations are illustrated in a context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within a scope of various embodiments of the present disclosure. In general, structures and functionality presented as separate resources in the example configurations may be implemented as a combined structure or resource. Similarly, structures and functionality presented as a single resource may be implemented as separate resources. These and other variations, modifications, additions, and improvements fall within a scope of embodiments of the present disclosure as represented by the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
Claims (21)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/172,975 US20210192067A1 (en) | 2018-05-22 | 2021-02-10 | User interface for interacting with multiple databases |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/986,284 US10956594B2 (en) | 2018-05-22 | 2018-05-22 | User interface for interacting with multiple databases |
US17/172,975 US20210192067A1 (en) | 2018-05-22 | 2021-02-10 | User interface for interacting with multiple databases |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/986,284 Continuation US10956594B2 (en) | 2018-05-22 | 2018-05-22 | User interface for interacting with multiple databases |
Publications (1)
Publication Number | Publication Date |
---|---|
US20210192067A1 true US20210192067A1 (en) | 2021-06-24 |
Family
ID=68614681
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/986,284 Active 2039-02-16 US10956594B2 (en) | 2018-05-22 | 2018-05-22 | User interface for interacting with multiple databases |
US17/172,975 Abandoned US20210192067A1 (en) | 2018-05-22 | 2021-02-10 | User interface for interacting with multiple databases |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/986,284 Active 2039-02-16 US10956594B2 (en) | 2018-05-22 | 2018-05-22 | User interface for interacting with multiple databases |
Country Status (1)
Country | Link |
---|---|
US (2) | US10956594B2 (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3455998B1 (en) * | 2016-05-12 | 2021-09-01 | Boland, Michael, J. | Identity authentication and information exchange system and method |
US10956594B2 (en) * | 2018-05-22 | 2021-03-23 | Identity Theft Guard Solutions, Inc. | User interface for interacting with multiple databases |
US20210326563A1 (en) * | 2019-06-20 | 2021-10-21 | Christopher Gordon Kossor | Electronic fingerprint device for identifying perpetrators and witnesses of a crime and method thereof |
US11720882B2 (en) * | 2020-01-16 | 2023-08-08 | Mastercard International Incorporated | Identity deep freeze |
US11470037B2 (en) | 2020-09-09 | 2022-10-11 | Self Financial, Inc. | Navigation pathway generation |
US11475010B2 (en) | 2020-09-09 | 2022-10-18 | Self Financial, Inc. | Asynchronous database caching |
US11641665B2 (en) * | 2020-09-09 | 2023-05-02 | Self Financial, Inc. | Resource utilization retrieval and modification |
US20220075877A1 (en) | 2020-09-09 | 2022-03-10 | Self Financial, Inc. | Interface and system for updating isolated repositories |
US20220318926A1 (en) * | 2021-03-30 | 2022-10-06 | Truist Bank | Application programming interface for providing common user interface access to data from separate systems |
CN115033401B (en) * | 2022-06-20 | 2024-10-11 | 北京中睿天下信息技术有限公司 | Message system based on isolated environment high concurrency scene |
US20240070661A1 (en) * | 2022-08-25 | 2024-02-29 | Truist Bank | Transaction system transfer techniques |
Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6005579A (en) * | 1996-04-30 | 1999-12-21 | Sony Corporation Of America | User interface for displaying windows on a rectangular parallelepiped |
US20060064560A1 (en) * | 2004-09-22 | 2006-03-23 | Hitachi, Ltd. | Storage system and storage control method |
US20070083463A1 (en) * | 2005-09-20 | 2007-04-12 | Kraft Harold H | Fraud alert switch |
US20070266439A1 (en) * | 2005-11-30 | 2007-11-15 | Harold Kraft | Privacy management and transaction system |
US20080208726A1 (en) * | 2005-09-02 | 2008-08-28 | Intersections, Inc. | Method and system for securing credit accounts |
US7774270B1 (en) * | 2004-08-19 | 2010-08-10 | Maccloskey Randy | Credit report lock system |
US20100250411A1 (en) * | 2009-03-30 | 2010-09-30 | Ogrodski Albert | Method and system for centralized identity and account controls |
US20130145426A1 (en) * | 2010-03-12 | 2013-06-06 | Michael Wright | Web-Hosted Self-Managed Virtual Systems With Complex Rule-Based Content Access |
US8606666B1 (en) * | 2007-01-31 | 2013-12-10 | Experian Information Solutions, Inc. | System and method for providing an aggregation tool |
US20140040127A1 (en) * | 2011-06-03 | 2014-02-06 | Visa International Service Association | Virtual Wallet Card Selection Apparatuses, Methods and Systems |
US20140089346A1 (en) * | 2012-09-26 | 2014-03-27 | Oracle International Corporation | Methods and apparatus for implementing semi-distributed lock management |
US8954887B1 (en) * | 2008-02-08 | 2015-02-10 | Google Inc. | Long press interface interactions |
US9106691B1 (en) * | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US9256904B1 (en) * | 2008-08-14 | 2016-02-09 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US20160277439A1 (en) * | 2015-03-20 | 2016-09-22 | Ncluud Corporation | Locking Applications and Devices Using Secure Out-of-Band Channels |
US9830646B1 (en) * | 2012-11-30 | 2017-11-28 | Consumerinfo.Com, Inc. | Credit score goals and alerts systems and methods |
US9853959B1 (en) * | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US20190258818A1 (en) * | 2016-02-08 | 2019-08-22 | Consumerinfo.Com, Inc. | Smart access control system for implementing access restrictions of regulated database records based on machine learning of trends |
US20190362086A1 (en) * | 2018-05-22 | 2019-11-28 | Identity Theft Guard Solutions, Inc. | User interface for interacting with multiple databases |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040187029A1 (en) * | 2003-03-21 | 2004-09-23 | Ting David M. T. | System and method for data and request filtering |
-
2018
- 2018-05-22 US US15/986,284 patent/US10956594B2/en active Active
-
2021
- 2021-02-10 US US17/172,975 patent/US20210192067A1/en not_active Abandoned
Patent Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6005579A (en) * | 1996-04-30 | 1999-12-21 | Sony Corporation Of America | User interface for displaying windows on a rectangular parallelepiped |
US7774270B1 (en) * | 2004-08-19 | 2010-08-10 | Maccloskey Randy | Credit report lock system |
US20060064560A1 (en) * | 2004-09-22 | 2006-03-23 | Hitachi, Ltd. | Storage system and storage control method |
US20080208726A1 (en) * | 2005-09-02 | 2008-08-28 | Intersections, Inc. | Method and system for securing credit accounts |
US20070083463A1 (en) * | 2005-09-20 | 2007-04-12 | Kraft Harold H | Fraud alert switch |
US20070266439A1 (en) * | 2005-11-30 | 2007-11-15 | Harold Kraft | Privacy management and transaction system |
US8606666B1 (en) * | 2007-01-31 | 2013-12-10 | Experian Information Solutions, Inc. | System and method for providing an aggregation tool |
US8954887B1 (en) * | 2008-02-08 | 2015-02-10 | Google Inc. | Long press interface interactions |
US9256904B1 (en) * | 2008-08-14 | 2016-02-09 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US20160155196A1 (en) * | 2008-08-14 | 2016-06-02 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US9489694B2 (en) * | 2008-08-14 | 2016-11-08 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US20100250411A1 (en) * | 2009-03-30 | 2010-09-30 | Ogrodski Albert | Method and system for centralized identity and account controls |
US20130145426A1 (en) * | 2010-03-12 | 2013-06-06 | Michael Wright | Web-Hosted Self-Managed Virtual Systems With Complex Rule-Based Content Access |
US20140040127A1 (en) * | 2011-06-03 | 2014-02-06 | Visa International Service Association | Virtual Wallet Card Selection Apparatuses, Methods and Systems |
US9106691B1 (en) * | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US10061936B1 (en) * | 2011-09-16 | 2018-08-28 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US9853959B1 (en) * | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US20140089346A1 (en) * | 2012-09-26 | 2014-03-27 | Oracle International Corporation | Methods and apparatus for implementing semi-distributed lock management |
US9830646B1 (en) * | 2012-11-30 | 2017-11-28 | Consumerinfo.Com, Inc. | Credit score goals and alerts systems and methods |
US20160277439A1 (en) * | 2015-03-20 | 2016-09-22 | Ncluud Corporation | Locking Applications and Devices Using Secure Out-of-Band Channels |
US20190258818A1 (en) * | 2016-02-08 | 2019-08-22 | Consumerinfo.Com, Inc. | Smart access control system for implementing access restrictions of regulated database records based on machine learning of trends |
US20190362086A1 (en) * | 2018-05-22 | 2019-11-28 | Identity Theft Guard Solutions, Inc. | User interface for interacting with multiple databases |
Non-Patent Citations (1)
Title |
---|
Leis, Viktor, et al. "The ART of practical synchronization." Proceedings of the 12th International Workshop on Data Management on New Hardware. 2016. (Year: 2016) * |
Also Published As
Publication number | Publication date |
---|---|
US10956594B2 (en) | 2021-03-23 |
US20190362086A1 (en) | 2019-11-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210192067A1 (en) | User interface for interacting with multiple databases | |
US11301551B2 (en) | Computing asset access control | |
US10812594B2 (en) | Development platform for industrial internet applications | |
AU2021250885B2 (en) | Customizable cloud-based software platform | |
US10972582B2 (en) | System and method for scoped attributes | |
US10742660B2 (en) | Event processing via industrial asset cloud computing system | |
US9923905B2 (en) | System and method for zone access control | |
US10146673B2 (en) | Source code change resolver | |
US20170220334A1 (en) | Mobile management of industrial assets | |
CN107003872B (en) | Centralized client application management | |
US11544289B2 (en) | Interface custom resource definition for stateful service management of clusters | |
US10270670B2 (en) | Error and special case handling using cloud account | |
US11811846B2 (en) | Thermal state inference based frequency scaling | |
US20180113584A1 (en) | Processing actions for apparatuses in specified geolocation | |
US12041083B1 (en) | Coordinating discrete systems | |
US20230353503A1 (en) | Role-based access control system for managing access to resources | |
US20220156179A1 (en) | Feature rollback for incapable mobile devices | |
US11537437B2 (en) | Executing and re-executing a list of component handlers defined for a resource in response to detecting a creation, deletion, or modification of the resource | |
US20240346116A1 (en) | Software package sharing to restricted landscapes | |
US20230421563A1 (en) | Managing access control using policy evaluation mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: IDENTITY THEFT GUARD SOLUTIONS, INC., OREGON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VANLOO, BRENT;SEMKE, CHRISTOPHER;JOHNSON, CHRISTOPHER RYAN;AND OTHERS;SIGNING DATES FROM 20180516 TO 20180518;REEL/FRAME:055318/0227 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
AS | Assignment |
Owner name: MONROE CAPITAL MANAGEMENT ADVISORS, LLC, ILLINOIS Free format text: SECURITY INTEREST;ASSIGNORS:ZEROFOX, INC.;LOOKINGGLASS CYBER SOLUTIONS, LLC;IDENTITY THEFT GUARD SOLUTIONS, INC.;REEL/FRAME:067396/0304 Effective date: 20240513 |
|
AS | Assignment |
Owner name: IDENTITY THEFT GUARD SOLUTIONS, INC., MARYLAND Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:STIFEL BANK;REEL/FRAME:067429/0849 Effective date: 20240513 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |