US20230418918A1 - User information gathering and distribution system - Google Patents
User information gathering and distribution system Download PDFInfo
- Publication number
- US20230418918A1 US20230418918A1 US18/244,662 US202318244662A US2023418918A1 US 20230418918 A1 US20230418918 A1 US 20230418918A1 US 202318244662 A US202318244662 A US 202318244662A US 2023418918 A1 US2023418918 A1 US 2023418918A1
- Authority
- US
- United States
- Prior art keywords
- user information
- user
- information
- transaction
- entity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 84
- 230000000694 effects Effects 0.000 claims description 17
- 230000004044 response Effects 0.000 claims description 15
- 230000003044 adaptive effect Effects 0.000 claims description 4
- 238000012544 monitoring process Methods 0.000 claims 3
- 230000008569 process Effects 0.000 description 25
- 238000010586 diagram Methods 0.000 description 15
- 230000015654 memory Effects 0.000 description 14
- 230000036541 health Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 238000013475 authorization Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 210000001525 retina Anatomy 0.000 description 4
- 230000001052 transient effect Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 241001155433 Centrarchus macropterus Species 0.000 description 1
- 206010020751 Hypersensitivity Diseases 0.000 description 1
- 241001633663 Iris pseudacorus Species 0.000 description 1
- 230000007815 allergy Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000003990 capacitor Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 239000012530 fluid Substances 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000010970 precious metal Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000002255 vaccination Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Definitions
- the information may include basic information associated with the individual such as first name, last name, email address, phone number, birthday, home address and so on.
- the information may also include information confidential to the individual such as social security number, health information, credit information, insurance information and so on.
- individuals store this information in a variety of places (e.g., financial institution, safe, government agency, etc.).
- Individuals may also be asked to provide pieces of this information to many different entities during a transaction. For example, when an individual is getting approved for a mortgage, buying a new car, or visiting the hospital, the individual may be asked to provide a variety of information.
- the individual may not know what information is needed, or the individual may not have the information needed readily available. If the individual does not know what information is needed for certain transactions, the individual may provide too much or too little information to the entity. Providing too much information to an entity may be dangerous for the individual as the information may be used fraudulently by the entity or be available to others whom may use the information fraudulently.
- One embodiment of the invention relates to a method of alerting a user of user information to be sent to an entity during a transaction, the method being performed by a user information service (UIS) computing system associated with an information service.
- the method includes populating, by a UIS information circuit and an associated user database, an account with user information received from at least one of the user and a plurality of entities.
- the method further includes receiving, by the UIS information circuit over a network via a network interface circuit, a user information request relating to a transaction from an entity computing system associated with the entity.
- the method includes sending, by a security circuit of the UIS information circuit, an alert including an approval request to a user computing device associated with the user over the network, wherein the approval request contains an identification of user information requested in the user information request.
- the method further includes receiving, by the security circuit, an approval of the approval request from the user computing device.
- the method includes providing, by the UIS information circuit and the user information database, the approved information to the entity to complete the transaction.
- Another embodiment relates to a non-transitory computer readable media having computer-executable instructions embodied therein that, when executed by a computing system associated with a second party to an agreement causes the second party computing system to perform operations for demonstrating consensus agreement.
- the operations include populating, by an associated user database, an account with user information received from at least one of the user and a plurality of entities.
- the operations further include receiving a user information request relating to a transaction from an entity computing system associated with the entity, sending an alert including an approval request to a user computing device associated with the user over the network, wherein the approval request contains an identification of user information requested in the user information request.
- the operations further include receiving an approval of the approval request from the user computing device and providing, by the user information database, the approved information to the entity to complete the transaction.
- the device includes a network interface circuit configured to communicate with a user computing device associated with a user and an entity computing system.
- the method further includes at least one processor operatively coupled to a non-transient memory to form a UIS information circuit.
- the circuit is structured to populate, in a user information database, an account with user information.
- the circuit is further structured to receive, via a network interface circuit, a user information request from an entity computing system over a network.
- the circuit is structured to send, via a security circuit, an alert including an approval request indicating the user information requested in the user information request to the user computing device over the network.
- the circuit is further structured to receive a response to the approval request from the user computing device.
- the circuit is structured to provide user information corresponding to the user information request and the response to the approval request to the entity computing system.
- FIG. 1 is a diagram of a data exchanging system, according to an example embodiment.
- FIG. 2 is a diagram of information and data flows of the data exchanging system of FIG. 1 , according to an example embodiment.
- FIG. 3 is a flow diagram of a method of populating user information for a user account, according to an example embodiment.
- FIG. 4 is a flow diagram of a method of providing user information to an entity, according to an example embodiment.
- FIG. 5 is a flow diagram of a method of comparing a user information request from an entity, according to an example embodiment.
- FIG. 6 is a flow diagram of a method of preparing user information for a predicted transaction, according to an example embodiment.
- FIG. 7 is a flow diagram of a method of determining if a user has user information ready for a potential transaction, according to an example embodiment.
- the user information systems and methods are structured to receive a plurality of user information types (e.g., social security number, insurance information, etc.) associated with a user and to enable the user to manage and distribute the information in a secure, convenient, efficient, and time-saving manner.
- the user information system may be accessed with at least one user device (e.g., a mobile device, a smart watch, etc.).
- the user information system is structured to receive an information request from an entity (e.g., bank, car dealer, etc.) based on a transaction type (e.g., mortgage approval, buying a car, etc.), compare the information request to information requests from similar entities for similar transactions, and to provide the user information to the entity.
- entity e.g., bank, car dealer, etc.
- a transaction type e.g., mortgage approval, buying a car, etc.
- the user information functions allow the user to add, manage, and distribute the user information.
- the user information system also predicts and verifies the user information needed for a given transaction to protect the user from risks of giving too much or incorrect information to an entity.
- the computing system 100 includes a user 102 , a plurality of entities 108 , a user information service 120 , and a network 140 .
- the network 140 may include any of various types of data exchanging networks.
- the network 140 may include wireless networks (e.g., 802.11X, ZigBee′, Bluetooth, Internet, etc.), wired networks (e.g., Ethernet), or any combination thereof.
- the network 140 is structured to permit the exchange of data, values, instructions, messages, etc. between and among the user computing device 104 , the entity computing system 110 , and the user information service computing system 122 .
- the user 102 may include individuals, business representatives, large and small business owners, other entities, and so on.
- the user 102 is associated with a user computing device 104 .
- the user computing device 104 may be, but is not limited to, a mobile computing device (e.g., a smartphone, tablet computer, laptop computer, person digital assistant, etc.), a desktop computing device, a wearable computing device, etc.
- Wearable computing devices refer to any type of computing device that a user 102 wears including, but not limited to, a watch, glasses, bracelet, etc.
- the user computing device 104 includes a user information circuit 106 .
- the user information circuit 106 is structured to allow the user 102 to communicate with the user information service 120 .
- the user information circuit 106 may be structured to provide a user interface (e.g., a graphical user interface) that permits the user 102 to provide information (e.g., user information) that is communicated to a user information service computing system 122 associated with the user information service 120 .
- the user information circuit 106 may be communicably coupled to a processor, non-transient memory, and network interface enabling the user computing device 104 to exchange data over the network 140 .
- the user information circuit 106 communicates data to and from the user information service computing system 122 via network 140 .
- the user 102 may download a user information application (e.g., a software “app”) prior to use, which may be used to set up and configure the user information circuit 106 .
- the user information circuit 106 is hard coded into the memory of the user computing device 104 .
- the user information circuit 106 is a web-based interface application accessed via the Internet on a web browser executed on the user computing device 104 . In such arrangements, the user information circuit 106 is executed and maintained remotely (e.g., on the user information service computing system 110 ).
- the user 102 logs onto or accesses the web-based interface to access the user information circuit 106 .
- the user information circuit 106 is supported by a separate computing system comprising one or more servers, processors, network interface circuits, etc. that transmit the applications for use to the user computing device 104 .
- the user information circuit 106 may include an application programming interface (API) and/or a software development kit (SDK) that facilitates the integration of other applications with the user information circuit 106 .
- API application programming interface
- SDK software development kit
- Each of the entities 108 provide services to a plurality of users, including the user 102 .
- Examples of the entities 108 include financial institutions, merchants, insurance companies, utility companies, social media networks, e-mail systems, health care providers, etc.
- Each of the plurality of entities 108 operates and/or is associated with a respective entity computing system 110 .
- Each entity computing system 110 includes a processor 112 , memory 114 , a network interface circuit 116 and a user information database 118 .
- the network interface circuit 116 facilitates the sending and receiving of data, commands, instructions, values, etc. over the network 140 (e.g., to and from the user information service computing system 120 , etc.).
- Each entity computing system 110 is communicably coupled to the user information service computing system 122 and/or the user computing device 104 via the network 140 .
- the entity computing system 110 also includes a user information database 118 that stores user information relating to the user 102 .
- the entity computing system 110 may maintain information about one or more of the entities 108 , information regarding user 102 (e.g., accounts associated with the user 102 and a respective one of the entities 108 , etc.) and so on in the user information database 118 .
- more than one entity 108 with an associated entity computing system 110 may be communicably coupled to the components of FIG. 1 over the network 140 to accommodate user information associated the user 102 at a plurality of entities 108 .
- the user information database may store user account information including account numbers, balances, credit limits, and so on.
- the user information service 120 is affiliated with a given entity 108 (e.g., a financial institution). In other arrangements, the user information service 120 is not directly affiliated with a given entity 108 .
- the user information service 120 includes a user information service computing system 122 .
- the user information service computing system 120 includes a processor 124 , memory 126 , a network interface circuit 128 , and a user information service (“UIS”) information circuit 130 .
- the network interface circuit 128 facilitates the sending and receiving of data, commands, instructions, values, etc. over the network 140 (e.g., to and from the user computing device 104 , to and from the entity computing system 110 , etc.).
- the user information service computing system 122 is structured to provide storage of user information associated with the user 102 and distribution of user information associated with the user 102 to one or more of the entities 108 .
- the UIS information circuit 130 of the user information service computing system 122 provides storage and distribution of user information to the user 102 via the user information circuit 106 .
- the operation of the user information service computing system 122 and the UIS information circuit 130 are described in further detail with respect to FIGS. 2 through 7 .
- the UIS information circuit 130 at the user information service computing system 122 communicates data to and from the user information circuit 106 and the entity computing system 110 via the network 140 , and includes a user information database 132 , a transaction type database 134 , a security circuit 136 , and a prediction circuit 138 .
- the user information database 132 includes storage media or access thereto structured to retrievably store user information flowing into the UIS computing system 122 .
- the transaction type database 134 retrievably stores information relating to a plurality of different transaction types, including types of user information relevant to each of the plurality of different transaction types.
- the information in the user information database 132 is shared with the transaction type database 134 .
- the security circuit 136 is structured to maintain and apply various security protocols relating to information stored in the user information database 132 , as well as information requested from the user 102 .
- the prediction circuit 138 is structured to predict future transactions based on information flowing to the UIS computing system 122 (e.g., information from the user information circuit 106 ) and information stored at the user information database 132 and the transaction type database 134 .
- information flowing to the UIS computing system 122 e.g., information from the user information circuit 106
- information stored at the user information database 132 and the transaction type database 134 Various example operations of the UIS information circuit are discussed in more detail below.
- the user information service computing system 122 receives a plurality of inputs, including, but not limited to, incoming user information 202 , information request 204 , potential transaction 206 , user input 208 from at least the user information circuit 106 and the entity computing system 110 .
- Incoming user information 202 may be any type of information relating to the user 102 .
- the incoming user information 202 may be personal information (e.g., social security number, birthday, home address, name, etc.), financial information (e.g., credit score, bank account balances, etc.), health information (e.g., allergies, vaccinations, family medical history, etc.) and so on.
- the incoming user information 202 may be received by the user information service computing system 122 from the user computing device 104 .
- the incoming user information 202 may be received from the entity computing system 110 .
- the user information computing system 122 may receive health care information (incoming user information 202 ) associated with the user 102 from a computing system associated with a health care provider.
- Information request 204 may be a request from the entity computing system 110 for user information associated with the user 102 sent to the user information service computing system 122 .
- the information request 204 may include a list of specific user information that is being requested.
- the information request 204 may also include the entity 108 that is requesting the user information.
- the information request 204 may indicate a type of transaction for which the entity computing system 110 is requesting the user information.
- Potential transaction 206 is a transaction, indicated by the user 102 via the user information circuit 106 , that the user 102 may complete in the future. For example, if the user 102 is planning on purchasing a car, but not for a few months the user 102 may send the user information service computing system 122 a potential transaction 206 . In this case, the user 102 may want to plan ahead to gather additional user information that may be needed for the potential transaction 206 .
- the potential transaction 206 is received by the user information service computing system 122 from the user information circuit 106 .
- User input 208 refers to input received from the user 102 at the user information circuit 106 .
- the user input 208 may include user responses to approval request 212 , flagged request 214 , alert 216 , and/or predicted transaction 218 , discussed below.
- user input 208 also includes setting and preferences associated with a user account for the user 102 with the user information service 120 .
- the UIS information circuit 130 at the user information service computing system 122 is also structured to provide information, requests, and alerts 216 to the entity computing system 110 and the user information circuit 106 .
- An alert 216 is a notification to be received at the user computing device 104 , and may specify a type of pending request, an requested response from the user 102 , a notification, and so on.
- the user information circuit 106 may receive the alert 216 over the network 140 and use any of a variety of output devices at the user computing device 104 to bring the alert 216 to the attention of the user 102 .
- the alert 216 may be associated with any of the outgoing types of data from the UIS computing system 122 (e.g., an approval request 212 , a flagged request 214 , a predicted transaction 218 , etc.).
- the alert 216 may be sent via email, text message, push notification, etc.
- the user 102 may set up and configure alerts 216 and alert preferences when setting up the user account.
- the user information service computing system 122 may provide outgoing user information 210 to one or more of the plurality of entities 108 .
- Outgoing user information 210 may be substantially similar to incoming user information 202 in that outgoing user information 210 may include any of various types of information relating to a given user.
- outgoing user information 210 is a set of user information that will be provided to the entity computing system 110 .
- the outgoing user information 210 sent to the entity computing system 110 may only include name, address, and credit score.
- the security circuit 136 may provide an approval request 212 and a corresponding alert 216 to the user information circuit 106 to notify the user 102 of information relating to an information request 204 received from one or more of the plurality of entities 108 .
- the security circuit 136 may provide the user information circuit 106 with all the user information that was requested in the information request 204 , as well as information relating to the type of transaction for which the user information is being requested, and the entity 108 that is requesting the user information in the approval request 212 .
- the security circuit 136 may receive, from the user 102 via the user information circuit 106 , user input 208 indicating an approval of the user information of approval request 212 .
- a flagged request 214 and a corresponding alert 216 may be provided to the user information circuit 106 by the security circuit 136 to notify the user 102 of information relating to an information request 204 received from one or more of the plurality of entities 108 when a piece of user information requested is unusual (e.g., medical information requested when getting a car loan).
- the prediction circuit 138 is structured to predict a potential future transaction the user 102 may be making based on activity by the user 102 on the user computing device 104 .
- the prediction circuit 138 may provide a predicted transaction 218 and a corresponding alert 216 to the user information circuit 106 , which in turn may provide the predicted transaction 218 to the UIS information circuit 130 .
- the UIS information circuit 130 may provide transaction information 220 to the user information circuit 106 from the transaction type database 134 to inform the user 102 about a transaction that is presently occurring or is actually set to occur.
- the incoming user information 202 may be transmitted to the user information service computing system 122 via the user information circuit 106 of the user computing device 104 .
- the UIS information circuit 130 may treat the incoming user information 202 as a request to create an account with the user information service 120 .
- the user account contains incoming user information 202 received from the user 102 , and all of the incoming user information 202 may be stored in user information database 132 .
- the user information database 132 is configured to store and manage incoming user information 202 associated with user 102 at the user information service computing system 122 .
- the UIS information circuit 130 may also receive incoming user information 202 from one or more entities 108 associated with user 102 (e.g., social media, health care provider, etc.).
- entity 108 associated with user 102
- the user information database 132 maintains user account settings and preferences.
- the information request 204 is transmitted to the user information computing system 122 from the entity computing system 110 .
- the information request 204 may specify the entity 108 requesting the user information, the type of transaction occurring, and the user information being requested.
- the term “transaction” may refer to financial and non-financial transactions.
- An example of a non-financial transaction may be providing outgoing user information 210 to an entity.
- the term “transaction” may refer to any operation or interaction executed by the user 102 with an entity 108 (e.g., visiting the doctor, making a flight reservation using frequent flier miles, financial transactions, buying a car, getting approved for a loan, etc.).
- the UIS information circuit 130 may compare the information request 204 to other requests of similar transaction types using the transaction type database 134 .
- Information relating to different types of transactions and user information commonly requested for these types of transactions is stored in transaction type database 134 .
- the transaction type database 134 may be constantly updating the outgoing user information 210 requested for certain transactions. In this regard, the transaction type database 134 may be dynamic and adaptive to learn what user information is commonly requested for a transaction.
- the transaction type database 134 may be updated manually by personnel (e.g., employees, etc.) associated with the user information service 120 , or may use prior transactions of all users with accounts at the user information service 120 , including user 102 .
- the security circuit 136 is structured to determine if information requested by the entity is consistent with information normally requested by a similar entity for a similar transaction type.
- the security circuit 136 may also be structured to flag inconsistent information and send the user 102 a flagged request 214 and a corresponding alert 216 .
- the UIS information circuit 130 compares the information request 204 to similar information requests of the same or similar type that are maintained in the transaction type database 134 , user information that is requested in information request 204 that is not consistent with information requests of the same or similar type may be flagged by the security circuit 136 .
- the security circuit 136 may have different levels or criteria for flagging requested user information. The flagging levels may be preset or determined by the user 102 when the user account is created.
- the flagging levels may also be based on more than one type of criteria (e.g., frequency of request, level of security of information, etc.).
- the security circuit 136 is also structured to determine the level of security for each piece of information the user 102 provides, and maintain security protocol for sharing information with a certain security level. For example, the security circuit 136 may require the user 102 to provide a password before the UIS information circuit 130 can share the social security number of the user 102 with one of the entities 108 .
- the UIS information circuit 130 may provide the user 102 with an alert 216 via the user information circuit 106 when certain user information is requested.
- the UIS information circuit 130 may provide the user 102 with alert 216 via the user information circuit 106 when user information is requested that the user 102 does not have linked or stored in the user information database 132 .
- Alert 216 may also be provided to the user 102 via the user information circuit 106 to remind the user 102 to provide the user information service computing system 122 with user information that will be needed for a future transaction the user 102 has indicated (e.g., potential transaction 206 ).
- the UIS information circuit 130 may receive a potential transaction 206 generated and transmitted from the user information circuit 106 .
- the user 102 may be planning on completing a transaction (e.g., getting a loan, qualifying for a mortgage, buying a car, etc.) and use the user information circuit 106 to transmit a corresponding potential transaction 206 to the user information service computing system 122 .
- the UIS information circuit 130 may search the transaction type database 134 to determine the user information that may be needed to complete the potential transaction 206 . In view of the information returned from the transaction type database 134 , the user 102 may have time to gather additional user information that is needed and check to see if the user information is accurate before completing a transaction with any one or more entity 108 .
- the UIS information circuit 130 may receive the potential transaction 206 from entity computing system 110 .
- the user 102 may visit one or more of the entities 108 looking for information regarding a transaction.
- the entity computing system 110 may send a potential transaction 206 to the user information service computing system 122 indicating that user 102 may complete a transaction with entity 108 .
- the entity computing system 110 may also indicate what user information would be needed to complete the transaction. Again, the user 102 would have time to gather additional user information that may be needed and check to see if the user information is accurate before completing a transaction with entity 108 .
- the UIS information circuit 130 may cooperate with the prediction circuit 138 to provide predicted transactions 218 to the user 102 .
- a predicted transaction 218 is information relating to an anticipated transaction based on the past behavior of the user 102 .
- the user information service computing system 122 may monitor other applications on the user computing device 104 and/or monitor website activity on the user computing device 104 to predict a potential transaction 218 of the user 102 .
- the prediction circuit 138 may be set with different transactions that could be completed and information that may be indicative of the transaction. For example, if the user 102 is looking up homes or properties, the prediction circuit 138 may predict the user 102 will be purchasing a home.
- the UIS information circuit 130 may notify (e.g., via alert 216 ) the user 102 of the predicted transaction 218 via the user information circuit 106 .
- the user 102 may transmit user input 208 to the user information service computing system 122 indicating if the predicted transaction 218 is accurate.
- the UIS information circuit 130 may use the transaction type database 134 to provide the user 102 with outgoing user information 210 corresponding to user information that would likely be needed for the predicted transaction 218 .
- the user 102 may provide user input 208 to the user information service computing system 122 via the user information circuit 106 .
- the approval may include each piece of user information that is approved by user 102 to be sent to the entity computing system 110 .
- the security circuit 136 may require the user 102 to provide authorization with the user input 208 indicating an approval.
- the security circuit 136 may also require the entity 108 (e.g., an employee associated with entity 108 ) to provide authorization or authentication before outgoing user information 210 is provided.
- the entity 108 may have to provide the security circuit 136 with a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc.
- the user input 208 may include a selection of one or more entity 108 when the user 102 has already approved all the outgoing user information 210 to be sent to one or more entity 108 (e.g., potential transaction 206 , predicted transaction 218 , etc.).
- the user information service computing system 122 transmits the approved outgoing user information 210 to entity computing system 110 .
- FIG. 3 a flow diagram of a method 300 of populating user information for a user account with the user information service computing system 122 is shown, according to an example embodiment.
- the method 300 registers the user 102 with the user information service 120 and gathers user information associated with the user 102 .
- a user account is created at 302 .
- the user account created may be initiated by user 102 transmitting incoming user information 202 to the user information service computing system 122 via the user information circuit 106 .
- the user 102 may provide additional information that is optional for the user 102 to include for registration. For example, the user 102 may have the option to add a phone number, set preferences for the user account, and change the password associated with the user account.
- the user account may also include system preferences the user 102 defines.
- the system preferences may include security preferences, usage preferences, alert preferences, and so on.
- the security preference may define the requirements needed by the security circuit 136 before accessing the user information service computing system 122 via the user information circuit 106 .
- a security preference may require the user 102 to provide a password (e.g., word, phrase, alphanumeric value, etc.), a biometric scan (e.g., a fingerprint scan, a retina scan, a voice sample, etc.), a semi-random number (e.g., as generated by a changing security token device), or a combination thereof to the security circuit 136 before the user 102 may access the user information service computing system 122 .
- the security circuit 136 may also allow the user 102 to define user information (e.g., social security number, etc.) that require a second passcode to authorize transmission to entity computing system 110 .
- Alert preferences may include when alert 216 is sent to the user information circuit 106 (e.g., information request 204 received, social security number requested, etc.), a form of alert 216 (e.g., text message, email, notification, etc.) and information included in alert 216 (e.g., user information requested, transaction type, entity 108 requesting the information, etc.).
- a form of alert 216 e.g., text message, email, notification, etc.
- information included in alert 216 e.g., user information requested, transaction type, entity 108 requesting the information, etc.
- Incoming user information 202 is added to the user account by the UIS information circuit 130 at 304 .
- the user 102 may manually enter the user information via input devices associated with the user computing device 104 .
- the user information circuit 106 provides a graphical user interface with labeled spaces for the user 102 to enter specified information. For example, the user 102 may fill in the home address of user 102 in a box labeled “Home Address.”
- the user 102 may also include information about one or more of the entities 108 that may provide additional incoming user information 202 .
- the user 102 may provide information regarding a health care provider or financial institution associated with the user 102 to the user information service computing system 122 via the user information circuit.
- the user 102 may link the user information circuit 106 to other applications used by the user 102 that include user information (e.g., mobile banking application, social media application, etc.).
- the user information service computing system 122 may request user information from the entity computing system 110 , at 306 .
- the UIS information circuit 130 may request healthcare information associated with user 102 from the health care provider indicated by the user 102 at 304 . Additionally, the user information service computing system 122 may request user information from the user 102 via the user information circuit 106 . If the UIS information circuit 130 has a set of user information (e.g., name, email, phone number, address, etc.) that is required for all users, including user 102 , the UIS information circuit 130 may send alert 216 to the user 102 via the user information circuit 106 indicating that user information is missing and/or incomplete.
- a set of user information e.g., name, email, phone number, address, etc.
- the UIS information circuit 130 of the user information service computing system 122 receives incoming user information 202 at 308 .
- the incoming user information 202 received at 308 may be the user information requested at 306 , or additional information provided to the UIS information circuit 130 via the user information circuit 106 or the entity computing system 110 .
- the information requested is information that remains constant (e.g., social security number, birthday, etc.), or relatively constant (e.g., home address, last name, insurance information, healthcare information, etc.)
- the user information database 132 may receive a copy of the user information.
- the UIS information circuit 130 may receive access to the user information instead of receiving copy of the user information.
- the incoming user information 202 received at 308 may be compared to the user information currently associated with the user account and/or other incoming user information 202 being received by the user information database 132 .
- the UIS information circuit 130 may send the alert 216 to the user 102 via the user information circuit 106 when a discrepancy is determined between pieces of user information. For example, if the home address associated with the user 102 received from one entity 108 is listed as “Pin Oak” and the home addressed associated with the user 102 at a different entity 108 is listed as “Pine Oak,” the user 102 may send user input 208 to the user information service computing system 122 indicating the information that is correct and should be stored in the user information database 132 . In some embodiments, the user information service computing system 122 may ask the user 102 via alert 216 to the user information circuit 106 to verify the user information received from the various entity computing systems 110 even if no discrepancies are found for the piece of user information.
- the UIS information circuit 130 of the user information service computing system 122 stores, manages, and distributes the user information at 310 .
- the user information that is constant or relatively constant may be stored by the user information computing system 122 . However, the user information may still be modified by user 102 via the user information circuit 106 , but may require manual updating of the user information.
- User information that is relatively fluid, or changes frequently may be managed by the user information database 132 . This information may be updated frequently as entities 108 associated with the user information (e.g., a financial institution associated with a financial account of user 102 ) update the user information. Additionally, some user information may be managed on a set cycle or by user input.
- the user 102 may indicate that the user 102 visits the eye doctor once a year, generally in March.
- the user information service computing system 122 may only request updated user information relating to the eye doctor (e.g., vision prescription, etc.) at the end of March, or may periodically check for user information updates during the month of March. If the user 102 instead visits the eye doctor in February, the user 102 may indicate via the user information circuit 106 , that the user information associated with the eye doctor has been updated.
- the user information service computing system 122 may request user information from a computing system (e.g., entity computing system 110 ) associated with the eye doctor (e.g., entity 108 ) based on the user input 208 indication received from user information circuit 106 . User information may then be selectively distributed to entity computing system 110 by the user information service computing system 122 . Additional methods for managing and distributing user information are explained in further detail below with respect to FIGS. 4 - 7 .
- FIG. 4 a flow diagram of a method 400 of providing user information to an entity using the user information service computing system 122 is shown, according to an example embodiment.
- the method 400 provides user information to computing system 122 based on a transaction occurring between the user 102 and one or more of the entities 108 .
- the method 400 may be initiated in two ways, by the user 102 , or by one or more of the entities 108 .
- the user information service computing system 122 receives an information request 204 from the entity computing system 110 at 402 .
- the information request 204 may include a list of all the user information (e.g., name, address, credit score, financial institution, etc.) being requested for the user 102 by the entity 108 for a transaction.
- the information request 204 may also include the type of transaction that is taking place (e.g., mortgage approval, etc.) and/or information relating to the entity 108 .
- the entity 108 may have to register (e.g., create an entity account, etc.) with the user information service computing system 122 before the information request 204 can be received from the entity computing system 110 .
- the entity 108 may not have to register with the user information service before the user information service computing system 122 can receive an information request 204 from the entity computing system 110 .
- the entity computing system 110 may have to provide at least basic user information (e.g., first and last name, phone number, etc.) to the user information service computing system 122 to identify the account associated with the user 102 at the user information service 120 .
- the security circuit 136 may require the entity computing system 110 to provide a form of authentication to ensure the entity computing system 110 is not trying to obtain user information for fraudulent purposes.
- the entity 108 may have to register an entity account and provide a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. to the security circuit 136 before the user information service computing system 122 responds to the information request 204 .
- a password e.g., phrase, number, alphanumeric sequence, etc.
- a biometric e.g., fingerprint, retina, etc.
- the entity 108 may have an entity number to associate the entity 108 with the user information service computing system 122 .
- the entity number may be associated with a user information service 120 account held by the user information service computing system 122 for the entity 108 .
- the entity account may contain information relating to transactions common for the entity 108 stored in the transaction type database 134 .
- a car dealership may have car loan and car purchase transactions associated with the entity account stored in the transaction type database 134 .
- the transaction type database 134 may also contain information commonly requested for the transactions associated with the entity 108 .
- the user information service computing system 122 can use this information to determine if the entity computing system 108 is requesting information consistent with information requests 204 made in the past.
- the security circuit 136 may suspect fraudulent activity relating to the entity computing system 110 . Inconsistent user information requests will be described in greater detail with respect to FIG. 5 .
- the user information service computing system 122 may send an approval request 212 and a corresponding alert 216 to the user 102 via the security circuit 136 of the user information circuit 106 at 404 .
- the approval request 212 may present the user information in a way that indicates the type of user information without revealing the user information. For example, the approval request 212 may indicate that the home address of user 102 was requested, without actually providing the home address of the user 102 .
- the user 102 may be notified by the user information service computing system 122 via the user information circuit 106 of the approval request 212 and have to log in to the user information computing system 122 to see the approval request 212 .
- the user 102 may receive a notification saying “Someone has requested user information, please login to approve this request,” etc.
- the approval request may also include information identifying the entity 108 that sent the information request 204 . By identifying the entity 108 , the user 102 can provide the correct outgoing user information 210 to the entity 108 .
- the approval request 212 may also include the transaction information 220 .
- the approval request 212 sent be the user information service computing system 122 may indicate that the user information is being requested to complete a car loan.
- the user 102 can verify the entity 108 requested the user information for the correct transaction.
- the approval request 212 may also indicate to the user 102 if any user information was requested that is not associated with the user information database 132 .
- the user information service computing system 122 receives a response to the approval request from the user 102 via user input 208 from the user information circuit 106 at 406 .
- the response to the approval request indicates which user information has been approved by the user 102 to share with the entity 108 that sent information request 204 .
- the user 102 may approve all, part or none of the user information in the user input 208 . If the user 102 does not approve any of the user information sought in the user information request 204 , the method 400 may terminate.
- outgoing user information 210 is provided to the entity computing system 110 of the entity 108 that sent the information request 204 at 414 .
- the response may indicate which user information is to be shared (e.g., checking account, one of the home addresses, etc.) with the entity computing system 110 for a given type of user information.
- the user 102 may choose to approve all pieces of the same type of user information with the user input 208 .
- the user 102 may approve the user information by checking a box next to the user information using a graphical user interface associated with the user information circuit 106 .
- the user 102 may have to provide authorization to the security circuit 136 in order to approve a piece of user information with high security. For example, if the user 102 is approving the social security number associated with the user 102 , the user may have to provide authorization to the security circuit 136 . For example, the user 102 may have to provide a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. to the security circuit before the outgoing user information 210 is authorized to be sent to the entity computing system 110 . In some embodiments, all user information requires authorization, while higher level security information requires secondary authorization from the security circuit 136 . Other methods of selecting and approving information for approval are intended to fall within the scope of the present disclosure.
- a password e.g., phrase, number, alphanumeric sequence, etc.
- a biometric e.g., fingerprint, retina, etc.
- the user information service computing system 122 may receive a potential transaction 206 from user 102 via the user information circuit 106 at 408 .
- the user information service computing system 122 may receive the potential transaction from the entity computing system 110 .
- the potential transaction 206 received from the entity computing system 110 by the user information service computing system 122 may contain information consistent with the information request 204 received at 402 .
- the entity computing system 110 is not requesting any user information, the entity computing system 110 is simply providing the user information service computing system 122 , and the user 102 , with an indication of what user information would be requested.
- the user information service computing system 122 receives selected user information from the user 102 via user input 208 from the user information circuit 106 at 410 . If the potential transaction 206 was received by the user information service computing system 122 from the user information circuit 106 , the transaction type database 134 may provide suggestions to the user 102 of what user information may be involved in the potential transaction 206 . The user 102 can select relevant user information from the user information stored and managed by the user information database 132 , or add additional user information relevant to the potential transaction. Alternatively, if the potential transaction was sent by the entity computing system 110 , the user 102 may approve the user information, much like was done at 406 . The selected user information may be stored in the user information database 132 so the user information is accessible when the user 102 is ready to complete a transaction.
- the user information service computing system 122 receives an entity selection at 412 from user input 208 from the user information circuit 106 . Since the potential transaction 206 may have been initiated by the user 102 at 408 , the entity 108 involved in the actual transaction may not be the entity 108 associated with the potential transaction 206 . If the potential transaction was initiated by the entity computing system 110 , the entity 108 may be saved in the user information database 132 with the user information for the potential transaction 206 . The user 102 may choose if the entity 108 that initiated the transaction should be saved with the potential transaction 206 by proving user input 208 via the user information circuit 106 .
- the user 102 can select entity 108 using the user information circuit 106 . If no entity was saved with the potential transaction, the user 102 may select an entity to complete the potential transaction by providing user input 208 via the user information circuit 106 .
- the user 102 may select an entity by providing the user information service computing system 122 with information about the entity (e.g., name, address, phone number, etc.) via the user information circuit 106 .
- the user 102 may select an entity by using a drop down list of entities 108 associated with the user information service computing system 122 on a graphical user interface associated with the user information circuit 106 .
- the user 102 may enter an entity identification number associated with the entity 108 and the user information service computing system 122 via the graphical user interface associated with the user information circuit 106 .
- the user 102 may receive the entity identification number from the entity 108 , or from a list provided to the user 102 via the user information circuit 106 from the user information service computing system 122 .
- the user 102 may use the user computing device 104 to scan a barcode, QR code, or other symbol at the entity 108 to indicate the entity 108 selected to the user information service computing system 122 .
- a more detailed method with regard to potential transactions can be seen with reference to FIG. 6 .
- the user information service computing system 122 provides the approved outgoing user information 210 to the entity computing system 110 of the selected entity 108 at 414 .
- the outgoing user information 210 may be provided to the entity computing system 110 in a number of ways.
- the user information service computing system 122 may provide the outgoing user information 210 in an email to the entity computing system 110 (e.g., in a PDF document, etc.).
- the user information service computing system 122 may populate a form associated with the entity computing system 110 to provide outgoing user information 210 .
- the user information service computing system 122 populates a database associated with the entity computing system 110 (e.g., user information database 118 ) to provide outgoing user information 210 .
- the entity 108 may determine how user information is sent based on setting associated with an entity account with the user information service 120 .
- the user information service computing system 122 determines how the outgoing user information 210 is sent to entity computing system 110 .
- the outgoing user information 210 is sent to the entity computing system 110 in different forms based on the level of security of the outgoing user information 210 determined by the security circuit 136 .
- the user information service computing system 122 updates the outgoing user information 210 for the transaction type at 416 .
- the user information service computing system 122 may update the transaction type database 134 .
- the transaction type database 134 may maintain all outgoing user information 210 requested for a plurality of transaction types.
- the transaction type database 134 may keep a single set of user information requested 210 for a given transaction type.
- the transaction type database 134 keeps all user information requested for a given transaction type for all users associated with the user information service computing system 122 .
- the transaction type database 134 may be adaptive and learn what user information is commonly requested for a given transaction type. This information may be used when determining if the information request 204 includes information not commonly requested, which will be described in greater detail with regard to FIG. 5 .
- FIG. 5 a flow diagram of a method 500 of comparing a user information request from an entity is shown, according to an example embodiment.
- the method 500 is performed by the user information service computing system 122 .
- the method 500 receives an information request 204 from entity computing system 110 at 502 , which may be substantially similar to process 402 of method 400 , compares the information request 204 to user information requests for the same transaction type and provides the entity computing system 110 with the outgoing user information 210 .
- the user information service computing system 122 compares the information request 204 to user information requests of similar transaction types at 504 .
- the information stored in the transaction type database 134 may also include the geographical location of the information request 204 , in case different geographical locations (e.g., different states, etc.) have different protocols for user information requested for certain transactions. Additionally, the transaction type database 134 may determine trends in the user information requested based on the dates of the information requests 204 .
- the user information service computing system 122 may compare the information request 204 received at 502 to individual user information requests stored in the transaction type database 134 . Alternatively, the user information service computing system 122 may compare the information request 204 received at 502 to an information request 204 that is representative of all of the information requests 204 stored in the transaction type database 134 .
- the user information service computing system 122 determines if the information request 204 received at 502 is similar to other user information requests for similar transaction types at 506 .
- the comparison may take into account the frequency of the user information requested. For example, if some type user information is always requested for the transaction type, and some type information is usually requested, these may both indicate a similar request and not cause the security circuit 136 to flag the information request 204 . However, if a particular type of user information is rarely or never requested for the transaction type, but appears in the information request 204 received at 502 , the information request 204 may not be considered similar.
- approval request 212 and a corresponding alert 216 is sent to the user information circuit 106 at 508 .
- Process 508 may be substantially similar to process 404 of method 400 . If there are user information types that are not similar to the user information types frequently requested for the transaction type, processes 510 - 512 occurs.
- the user information service computing system 122 flags non-similar user information types in the information request 204 at 510 .
- the user information service computing system 122 may use the security circuit 136 to determine how to flag the user information that was determined inconsistent with frequently requested user information when compared with other user information requests for similar entity types using the transaction type database 134 .
- the security circuit 136 may have different levels of comparison that would cause user information to be flagged. For example, if a piece of information is sometimes requested, a first flag may be applied (e.g., a yellow flag, etc.). If a piece of information is rarely requested, a second flag may be applied (e.g., an orange flag, etc.).
- a third flag may be applied (e.g., a red flag, etc.).
- the information may be flagged based on a level of security associated with the user information. For example, the name of user 102 may have a low security level and therefore have one flag associated with the name, while the social security number of the user 102 may have a high security level and therefore have a different flag associated with the social security number.
- the user information requested that is inconsistent with the user information commonly requested may be flagged with a first, second, third, etc. flag based on the level of security of the user information.
- a piece of user information may receive multiple sets of flags based on different criteria (e.g., frequency of request and level of security, etc.).
- the user information service computing system 122 sends a flagged request 214 and a corresponding alert 216 to the user 102 via the user information circuit 106 at 512 .
- the flagged request 214 indicates any information that was flagged by the security circuit 136 at 510 .
- the flagged request 214 may also include information consistent with the approval request 212 of process 404 of method 400 , such as transaction information 220 and information indicating the entity 108 that sent the information request 204 , in addition to the flagged user information.
- the user information service computing system 122 receives the user response to the request at 514 via user input 208 from the user information circuit 106 regardless of whether or not the information request 204 received at 502 was similar to information requests of similar transaction types.
- the user information service computing system 122 sends the approved outgoing user information 210 to the entity computing system 110 at 516 .
- Process 514 - 516 may be substantially similar to processes 406 and 414 of method 400 , respectively.
- FIG. 6 a flow diagram of a method 600 of preparing user information for a predicted transaction 218 is shown according to an example embodiment.
- the method 600 is performed by user information service computing system 122 .
- the method 600 predicts a transaction based on activity of the user 102 and provides recommendation to the user 102 based on the predicted transaction 218 .
- the user information service computing system 122 predicts a transaction of the user 102 at 602 .
- the user information service computing system 122 may monitor other software applications on the user computing device 104 and/or monitor website activity on the user computing device 104 to predict a potential transaction of the user 102 .
- the prediction circuit 138 may be set with different transactions that could be completed and information that may be indicative of future transactions based on activity on the user computing device 104 . For example, if the user 102 is looking up homes or properties, the prediction circuit 138 may predict the user 102 will be purchasing a home.
- the prediction circuit 138 of the user information service computing system 122 may be set to only predict a transaction after a given set of activity is monitored. For example, the user 102 may have to look at home and property listings multiple times in a given period of time before the prediction circuit 138 predicts the transaction to minimize the number of predicted transactions 218 generated.
- the user information service computing system 122 sends the predicted transaction and a corresponding alert 216 to the user 102 via the user information circuit 106 at 604 .
- the user information service computing system 122 may send the predicted transaction to the user information circuit 106 as an alert 216 .
- the alert 216 may include the predicted transaction 218 as well as information indicating how the user information service computing system 122 predicted the transaction. For example, the alert may say “We noticed you have been viewing houses for sale frequently, are you planning on purchasing a home?”
- the user 102 may respond to the alert via user input 208 to the user information circuit 106 .
- the user information service computing system 122 determines if the user 102 confirmed the predicted transaction 218 or not at 606 . If the user 102 indicates that the predicted transaction 218 is not a transaction the user 102 is planning on completing, the user information service computing system 122 may delete the predicted transaction 218 at 608 .
- the prediction circuit 138 may also make note of the fact that the user 102 is not planning on making the predicted transaction 218 so as to minimize the chance of sending the user 102 another alert 216 relating to a predicted transaction 218 that is the same as a previously predicted transaction. If the user 102 confirms via user input 108 to the user information circuit 106 that the predicted transaction 218 is a transaction the user 102 plans on completing in the future, processes 610 - 614 may occur.
- the user information service computing system 122 analyzes the user information at 610 . Analyzing the user information may include determining the user information that is likely to be needed for a given transaction type by the transaction type database 134 .
- the transaction type database 134 may determine different levels of user information. For example, the transaction type database 134 may determine user information that will most likely be needed for the identified transaction type. The transaction type database 134 may also determine user information that may be needed, depending on the entity 108 that the user 102 will be using to complete the transaction.
- the transaction type database 134 may use methods similar to those used when comparing the user information request to similar user information requests as described with respect to FIG. 5 , specifically process 504 of the method 500 .
- Analyzing the user information may also include comparing the user information needed for the transaction with the user information stored at the user information database 132 .
- the user information service computing system 122 may compare the user information determined at 610 to the user information database 132 to determine if the user information database 132 has all the user information needed for the predicted transaction 218 .
- Analyzing the user information may also include analyzing the content of the user information (e.g., financial information, etc.). Analyzing the content of the user information may provide the user information service computing system 122 with information regarding the likelihood of a successful transaction. For example, if the predicted transaction 218 is buying a car, but the user 102 does not have enough money saved for a down payment, analyzing the user information may indicate that the user 102 should be saving more money.
- the user information service computing system 122 sends a predicted transaction recommendation and a corresponding alert 216 to the user 102 via the user information circuit 106 at 612 .
- the predicted transaction recommendation is a recommendation to the user 102 based on the analysis of the user information at 610 .
- the predicted transaction recommendation may include information relating to user information that is needed for the predicted transaction that the user 102 currently does not have associated with the user information service computing system 122 .
- the predicted transaction recommendation may provide the user 102 with information regarding improvements that could be made to the user information to increase the likelihood of a successful transaction.
- the user information service computing system 122 may provide the user 102 with the alert 216 via the user information circuit 106 indicating the predicted transaction recommendation.
- Alert 216 may also be provided to the user 102 via the user information circuit 106 by the user information database 132 to remind the user 102 to provide the user information service computing system 122 with user information that will be needed for the potential transaction if the user 102 has not provided the user information needed in a set amount of time.
- the predicted transaction recommendation may also include recommendations for changes in the activity of the user 102 in order to have a successful transaction when the user 102 is ready to complete the predicted transaction 218 . For example, if the predicted transaction is buying a car, the predicted transaction recommendation may include financial recommendations to increase the likelihood that the user 102 will be able to make car payments, information on the credit score of the user 102 and how to improve the credit score to get better car loans, etc.
- the user information service computing system 122 sets the predicted transaction as a potential transaction at 614 . Since the user 102 has confirmed the predicted transaction is a transaction the user 102 is thinking about completing, the user information service computing system 122 , it is no longer a predicted transaction.
- FIG. 7 a flow diagram of a method 700 of determining if the user 102 has the user information ready for a potential transaction 206 is shown, according to an example embodiment.
- the method 700 is performed by the user information service computing system 122 .
- the method 700 receives a potential transaction 206 , determines if the user 102 has the user information that will likely be need for the potential transaction 206 , and provides the entity computing system 110 with the approved outgoing user information 210 .
- the potential transaction 206 is received as a product of method 600 .
- Process 702 may be substantially similar to process 408 of method 400 .
- the user information service computing system 122 determines the user information needed for the transaction at 704 , much like process 610 of method 600 when the transaction type database 134 analyzes the transaction type to determine the type of user information that will likely be needed for the potential transaction 206 . However, unlike process 610 of method 600 , the content of the user information is not analyzed to provide recommendations on changes in behavior.
- the user information service computing system 122 determines if the user 102 has the user information determined at 704 for the potential transaction 206 received at 702 at 706 .
- the transaction type database 134 may compare the user information determined at 704 to information in the user information database 132 to determine if the user information database 132 has the user information that will likely be needed for the potential transaction 206 . If the user information that will likely be needed is in the user information database 132 , the method 700 may proceed directly to process 712 . If user information is needed and is not in the user information database 132 , processes 708 - 710 occur.
- the user information service computing system 122 alerts the user 102 of the missing user information at 708 .
- the user information service computing system 122 may provide the user 102 with the alert 216 much like process 612 .
- the alert 216 is received by the user 102 via the user information circuit 106 and indicates user information that was determined to be missing at 706 .
- the user information service computing system 122 receives incoming user information 202 at 710 .
- the incoming user information 202 is received from the user 102 via the user information circuit 106 in response to the alert 216 notifying the user 102 of user information that is missing.
- Process 710 may be substantially similar to process 304 and 308 of method 300 .
- the user information service computing system 122 receives the user 102 entity selection at 712 .
- the user 102 entity selection is sent from the user information circuit 106 and indicates which entity 108 the user 102 has selected to complete the potential transaction 206 .
- Process 712 may be substantially similar to process 412 of method 400 .
- the user information service computing system 122 provides the approved outgoing user information 210 to the entity computing system 110 at 714 .
- the entity computing system 110 that receives the approved outgoing user information 210 is the entity computing system 110 associated with the entity selected at 712 .
- Process 714 may be substantially similar to process 414 of method 400 .
- the user information service By using the user information service to store and manage user information, individuals gain ease of access to user information. In addition, with all the user information stored in a single location, information is protected, accessible and easy to distribute. Oftentimes, when individuals are asked for user information, the individual must get the information from a variety of places. The individual may have some information stored at home in a safe, while other information is stored electronically. The individual may also have to reach out to other entities to get the information needed. This can be cumbersome for the individual, and cause delays in transactions the user would like to complete. In addition, once the individual obtains all the information, it has to be shared with the entity the individual is completing the transaction with. This process can be tedious and the individual may makes mistakes when providing large amount of information. By using the user information service, individuals can easily provide all the needed information to an entity to quickly, and accurately, complete a transaction.
- circuit may include hardware structured to execute the functions described herein.
- each respective “circuit” may include machine-readable media for configuring the hardware to execute the functions described herein.
- the circuit may be embodied as one or more circuitry components including, but not limited to, processing circuitry, network interfaces, peripheral devices, input devices, output devices, sensors, etc.
- a circuit may take the form of one or more analog circuits, electronic circuits (e.g., integrated circuits (IC), discrete circuits, system on a chip (SOCs) circuits, etc.), telecommunication circuits, hybrid circuits, and any other type of “circuit.”
- the “circuit” may include any type of component for accomplishing or facilitating achievement of the operations described herein.
- a circuit as described herein may include one or more transistors, logic gates (e.g., NAND, AND, NOR, OR, XOR, NOT, XNOR, etc.), resistors, multiplexers, registers, capacitors, inductors, diodes, wiring, and so on).
- the “circuit” may also include one or more processors communicatively coupled to one or more memory or memory devices.
- the one or more processors may execute instructions stored in the memory or may execute instructions otherwise accessible to the one or more processors.
- the one or more processors may be embodied in various ways.
- the one or more processors may be constructed in a manner sufficient to perform at least the operations described herein.
- the one or more processors may be shared by multiple circuits (e.g., circuit A and circuit B may comprise or otherwise share the same processor which, in some example embodiments, may execute instructions stored, or otherwise accessed, via different areas of memory).
- the one or more processors may be structured to perform or otherwise execute certain operations independent of one or more co-processors.
- two or more processors may be coupled via a bus to enable independent, parallel, pipelined, or multi-threaded instruction execution.
- Each processor may be implemented as one or more general-purpose processors, application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), digital signal processors (DSPs), or other suitable electronic data processing components structured to execute instructions provided by memory.
- the one or more processors may take the form of a single core processor, multi-core processor (e.g., a dual core processor, triple core processor, quad core processor, etc.), microprocessor, etc.
- the one or more processors may be external to the apparatus, for example the one or more processors may be a remote processor (e.g., a cloud based processor). Alternatively or additionally, the one or more processors may be internal and/or local to the apparatus. In this regard, a given circuit or components thereof may be disposed locally (e.g., as part of a local server, a local computing system, etc.) or remotely (e.g., as part of a remote server such as a cloud based server). To that end, a “circuit” as described herein may include components that are distributed across one or more locations.
- An exemplary system for implementing the overall system or portions of the embodiments might include a general purpose computing computers in the form of computers, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit.
- Each memory device may include non-transient volatile storage media, non-volatile storage media, non-transitory storage media (e.g., one or more volatile and/or non-volatile memories), etc.
- the non-volatile media may take the form of ROM, flash memory (e.g., flash memory such as NAND, 3D NAND, NOR, 3D NOR, etc.), EEPROM, MRAM, magnetic storage, hard discs, optical discs, etc.
- the volatile storage media may take the form of RAM, TRAM, ZRAM, etc. Combinations of the above are also included within the scope of machine-readable media.
- machine-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.
- Each respective memory device may be operable to maintain or otherwise store information relating to the operations performed by one or more associated circuits, including processor instructions and related data (e.g., database components, object code components, script components, etc.), in accordance with the example embodiments described herein.
- input devices may include any type of input device including, but not limited to, a keyboard, a keypad, a mouse, joystick or other input devices performing a similar function.
- output device may include any type of output device including, but not limited to, a computer monitor, printer, facsimile machine, or other output devices performing a similar function.
Abstract
Systems and methods relating to alerting users as to user information to be exchanged during transactions. A user information system (UIS) information circuit and an associated user information database populates an account with user information received from at least one of the user and a plurality of entities. A user information request relating to a transaction is received from an entity computing system associated with an entity over a network via a network interface circuit. A security circuit sends an alert comprising an approval request containing an identification of user information requested in the user information request to a user computing device associated with the user over the network. The security circuit receives an approval of the approval request from the user computing device, and the UIS information circuit provides the approved information to the entity to complete the transaction.
Description
- This application is a continuation of U.S. patent application Ser. No. 17/079,095, entitled “USER INFORMATION GATHERING AND DISTRIBUTION SYSTEM,” filed Oct. 23, 2020, which is a continuation of U.S. patent application Ser. No. 15/385,035, entitled “USER INFORMATION GATHERING AND DISTRIBUTION SYSTEM,” filed Dec. 20, 2016, issued as U.S. Pat. No. 10,817,593 on Oct. 27, 2020, which itself claims priority to U.S. Provisional Patent Application No. 62/272,422 entitled “USER INFORMATION GATHERING AND DISTRIBUTION SYSTEM,” filed Dec. 29, 2015, each of which are incorporated in their entireties and for all purposes.
- Individuals often have a plurality of information associated with the individual that is shared with a plurality of entities. The information may include basic information associated with the individual such as first name, last name, email address, phone number, birthday, home address and so on. The information may also include information confidential to the individual such as social security number, health information, credit information, insurance information and so on. Often, individuals store this information in a variety of places (e.g., financial institution, safe, government agency, etc.). Individuals may also be asked to provide pieces of this information to many different entities during a transaction. For example, when an individual is getting approved for a mortgage, buying a new car, or visiting the hospital, the individual may be asked to provide a variety of information. However, the individual may not know what information is needed, or the individual may not have the information needed readily available. If the individual does not know what information is needed for certain transactions, the individual may provide too much or too little information to the entity. Providing too much information to an entity may be dangerous for the individual as the information may be used fraudulently by the entity or be available to others whom may use the information fraudulently.
- One embodiment of the invention relates to a method of alerting a user of user information to be sent to an entity during a transaction, the method being performed by a user information service (UIS) computing system associated with an information service. The method includes populating, by a UIS information circuit and an associated user database, an account with user information received from at least one of the user and a plurality of entities. The method further includes receiving, by the UIS information circuit over a network via a network interface circuit, a user information request relating to a transaction from an entity computing system associated with the entity. The method includes sending, by a security circuit of the UIS information circuit, an alert including an approval request to a user computing device associated with the user over the network, wherein the approval request contains an identification of user information requested in the user information request. The method further includes receiving, by the security circuit, an approval of the approval request from the user computing device. The method includes providing, by the UIS information circuit and the user information database, the approved information to the entity to complete the transaction.
- Another embodiment relates to a non-transitory computer readable media having computer-executable instructions embodied therein that, when executed by a computing system associated with a second party to an agreement causes the second party computing system to perform operations for demonstrating consensus agreement. The operations include populating, by an associated user database, an account with user information received from at least one of the user and a plurality of entities. The operations further include receiving a user information request relating to a transaction from an entity computing system associated with the entity, sending an alert including an approval request to a user computing device associated with the user over the network, wherein the approval request contains an identification of user information requested in the user information request. The operations further include receiving an approval of the approval request from the user computing device and providing, by the user information database, the approved information to the entity to complete the transaction.
- Yet another embodiment of the invention relates to a user information service (UIS) computing device. The device includes a network interface circuit configured to communicate with a user computing device associated with a user and an entity computing system. The method further includes at least one processor operatively coupled to a non-transient memory to form a UIS information circuit. The circuit is structured to populate, in a user information database, an account with user information. The circuit is further structured to receive, via a network interface circuit, a user information request from an entity computing system over a network. The circuit is structured to send, via a security circuit, an alert including an approval request indicating the user information requested in the user information request to the user computing device over the network. The circuit is further structured to receive a response to the approval request from the user computing device. The circuit is structured to provide user information corresponding to the user information request and the response to the approval request to the entity computing system.
-
FIG. 1 is a diagram of a data exchanging system, according to an example embodiment. -
FIG. 2 is a diagram of information and data flows of the data exchanging system ofFIG. 1 , according to an example embodiment. -
FIG. 3 is a flow diagram of a method of populating user information for a user account, according to an example embodiment. -
FIG. 4 is a flow diagram of a method of providing user information to an entity, according to an example embodiment. -
FIG. 5 is a flow diagram of a method of comparing a user information request from an entity, according to an example embodiment. -
FIG. 6 is a flow diagram of a method of preparing user information for a predicted transaction, according to an example embodiment. -
FIG. 7 is a flow diagram of a method of determining if a user has user information ready for a potential transaction, according to an example embodiment. - Referring to the figures generally, user information gathering and distribution systems and methods are described. The user information systems and methods are structured to receive a plurality of user information types (e.g., social security number, insurance information, etc.) associated with a user and to enable the user to manage and distribute the information in a secure, convenient, efficient, and time-saving manner. The user information system may be accessed with at least one user device (e.g., a mobile device, a smart watch, etc.). In some arrangements, the user information system is structured to receive an information request from an entity (e.g., bank, car dealer, etc.) based on a transaction type (e.g., mortgage approval, buying a car, etc.), compare the information request to information requests from similar entities for similar transactions, and to provide the user information to the entity. The user information functions allow the user to add, manage, and distribute the user information. The user information system also predicts and verifies the user information needed for a given transaction to protect the user from risks of giving too much or incorrect information to an entity.
- Referring now to
FIG. 1 , a diagram of adata exchange system 100 is shown according to an example embodiment. Thecomputing system 100 includes auser 102, a plurality ofentities 108, auser information service 120, and anetwork 140. Thenetwork 140 may include any of various types of data exchanging networks. For example, thenetwork 140 may include wireless networks (e.g., 802.11X, ZigBee′, Bluetooth, Internet, etc.), wired networks (e.g., Ethernet), or any combination thereof. Thenetwork 140 is structured to permit the exchange of data, values, instructions, messages, etc. between and among the user computing device 104, theentity computing system 110, and the user informationservice computing system 122. - The
user 102 may include individuals, business representatives, large and small business owners, other entities, and so on. Theuser 102 is associated with a user computing device 104. The user computing device 104 may be, but is not limited to, a mobile computing device (e.g., a smartphone, tablet computer, laptop computer, person digital assistant, etc.), a desktop computing device, a wearable computing device, etc. Wearable computing devices refer to any type of computing device that auser 102 wears including, but not limited to, a watch, glasses, bracelet, etc. - The user computing device 104 includes a user information circuit 106. The user information circuit 106 is structured to allow the
user 102 to communicate with theuser information service 120. For example, the user information circuit 106 may be structured to provide a user interface (e.g., a graphical user interface) that permits theuser 102 to provide information (e.g., user information) that is communicated to a user informationservice computing system 122 associated with theuser information service 120. In this regard, the user information circuit 106 may be communicably coupled to a processor, non-transient memory, and network interface enabling the user computing device 104 to exchange data over thenetwork 140. - In addition, the user information circuit 106 communicates data to and from the user information
service computing system 122 vianetwork 140. In some arrangements, theuser 102 may download a user information application (e.g., a software “app”) prior to use, which may be used to set up and configure the user information circuit 106. In another arrangement, the user information circuit 106 is hard coded into the memory of the user computing device 104. In further arrangements, the user information circuit 106 is a web-based interface application accessed via the Internet on a web browser executed on the user computing device 104. In such arrangements, the user information circuit 106 is executed and maintained remotely (e.g., on the user information service computing system 110). In this instance, theuser 102 logs onto or accesses the web-based interface to access the user information circuit 106. In some arrangements, the user information circuit 106 is supported by a separate computing system comprising one or more servers, processors, network interface circuits, etc. that transmit the applications for use to the user computing device 104. In certain embodiments, the user information circuit 106 may include an application programming interface (API) and/or a software development kit (SDK) that facilitates the integration of other applications with the user information circuit 106. - Each of the
entities 108 provide services to a plurality of users, including theuser 102. Examples of theentities 108 include financial institutions, merchants, insurance companies, utility companies, social media networks, e-mail systems, health care providers, etc. Each of the plurality ofentities 108 operates and/or is associated with a respectiveentity computing system 110. Eachentity computing system 110 includes aprocessor 112,memory 114, anetwork interface circuit 116 and auser information database 118. Thenetwork interface circuit 116 facilitates the sending and receiving of data, commands, instructions, values, etc. over the network 140 (e.g., to and from the user informationservice computing system 120, etc.). Eachentity computing system 110 is communicably coupled to the user informationservice computing system 122 and/or the user computing device 104 via thenetwork 140. - The
entity computing system 110 also includes auser information database 118 that stores user information relating to theuser 102. Theentity computing system 110 may maintain information about one or more of theentities 108, information regarding user 102 (e.g., accounts associated with theuser 102 and a respective one of theentities 108, etc.) and so on in theuser information database 118. In this regard and as mentioned above, more than oneentity 108 with an associatedentity computing system 110 may be communicably coupled to the components ofFIG. 1 over thenetwork 140 to accommodate user information associated theuser 102 at a plurality ofentities 108. For example, if theentity 108 is a financial institution, the user information database may store user account information including account numbers, balances, credit limits, and so on. - In some arrangements, the
user information service 120 is affiliated with a given entity 108 (e.g., a financial institution). In other arrangements, theuser information service 120 is not directly affiliated with a givenentity 108. Theuser information service 120 includes a user informationservice computing system 122. The user informationservice computing system 120 includes aprocessor 124,memory 126, anetwork interface circuit 128, and a user information service (“UIS”)information circuit 130. Thenetwork interface circuit 128 facilitates the sending and receiving of data, commands, instructions, values, etc. over the network 140 (e.g., to and from the user computing device 104, to and from theentity computing system 110, etc.). The user informationservice computing system 122 is structured to provide storage of user information associated with theuser 102 and distribution of user information associated with theuser 102 to one or more of theentities 108. - The
UIS information circuit 130 of the user informationservice computing system 122 provides storage and distribution of user information to theuser 102 via the user information circuit 106. The operation of the user informationservice computing system 122 and theUIS information circuit 130 are described in further detail with respect toFIGS. 2 through 7 . - Now referring to
FIG. 2 , a diagram of information and data flows to and from the user informationservice computing system 122 ofFIG. 1 is shown in greater detail, according to an example embodiment. TheUIS information circuit 130 at the user informationservice computing system 122 communicates data to and from the user information circuit 106 and theentity computing system 110 via thenetwork 140, and includes auser information database 132, atransaction type database 134, asecurity circuit 136, and aprediction circuit 138. Theuser information database 132 includes storage media or access thereto structured to retrievably store user information flowing into theUIS computing system 122. Thetransaction type database 134 retrievably stores information relating to a plurality of different transaction types, including types of user information relevant to each of the plurality of different transaction types. In some arrangements, the information in theuser information database 132 is shared with thetransaction type database 134. Thesecurity circuit 136 is structured to maintain and apply various security protocols relating to information stored in theuser information database 132, as well as information requested from theuser 102. Theprediction circuit 138 is structured to predict future transactions based on information flowing to the UIS computing system 122 (e.g., information from the user information circuit 106) and information stored at theuser information database 132 and thetransaction type database 134. Various example operations of the UIS information circuit are discussed in more detail below. - The user information
service computing system 122 receives a plurality of inputs, including, but not limited to,incoming user information 202,information request 204,potential transaction 206,user input 208 from at least the user information circuit 106 and theentity computing system 110. -
Incoming user information 202 may be any type of information relating to theuser 102. For example, theincoming user information 202 may be personal information (e.g., social security number, birthday, home address, name, etc.), financial information (e.g., credit score, bank account balances, etc.), health information (e.g., allergies, vaccinations, family medical history, etc.) and so on. Theincoming user information 202 may be received by the user informationservice computing system 122 from the user computing device 104. Alternatively, theincoming user information 202 may be received from theentity computing system 110. For example, the userinformation computing system 122 may receive health care information (incoming user information 202) associated with theuser 102 from a computing system associated with a health care provider. -
Information request 204 may be a request from theentity computing system 110 for user information associated with theuser 102 sent to the user informationservice computing system 122. Theinformation request 204 may include a list of specific user information that is being requested. Theinformation request 204 may also include theentity 108 that is requesting the user information. In addition, theinformation request 204 may indicate a type of transaction for which theentity computing system 110 is requesting the user information. -
Potential transaction 206 is a transaction, indicated by theuser 102 via the user information circuit 106, that theuser 102 may complete in the future. For example, if theuser 102 is planning on purchasing a car, but not for a few months theuser 102 may send the user information service computing system 122 apotential transaction 206. In this case, theuser 102 may want to plan ahead to gather additional user information that may be needed for thepotential transaction 206. Thepotential transaction 206 is received by the user informationservice computing system 122 from the user information circuit 106. -
User input 208 refers to input received from theuser 102 at the user information circuit 106. Theuser input 208 may include user responses toapproval request 212, flaggedrequest 214, alert 216, and/or predictedtransaction 218, discussed below. In some arrangements,user input 208 also includes setting and preferences associated with a user account for theuser 102 with theuser information service 120. - The
UIS information circuit 130 at the user informationservice computing system 122 is also structured to provide information, requests, and alerts 216 to theentity computing system 110 and the user information circuit 106. An alert 216 is a notification to be received at the user computing device 104, and may specify a type of pending request, an requested response from theuser 102, a notification, and so on. The user information circuit 106 may receive the alert 216 over thenetwork 140 and use any of a variety of output devices at the user computing device 104 to bring the alert 216 to the attention of theuser 102. The alert 216 may be associated with any of the outgoing types of data from the UIS computing system 122 (e.g., anapproval request 212, a flaggedrequest 214, a predictedtransaction 218, etc.). The alert 216 may be sent via email, text message, push notification, etc. Theuser 102 may set up and configurealerts 216 and alert preferences when setting up the user account. - The user information
service computing system 122 may provideoutgoing user information 210 to one or more of the plurality ofentities 108.Outgoing user information 210 may be substantially similar toincoming user information 202 in thatoutgoing user information 210 may include any of various types of information relating to a given user. However,outgoing user information 210 is a set of user information that will be provided to theentity computing system 110. For example, in one arrangement, while the user information collectively received by the user informationservice computing system 122 includes all the user information types described above, theoutgoing user information 210 sent to theentity computing system 110 may only include name, address, and credit score. - The
security circuit 136 may provide anapproval request 212 and acorresponding alert 216 to the user information circuit 106 to notify theuser 102 of information relating to aninformation request 204 received from one or more of the plurality ofentities 108. As another example, thesecurity circuit 136 may provide the user information circuit 106 with all the user information that was requested in theinformation request 204, as well as information relating to the type of transaction for which the user information is being requested, and theentity 108 that is requesting the user information in theapproval request 212. Thesecurity circuit 136 may receive, from theuser 102 via the user information circuit 106,user input 208 indicating an approval of the user information ofapproval request 212. - A flagged
request 214 and acorresponding alert 216 may be provided to the user information circuit 106 by thesecurity circuit 136 to notify theuser 102 of information relating to aninformation request 204 received from one or more of the plurality ofentities 108 when a piece of user information requested is unusual (e.g., medical information requested when getting a car loan). - The
prediction circuit 138 is structured to predict a potential future transaction theuser 102 may be making based on activity by theuser 102 on the user computing device 104. When theprediction circuit 138 identifies a potential future transaction, the prediction circuit may provide a predictedtransaction 218 and acorresponding alert 216 to the user information circuit 106, which in turn may provide the predictedtransaction 218 to theUIS information circuit 130. - The
UIS information circuit 130 may providetransaction information 220 to the user information circuit 106 from thetransaction type database 134 to inform theuser 102 about a transaction that is presently occurring or is actually set to occur. - In operation, the
incoming user information 202 may be transmitted to the user informationservice computing system 122 via the user information circuit 106 of the user computing device 104. The first time theuser 102 sendsincoming user information 202 to the user informationservice computing system 122, theUIS information circuit 130 may treat theincoming user information 202 as a request to create an account with theuser information service 120. The user account containsincoming user information 202 received from theuser 102, and all of theincoming user information 202 may be stored inuser information database 132. Theuser information database 132 is configured to store and manageincoming user information 202 associated withuser 102 at the user informationservice computing system 122. TheUIS information circuit 130 may also receiveincoming user information 202 from one ormore entities 108 associated with user 102 (e.g., social media, health care provider, etc.). In addition to storing and managingincoming user information 202, theuser information database 132 maintains user account settings and preferences. - In operation, the
information request 204 is transmitted to the userinformation computing system 122 from theentity computing system 110. Theinformation request 204 may specify theentity 108 requesting the user information, the type of transaction occurring, and the user information being requested. As used herein, the term “transaction” may refer to financial and non-financial transactions. An example of a non-financial transaction may be providingoutgoing user information 210 to an entity. Accordingly, the term “transaction” may refer to any operation or interaction executed by theuser 102 with an entity 108 (e.g., visiting the doctor, making a flight reservation using frequent flier miles, financial transactions, buying a car, getting approved for a loan, etc.). - The
UIS information circuit 130 may compare theinformation request 204 to other requests of similar transaction types using thetransaction type database 134. Information relating to different types of transactions and user information commonly requested for these types of transactions is stored intransaction type database 134. Thetransaction type database 134 may be constantly updating theoutgoing user information 210 requested for certain transactions. In this regard, thetransaction type database 134 may be dynamic and adaptive to learn what user information is commonly requested for a transaction. Thetransaction type database 134 may be updated manually by personnel (e.g., employees, etc.) associated with theuser information service 120, or may use prior transactions of all users with accounts at theuser information service 120, includinguser 102. - The
security circuit 136 is structured to determine if information requested by the entity is consistent with information normally requested by a similar entity for a similar transaction type. Thesecurity circuit 136 may also be structured to flag inconsistent information and send the user 102 a flaggedrequest 214 and acorresponding alert 216. When theUIS information circuit 130 compares theinformation request 204 to similar information requests of the same or similar type that are maintained in thetransaction type database 134, user information that is requested ininformation request 204 that is not consistent with information requests of the same or similar type may be flagged by thesecurity circuit 136. Thesecurity circuit 136 may have different levels or criteria for flagging requested user information. The flagging levels may be preset or determined by theuser 102 when the user account is created. The flagging levels may also be based on more than one type of criteria (e.g., frequency of request, level of security of information, etc.). Thesecurity circuit 136 is also structured to determine the level of security for each piece of information theuser 102 provides, and maintain security protocol for sharing information with a certain security level. For example, thesecurity circuit 136 may require theuser 102 to provide a password before theUIS information circuit 130 can share the social security number of theuser 102 with one of theentities 108. - The
UIS information circuit 130 may provide theuser 102 with an alert 216 via the user information circuit 106 when certain user information is requested. TheUIS information circuit 130 may provide theuser 102 withalert 216 via the user information circuit 106 when user information is requested that theuser 102 does not have linked or stored in theuser information database 132.Alert 216 may also be provided to theuser 102 via the user information circuit 106 to remind theuser 102 to provide the user informationservice computing system 122 with user information that will be needed for a future transaction theuser 102 has indicated (e.g., potential transaction 206). - The
UIS information circuit 130 may receive apotential transaction 206 generated and transmitted from the user information circuit 106. Theuser 102 may be planning on completing a transaction (e.g., getting a loan, qualifying for a mortgage, buying a car, etc.) and use the user information circuit 106 to transmit a correspondingpotential transaction 206 to the user informationservice computing system 122. TheUIS information circuit 130 may search thetransaction type database 134 to determine the user information that may be needed to complete thepotential transaction 206. In view of the information returned from thetransaction type database 134, theuser 102 may have time to gather additional user information that is needed and check to see if the user information is accurate before completing a transaction with any one ormore entity 108. Alternatively, theUIS information circuit 130 may receive thepotential transaction 206 fromentity computing system 110. Theuser 102 may visit one or more of theentities 108 looking for information regarding a transaction. In this regard, theentity computing system 110 may send apotential transaction 206 to the user informationservice computing system 122 indicating thatuser 102 may complete a transaction withentity 108. Theentity computing system 110 may also indicate what user information would be needed to complete the transaction. Again, theuser 102 would have time to gather additional user information that may be needed and check to see if the user information is accurate before completing a transaction withentity 108. - The
UIS information circuit 130 may cooperate with theprediction circuit 138 to provide predictedtransactions 218 to theuser 102. A predictedtransaction 218 is information relating to an anticipated transaction based on the past behavior of theuser 102. The user informationservice computing system 122 may monitor other applications on the user computing device 104 and/or monitor website activity on the user computing device 104 to predict apotential transaction 218 of theuser 102. Theprediction circuit 138 may be set with different transactions that could be completed and information that may be indicative of the transaction. For example, if theuser 102 is looking up homes or properties, theprediction circuit 138 may predict theuser 102 will be purchasing a home. TheUIS information circuit 130 may notify (e.g., via alert 216) theuser 102 of the predictedtransaction 218 via the user information circuit 106. Theuser 102 may transmituser input 208 to the user informationservice computing system 122 indicating if the predictedtransaction 218 is accurate. TheUIS information circuit 130 may use thetransaction type database 134 to provide theuser 102 withoutgoing user information 210 corresponding to user information that would likely be needed for the predictedtransaction 218. - When the
user 102 is ready to complete a transaction (e.g., send outgoing user information 210) with one or more of theentities 108, theuser 102 may provideuser input 208 to the user informationservice computing system 122 via the user information circuit 106. Where theuser input 208 is an approval, the approval may include each piece of user information that is approved byuser 102 to be sent to theentity computing system 110. Thesecurity circuit 136 may require theuser 102 to provide authorization with theuser input 208 indicating an approval. In some embodiments, thesecurity circuit 136 may also require the entity 108 (e.g., an employee associated with entity 108) to provide authorization or authentication beforeoutgoing user information 210 is provided. For example, theentity 108 may have to provide thesecurity circuit 136 with a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. Alternatively, theuser input 208 may include a selection of one ormore entity 108 when theuser 102 has already approved all theoutgoing user information 210 to be sent to one or more entity 108 (e.g.,potential transaction 206, predictedtransaction 218, etc.). The user informationservice computing system 122 transmits the approvedoutgoing user information 210 toentity computing system 110. - Now referring to
FIG. 3 , a flow diagram of amethod 300 of populating user information for a user account with the user informationservice computing system 122 is shown, according to an example embodiment. Themethod 300 registers theuser 102 with theuser information service 120 and gathers user information associated with theuser 102. - A user account is created at 302. The user account created may be initiated by
user 102 transmittingincoming user information 202 to the user informationservice computing system 122 via the user information circuit 106. Theuser 102 may provide additional information that is optional for theuser 102 to include for registration. For example, theuser 102 may have the option to add a phone number, set preferences for the user account, and change the password associated with the user account. The user account may also include system preferences theuser 102 defines. The system preferences may include security preferences, usage preferences, alert preferences, and so on. The security preference may define the requirements needed by thesecurity circuit 136 before accessing the user informationservice computing system 122 via the user information circuit 106. For example, a security preference may require theuser 102 to provide a password (e.g., word, phrase, alphanumeric value, etc.), a biometric scan (e.g., a fingerprint scan, a retina scan, a voice sample, etc.), a semi-random number (e.g., as generated by a changing security token device), or a combination thereof to thesecurity circuit 136 before theuser 102 may access the user informationservice computing system 122. Thesecurity circuit 136 may also allow theuser 102 to define user information (e.g., social security number, etc.) that require a second passcode to authorize transmission toentity computing system 110. Alert preferences may include when alert 216 is sent to the user information circuit 106 (e.g.,information request 204 received, social security number requested, etc.), a form of alert 216 (e.g., text message, email, notification, etc.) and information included in alert 216 (e.g., user information requested, transaction type,entity 108 requesting the information, etc.). -
Incoming user information 202 is added to the user account by theUIS information circuit 130 at 304. Theuser 102 may manually enter the user information via input devices associated with the user computing device 104. In some arrangements, the user information circuit 106 provides a graphical user interface with labeled spaces for theuser 102 to enter specified information. For example, theuser 102 may fill in the home address ofuser 102 in a box labeled “Home Address.” Theuser 102 may also include information about one or more of theentities 108 that may provide additionalincoming user information 202. For example, theuser 102 may provide information regarding a health care provider or financial institution associated with theuser 102 to the user informationservice computing system 122 via the user information circuit. Alternatively, theuser 102 may link the user information circuit 106 to other applications used by theuser 102 that include user information (e.g., mobile banking application, social media application, etc.). - The user information
service computing system 122 may request user information from theentity computing system 110, at 306. For example, theUIS information circuit 130 may request healthcare information associated withuser 102 from the health care provider indicated by theuser 102 at 304. Additionally, the user informationservice computing system 122 may request user information from theuser 102 via the user information circuit 106. If theUIS information circuit 130 has a set of user information (e.g., name, email, phone number, address, etc.) that is required for all users, includinguser 102, theUIS information circuit 130 may send alert 216 to theuser 102 via the user information circuit 106 indicating that user information is missing and/or incomplete. - The
UIS information circuit 130 of the user informationservice computing system 122 receivesincoming user information 202 at 308. Theincoming user information 202 received at 308 may be the user information requested at 306, or additional information provided to theUIS information circuit 130 via the user information circuit 106 or theentity computing system 110. If the information requested is information that remains constant (e.g., social security number, birthday, etc.), or relatively constant (e.g., home address, last name, insurance information, healthcare information, etc.), theuser information database 132 may receive a copy of the user information. Alternatively, if the user information changes frequently (e.g., balance of financial accounts, credit score, etc.) theUIS information circuit 130 may receive access to the user information instead of receiving copy of the user information. Theincoming user information 202 received at 308 may be compared to the user information currently associated with the user account and/or otherincoming user information 202 being received by theuser information database 132. TheUIS information circuit 130 may send the alert 216 to theuser 102 via the user information circuit 106 when a discrepancy is determined between pieces of user information. For example, if the home address associated with theuser 102 received from oneentity 108 is listed as “Pin Oak” and the home addressed associated with theuser 102 at adifferent entity 108 is listed as “Pine Oak,” theuser 102 may senduser input 208 to the user informationservice computing system 122 indicating the information that is correct and should be stored in theuser information database 132. In some embodiments, the user informationservice computing system 122 may ask theuser 102 viaalert 216 to the user information circuit 106 to verify the user information received from the variousentity computing systems 110 even if no discrepancies are found for the piece of user information. - The
UIS information circuit 130 of the user informationservice computing system 122 stores, manages, and distributes the user information at 310. The user information that is constant or relatively constant may be stored by the userinformation computing system 122. However, the user information may still be modified byuser 102 via the user information circuit 106, but may require manual updating of the user information. User information that is relatively fluid, or changes frequently, may be managed by theuser information database 132. This information may be updated frequently asentities 108 associated with the user information (e.g., a financial institution associated with a financial account of user 102) update the user information. Additionally, some user information may be managed on a set cycle or by user input. For example, theuser 102 may indicate that theuser 102 visits the eye doctor once a year, generally in March. The user informationservice computing system 122 may only request updated user information relating to the eye doctor (e.g., vision prescription, etc.) at the end of March, or may periodically check for user information updates during the month of March. If theuser 102 instead visits the eye doctor in February, theuser 102 may indicate via the user information circuit 106, that the user information associated with the eye doctor has been updated. The user informationservice computing system 122 may request user information from a computing system (e.g., entity computing system 110) associated with the eye doctor (e.g., entity 108) based on theuser input 208 indication received from user information circuit 106. User information may then be selectively distributed toentity computing system 110 by the user informationservice computing system 122. Additional methods for managing and distributing user information are explained in further detail below with respect toFIGS. 4-7 . - Referring now to
FIG. 4 , a flow diagram of amethod 400 of providing user information to an entity using the user informationservice computing system 122 is shown, according to an example embodiment. Themethod 400 provides user information tocomputing system 122 based on a transaction occurring between theuser 102 and one or more of theentities 108. Themethod 400 may be initiated in two ways, by theuser 102, or by one or more of theentities 108. - The user information
service computing system 122 receives aninformation request 204 from theentity computing system 110 at 402. Theinformation request 204 may include a list of all the user information (e.g., name, address, credit score, financial institution, etc.) being requested for theuser 102 by theentity 108 for a transaction. Theinformation request 204 may also include the type of transaction that is taking place (e.g., mortgage approval, etc.) and/or information relating to theentity 108. Theentity 108 may have to register (e.g., create an entity account, etc.) with the user informationservice computing system 122 before theinformation request 204 can be received from theentity computing system 110. Alternatively, theentity 108 may not have to register with the user information service before the user informationservice computing system 122 can receive aninformation request 204 from theentity computing system 110. - The
entity computing system 110 may have to provide at least basic user information (e.g., first and last name, phone number, etc.) to the user informationservice computing system 122 to identify the account associated with theuser 102 at theuser information service 120. In some embodiments, thesecurity circuit 136 may require theentity computing system 110 to provide a form of authentication to ensure theentity computing system 110 is not trying to obtain user information for fraudulent purposes. For example, theentity 108 may have to register an entity account and provide a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. to thesecurity circuit 136 before the user informationservice computing system 122 responds to theinformation request 204. - The
entity 108 may have an entity number to associate theentity 108 with the user informationservice computing system 122. The entity number may be associated with auser information service 120 account held by the user informationservice computing system 122 for theentity 108. The entity account may contain information relating to transactions common for theentity 108 stored in thetransaction type database 134. For example, a car dealership may have car loan and car purchase transactions associated with the entity account stored in thetransaction type database 134. Thetransaction type database 134 may also contain information commonly requested for the transactions associated with theentity 108. The user informationservice computing system 122 can use this information to determine if theentity computing system 108 is requesting information consistent withinformation requests 204 made in the past. For example, if the car dealership has a defined set of user information that is requested from theuser 102 when theuser 102 is getting a car loan, but aninformation request 204 contains more information than normally requested, thesecurity circuit 136 may suspect fraudulent activity relating to theentity computing system 110. Inconsistent user information requests will be described in greater detail with respect toFIG. 5 . - The user information
service computing system 122 may send anapproval request 212 and acorresponding alert 216 to theuser 102 via thesecurity circuit 136 of the user information circuit 106 at 404. Theapproval request 212 may present the user information in a way that indicates the type of user information without revealing the user information. For example, theapproval request 212 may indicate that the home address ofuser 102 was requested, without actually providing the home address of theuser 102. Alternatively, theuser 102 may be notified by the user informationservice computing system 122 via the user information circuit 106 of theapproval request 212 and have to log in to the userinformation computing system 122 to see theapproval request 212. For example, theuser 102 may receive a notification saying “Someone has requested user information, please login to approve this request,” etc. The approval request may also include information identifying theentity 108 that sent theinformation request 204. By identifying theentity 108, theuser 102 can provide the correctoutgoing user information 210 to theentity 108. Theapproval request 212 may also include thetransaction information 220. For example, theapproval request 212 sent be the user informationservice computing system 122 may indicate that the user information is being requested to complete a car loan. By providing thetransaction information 202 to theuser 102 via the user information circuit 106, theuser 102 can verify theentity 108 requested the user information for the correct transaction. Theapproval request 212 may also indicate to theuser 102 if any user information was requested that is not associated with theuser information database 132. - The user information
service computing system 122 receives a response to the approval request from theuser 102 viauser input 208 from the user information circuit 106 at 406. The response to the approval request indicates which user information has been approved by theuser 102 to share with theentity 108 that sentinformation request 204. Theuser 102 may approve all, part or none of the user information in theuser input 208. If theuser 102 does not approve any of the user information sought in theuser information request 204, themethod 400 may terminate. - If the
user 102 approves part or all of the user information,outgoing user information 210 is provided to theentity computing system 110 of theentity 108 that sent theinformation request 204 at 414. If theuser 102 has multiple pieces of the same type of user information (e.g., multiple accounts, two home addresses, etc.) the response may indicate which user information is to be shared (e.g., checking account, one of the home addresses, etc.) with theentity computing system 110 for a given type of user information. Alternatively, theuser 102 may choose to approve all pieces of the same type of user information with theuser input 208. Theuser 102 may approve the user information by checking a box next to the user information using a graphical user interface associated with the user information circuit 106. Theuser 102 may have to provide authorization to thesecurity circuit 136 in order to approve a piece of user information with high security. For example, if theuser 102 is approving the social security number associated with theuser 102, the user may have to provide authorization to thesecurity circuit 136. For example, theuser 102 may have to provide a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. to the security circuit before theoutgoing user information 210 is authorized to be sent to theentity computing system 110. In some embodiments, all user information requires authorization, while higher level security information requires secondary authorization from thesecurity circuit 136. Other methods of selecting and approving information for approval are intended to fall within the scope of the present disclosure. - Instead of receiving an
information request 204 fromentity 108, the user informationservice computing system 122 may receive apotential transaction 206 fromuser 102 via the user information circuit 106 at 408. Alternatively, the user informationservice computing system 122 may receive the potential transaction from theentity computing system 110. Thepotential transaction 206 received from theentity computing system 110 by the user informationservice computing system 122 may contain information consistent with theinformation request 204 received at 402. However, in this case, theentity computing system 110 is not requesting any user information, theentity computing system 110 is simply providing the user informationservice computing system 122, and theuser 102, with an indication of what user information would be requested. - The user information
service computing system 122 receives selected user information from theuser 102 viauser input 208 from the user information circuit 106 at 410. If thepotential transaction 206 was received by the user informationservice computing system 122 from the user information circuit 106, thetransaction type database 134 may provide suggestions to theuser 102 of what user information may be involved in thepotential transaction 206. Theuser 102 can select relevant user information from the user information stored and managed by theuser information database 132, or add additional user information relevant to the potential transaction. Alternatively, if the potential transaction was sent by theentity computing system 110, theuser 102 may approve the user information, much like was done at 406. The selected user information may be stored in theuser information database 132 so the user information is accessible when theuser 102 is ready to complete a transaction. - When the
user 102 is ready to complete thepotential transaction 206, the user informationservice computing system 122 receives an entity selection at 412 fromuser input 208 from the user information circuit 106. Since thepotential transaction 206 may have been initiated by theuser 102 at 408, theentity 108 involved in the actual transaction may not be theentity 108 associated with thepotential transaction 206. If the potential transaction was initiated by theentity computing system 110, theentity 108 may be saved in theuser information database 132 with the user information for thepotential transaction 206. Theuser 102 may choose if theentity 108 that initiated the transaction should be saved with thepotential transaction 206 by provinguser input 208 via the user information circuit 106. If theentity 108 was saved with thepotential transaction 206, theuser 102 can selectentity 108 using the user information circuit 106. If no entity was saved with the potential transaction, theuser 102 may select an entity to complete the potential transaction by providinguser input 208 via the user information circuit 106. Theuser 102 may select an entity by providing the user informationservice computing system 122 with information about the entity (e.g., name, address, phone number, etc.) via the user information circuit 106. Alternatively, theuser 102 may select an entity by using a drop down list ofentities 108 associated with the user informationservice computing system 122 on a graphical user interface associated with the user information circuit 106. In another embodiment, theuser 102 may enter an entity identification number associated with theentity 108 and the user informationservice computing system 122 via the graphical user interface associated with the user information circuit 106. Theuser 102 may receive the entity identification number from theentity 108, or from a list provided to theuser 102 via the user information circuit 106 from the user informationservice computing system 122. Alternatively, theuser 102 may use the user computing device 104 to scan a barcode, QR code, or other symbol at theentity 108 to indicate theentity 108 selected to the user informationservice computing system 122. A more detailed method with regard to potential transactions can be seen with reference toFIG. 6 . - The user information
service computing system 122 provides the approvedoutgoing user information 210 to theentity computing system 110 of the selectedentity 108 at 414. Theoutgoing user information 210 may be provided to theentity computing system 110 in a number of ways. The user informationservice computing system 122 may provide theoutgoing user information 210 in an email to the entity computing system 110 (e.g., in a PDF document, etc.). Alternatively, the user informationservice computing system 122 may populate a form associated with theentity computing system 110 to provideoutgoing user information 210. In another embodiment, the user informationservice computing system 122 populates a database associated with the entity computing system 110 (e.g., user information database 118) to provideoutgoing user information 210. In some embodiments, theentity 108 may determine how user information is sent based on setting associated with an entity account with theuser information service 120. In other embodiments, the user informationservice computing system 122 determines how theoutgoing user information 210 is sent toentity computing system 110. In another embodiment, theoutgoing user information 210 is sent to theentity computing system 110 in different forms based on the level of security of theoutgoing user information 210 determined by thesecurity circuit 136. - The user information
service computing system 122 updates theoutgoing user information 210 for the transaction type at 416. The user informationservice computing system 122 may update thetransaction type database 134. Thetransaction type database 134 may maintain alloutgoing user information 210 requested for a plurality of transaction types. Thetransaction type database 134 may keep a single set of user information requested 210 for a given transaction type. Alternatively, thetransaction type database 134 keeps all user information requested for a given transaction type for all users associated with the user informationservice computing system 122. In this regard, thetransaction type database 134 may be adaptive and learn what user information is commonly requested for a given transaction type. This information may be used when determining if theinformation request 204 includes information not commonly requested, which will be described in greater detail with regard toFIG. 5 . - Referring now to
FIG. 5 , a flow diagram of amethod 500 of comparing a user information request from an entity is shown, according to an example embodiment. Themethod 500 is performed by the user informationservice computing system 122. Themethod 500 receives aninformation request 204 fromentity computing system 110 at 502, which may be substantially similar to process 402 ofmethod 400, compares theinformation request 204 to user information requests for the same transaction type and provides theentity computing system 110 with theoutgoing user information 210. - The user information
service computing system 122 compares theinformation request 204 to user information requests of similar transaction types at 504. The information stored in thetransaction type database 134 may also include the geographical location of theinformation request 204, in case different geographical locations (e.g., different states, etc.) have different protocols for user information requested for certain transactions. Additionally, thetransaction type database 134 may determine trends in the user information requested based on the dates of the information requests 204. The user informationservice computing system 122 may compare theinformation request 204 received at 502 to individual user information requests stored in thetransaction type database 134. Alternatively, the user informationservice computing system 122 may compare theinformation request 204 received at 502 to aninformation request 204 that is representative of all of the information requests 204 stored in thetransaction type database 134. - The user information
service computing system 122 determines if theinformation request 204 received at 502 is similar to other user information requests for similar transaction types at 506. The comparison may take into account the frequency of the user information requested. For example, if some type user information is always requested for the transaction type, and some type information is usually requested, these may both indicate a similar request and not cause thesecurity circuit 136 to flag theinformation request 204. However, if a particular type of user information is rarely or never requested for the transaction type, but appears in theinformation request 204 received at 502, theinformation request 204 may not be considered similar. If the user information requested is similar to the user information frequently requested for the transaction type,approval request 212 and acorresponding alert 216 is sent to the user information circuit 106 at 508.Process 508 may be substantially similar to process 404 ofmethod 400. If there are user information types that are not similar to the user information types frequently requested for the transaction type, processes 510-512 occurs. - The user information
service computing system 122 flags non-similar user information types in theinformation request 204 at 510. The user informationservice computing system 122 may use thesecurity circuit 136 to determine how to flag the user information that was determined inconsistent with frequently requested user information when compared with other user information requests for similar entity types using thetransaction type database 134. Thesecurity circuit 136 may have different levels of comparison that would cause user information to be flagged. For example, if a piece of information is sometimes requested, a first flag may be applied (e.g., a yellow flag, etc.). If a piece of information is rarely requested, a second flag may be applied (e.g., an orange flag, etc.). If a piece of information is never, or should never, be requested a third flag may be applied (e.g., a red flag, etc.). Alternatively, the information may be flagged based on a level of security associated with the user information. For example, the name ofuser 102 may have a low security level and therefore have one flag associated with the name, while the social security number of theuser 102 may have a high security level and therefore have a different flag associated with the social security number. In that regard, the user information requested that is inconsistent with the user information commonly requested may be flagged with a first, second, third, etc. flag based on the level of security of the user information. In some embodiments, a piece of user information may receive multiple sets of flags based on different criteria (e.g., frequency of request and level of security, etc.). - The user information
service computing system 122 sends a flaggedrequest 214 and acorresponding alert 216 to theuser 102 via the user information circuit 106 at 512. The flaggedrequest 214 indicates any information that was flagged by thesecurity circuit 136 at 510. The flaggedrequest 214 may also include information consistent with theapproval request 212 ofprocess 404 ofmethod 400, such astransaction information 220 and information indicating theentity 108 that sent theinformation request 204, in addition to the flagged user information. - The user information
service computing system 122 receives the user response to the request at 514 viauser input 208 from the user information circuit 106 regardless of whether or not theinformation request 204 received at 502 was similar to information requests of similar transaction types. The user informationservice computing system 122 sends the approvedoutgoing user information 210 to theentity computing system 110 at 516. Process 514-516 may be substantially similar toprocesses method 400, respectively. - Referring now to
FIG. 6 , a flow diagram of amethod 600 of preparing user information for a predictedtransaction 218 is shown according to an example embodiment. Themethod 600 is performed by user informationservice computing system 122. Themethod 600 predicts a transaction based on activity of theuser 102 and provides recommendation to theuser 102 based on the predictedtransaction 218. - The user information
service computing system 122 predicts a transaction of theuser 102 at 602. The user informationservice computing system 122 may monitor other software applications on the user computing device 104 and/or monitor website activity on the user computing device 104 to predict a potential transaction of theuser 102. Theprediction circuit 138 may be set with different transactions that could be completed and information that may be indicative of future transactions based on activity on the user computing device 104. For example, if theuser 102 is looking up homes or properties, theprediction circuit 138 may predict theuser 102 will be purchasing a home. Theprediction circuit 138 of the user informationservice computing system 122 may be set to only predict a transaction after a given set of activity is monitored. For example, theuser 102 may have to look at home and property listings multiple times in a given period of time before theprediction circuit 138 predicts the transaction to minimize the number of predictedtransactions 218 generated. - The user information
service computing system 122 sends the predicted transaction and acorresponding alert 216 to theuser 102 via the user information circuit 106 at 604. The user informationservice computing system 122 may send the predicted transaction to the user information circuit 106 as analert 216. The alert 216 may include the predictedtransaction 218 as well as information indicating how the user informationservice computing system 122 predicted the transaction. For example, the alert may say “We noticed you have been viewing houses for sale frequently, are you planning on purchasing a home?” Theuser 102 may respond to the alert viauser input 208 to the user information circuit 106. - The user information
service computing system 122 determines if theuser 102 confirmed the predictedtransaction 218 or not at 606. If theuser 102 indicates that the predictedtransaction 218 is not a transaction theuser 102 is planning on completing, the user informationservice computing system 122 may delete the predictedtransaction 218 at 608. Theprediction circuit 138 may also make note of the fact that theuser 102 is not planning on making the predictedtransaction 218 so as to minimize the chance of sending theuser 102 another alert 216 relating to a predictedtransaction 218 that is the same as a previously predicted transaction. If theuser 102 confirms viauser input 108 to the user information circuit 106 that the predictedtransaction 218 is a transaction theuser 102 plans on completing in the future, processes 610-614 may occur. - The user information
service computing system 122 analyzes the user information at 610. Analyzing the user information may include determining the user information that is likely to be needed for a given transaction type by thetransaction type database 134. Thetransaction type database 134 may determine different levels of user information. For example, thetransaction type database 134 may determine user information that will most likely be needed for the identified transaction type. Thetransaction type database 134 may also determine user information that may be needed, depending on theentity 108 that theuser 102 will be using to complete the transaction. Thetransaction type database 134 may use methods similar to those used when comparing the user information request to similar user information requests as described with respect toFIG. 5 , specifically process 504 of themethod 500. Analyzing the user information may also include comparing the user information needed for the transaction with the user information stored at theuser information database 132. The user informationservice computing system 122 may compare the user information determined at 610 to theuser information database 132 to determine if theuser information database 132 has all the user information needed for the predictedtransaction 218. Analyzing the user information may also include analyzing the content of the user information (e.g., financial information, etc.). Analyzing the content of the user information may provide the user informationservice computing system 122 with information regarding the likelihood of a successful transaction. For example, if the predictedtransaction 218 is buying a car, but theuser 102 does not have enough money saved for a down payment, analyzing the user information may indicate that theuser 102 should be saving more money. - The user information
service computing system 122 sends a predicted transaction recommendation and acorresponding alert 216 to theuser 102 via the user information circuit 106 at 612. The predicted transaction recommendation is a recommendation to theuser 102 based on the analysis of the user information at 610. The predicted transaction recommendation may include information relating to user information that is needed for the predicted transaction that theuser 102 currently does not have associated with the user informationservice computing system 122. Alternatively, or in addition, the predicted transaction recommendation may provide theuser 102 with information regarding improvements that could be made to the user information to increase the likelihood of a successful transaction. The user informationservice computing system 122 may provide theuser 102 with the alert 216 via the user information circuit 106 indicating the predicted transaction recommendation.Alert 216 may also be provided to theuser 102 via the user information circuit 106 by theuser information database 132 to remind theuser 102 to provide the user informationservice computing system 122 with user information that will be needed for the potential transaction if theuser 102 has not provided the user information needed in a set amount of time. The predicted transaction recommendation may also include recommendations for changes in the activity of theuser 102 in order to have a successful transaction when theuser 102 is ready to complete the predictedtransaction 218. For example, if the predicted transaction is buying a car, the predicted transaction recommendation may include financial recommendations to increase the likelihood that theuser 102 will be able to make car payments, information on the credit score of theuser 102 and how to improve the credit score to get better car loans, etc. - The user information
service computing system 122 sets the predicted transaction as a potential transaction at 614. Since theuser 102 has confirmed the predicted transaction is a transaction theuser 102 is thinking about completing, the user informationservice computing system 122, it is no longer a predicted transaction. - Referring now to
FIG. 7 , a flow diagram of amethod 700 of determining if theuser 102 has the user information ready for apotential transaction 206 is shown, according to an example embodiment. Themethod 700 is performed by the user informationservice computing system 122. Themethod 700 receives apotential transaction 206, determines if theuser 102 has the user information that will likely be need for thepotential transaction 206, and provides theentity computing system 110 with the approvedoutgoing user information 210. Alternatively, thepotential transaction 206 is received as a product ofmethod 600.Process 702 may be substantially similar to process 408 ofmethod 400. - The user information
service computing system 122 determines the user information needed for the transaction at 704, much likeprocess 610 ofmethod 600 when thetransaction type database 134 analyzes the transaction type to determine the type of user information that will likely be needed for thepotential transaction 206. However, unlikeprocess 610 ofmethod 600, the content of the user information is not analyzed to provide recommendations on changes in behavior. - The user information
service computing system 122 determines if theuser 102 has the user information determined at 704 for thepotential transaction 206 received at 702 at 706. Thetransaction type database 134 may compare the user information determined at 704 to information in theuser information database 132 to determine if theuser information database 132 has the user information that will likely be needed for thepotential transaction 206. If the user information that will likely be needed is in theuser information database 132, themethod 700 may proceed directly toprocess 712. If user information is needed and is not in theuser information database 132, processes 708-710 occur. - The user information
service computing system 122 alerts theuser 102 of the missing user information at 708. The user informationservice computing system 122 may provide theuser 102 with the alert 216 much likeprocess 612. The alert 216 is received by theuser 102 via the user information circuit 106 and indicates user information that was determined to be missing at 706. - The user information
service computing system 122 receivesincoming user information 202 at 710. Theincoming user information 202 is received from theuser 102 via the user information circuit 106 in response to the alert 216 notifying theuser 102 of user information that is missing.Process 710 may be substantially similar toprocess method 300. - The user information
service computing system 122 receives theuser 102 entity selection at 712. Theuser 102 entity selection is sent from the user information circuit 106 and indicates whichentity 108 theuser 102 has selected to complete thepotential transaction 206.Process 712 may be substantially similar to process 412 ofmethod 400. - The user information
service computing system 122 provides the approvedoutgoing user information 210 to theentity computing system 110 at 714. Theentity computing system 110 that receives the approvedoutgoing user information 210 is theentity computing system 110 associated with the entity selected at 712.Process 714 may be substantially similar to process 414 ofmethod 400. - By using the user information service to store and manage user information, individuals gain ease of access to user information. In addition, with all the user information stored in a single location, information is protected, accessible and easy to distribute. Oftentimes, when individuals are asked for user information, the individual must get the information from a variety of places. The individual may have some information stored at home in a safe, while other information is stored electronically. The individual may also have to reach out to other entities to get the information needed. This can be cumbersome for the individual, and cause delays in transactions the user would like to complete. In addition, once the individual obtains all the information, it has to be shared with the entity the individual is completing the transaction with. This process can be tedious and the individual may makes mistakes when providing large amount of information. By using the user information service, individuals can easily provide all the needed information to an entity to quickly, and accurately, complete a transaction.
- The embodiments described herein have been described with reference to drawings. The drawings illustrate certain details of specific embodiments that implement the systems, methods and programs described herein. However, describing the embodiments with drawings should not be construed as imposing on the disclosure any limitations that may be present in the drawings.
- It should be understood that no claim element herein is to be construed under the provisions of 35 U.S.C. § 112(f), unless the element is expressly recited using the phrase “means for.”
- As used herein, the term “circuit” may include hardware structured to execute the functions described herein. In some embodiments, each respective “circuit” may include machine-readable media for configuring the hardware to execute the functions described herein. The circuit may be embodied as one or more circuitry components including, but not limited to, processing circuitry, network interfaces, peripheral devices, input devices, output devices, sensors, etc. In some embodiments, a circuit may take the form of one or more analog circuits, electronic circuits (e.g., integrated circuits (IC), discrete circuits, system on a chip (SOCs) circuits, etc.), telecommunication circuits, hybrid circuits, and any other type of “circuit.” In this regard, the “circuit” may include any type of component for accomplishing or facilitating achievement of the operations described herein. For example, a circuit as described herein may include one or more transistors, logic gates (e.g., NAND, AND, NOR, OR, XOR, NOT, XNOR, etc.), resistors, multiplexers, registers, capacitors, inductors, diodes, wiring, and so on).
- The “circuit” may also include one or more processors communicatively coupled to one or more memory or memory devices. In this regard, the one or more processors may execute instructions stored in the memory or may execute instructions otherwise accessible to the one or more processors. In some embodiments, the one or more processors may be embodied in various ways. The one or more processors may be constructed in a manner sufficient to perform at least the operations described herein. In some embodiments, the one or more processors may be shared by multiple circuits (e.g., circuit A and circuit B may comprise or otherwise share the same processor which, in some example embodiments, may execute instructions stored, or otherwise accessed, via different areas of memory). Alternatively or additionally, the one or more processors may be structured to perform or otherwise execute certain operations independent of one or more co-processors. In other example embodiments, two or more processors may be coupled via a bus to enable independent, parallel, pipelined, or multi-threaded instruction execution. Each processor may be implemented as one or more general-purpose processors, application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), digital signal processors (DSPs), or other suitable electronic data processing components structured to execute instructions provided by memory. The one or more processors may take the form of a single core processor, multi-core processor (e.g., a dual core processor, triple core processor, quad core processor, etc.), microprocessor, etc. In some embodiments, the one or more processors may be external to the apparatus, for example the one or more processors may be a remote processor (e.g., a cloud based processor). Alternatively or additionally, the one or more processors may be internal and/or local to the apparatus. In this regard, a given circuit or components thereof may be disposed locally (e.g., as part of a local server, a local computing system, etc.) or remotely (e.g., as part of a remote server such as a cloud based server). To that end, a “circuit” as described herein may include components that are distributed across one or more locations.
- An exemplary system for implementing the overall system or portions of the embodiments might include a general purpose computing computers in the form of computers, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit. Each memory device may include non-transient volatile storage media, non-volatile storage media, non-transitory storage media (e.g., one or more volatile and/or non-volatile memories), etc. In some embodiments, the non-volatile media may take the form of ROM, flash memory (e.g., flash memory such as NAND, 3D NAND, NOR, 3D NOR, etc.), EEPROM, MRAM, magnetic storage, hard discs, optical discs, etc. In other embodiments, the volatile storage media may take the form of RAM, TRAM, ZRAM, etc. Combinations of the above are also included within the scope of machine-readable media. In this regard, machine-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions. Each respective memory device may be operable to maintain or otherwise store information relating to the operations performed by one or more associated circuits, including processor instructions and related data (e.g., database components, object code components, script components, etc.), in accordance with the example embodiments described herein.
- It should also be noted that the term “input devices,” as described herein, may include any type of input device including, but not limited to, a keyboard, a keypad, a mouse, joystick or other input devices performing a similar function. Comparatively, the term “output device,” as described herein, may include any type of output device including, but not limited to, a computer monitor, printer, facsimile machine, or other output devices performing a similar function.
- Any foregoing references to currency or funds are intended to include fiat currencies, non-fiat currencies (e.g., precious metals), and math-based currencies (often referred to as cryptocurrencies). Examples of math-based currencies include Bitcoin, Litecoin, Dogecoin, and the like.
- It should be noted that although the diagrams herein may show a specific order and composition of method steps, it is understood that the order of these steps may differ from what is depicted. For example, two or more steps may be performed concurrently or with partial concurrence. Also, some method steps that are performed as discrete steps may be combined, steps being performed as a combined step may be separated into discrete steps, the sequence of certain processes may be reversed or otherwise varied, and the nature or number of discrete processes may be altered or varied. The order or sequence of any element or apparatus may be varied or substituted according to alternative embodiments. Accordingly, all such modifications are intended to be included within the scope of the present disclosure as defined in the appended claims. Such variations will depend on the machine-readable media and hardware systems chosen and on designer choice. It is understood that all such variations are within the scope of the disclosure. Likewise, software and web implementations of the present disclosure could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various database searching steps, correlation steps, comparison steps and decision steps.
- The foregoing description of embodiments has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the disclosure to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from this disclosure. The embodiments were chosen and described in order to explain the principals of the disclosure and its practical application to enable one skilled in the art to utilize the various embodiments and with various modifications as are suited to the particular use contemplated. Other substitutions, modifications, changes and omissions may be made in the design, operating conditions and arrangement of the embodiments without departing from the scope of the present disclosure as expressed in the appended claims.
Claims (20)
1. A method, comprising:
determining, by a User Information Service (UIS) system, that a user of a user computing device is predicted to engage in a potential transaction based on monitoring software applications executed on the user computing device and website activities on the user computing device;
determining, by the UIS system based on a transaction type of the potential transaction and an entity of the potential transaction, first user information corresponding to the potential transaction by comparing the potential transaction to a plurality of prior transactions of the same transaction type;
determining, by the UIS system, second user information of the user stored in a user information database;
determining, by the UIS system, whether the second user information is sufficient for the potential transaction by comparing the first user information and the second user information;
in response to determining that the second user information is not sufficient for the potential transaction, sending, by the UIS system to the user computing device, an alert indicating third user information different from the second user information;
receiving, by the UIS system from the user computing device, the third user information; and
providing, by the UIS system to an entity computing system of the entity, the second user information and the third user information.
2. The method of claim 1 , further comprising:
determining the type of transactions based on monitoring the software applications and the web site activities; and
determining that the software applications and the website activities comprise multiple instances of the type of transactions over a period of time.
3. The method of claim 1 , further comprising:
sending, by the UIS system to the user computing device, an alert indicative of the potential transaction; and
determining, by the UIS system from the user computing device, whether the user computing device confirms the potential transaction.
4. The method of claim 3 , further comprising in response to determining that the user computing device rejects the potential transaction, deleting, by the UIS system, the potential transaction.
5. The method of claim 1 , further comprising populating, by the UIS system in the user information database, an account of the user with the second user information received from at least one of the user computing system and a plurality of entity computing systems.
6. The method of claim 1 , further comprising analyzing, by the UIS system, a likelihood that the potential transaction is successful by comparing a first value corresponding to the transaction type to a second value comprised in the second user information.
7. The method of claim 1 , wherein the user information database is adaptive, constantly updates user information requested for certain types of transactions, and learns what user information requests to compare based on a given transaction type of prior user information requests
8. At least one non-transitory computer readable medium having computer-executable instructions embodied therein that, when executed by at least one processor, causes the at least one processor to:
determine that a user of a user computing device is predicted to engage in a potential transaction based on monitoring software applications executed on the user computing device and website activities on the user computing device;
determine based on a transaction type of the potential transaction and an entity of the potential transaction, first user information corresponding to the potential transaction by comparing the potential transaction to a plurality of prior transactions of the same transaction type;
determine second user information of the user stored in a user information database;
determine whether the second user information is sufficient for the potential transaction by comparing the first user information and the second user information;
in response to determining that the second user information is not sufficient for the potential transaction, send, to the user computing device, an alert indicating third user information different from the second user information;
receive from the user computing device, the third user information; and
provide, to an entity computing system of the entity, the second user information and the third user information.
9. The non-transitory computer readable medium of claim 8 , wherein the at least one processor is further caused to:
determine the type of transactions based on monitoring the software applications and the website activities; and
determine that the software applications and the website activities comprise multiple instances of the type of transactions over a period of time.
10. The non-transitory computer readable medium of claim 8 , wherein the at least one processor is further caused to:
send, to the user computing device, an alert indicative of the potential transaction; and
determine, from the user computing device, whether the user computing device confirms the potential transaction.
11. The non-transitory computer readable medium of claim 10 , wherein the at least one processor is further caused to: in response to determining that the user computing device rejects the potential transaction, deleting, by the UIS system, the potential transaction.
12. The non-transitory computer readable medium of claim 8 , wherein the at least one processor is further caused to populate in the user information database an account of the user with the second user information received from at least one of the user computing system and a plurality of entity computing systems.
13. The non-transitory computer readable medium of claim 8 , wherein the at least one processor is further caused to analyze a likelihood that the potential transaction is successful by comparing a first value corresponding to the transaction type to a second value comprised in the second user information.
14. The non-transitory computer readable medium of claim 8 , wherein the user information database is adaptive, constantly updates user information requested for certain types of transactions, and learns what user information requests to compare based on a given transaction type of prior user information requests
15. A system, comprising at least one processor configured to:
determine that a user of a user computing device is predicted to engage in a potential transaction based on monitoring software applications executed on the user computing device and website activities on the user computing device;
determine based on a transaction type of the potential transaction and an entity of the potential transaction, first user information corresponding to the potential transaction by comparing the potential transaction to a plurality of prior transactions of the same transaction type;
determine second user information of the user stored in a user information database;
determine whether the second user information is sufficient for the potential transaction by comparing the first user information and the second user information;
in response to determining that the second user information is not sufficient for the potential transaction, send, to the user computing device, an alert indicating third user information different from the second user information;
receive from the user computing device, the third user information; and
provide, to an entity computing system of the entity, the second user information and the third user information.
16. The system of claim 15 , wherein the at least one processor is further configured to:
determine the type of transactions based on monitoring the software applications and the website activities; and
determine that the software applications and the website activities comprise multiple instances of the type of transactions over a period of time.
17. The system of claim 15 , wherein the at least one processor is further configured to:
send, to the user computing device, an alert indicative of the potential transaction; and
determine, from the user computing device, whether the user computing device confirms the potential transaction.
18. The system of claim 10 , wherein the at least one processor is further configured to: in response to determining that the user computing device rejects the potential transaction, deleting, by the UIS system, the potential transaction.
19. The system of claim 8 , wherein the at least one processor is further configured to populate in the user information database an account of the user with the second user information received from at least one of the user computing system and a plurality of entity computing systems.
20. The system of claim 8 , wherein the at least one processor is further configured to analyze a likelihood that the potential transaction is successful by comparing a first value corresponding to the transaction type to a second value comprised in the second user information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/244,662 US20230418918A1 (en) | 2015-12-29 | 2023-09-11 | User information gathering and distribution system |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562272422P | 2015-12-29 | 2015-12-29 | |
US15/385,035 US10817593B1 (en) | 2015-12-29 | 2016-12-20 | User information gathering and distribution system |
US17/079,095 US11755707B1 (en) | 2015-12-29 | 2020-10-23 | User information gathering and distribution system |
US18/244,662 US20230418918A1 (en) | 2015-12-29 | 2023-09-11 | User information gathering and distribution system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/079,095 Continuation US11755707B1 (en) | 2015-12-29 | 2020-10-23 | User information gathering and distribution system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20230418918A1 true US20230418918A1 (en) | 2023-12-28 |
Family
ID=72944795
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/385,035 Active 2037-08-24 US10817593B1 (en) | 2015-12-29 | 2016-12-20 | User information gathering and distribution system |
US17/079,095 Active 2037-07-03 US11755707B1 (en) | 2015-12-29 | 2020-10-23 | User information gathering and distribution system |
US18/244,662 Pending US20230418918A1 (en) | 2015-12-29 | 2023-09-11 | User information gathering and distribution system |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/385,035 Active 2037-08-24 US10817593B1 (en) | 2015-12-29 | 2016-12-20 | User information gathering and distribution system |
US17/079,095 Active 2037-07-03 US11755707B1 (en) | 2015-12-29 | 2020-10-23 | User information gathering and distribution system |
Country Status (1)
Country | Link |
---|---|
US (3) | US10817593B1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10951730B1 (en) * | 2017-08-09 | 2021-03-16 | Wells Fargo Bank, N.A. | Communication-based automated guidance |
WO2019126471A1 (en) * | 2017-12-21 | 2019-06-27 | Taliware, Inc. | Blockchain network management implementing biometric based authentication of an individual |
Family Cites Families (223)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5987132A (en) * | 1996-06-17 | 1999-11-16 | Verifone, Inc. | System, method and article of manufacture for conditionally accepting a payment method utilizing an extensible, flexible architecture |
US5850446A (en) * | 1996-06-17 | 1998-12-15 | Verifone, Inc. | System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible architecture |
US5978840A (en) * | 1996-09-26 | 1999-11-02 | Verifone, Inc. | System, method and article of manufacture for a payment gateway system architecture for processing encrypted payment transactions utilizing a multichannel, extensible, flexible architecture |
US6169789B1 (en) * | 1996-12-16 | 2001-01-02 | Sanjay K. Rao | Intelligent keyboard system |
US5996076A (en) * | 1997-02-19 | 1999-11-30 | Verifone, Inc. | System, method and article of manufacture for secure digital certification of electronic commerce |
US6233565B1 (en) * | 1998-02-13 | 2001-05-15 | Saranac Software, Inc. | Methods and apparatus for internet based financial transactions with evidence of payment |
US7100195B1 (en) * | 1999-07-30 | 2006-08-29 | Accenture Llp | Managing user information on an e-commerce system |
US20050108096A1 (en) * | 1999-09-28 | 2005-05-19 | Chameleon Network Inc. | Portable electronic authorization system and method |
US7236956B1 (en) * | 1999-10-18 | 2007-06-26 | Stamps.Com | Role assignments in a cryptographic module for secure processing of value-bearing items |
US6671818B1 (en) * | 1999-11-22 | 2003-12-30 | Accenture Llp | Problem isolation through translating and filtering events into a standard object format in a network based supply chain |
US6526125B1 (en) * | 1999-12-11 | 2003-02-25 | Lucent Technologies Inc. | System and method for automatic location identification discrepancy notification |
US7257581B1 (en) | 2000-08-04 | 2007-08-14 | Guardian Networks, Llc | Storage, management and distribution of consumer information |
US7603319B2 (en) * | 2000-08-28 | 2009-10-13 | Contentguard Holdings, Inc. | Method and apparatus for preserving customer identity in on-line transactions |
US7743259B2 (en) * | 2000-08-28 | 2010-06-22 | Contentguard Holdings, Inc. | System and method for digital rights management using a standard rendering engine |
US20060074727A1 (en) * | 2000-09-07 | 2006-04-06 | Briere Daniel D | Method and apparatus for collection and dissemination of information over a computer network |
US8996698B1 (en) * | 2000-11-03 | 2015-03-31 | Truphone Limited | Cooperative network for mobile internet access |
US7343317B2 (en) * | 2001-01-18 | 2008-03-11 | Nokia Corporation | Real-time wireless e-coupon (promotion) definition based on available segment |
US7150037B2 (en) * | 2001-03-21 | 2006-12-12 | Intelliden, Inc. | Network configuration manager |
US20020143655A1 (en) * | 2001-04-02 | 2002-10-03 | Stephen Elston | Remote ordering system for mobile commerce |
US20030028427A1 (en) | 2001-08-02 | 2003-02-06 | International Business Machines Corporation | User control of electronic personal information while browsing the Web |
WO2003014867A2 (en) * | 2001-08-03 | 2003-02-20 | John Allen Ananian | Personalized interactive digital catalog profiling |
US7162451B2 (en) | 2001-11-30 | 2007-01-09 | International Business Machines Corporation | Information content distribution based on privacy and/or personal information |
US7627521B1 (en) * | 2002-01-15 | 2009-12-01 | Jpmorgan Chase Bank, N.A. | System and method for processing mircotransactions |
US7370356B1 (en) * | 2002-01-23 | 2008-05-06 | Symantec Corporation | Distributed network monitoring system and method |
US20040147265A1 (en) * | 2002-07-23 | 2004-07-29 | Mark Kelley | System and method for an adaptive user communications device |
WO2004017592A1 (en) * | 2002-08-19 | 2004-02-26 | Research In Motion Limited | System and method for secure control of resources of wireless mobile communication device |
US9105032B2 (en) * | 2007-05-03 | 2015-08-11 | Yellowpages.Com Llc | Systems and methods to provide advertisements for real time communications |
US20050086531A1 (en) * | 2003-10-20 | 2005-04-21 | Pss Systems, Inc. | Method and system for proxy approval of security changes for a file security system |
US20130179949A1 (en) * | 2004-01-22 | 2013-07-11 | Jpay, Inc. | Secure exchange of digital content |
GB2412189B (en) * | 2004-03-16 | 2007-04-04 | Netcraft Ltd | Security component for use with an internet browser application and method and apparatus associated therewith |
US7280644B2 (en) * | 2004-12-07 | 2007-10-09 | Ewi Holdings, Inc. | Transaction processing platform for faciliating electronic distribution of plural prepaid services |
US8990254B2 (en) * | 2004-07-02 | 2015-03-24 | Ellie Mae, Inc. | Loan origination software system for processing mortgage loans over a distributed network |
US8700729B2 (en) * | 2005-01-21 | 2014-04-15 | Robin Dua | Method and apparatus for managing credentials through a wireless network |
US8195481B2 (en) * | 2005-02-25 | 2012-06-05 | Virtual Radiologic Corporaton | Teleradiology image processing system |
US20110110568A1 (en) * | 2005-04-08 | 2011-05-12 | Gregory Vesper | Web enabled medical image repository |
US20140337503A1 (en) * | 2005-04-26 | 2014-11-13 | Guy Hefetz | Methods for acquiring an internet user's consent to be located |
US9401900B2 (en) * | 2005-07-01 | 2016-07-26 | Cirius Messaging Inc. | Secure electronic mail system with thread/conversation opt out |
WO2007029116A2 (en) * | 2005-07-01 | 2007-03-15 | 0733660 B.C. Ltd. Dba E-Mail2, Inc. | Electronic mail messaging system |
US8688790B2 (en) * | 2005-07-01 | 2014-04-01 | Email2 Scp Solutions Inc. | Secure electronic mail system with for your eyes only features |
US8418233B1 (en) * | 2005-07-29 | 2013-04-09 | F5 Networks, Inc. | Rule based extensible authentication |
US9015090B2 (en) * | 2005-09-06 | 2015-04-21 | Daniel Chien | Evaluating a questionable network communication |
US9674145B2 (en) * | 2005-09-06 | 2017-06-06 | Daniel Chien | Evaluating a questionable network communication |
US8682795B2 (en) * | 2005-09-16 | 2014-03-25 | Oracle International Corporation | Trusted information exchange based on trust agreements |
US8458465B1 (en) * | 2005-11-16 | 2013-06-04 | AT&T Intellectual Property II, L. P. | Biometric authentication |
US7836303B2 (en) * | 2005-12-09 | 2010-11-16 | University Of Washington | Web browser operating system |
US20070150299A1 (en) * | 2005-12-22 | 2007-06-28 | Flory Clive F | Method, system, and apparatus for the management of the electronic files |
WO2007145687A1 (en) * | 2006-02-21 | 2007-12-21 | Weiss Kenneth P | Method and apparatus for secure access payment and identification |
US8234220B2 (en) * | 2007-02-21 | 2012-07-31 | Weiss Kenneth P | Universal secure registry |
US8249965B2 (en) * | 2006-03-30 | 2012-08-21 | Obopay, Inc. | Member-supported mobile payment system |
US9195834B1 (en) * | 2007-03-19 | 2015-11-24 | Ravenwhite Inc. | Cloud authentication |
KR100842270B1 (en) * | 2006-12-04 | 2008-06-30 | 한국전자통신연구원 | Electric tag for privacy protection and method for privacy protection using the electric tag |
US8655939B2 (en) * | 2007-01-05 | 2014-02-18 | Digital Doors, Inc. | Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor |
US8126506B2 (en) * | 2007-02-14 | 2012-02-28 | Nuance Communications, Inc. | System and method for securely managing data stored on mobile devices, such as enterprise mobility data |
US20080209213A1 (en) * | 2007-02-23 | 2008-08-28 | Sony Ericsson Mobile Communications Ab | Authorizing secure resources |
US9003488B2 (en) * | 2007-06-06 | 2015-04-07 | Datavalet Technologies | System and method for remote device recognition at public hotspots |
US10523689B2 (en) * | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US8311513B1 (en) * | 2007-06-27 | 2012-11-13 | ENORCOM Corporation | Automated mobile system |
US20090043691A1 (en) | 2007-08-06 | 2009-02-12 | Sheldon Kasower | System and method for gathering, processing, authenticating and distributing personal information |
US8214291B2 (en) * | 2007-10-19 | 2012-07-03 | Ebay Inc. | Unified identity verification |
US8201229B2 (en) * | 2007-11-12 | 2012-06-12 | Bally Gaming, Inc. | User authorization system and methods |
US20090260064A1 (en) * | 2008-04-15 | 2009-10-15 | Problem Resolution Enterprise, Llc | Method and process for registering a device to verify transactions |
US8626115B2 (en) * | 2009-01-28 | 2014-01-07 | Headwater Partners I Llc | Wireless network service interfaces |
US8583781B2 (en) * | 2009-01-28 | 2013-11-12 | Headwater Partners I Llc | Simplified service network architecture |
US8589541B2 (en) * | 2009-01-28 | 2013-11-19 | Headwater Partners I Llc | Device-assisted services for protecting network capacity |
EP2151795A1 (en) * | 2008-08-08 | 2010-02-10 | France Telecom | Secure electronic coupon delivery to mobile device |
US8073778B2 (en) * | 2008-09-11 | 2011-12-06 | Linden Research, Inc. | Scalable distributed transaction manager for multi-host transactions |
US8146134B2 (en) * | 2008-10-28 | 2012-03-27 | Yahoo! Inc. | Scalable firewall policy management platform |
US8745213B2 (en) * | 2008-12-19 | 2014-06-03 | Openpeak Inc. | Managed services platform and method of operation of same |
US8364567B2 (en) * | 2008-12-29 | 2013-01-29 | Bank Of America Corporation | Secure platforms for financial transaction applications |
US8843997B1 (en) * | 2009-01-02 | 2014-09-23 | Resilient Network Systems, Inc. | Resilient trust network services |
US20100191652A1 (en) * | 2009-01-23 | 2010-07-29 | Eckert Daniel J | Systems and methods for adding functionality to a uis for use at a point of interaction |
US9578182B2 (en) * | 2009-01-28 | 2017-02-21 | Headwater Partners I Llc | Mobile device and service management |
US8793758B2 (en) * | 2009-01-28 | 2014-07-29 | Headwater Partners I Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US10019677B2 (en) * | 2009-11-20 | 2018-07-10 | Alert Enterprise, Inc. | Active policy enforcement |
US10027711B2 (en) * | 2009-11-20 | 2018-07-17 | Alert Enterprise, Inc. | Situational intelligence |
US20110270751A1 (en) * | 2009-12-14 | 2011-11-03 | Andrew Csinger | Electronic commerce system and system and method for establishing a trusted session |
US8775245B2 (en) * | 2010-02-11 | 2014-07-08 | News America Marketing Properties, Llc | Secure coupon distribution |
US9270663B2 (en) * | 2010-04-30 | 2016-02-23 | T-Central, Inc. | System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added |
US9461996B2 (en) * | 2010-05-07 | 2016-10-04 | Citrix Systems, Inc. | Systems and methods for providing a single click access to enterprise, SAAS and cloud hosted application |
US8560610B2 (en) | 2010-06-16 | 2013-10-15 | Brighttag Inc. | Unified collection and distribution of data |
US9253288B2 (en) * | 2010-07-01 | 2016-02-02 | Ishai Binenstock | Location-aware mobile connectivity and information exchange system |
US20120066262A1 (en) | 2010-09-14 | 2012-03-15 | Greenberg David M | User-Controlled Management and Distribution of User Information |
US8661076B2 (en) * | 2010-09-23 | 2014-02-25 | Salesforce.Com, Inc. | Business networking information feed alerts |
US9552431B2 (en) * | 2010-11-24 | 2017-01-24 | Visa International Service Association | Unified online content manager apparatuses, methods, and systems |
US8756221B2 (en) * | 2010-12-03 | 2014-06-17 | Salesforce.Com, Inc. | Social files |
US8700524B2 (en) * | 2011-01-04 | 2014-04-15 | Boku, Inc. | Systems and methods to restrict payment transactions |
US9531758B2 (en) * | 2011-03-18 | 2016-12-27 | Zscaler, Inc. | Dynamic user identification and policy enforcement in cloud-based secure web gateways |
US9369433B1 (en) * | 2011-03-18 | 2016-06-14 | Zscaler, Inc. | Cloud based social networking policy and compliance systems and methods |
US20130006862A1 (en) * | 2011-07-03 | 2013-01-03 | Robert William Graham | System and Method of Controlling Transactions |
US8429068B1 (en) * | 2011-07-08 | 2013-04-23 | Intuit Inc. | Data aggregation for transaction banking partnerships |
US20130024910A1 (en) * | 2011-07-22 | 2013-01-24 | Salesforce.Com, Inc. | Computer implemented methods and apparatus for integrating a social network information feed with a network communications application |
US9591090B2 (en) * | 2011-08-22 | 2017-03-07 | Salesforce.Com, Inc. | Computer implemented methods and apparatus for sharing data of an information feed of an online social network |
US10158638B2 (en) * | 2011-08-31 | 2018-12-18 | Salesforce.Com, Inc. | Computer implemented methods and apparatus for providing access to an online social network |
US8726082B2 (en) * | 2011-09-02 | 2014-05-13 | Verizon Patent And Licensing Inc. | Method and system for providing incomplete action monitoring and service for data transactions |
US20140032733A1 (en) * | 2011-10-11 | 2014-01-30 | Citrix Systems, Inc. | Policy-Based Application Management |
US9137262B2 (en) * | 2011-10-11 | 2015-09-15 | Citrix Systems, Inc. | Providing secure mobile device access to enterprise resources using application tunnels |
US9330398B2 (en) * | 2011-11-04 | 2016-05-03 | At&T Intellectual Property I, L.P. | Internet protocol multi-media system value voucher distribution with network storage and redemption |
DE202012100620U1 (en) * | 2011-11-22 | 2012-06-13 | Square, Inc. | System for processing cardless payment transactions |
US9787681B2 (en) * | 2012-01-06 | 2017-10-10 | Optio Labs, Inc. | Systems and methods for enforcing access control policies on privileged accesses for mobile devices |
US8793804B2 (en) * | 2012-01-09 | 2014-07-29 | Ezshield, Inc. | Computer implemented method, computer system and nontransitory computer readable storage medium having HTTP module |
WO2013126713A1 (en) * | 2012-02-22 | 2013-08-29 | Pave, Inc. | Apparatuses, methods and systems for facilitating communities of social based investment |
US9143402B2 (en) | 2012-02-24 | 2015-09-22 | Qualcomm Incorporated | Sensor based configuration and control of network devices |
US9251360B2 (en) * | 2012-04-27 | 2016-02-02 | Intralinks, Inc. | Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment |
US9253176B2 (en) * | 2012-04-27 | 2016-02-02 | Intralinks, Inc. | Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment |
US20140245015A1 (en) * | 2012-04-27 | 2014-08-28 | Intralinks, Inc. | Offline file access |
US20140304836A1 (en) * | 2012-04-27 | 2014-10-09 | Intralinks, Inc. | Digital rights management through virtual container partitioning |
US20140189483A1 (en) * | 2012-04-27 | 2014-07-03 | Intralinks, Inc. | Spreadsheet viewer facility |
US9553860B2 (en) * | 2012-04-27 | 2017-01-24 | Intralinks, Inc. | Email effectivity facility in a networked secure collaborative exchange environment |
US9124419B2 (en) * | 2012-05-08 | 2015-09-01 | Discretix Technologies Ltd. | Method, device, and system of secure entry and handling of passwords |
US9195819B2 (en) * | 2012-07-26 | 2015-11-24 | Bitlit Media Inc. | Methods and systems for verifying ownership of a physical work or facilitating access to an electronic resource associated with a physical work |
US20150235215A1 (en) * | 2012-08-16 | 2015-08-20 | Tango Mobile, LLC | System and Method for Mobile or Web-Based Payment/Credential Process |
US9747388B2 (en) * | 2012-08-31 | 2017-08-29 | Salesforce.Com, Inc. | Systems and methods for providing access to external content objects |
US9990426B2 (en) * | 2012-08-31 | 2018-06-05 | Salesforce.Com, Inc. | Systems and methods for content management in an on-demand environment |
US20140089121A1 (en) * | 2012-09-26 | 2014-03-27 | Symbol Technologies, Inc. | Arrangement for and method of alerting a user to context-based transactional information under which products are to be transacted at a point-of-transaction site |
US20140109176A1 (en) * | 2012-10-15 | 2014-04-17 | Citrix Systems, Inc. | Configuring and providing profiles that manage execution of mobile applications |
EP3726337A1 (en) * | 2012-11-12 | 2020-10-21 | Enorcom Corporation | Automated mobile system |
US10102510B2 (en) | 2012-11-28 | 2018-10-16 | Hoverkey Ltd. | Method and system of conducting a cryptocurrency payment via a mobile device using a contactless token to store and protect a user's secret key |
US9445262B2 (en) * | 2012-12-10 | 2016-09-13 | Lg Uplus Corp. | Authentication server, mobile terminal and method for issuing radio frequency card key using authentication server and mobile terminal |
US9185078B2 (en) * | 2012-12-18 | 2015-11-10 | Salesforce.Com, Inc. | Systems, methods, and apparatuses for implementing cross organizational data sharing |
CA2895126C (en) * | 2012-12-20 | 2021-08-03 | Airbiquity Inc. | Efficient headunit communication integration |
US9374369B2 (en) * | 2012-12-28 | 2016-06-21 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
US8781104B1 (en) * | 2013-01-11 | 2014-07-15 | American Express Travel Related Services Company, Inc. | System and method for enabling tracking of contract provisions in a service message switching marketplace |
MY187537A (en) * | 2013-02-22 | 2021-09-28 | Mastercard International Inc | Systems, apparatus and methods for mobile companion prepaid card |
US9300645B1 (en) * | 2013-03-14 | 2016-03-29 | Ip Holdings, Inc. | Mobile IO input and output for smartphones, tablet, and wireless devices including touch screen, voice, pen, and gestures |
US9904579B2 (en) * | 2013-03-15 | 2018-02-27 | Advanced Elemental Technologies, Inc. | Methods and systems for purposeful computing |
US8875235B1 (en) * | 2013-03-15 | 2014-10-28 | Rex Hakimian | Independent administering of verified user-controlled electronic identifications utilizing specifically programmed computer-implemented methods and computer systems |
US9378065B2 (en) * | 2013-03-15 | 2016-06-28 | Advanced Elemental Technologies, Inc. | Purposeful computing |
US10075384B2 (en) * | 2013-03-15 | 2018-09-11 | Advanced Elemental Technologies, Inc. | Purposeful computing |
US9832205B2 (en) * | 2013-03-15 | 2017-11-28 | International Business Machines Corporation | Cross provider security management functionality within a cloud service brokerage platform |
US9898726B2 (en) * | 2013-03-28 | 2018-02-20 | Glory Global Solutions (International) Limited | Security system |
US20140310160A1 (en) * | 2013-04-11 | 2014-10-16 | Pawan Kumar | Alert System with Multiple Transaction Indicators |
US9792459B2 (en) * | 2013-04-29 | 2017-10-17 | Sri International | Flexible policy arbitration control suite |
EP3036675B1 (en) * | 2013-08-23 | 2021-03-10 | IDEMIA Identity & Security USA LLC | Method for identity management |
US9536065B2 (en) * | 2013-08-23 | 2017-01-03 | Morphotrust Usa, Llc | System and method for identity management |
US10872077B2 (en) | 2013-09-23 | 2020-12-22 | David D. Wright, SR. | Management of entitlements using blockchain |
KR102252136B1 (en) * | 2013-10-25 | 2021-05-13 | 더 리젠츠 오브 더 유니버시티 오브 미시건 | Controlling unregulated aggregation of mobile app usage |
US9203843B2 (en) * | 2013-11-08 | 2015-12-01 | At&T Mobility Ii Llc | Mobile device enabled tiered data exchange via a vehicle |
WO2015073708A1 (en) * | 2013-11-14 | 2015-05-21 | Intralinks, Inc. | Litigation support in cloud-hosted file sharing and collaboration |
WO2015088986A1 (en) * | 2013-12-09 | 2015-06-18 | Sureclinical Inc. | System and method for high trust cloud digital signing and workflow automation in health sciences |
EP3080742A4 (en) * | 2013-12-11 | 2017-08-30 | Intralinks, Inc. | Customizable secure data exchange environment |
US20150188779A1 (en) * | 2013-12-31 | 2015-07-02 | Jut, Inc. | Split-application infrastructure |
US20160140331A1 (en) * | 2014-01-15 | 2016-05-19 | Michael Geronimo Perez | Method and system for biometric identification and verification |
US10497037B2 (en) | 2014-03-31 | 2019-12-03 | Monticello Enterprises LLC | System and method for managing cryptocurrency payments via the payment request API |
CA2945158A1 (en) | 2014-04-08 | 2015-10-15 | Capital One Financial Corporation | Systems and methods for transacting at an atm using a mobile device |
US9613190B2 (en) * | 2014-04-23 | 2017-04-04 | Intralinks, Inc. | Systems and methods of secure data exchange |
US9781123B2 (en) * | 2014-04-25 | 2017-10-03 | Samsung Electronics Co., Ltd. | Methods of providing social network service and server performing the same |
US20150348032A1 (en) | 2014-05-30 | 2015-12-03 | Apple Inc. | Real time approval of digital store purchases for a shared content storage account |
US9531714B2 (en) * | 2014-06-27 | 2016-12-27 | Citrix Systems, Inc. | Enterprise authentication via third party authentication support |
WO2015199977A1 (en) * | 2014-06-27 | 2015-12-30 | Psi Systems, Inc. | Systems and methods providing payment transactions |
US10956907B2 (en) * | 2014-07-10 | 2021-03-23 | Datalogic Usa, Inc. | Authorization of transactions based on automated validation of customer speech |
US20160048700A1 (en) * | 2014-08-14 | 2016-02-18 | Nagravision S.A. | Securing personal information |
US20160072839A1 (en) * | 2014-09-05 | 2016-03-10 | Salesforce.Com, Inc. | Facilitating dynamic management of participating devices within a network in an on-demand services environment |
US9800615B2 (en) * | 2014-09-09 | 2017-10-24 | Bank Of America Corporation | Real-time security monitoring using cross-channel event processor |
KR102036758B1 (en) * | 2014-09-30 | 2019-10-28 | 사이트릭스 시스템스, 인크. | Fast smart card logon and federated full domain logon |
US9544307B2 (en) * | 2014-10-29 | 2017-01-10 | Salesforce.Com, Inc. | Providing a security mechanism on a mobile device |
US10027667B2 (en) * | 2014-11-12 | 2018-07-17 | Time Warner Cable Enterprises Llc | Methods and apparatus for provisioning services which require a device to be securely associated with an account |
US9876822B2 (en) * | 2014-11-28 | 2018-01-23 | International Business Machines Corporation | Administration of a context-based cloud security assurance system |
US9503451B1 (en) * | 2014-12-15 | 2016-11-22 | Amazon Technologies, Inc. | Compromised authentication information clearing house |
US9838384B1 (en) * | 2014-12-15 | 2017-12-05 | Amazon Technologies, Inc. | Password-based fraud detection |
US9998434B2 (en) * | 2015-01-26 | 2018-06-12 | Listat Ltd. | Secure dynamic communication network and protocol |
JP5956623B1 (en) * | 2015-01-30 | 2016-07-27 | 株式会社Pfu | system |
US9807086B2 (en) * | 2015-04-15 | 2017-10-31 | Citrix Systems, Inc. | Authentication of a client device based on entropy from a server or other device |
US10026082B2 (en) | 2015-05-21 | 2018-07-17 | Mastercard International Incorporated | Method and system for linkage of blockchain-based assets to fiat currency accounts |
US20160342989A1 (en) | 2015-05-21 | 2016-11-24 | Mastercard International Incorporated | Method and system for processing blockchain-based transactions on existing payment networks |
US9870562B2 (en) | 2015-05-21 | 2018-01-16 | Mastercard International Incorporated | Method and system for integration of market exchange and issuer processing for blockchain-based transactions |
US10963881B2 (en) | 2015-05-21 | 2021-03-30 | Mastercard International Incorporated | Method and system for fraud control of blockchain-based transactions |
US20160371697A1 (en) * | 2015-06-22 | 2016-12-22 | International Business Machines Corporation | Transaction fraud detection |
JP6636058B2 (en) | 2015-07-02 | 2020-01-29 | ナスダック, インコーポレイテッドNasdaq, Inc. | Source guarantee system and method in a distributed transaction database |
GB201511964D0 (en) | 2015-07-08 | 2015-08-19 | Barclays Bank Plc | Secure digital data operations |
US10033702B2 (en) * | 2015-08-05 | 2018-07-24 | Intralinks, Inc. | Systems and methods of secure data exchange |
US10582001B2 (en) * | 2015-08-11 | 2020-03-03 | Oracle International Corporation | Asynchronous pre-caching of synchronously loaded resources |
US10402792B2 (en) | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
JP6951329B2 (en) | 2015-10-14 | 2021-10-20 | ケンブリッジ ブロックチェーン,エルエルシー | Systems and methods for managing digital identities |
US10255589B1 (en) * | 2015-10-23 | 2019-04-09 | Wells Fargo Bank, N.A. | Access controls for transfer transactions |
US20170132615A1 (en) | 2015-11-11 | 2017-05-11 | Bank Of America Corporation | Block chain alias for person-to-person payments |
CN106911641A (en) | 2015-12-23 | 2017-06-30 | 索尼公司 | For authorizing the client terminal device for accessing, server unit and access control system |
US10679215B2 (en) | 2016-02-22 | 2020-06-09 | Bank Of America Corporation | System for control of device identity and usage in a process data network |
EP3424177B1 (en) | 2016-02-29 | 2021-10-13 | SecureKey Technologies Inc. | Systems and methods for distributed identity verification |
US10643203B2 (en) | 2016-04-12 | 2020-05-05 | Digicash Pty Ltd. | Secure transaction controller for value token exchange systems |
US10521775B2 (en) | 2016-04-18 | 2019-12-31 | R3 Ltd. | Secure processing of electronic transactions by a decentralized, distributed ledger system |
US10333705B2 (en) | 2016-04-30 | 2019-06-25 | Civic Technologies, Inc. | Methods and apparatus for providing attestation of information using a centralized or distributed ledger |
WO2017190175A1 (en) | 2016-05-06 | 2017-11-09 | Othera Pty Ltd | Methods and systems for blockchain based "segmented risk based securities" |
US9635000B1 (en) | 2016-05-25 | 2017-04-25 | Sead Muftic | Blockchain identity management system based on public identities ledger |
WO2018039312A1 (en) | 2016-08-23 | 2018-03-01 | BBM Health LLC | Blockchain-based mechanisms for secure health information resource exchange |
US10282558B2 (en) | 2016-09-02 | 2019-05-07 | The Toronto-Dominion Bank | System and method for maintaining a segregated database in a multiple distributed ledger system |
US20180075421A1 (en) | 2016-09-09 | 2018-03-15 | BitPagos, Inc. | Loan processing service utilizing a distributed ledger digital asset as collateral |
US11651359B2 (en) | 2016-10-05 | 2023-05-16 | The Toronto-Dominion Bank | Distributed electronic ledger with metadata |
US20180343120A1 (en) | 2016-10-26 | 2018-11-29 | Black Gold Coin, Inc. | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features |
US20180114218A1 (en) | 2016-10-26 | 2018-04-26 | International Business Machines Corporation | Blockchain: automatic fork protection |
US20180130034A1 (en) | 2016-11-07 | 2018-05-10 | LedgerDomain, LLC | Extended blockchains for event tracking and management |
EP3639536A2 (en) | 2016-12-30 | 2020-04-22 | INTEL Corporation | Naming and blockchain recording for the internet of things |
US11797982B2 (en) | 2017-01-06 | 2023-10-24 | FirstBlood Technologies, Inc. | Digital ledger authentication using address encoding |
US20180247191A1 (en) | 2017-02-03 | 2018-08-30 | Milestone Entertainment Llc | Architectures, systems and methods for program defined entertainment state system, decentralized cryptocurrency system and system with segregated secure functions and public functions |
US20180225661A1 (en) | 2017-02-07 | 2018-08-09 | Microsoft Technology Licensing, Llc | Consortium blockchain network with verified blockchain and consensus protocols |
US20200394652A1 (en) | 2017-03-08 | 2020-12-17 | Ip Oversight Corporation | A method for creating commodity assets from unrefined commodity reserves utilizing blockchain and distributed ledger technology |
WO2018170504A1 (en) | 2017-03-17 | 2018-09-20 | Labyrinth Research Llc | Unified control of privacy-impacting devices |
US20200067697A1 (en) | 2017-03-22 | 2020-02-27 | NEC Laboratories Europe GmbH | Method for operating a blockchain |
US10102526B1 (en) | 2017-03-31 | 2018-10-16 | Vijay K. Madisetti | Method and system for blockchain-based combined identity, ownership, integrity and custody management |
US20180308072A1 (en) | 2017-04-21 | 2018-10-25 | Gem | Method and apparatus for blockchain management |
US20180315055A1 (en) | 2017-05-01 | 2018-11-01 | International Business Machines Corporation | Blockchain For Issue/Defect Tracking System |
WO2018204541A1 (en) | 2017-05-02 | 2018-11-08 | Luther Systems | Financial derivative contract execution platform, system and method |
US10657607B2 (en) | 2017-05-06 | 2020-05-19 | Adp, Llc | Implementation of payroll smart contract on a distributed ledger |
US10708070B2 (en) | 2017-05-24 | 2020-07-07 | Nxm Labs Canada Inc. | System and method for utilizing connected devices to enable secure and anonymous electronic interaction in a decentralized manner |
CN110692214B (en) | 2017-06-02 | 2023-10-31 | 维萨国际服务协会 | Method and system for ownership verification using blockchain |
WO2018222797A1 (en) | 2017-06-02 | 2018-12-06 | Walmart Apollo, Llc | Systems and methods for product review management with distributed database |
US20180349896A1 (en) | 2017-06-05 | 2018-12-06 | Mastercard International Incorporated | Method and system for anonymization of electronic transactions via blockchain |
EP3416334B1 (en) | 2017-06-15 | 2020-01-15 | Accenture Global Solutions Limited | Portable biometric identity on a distributed data storage layer |
US11922363B2 (en) | 2017-07-05 | 2024-03-05 | United Parcel Service Of America, Inc. | Counterparty physical proximity verification for digital asset transfers |
WO2019010392A1 (en) | 2017-07-07 | 2019-01-10 | Symbiont.Io, Inc. | Systems, methods, and devices for reducing and/or eliminating data leakage in electronic ledger technologies for trustless order matching |
EP3649557A4 (en) | 2017-07-07 | 2020-12-09 | Visa International Service Association | System, method, and apparatus for implementing a blockchain-based entity identification network |
EP3649593A4 (en) | 2017-07-07 | 2021-03-24 | Visa International Service Association | System, method, and apparatus for implementing a blockchain-based rewards network |
US20190020653A1 (en) | 2017-07-12 | 2019-01-17 | Averon Us, Inc. | Method and apparatus for secure cross-service content selection and delivery based on mobile device identity |
US10984134B2 (en) | 2017-07-14 | 2021-04-20 | Microsoft Technology Licensing, Llc | Blockchain system for leveraging member nodes to achieve consensus |
US10664797B2 (en) | 2017-07-19 | 2020-05-26 | Amazon Technologies, Inc. | Distributed ledger certification |
US10839379B2 (en) | 2017-07-20 | 2020-11-17 | Chicago Mercantile Exchange Inc. | Blockchain including linked digital assets |
US10055715B1 (en) | 2017-07-26 | 2018-08-21 | Square, Inc. | Cryptocurrency payment network |
US10829088B2 (en) | 2017-09-22 | 2020-11-10 | Sensormatic Electronics, LLC | Identity management for implementing vehicle access and operation management |
US10607484B2 (en) | 2017-12-28 | 2020-03-31 | Intel Corporation | Privacy-preserving distributed visual data processing |
US11288740B2 (en) | 2017-12-29 | 2022-03-29 | Intel Corporation | Securing distributed electronic wallet shares |
US11502841B2 (en) | 2018-03-07 | 2022-11-15 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
US11716320B2 (en) | 2018-03-27 | 2023-08-01 | Workday, Inc. | Digital credentials for primary factor authentication |
US11836721B2 (en) | 2018-06-29 | 2023-12-05 | Intel Corporation | Protection of information in an information exchange |
US11432149B1 (en) | 2019-10-10 | 2022-08-30 | Wells Fargo Bank, N.A. | Self-sovereign identification via digital credentials for selected identity attributes |
-
2016
- 2016-12-20 US US15/385,035 patent/US10817593B1/en active Active
-
2020
- 2020-10-23 US US17/079,095 patent/US11755707B1/en active Active
-
2023
- 2023-09-11 US US18/244,662 patent/US20230418918A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US10817593B1 (en) | 2020-10-27 |
US11755707B1 (en) | 2023-09-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11120158B2 (en) | Secure permissioning of access to user accounts, including secure distribution of aggregated user account data | |
US11593476B2 (en) | Data breach score and method | |
US10963878B2 (en) | System and method for financial management | |
CN109155030B (en) | System and method for facilitating network transactions | |
US20230033992A1 (en) | Transaction completion via application interaction | |
RU2602394C2 (en) | Payment privacy tokenisation apparatus, methods and systems | |
US9922324B2 (en) | Verified purchasing by email | |
US20230418918A1 (en) | User information gathering and distribution system | |
US20160321722A1 (en) | Systems and methods for obtaining consumer data | |
US20200380481A1 (en) | Autonomous bill pay bot with automatic social overdraft protection | |
KR20220035050A (en) | Identity and risk scoring of tokenized assets and associated token transactions backed by government bonds | |
BR112013021057A2 (en) | universal electronic payment devices, methods and systems | |
US11373176B2 (en) | Systems and methods for federated identity management | |
US20230252467A1 (en) | Predicting and making payments via preferred payment methods | |
CN110494842A (en) | Safety certification and Financial Attribute service | |
US11188887B1 (en) | Systems and methods for payment information access management | |
US20240007506A1 (en) | Enterprise account aggregation and visualization system | |
US20170099294A1 (en) | Multi-Party Secure Information Integration System | |
US20210383382A1 (en) | Systems and methods for customer control of data | |
US20150081496A1 (en) | System and Method for an Integrated Financial Management Tool | |
US20210192612A1 (en) | Peer-to-peer lending platform based on financial health analysis | |
US20200160427A1 (en) | Systems and methods for aggregating, exchanging, and filtering data over a communications network | |
CA3037134A1 (en) | Systems and methods of generating a pooled investment vehicle using shared data | |
US11281765B1 (en) | Token management systems and methods | |
WO2018142272A9 (en) | A method of controlling personal information and allowing interaction with authenticated users |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |