US20230418918A1 - User information gathering and distribution system - Google Patents

User information gathering and distribution system Download PDF

Info

Publication number
US20230418918A1
US20230418918A1 US18/244,662 US202318244662A US2023418918A1 US 20230418918 A1 US20230418918 A1 US 20230418918A1 US 202318244662 A US202318244662 A US 202318244662A US 2023418918 A1 US2023418918 A1 US 2023418918A1
Authority
US
United States
Prior art keywords
user information
user
information
transaction
entity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/244,662
Inventor
Venu Andra
Balinder Mangat
Tabari D. Williams
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wells Fargo Bank NA
Original Assignee
Wells Fargo Bank NA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wells Fargo Bank NA filed Critical Wells Fargo Bank NA
Priority to US18/244,662 priority Critical patent/US20230418918A1/en
Publication of US20230418918A1 publication Critical patent/US20230418918A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/082Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication

Definitions

  • the information may include basic information associated with the individual such as first name, last name, email address, phone number, birthday, home address and so on.
  • the information may also include information confidential to the individual such as social security number, health information, credit information, insurance information and so on.
  • individuals store this information in a variety of places (e.g., financial institution, safe, government agency, etc.).
  • Individuals may also be asked to provide pieces of this information to many different entities during a transaction. For example, when an individual is getting approved for a mortgage, buying a new car, or visiting the hospital, the individual may be asked to provide a variety of information.
  • the individual may not know what information is needed, or the individual may not have the information needed readily available. If the individual does not know what information is needed for certain transactions, the individual may provide too much or too little information to the entity. Providing too much information to an entity may be dangerous for the individual as the information may be used fraudulently by the entity or be available to others whom may use the information fraudulently.
  • One embodiment of the invention relates to a method of alerting a user of user information to be sent to an entity during a transaction, the method being performed by a user information service (UIS) computing system associated with an information service.
  • the method includes populating, by a UIS information circuit and an associated user database, an account with user information received from at least one of the user and a plurality of entities.
  • the method further includes receiving, by the UIS information circuit over a network via a network interface circuit, a user information request relating to a transaction from an entity computing system associated with the entity.
  • the method includes sending, by a security circuit of the UIS information circuit, an alert including an approval request to a user computing device associated with the user over the network, wherein the approval request contains an identification of user information requested in the user information request.
  • the method further includes receiving, by the security circuit, an approval of the approval request from the user computing device.
  • the method includes providing, by the UIS information circuit and the user information database, the approved information to the entity to complete the transaction.
  • Another embodiment relates to a non-transitory computer readable media having computer-executable instructions embodied therein that, when executed by a computing system associated with a second party to an agreement causes the second party computing system to perform operations for demonstrating consensus agreement.
  • the operations include populating, by an associated user database, an account with user information received from at least one of the user and a plurality of entities.
  • the operations further include receiving a user information request relating to a transaction from an entity computing system associated with the entity, sending an alert including an approval request to a user computing device associated with the user over the network, wherein the approval request contains an identification of user information requested in the user information request.
  • the operations further include receiving an approval of the approval request from the user computing device and providing, by the user information database, the approved information to the entity to complete the transaction.
  • the device includes a network interface circuit configured to communicate with a user computing device associated with a user and an entity computing system.
  • the method further includes at least one processor operatively coupled to a non-transient memory to form a UIS information circuit.
  • the circuit is structured to populate, in a user information database, an account with user information.
  • the circuit is further structured to receive, via a network interface circuit, a user information request from an entity computing system over a network.
  • the circuit is structured to send, via a security circuit, an alert including an approval request indicating the user information requested in the user information request to the user computing device over the network.
  • the circuit is further structured to receive a response to the approval request from the user computing device.
  • the circuit is structured to provide user information corresponding to the user information request and the response to the approval request to the entity computing system.
  • FIG. 1 is a diagram of a data exchanging system, according to an example embodiment.
  • FIG. 2 is a diagram of information and data flows of the data exchanging system of FIG. 1 , according to an example embodiment.
  • FIG. 3 is a flow diagram of a method of populating user information for a user account, according to an example embodiment.
  • FIG. 4 is a flow diagram of a method of providing user information to an entity, according to an example embodiment.
  • FIG. 5 is a flow diagram of a method of comparing a user information request from an entity, according to an example embodiment.
  • FIG. 6 is a flow diagram of a method of preparing user information for a predicted transaction, according to an example embodiment.
  • FIG. 7 is a flow diagram of a method of determining if a user has user information ready for a potential transaction, according to an example embodiment.
  • the user information systems and methods are structured to receive a plurality of user information types (e.g., social security number, insurance information, etc.) associated with a user and to enable the user to manage and distribute the information in a secure, convenient, efficient, and time-saving manner.
  • the user information system may be accessed with at least one user device (e.g., a mobile device, a smart watch, etc.).
  • the user information system is structured to receive an information request from an entity (e.g., bank, car dealer, etc.) based on a transaction type (e.g., mortgage approval, buying a car, etc.), compare the information request to information requests from similar entities for similar transactions, and to provide the user information to the entity.
  • entity e.g., bank, car dealer, etc.
  • a transaction type e.g., mortgage approval, buying a car, etc.
  • the user information functions allow the user to add, manage, and distribute the user information.
  • the user information system also predicts and verifies the user information needed for a given transaction to protect the user from risks of giving too much or incorrect information to an entity.
  • the computing system 100 includes a user 102 , a plurality of entities 108 , a user information service 120 , and a network 140 .
  • the network 140 may include any of various types of data exchanging networks.
  • the network 140 may include wireless networks (e.g., 802.11X, ZigBee′, Bluetooth, Internet, etc.), wired networks (e.g., Ethernet), or any combination thereof.
  • the network 140 is structured to permit the exchange of data, values, instructions, messages, etc. between and among the user computing device 104 , the entity computing system 110 , and the user information service computing system 122 .
  • the user 102 may include individuals, business representatives, large and small business owners, other entities, and so on.
  • the user 102 is associated with a user computing device 104 .
  • the user computing device 104 may be, but is not limited to, a mobile computing device (e.g., a smartphone, tablet computer, laptop computer, person digital assistant, etc.), a desktop computing device, a wearable computing device, etc.
  • Wearable computing devices refer to any type of computing device that a user 102 wears including, but not limited to, a watch, glasses, bracelet, etc.
  • the user computing device 104 includes a user information circuit 106 .
  • the user information circuit 106 is structured to allow the user 102 to communicate with the user information service 120 .
  • the user information circuit 106 may be structured to provide a user interface (e.g., a graphical user interface) that permits the user 102 to provide information (e.g., user information) that is communicated to a user information service computing system 122 associated with the user information service 120 .
  • the user information circuit 106 may be communicably coupled to a processor, non-transient memory, and network interface enabling the user computing device 104 to exchange data over the network 140 .
  • the user information circuit 106 communicates data to and from the user information service computing system 122 via network 140 .
  • the user 102 may download a user information application (e.g., a software “app”) prior to use, which may be used to set up and configure the user information circuit 106 .
  • the user information circuit 106 is hard coded into the memory of the user computing device 104 .
  • the user information circuit 106 is a web-based interface application accessed via the Internet on a web browser executed on the user computing device 104 . In such arrangements, the user information circuit 106 is executed and maintained remotely (e.g., on the user information service computing system 110 ).
  • the user 102 logs onto or accesses the web-based interface to access the user information circuit 106 .
  • the user information circuit 106 is supported by a separate computing system comprising one or more servers, processors, network interface circuits, etc. that transmit the applications for use to the user computing device 104 .
  • the user information circuit 106 may include an application programming interface (API) and/or a software development kit (SDK) that facilitates the integration of other applications with the user information circuit 106 .
  • API application programming interface
  • SDK software development kit
  • Each of the entities 108 provide services to a plurality of users, including the user 102 .
  • Examples of the entities 108 include financial institutions, merchants, insurance companies, utility companies, social media networks, e-mail systems, health care providers, etc.
  • Each of the plurality of entities 108 operates and/or is associated with a respective entity computing system 110 .
  • Each entity computing system 110 includes a processor 112 , memory 114 , a network interface circuit 116 and a user information database 118 .
  • the network interface circuit 116 facilitates the sending and receiving of data, commands, instructions, values, etc. over the network 140 (e.g., to and from the user information service computing system 120 , etc.).
  • Each entity computing system 110 is communicably coupled to the user information service computing system 122 and/or the user computing device 104 via the network 140 .
  • the entity computing system 110 also includes a user information database 118 that stores user information relating to the user 102 .
  • the entity computing system 110 may maintain information about one or more of the entities 108 , information regarding user 102 (e.g., accounts associated with the user 102 and a respective one of the entities 108 , etc.) and so on in the user information database 118 .
  • more than one entity 108 with an associated entity computing system 110 may be communicably coupled to the components of FIG. 1 over the network 140 to accommodate user information associated the user 102 at a plurality of entities 108 .
  • the user information database may store user account information including account numbers, balances, credit limits, and so on.
  • the user information service 120 is affiliated with a given entity 108 (e.g., a financial institution). In other arrangements, the user information service 120 is not directly affiliated with a given entity 108 .
  • the user information service 120 includes a user information service computing system 122 .
  • the user information service computing system 120 includes a processor 124 , memory 126 , a network interface circuit 128 , and a user information service (“UIS”) information circuit 130 .
  • the network interface circuit 128 facilitates the sending and receiving of data, commands, instructions, values, etc. over the network 140 (e.g., to and from the user computing device 104 , to and from the entity computing system 110 , etc.).
  • the user information service computing system 122 is structured to provide storage of user information associated with the user 102 and distribution of user information associated with the user 102 to one or more of the entities 108 .
  • the UIS information circuit 130 of the user information service computing system 122 provides storage and distribution of user information to the user 102 via the user information circuit 106 .
  • the operation of the user information service computing system 122 and the UIS information circuit 130 are described in further detail with respect to FIGS. 2 through 7 .
  • the UIS information circuit 130 at the user information service computing system 122 communicates data to and from the user information circuit 106 and the entity computing system 110 via the network 140 , and includes a user information database 132 , a transaction type database 134 , a security circuit 136 , and a prediction circuit 138 .
  • the user information database 132 includes storage media or access thereto structured to retrievably store user information flowing into the UIS computing system 122 .
  • the transaction type database 134 retrievably stores information relating to a plurality of different transaction types, including types of user information relevant to each of the plurality of different transaction types.
  • the information in the user information database 132 is shared with the transaction type database 134 .
  • the security circuit 136 is structured to maintain and apply various security protocols relating to information stored in the user information database 132 , as well as information requested from the user 102 .
  • the prediction circuit 138 is structured to predict future transactions based on information flowing to the UIS computing system 122 (e.g., information from the user information circuit 106 ) and information stored at the user information database 132 and the transaction type database 134 .
  • information flowing to the UIS computing system 122 e.g., information from the user information circuit 106
  • information stored at the user information database 132 and the transaction type database 134 Various example operations of the UIS information circuit are discussed in more detail below.
  • the user information service computing system 122 receives a plurality of inputs, including, but not limited to, incoming user information 202 , information request 204 , potential transaction 206 , user input 208 from at least the user information circuit 106 and the entity computing system 110 .
  • Incoming user information 202 may be any type of information relating to the user 102 .
  • the incoming user information 202 may be personal information (e.g., social security number, birthday, home address, name, etc.), financial information (e.g., credit score, bank account balances, etc.), health information (e.g., allergies, vaccinations, family medical history, etc.) and so on.
  • the incoming user information 202 may be received by the user information service computing system 122 from the user computing device 104 .
  • the incoming user information 202 may be received from the entity computing system 110 .
  • the user information computing system 122 may receive health care information (incoming user information 202 ) associated with the user 102 from a computing system associated with a health care provider.
  • Information request 204 may be a request from the entity computing system 110 for user information associated with the user 102 sent to the user information service computing system 122 .
  • the information request 204 may include a list of specific user information that is being requested.
  • the information request 204 may also include the entity 108 that is requesting the user information.
  • the information request 204 may indicate a type of transaction for which the entity computing system 110 is requesting the user information.
  • Potential transaction 206 is a transaction, indicated by the user 102 via the user information circuit 106 , that the user 102 may complete in the future. For example, if the user 102 is planning on purchasing a car, but not for a few months the user 102 may send the user information service computing system 122 a potential transaction 206 . In this case, the user 102 may want to plan ahead to gather additional user information that may be needed for the potential transaction 206 .
  • the potential transaction 206 is received by the user information service computing system 122 from the user information circuit 106 .
  • User input 208 refers to input received from the user 102 at the user information circuit 106 .
  • the user input 208 may include user responses to approval request 212 , flagged request 214 , alert 216 , and/or predicted transaction 218 , discussed below.
  • user input 208 also includes setting and preferences associated with a user account for the user 102 with the user information service 120 .
  • the UIS information circuit 130 at the user information service computing system 122 is also structured to provide information, requests, and alerts 216 to the entity computing system 110 and the user information circuit 106 .
  • An alert 216 is a notification to be received at the user computing device 104 , and may specify a type of pending request, an requested response from the user 102 , a notification, and so on.
  • the user information circuit 106 may receive the alert 216 over the network 140 and use any of a variety of output devices at the user computing device 104 to bring the alert 216 to the attention of the user 102 .
  • the alert 216 may be associated with any of the outgoing types of data from the UIS computing system 122 (e.g., an approval request 212 , a flagged request 214 , a predicted transaction 218 , etc.).
  • the alert 216 may be sent via email, text message, push notification, etc.
  • the user 102 may set up and configure alerts 216 and alert preferences when setting up the user account.
  • the user information service computing system 122 may provide outgoing user information 210 to one or more of the plurality of entities 108 .
  • Outgoing user information 210 may be substantially similar to incoming user information 202 in that outgoing user information 210 may include any of various types of information relating to a given user.
  • outgoing user information 210 is a set of user information that will be provided to the entity computing system 110 .
  • the outgoing user information 210 sent to the entity computing system 110 may only include name, address, and credit score.
  • the security circuit 136 may provide an approval request 212 and a corresponding alert 216 to the user information circuit 106 to notify the user 102 of information relating to an information request 204 received from one or more of the plurality of entities 108 .
  • the security circuit 136 may provide the user information circuit 106 with all the user information that was requested in the information request 204 , as well as information relating to the type of transaction for which the user information is being requested, and the entity 108 that is requesting the user information in the approval request 212 .
  • the security circuit 136 may receive, from the user 102 via the user information circuit 106 , user input 208 indicating an approval of the user information of approval request 212 .
  • a flagged request 214 and a corresponding alert 216 may be provided to the user information circuit 106 by the security circuit 136 to notify the user 102 of information relating to an information request 204 received from one or more of the plurality of entities 108 when a piece of user information requested is unusual (e.g., medical information requested when getting a car loan).
  • the prediction circuit 138 is structured to predict a potential future transaction the user 102 may be making based on activity by the user 102 on the user computing device 104 .
  • the prediction circuit 138 may provide a predicted transaction 218 and a corresponding alert 216 to the user information circuit 106 , which in turn may provide the predicted transaction 218 to the UIS information circuit 130 .
  • the UIS information circuit 130 may provide transaction information 220 to the user information circuit 106 from the transaction type database 134 to inform the user 102 about a transaction that is presently occurring or is actually set to occur.
  • the incoming user information 202 may be transmitted to the user information service computing system 122 via the user information circuit 106 of the user computing device 104 .
  • the UIS information circuit 130 may treat the incoming user information 202 as a request to create an account with the user information service 120 .
  • the user account contains incoming user information 202 received from the user 102 , and all of the incoming user information 202 may be stored in user information database 132 .
  • the user information database 132 is configured to store and manage incoming user information 202 associated with user 102 at the user information service computing system 122 .
  • the UIS information circuit 130 may also receive incoming user information 202 from one or more entities 108 associated with user 102 (e.g., social media, health care provider, etc.).
  • entity 108 associated with user 102
  • the user information database 132 maintains user account settings and preferences.
  • the information request 204 is transmitted to the user information computing system 122 from the entity computing system 110 .
  • the information request 204 may specify the entity 108 requesting the user information, the type of transaction occurring, and the user information being requested.
  • the term “transaction” may refer to financial and non-financial transactions.
  • An example of a non-financial transaction may be providing outgoing user information 210 to an entity.
  • the term “transaction” may refer to any operation or interaction executed by the user 102 with an entity 108 (e.g., visiting the doctor, making a flight reservation using frequent flier miles, financial transactions, buying a car, getting approved for a loan, etc.).
  • the UIS information circuit 130 may compare the information request 204 to other requests of similar transaction types using the transaction type database 134 .
  • Information relating to different types of transactions and user information commonly requested for these types of transactions is stored in transaction type database 134 .
  • the transaction type database 134 may be constantly updating the outgoing user information 210 requested for certain transactions. In this regard, the transaction type database 134 may be dynamic and adaptive to learn what user information is commonly requested for a transaction.
  • the transaction type database 134 may be updated manually by personnel (e.g., employees, etc.) associated with the user information service 120 , or may use prior transactions of all users with accounts at the user information service 120 , including user 102 .
  • the security circuit 136 is structured to determine if information requested by the entity is consistent with information normally requested by a similar entity for a similar transaction type.
  • the security circuit 136 may also be structured to flag inconsistent information and send the user 102 a flagged request 214 and a corresponding alert 216 .
  • the UIS information circuit 130 compares the information request 204 to similar information requests of the same or similar type that are maintained in the transaction type database 134 , user information that is requested in information request 204 that is not consistent with information requests of the same or similar type may be flagged by the security circuit 136 .
  • the security circuit 136 may have different levels or criteria for flagging requested user information. The flagging levels may be preset or determined by the user 102 when the user account is created.
  • the flagging levels may also be based on more than one type of criteria (e.g., frequency of request, level of security of information, etc.).
  • the security circuit 136 is also structured to determine the level of security for each piece of information the user 102 provides, and maintain security protocol for sharing information with a certain security level. For example, the security circuit 136 may require the user 102 to provide a password before the UIS information circuit 130 can share the social security number of the user 102 with one of the entities 108 .
  • the UIS information circuit 130 may provide the user 102 with an alert 216 via the user information circuit 106 when certain user information is requested.
  • the UIS information circuit 130 may provide the user 102 with alert 216 via the user information circuit 106 when user information is requested that the user 102 does not have linked or stored in the user information database 132 .
  • Alert 216 may also be provided to the user 102 via the user information circuit 106 to remind the user 102 to provide the user information service computing system 122 with user information that will be needed for a future transaction the user 102 has indicated (e.g., potential transaction 206 ).
  • the UIS information circuit 130 may receive a potential transaction 206 generated and transmitted from the user information circuit 106 .
  • the user 102 may be planning on completing a transaction (e.g., getting a loan, qualifying for a mortgage, buying a car, etc.) and use the user information circuit 106 to transmit a corresponding potential transaction 206 to the user information service computing system 122 .
  • the UIS information circuit 130 may search the transaction type database 134 to determine the user information that may be needed to complete the potential transaction 206 . In view of the information returned from the transaction type database 134 , the user 102 may have time to gather additional user information that is needed and check to see if the user information is accurate before completing a transaction with any one or more entity 108 .
  • the UIS information circuit 130 may receive the potential transaction 206 from entity computing system 110 .
  • the user 102 may visit one or more of the entities 108 looking for information regarding a transaction.
  • the entity computing system 110 may send a potential transaction 206 to the user information service computing system 122 indicating that user 102 may complete a transaction with entity 108 .
  • the entity computing system 110 may also indicate what user information would be needed to complete the transaction. Again, the user 102 would have time to gather additional user information that may be needed and check to see if the user information is accurate before completing a transaction with entity 108 .
  • the UIS information circuit 130 may cooperate with the prediction circuit 138 to provide predicted transactions 218 to the user 102 .
  • a predicted transaction 218 is information relating to an anticipated transaction based on the past behavior of the user 102 .
  • the user information service computing system 122 may monitor other applications on the user computing device 104 and/or monitor website activity on the user computing device 104 to predict a potential transaction 218 of the user 102 .
  • the prediction circuit 138 may be set with different transactions that could be completed and information that may be indicative of the transaction. For example, if the user 102 is looking up homes or properties, the prediction circuit 138 may predict the user 102 will be purchasing a home.
  • the UIS information circuit 130 may notify (e.g., via alert 216 ) the user 102 of the predicted transaction 218 via the user information circuit 106 .
  • the user 102 may transmit user input 208 to the user information service computing system 122 indicating if the predicted transaction 218 is accurate.
  • the UIS information circuit 130 may use the transaction type database 134 to provide the user 102 with outgoing user information 210 corresponding to user information that would likely be needed for the predicted transaction 218 .
  • the user 102 may provide user input 208 to the user information service computing system 122 via the user information circuit 106 .
  • the approval may include each piece of user information that is approved by user 102 to be sent to the entity computing system 110 .
  • the security circuit 136 may require the user 102 to provide authorization with the user input 208 indicating an approval.
  • the security circuit 136 may also require the entity 108 (e.g., an employee associated with entity 108 ) to provide authorization or authentication before outgoing user information 210 is provided.
  • the entity 108 may have to provide the security circuit 136 with a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc.
  • the user input 208 may include a selection of one or more entity 108 when the user 102 has already approved all the outgoing user information 210 to be sent to one or more entity 108 (e.g., potential transaction 206 , predicted transaction 218 , etc.).
  • the user information service computing system 122 transmits the approved outgoing user information 210 to entity computing system 110 .
  • FIG. 3 a flow diagram of a method 300 of populating user information for a user account with the user information service computing system 122 is shown, according to an example embodiment.
  • the method 300 registers the user 102 with the user information service 120 and gathers user information associated with the user 102 .
  • a user account is created at 302 .
  • the user account created may be initiated by user 102 transmitting incoming user information 202 to the user information service computing system 122 via the user information circuit 106 .
  • the user 102 may provide additional information that is optional for the user 102 to include for registration. For example, the user 102 may have the option to add a phone number, set preferences for the user account, and change the password associated with the user account.
  • the user account may also include system preferences the user 102 defines.
  • the system preferences may include security preferences, usage preferences, alert preferences, and so on.
  • the security preference may define the requirements needed by the security circuit 136 before accessing the user information service computing system 122 via the user information circuit 106 .
  • a security preference may require the user 102 to provide a password (e.g., word, phrase, alphanumeric value, etc.), a biometric scan (e.g., a fingerprint scan, a retina scan, a voice sample, etc.), a semi-random number (e.g., as generated by a changing security token device), or a combination thereof to the security circuit 136 before the user 102 may access the user information service computing system 122 .
  • the security circuit 136 may also allow the user 102 to define user information (e.g., social security number, etc.) that require a second passcode to authorize transmission to entity computing system 110 .
  • Alert preferences may include when alert 216 is sent to the user information circuit 106 (e.g., information request 204 received, social security number requested, etc.), a form of alert 216 (e.g., text message, email, notification, etc.) and information included in alert 216 (e.g., user information requested, transaction type, entity 108 requesting the information, etc.).
  • a form of alert 216 e.g., text message, email, notification, etc.
  • information included in alert 216 e.g., user information requested, transaction type, entity 108 requesting the information, etc.
  • Incoming user information 202 is added to the user account by the UIS information circuit 130 at 304 .
  • the user 102 may manually enter the user information via input devices associated with the user computing device 104 .
  • the user information circuit 106 provides a graphical user interface with labeled spaces for the user 102 to enter specified information. For example, the user 102 may fill in the home address of user 102 in a box labeled “Home Address.”
  • the user 102 may also include information about one or more of the entities 108 that may provide additional incoming user information 202 .
  • the user 102 may provide information regarding a health care provider or financial institution associated with the user 102 to the user information service computing system 122 via the user information circuit.
  • the user 102 may link the user information circuit 106 to other applications used by the user 102 that include user information (e.g., mobile banking application, social media application, etc.).
  • the user information service computing system 122 may request user information from the entity computing system 110 , at 306 .
  • the UIS information circuit 130 may request healthcare information associated with user 102 from the health care provider indicated by the user 102 at 304 . Additionally, the user information service computing system 122 may request user information from the user 102 via the user information circuit 106 . If the UIS information circuit 130 has a set of user information (e.g., name, email, phone number, address, etc.) that is required for all users, including user 102 , the UIS information circuit 130 may send alert 216 to the user 102 via the user information circuit 106 indicating that user information is missing and/or incomplete.
  • a set of user information e.g., name, email, phone number, address, etc.
  • the UIS information circuit 130 of the user information service computing system 122 receives incoming user information 202 at 308 .
  • the incoming user information 202 received at 308 may be the user information requested at 306 , or additional information provided to the UIS information circuit 130 via the user information circuit 106 or the entity computing system 110 .
  • the information requested is information that remains constant (e.g., social security number, birthday, etc.), or relatively constant (e.g., home address, last name, insurance information, healthcare information, etc.)
  • the user information database 132 may receive a copy of the user information.
  • the UIS information circuit 130 may receive access to the user information instead of receiving copy of the user information.
  • the incoming user information 202 received at 308 may be compared to the user information currently associated with the user account and/or other incoming user information 202 being received by the user information database 132 .
  • the UIS information circuit 130 may send the alert 216 to the user 102 via the user information circuit 106 when a discrepancy is determined between pieces of user information. For example, if the home address associated with the user 102 received from one entity 108 is listed as “Pin Oak” and the home addressed associated with the user 102 at a different entity 108 is listed as “Pine Oak,” the user 102 may send user input 208 to the user information service computing system 122 indicating the information that is correct and should be stored in the user information database 132 . In some embodiments, the user information service computing system 122 may ask the user 102 via alert 216 to the user information circuit 106 to verify the user information received from the various entity computing systems 110 even if no discrepancies are found for the piece of user information.
  • the UIS information circuit 130 of the user information service computing system 122 stores, manages, and distributes the user information at 310 .
  • the user information that is constant or relatively constant may be stored by the user information computing system 122 . However, the user information may still be modified by user 102 via the user information circuit 106 , but may require manual updating of the user information.
  • User information that is relatively fluid, or changes frequently may be managed by the user information database 132 . This information may be updated frequently as entities 108 associated with the user information (e.g., a financial institution associated with a financial account of user 102 ) update the user information. Additionally, some user information may be managed on a set cycle or by user input.
  • the user 102 may indicate that the user 102 visits the eye doctor once a year, generally in March.
  • the user information service computing system 122 may only request updated user information relating to the eye doctor (e.g., vision prescription, etc.) at the end of March, or may periodically check for user information updates during the month of March. If the user 102 instead visits the eye doctor in February, the user 102 may indicate via the user information circuit 106 , that the user information associated with the eye doctor has been updated.
  • the user information service computing system 122 may request user information from a computing system (e.g., entity computing system 110 ) associated with the eye doctor (e.g., entity 108 ) based on the user input 208 indication received from user information circuit 106 . User information may then be selectively distributed to entity computing system 110 by the user information service computing system 122 . Additional methods for managing and distributing user information are explained in further detail below with respect to FIGS. 4 - 7 .
  • FIG. 4 a flow diagram of a method 400 of providing user information to an entity using the user information service computing system 122 is shown, according to an example embodiment.
  • the method 400 provides user information to computing system 122 based on a transaction occurring between the user 102 and one or more of the entities 108 .
  • the method 400 may be initiated in two ways, by the user 102 , or by one or more of the entities 108 .
  • the user information service computing system 122 receives an information request 204 from the entity computing system 110 at 402 .
  • the information request 204 may include a list of all the user information (e.g., name, address, credit score, financial institution, etc.) being requested for the user 102 by the entity 108 for a transaction.
  • the information request 204 may also include the type of transaction that is taking place (e.g., mortgage approval, etc.) and/or information relating to the entity 108 .
  • the entity 108 may have to register (e.g., create an entity account, etc.) with the user information service computing system 122 before the information request 204 can be received from the entity computing system 110 .
  • the entity 108 may not have to register with the user information service before the user information service computing system 122 can receive an information request 204 from the entity computing system 110 .
  • the entity computing system 110 may have to provide at least basic user information (e.g., first and last name, phone number, etc.) to the user information service computing system 122 to identify the account associated with the user 102 at the user information service 120 .
  • the security circuit 136 may require the entity computing system 110 to provide a form of authentication to ensure the entity computing system 110 is not trying to obtain user information for fraudulent purposes.
  • the entity 108 may have to register an entity account and provide a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. to the security circuit 136 before the user information service computing system 122 responds to the information request 204 .
  • a password e.g., phrase, number, alphanumeric sequence, etc.
  • a biometric e.g., fingerprint, retina, etc.
  • the entity 108 may have an entity number to associate the entity 108 with the user information service computing system 122 .
  • the entity number may be associated with a user information service 120 account held by the user information service computing system 122 for the entity 108 .
  • the entity account may contain information relating to transactions common for the entity 108 stored in the transaction type database 134 .
  • a car dealership may have car loan and car purchase transactions associated with the entity account stored in the transaction type database 134 .
  • the transaction type database 134 may also contain information commonly requested for the transactions associated with the entity 108 .
  • the user information service computing system 122 can use this information to determine if the entity computing system 108 is requesting information consistent with information requests 204 made in the past.
  • the security circuit 136 may suspect fraudulent activity relating to the entity computing system 110 . Inconsistent user information requests will be described in greater detail with respect to FIG. 5 .
  • the user information service computing system 122 may send an approval request 212 and a corresponding alert 216 to the user 102 via the security circuit 136 of the user information circuit 106 at 404 .
  • the approval request 212 may present the user information in a way that indicates the type of user information without revealing the user information. For example, the approval request 212 may indicate that the home address of user 102 was requested, without actually providing the home address of the user 102 .
  • the user 102 may be notified by the user information service computing system 122 via the user information circuit 106 of the approval request 212 and have to log in to the user information computing system 122 to see the approval request 212 .
  • the user 102 may receive a notification saying “Someone has requested user information, please login to approve this request,” etc.
  • the approval request may also include information identifying the entity 108 that sent the information request 204 . By identifying the entity 108 , the user 102 can provide the correct outgoing user information 210 to the entity 108 .
  • the approval request 212 may also include the transaction information 220 .
  • the approval request 212 sent be the user information service computing system 122 may indicate that the user information is being requested to complete a car loan.
  • the user 102 can verify the entity 108 requested the user information for the correct transaction.
  • the approval request 212 may also indicate to the user 102 if any user information was requested that is not associated with the user information database 132 .
  • the user information service computing system 122 receives a response to the approval request from the user 102 via user input 208 from the user information circuit 106 at 406 .
  • the response to the approval request indicates which user information has been approved by the user 102 to share with the entity 108 that sent information request 204 .
  • the user 102 may approve all, part or none of the user information in the user input 208 . If the user 102 does not approve any of the user information sought in the user information request 204 , the method 400 may terminate.
  • outgoing user information 210 is provided to the entity computing system 110 of the entity 108 that sent the information request 204 at 414 .
  • the response may indicate which user information is to be shared (e.g., checking account, one of the home addresses, etc.) with the entity computing system 110 for a given type of user information.
  • the user 102 may choose to approve all pieces of the same type of user information with the user input 208 .
  • the user 102 may approve the user information by checking a box next to the user information using a graphical user interface associated with the user information circuit 106 .
  • the user 102 may have to provide authorization to the security circuit 136 in order to approve a piece of user information with high security. For example, if the user 102 is approving the social security number associated with the user 102 , the user may have to provide authorization to the security circuit 136 . For example, the user 102 may have to provide a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. to the security circuit before the outgoing user information 210 is authorized to be sent to the entity computing system 110 . In some embodiments, all user information requires authorization, while higher level security information requires secondary authorization from the security circuit 136 . Other methods of selecting and approving information for approval are intended to fall within the scope of the present disclosure.
  • a password e.g., phrase, number, alphanumeric sequence, etc.
  • a biometric e.g., fingerprint, retina, etc.
  • the user information service computing system 122 may receive a potential transaction 206 from user 102 via the user information circuit 106 at 408 .
  • the user information service computing system 122 may receive the potential transaction from the entity computing system 110 .
  • the potential transaction 206 received from the entity computing system 110 by the user information service computing system 122 may contain information consistent with the information request 204 received at 402 .
  • the entity computing system 110 is not requesting any user information, the entity computing system 110 is simply providing the user information service computing system 122 , and the user 102 , with an indication of what user information would be requested.
  • the user information service computing system 122 receives selected user information from the user 102 via user input 208 from the user information circuit 106 at 410 . If the potential transaction 206 was received by the user information service computing system 122 from the user information circuit 106 , the transaction type database 134 may provide suggestions to the user 102 of what user information may be involved in the potential transaction 206 . The user 102 can select relevant user information from the user information stored and managed by the user information database 132 , or add additional user information relevant to the potential transaction. Alternatively, if the potential transaction was sent by the entity computing system 110 , the user 102 may approve the user information, much like was done at 406 . The selected user information may be stored in the user information database 132 so the user information is accessible when the user 102 is ready to complete a transaction.
  • the user information service computing system 122 receives an entity selection at 412 from user input 208 from the user information circuit 106 . Since the potential transaction 206 may have been initiated by the user 102 at 408 , the entity 108 involved in the actual transaction may not be the entity 108 associated with the potential transaction 206 . If the potential transaction was initiated by the entity computing system 110 , the entity 108 may be saved in the user information database 132 with the user information for the potential transaction 206 . The user 102 may choose if the entity 108 that initiated the transaction should be saved with the potential transaction 206 by proving user input 208 via the user information circuit 106 .
  • the user 102 can select entity 108 using the user information circuit 106 . If no entity was saved with the potential transaction, the user 102 may select an entity to complete the potential transaction by providing user input 208 via the user information circuit 106 .
  • the user 102 may select an entity by providing the user information service computing system 122 with information about the entity (e.g., name, address, phone number, etc.) via the user information circuit 106 .
  • the user 102 may select an entity by using a drop down list of entities 108 associated with the user information service computing system 122 on a graphical user interface associated with the user information circuit 106 .
  • the user 102 may enter an entity identification number associated with the entity 108 and the user information service computing system 122 via the graphical user interface associated with the user information circuit 106 .
  • the user 102 may receive the entity identification number from the entity 108 , or from a list provided to the user 102 via the user information circuit 106 from the user information service computing system 122 .
  • the user 102 may use the user computing device 104 to scan a barcode, QR code, or other symbol at the entity 108 to indicate the entity 108 selected to the user information service computing system 122 .
  • a more detailed method with regard to potential transactions can be seen with reference to FIG. 6 .
  • the user information service computing system 122 provides the approved outgoing user information 210 to the entity computing system 110 of the selected entity 108 at 414 .
  • the outgoing user information 210 may be provided to the entity computing system 110 in a number of ways.
  • the user information service computing system 122 may provide the outgoing user information 210 in an email to the entity computing system 110 (e.g., in a PDF document, etc.).
  • the user information service computing system 122 may populate a form associated with the entity computing system 110 to provide outgoing user information 210 .
  • the user information service computing system 122 populates a database associated with the entity computing system 110 (e.g., user information database 118 ) to provide outgoing user information 210 .
  • the entity 108 may determine how user information is sent based on setting associated with an entity account with the user information service 120 .
  • the user information service computing system 122 determines how the outgoing user information 210 is sent to entity computing system 110 .
  • the outgoing user information 210 is sent to the entity computing system 110 in different forms based on the level of security of the outgoing user information 210 determined by the security circuit 136 .
  • the user information service computing system 122 updates the outgoing user information 210 for the transaction type at 416 .
  • the user information service computing system 122 may update the transaction type database 134 .
  • the transaction type database 134 may maintain all outgoing user information 210 requested for a plurality of transaction types.
  • the transaction type database 134 may keep a single set of user information requested 210 for a given transaction type.
  • the transaction type database 134 keeps all user information requested for a given transaction type for all users associated with the user information service computing system 122 .
  • the transaction type database 134 may be adaptive and learn what user information is commonly requested for a given transaction type. This information may be used when determining if the information request 204 includes information not commonly requested, which will be described in greater detail with regard to FIG. 5 .
  • FIG. 5 a flow diagram of a method 500 of comparing a user information request from an entity is shown, according to an example embodiment.
  • the method 500 is performed by the user information service computing system 122 .
  • the method 500 receives an information request 204 from entity computing system 110 at 502 , which may be substantially similar to process 402 of method 400 , compares the information request 204 to user information requests for the same transaction type and provides the entity computing system 110 with the outgoing user information 210 .
  • the user information service computing system 122 compares the information request 204 to user information requests of similar transaction types at 504 .
  • the information stored in the transaction type database 134 may also include the geographical location of the information request 204 , in case different geographical locations (e.g., different states, etc.) have different protocols for user information requested for certain transactions. Additionally, the transaction type database 134 may determine trends in the user information requested based on the dates of the information requests 204 .
  • the user information service computing system 122 may compare the information request 204 received at 502 to individual user information requests stored in the transaction type database 134 . Alternatively, the user information service computing system 122 may compare the information request 204 received at 502 to an information request 204 that is representative of all of the information requests 204 stored in the transaction type database 134 .
  • the user information service computing system 122 determines if the information request 204 received at 502 is similar to other user information requests for similar transaction types at 506 .
  • the comparison may take into account the frequency of the user information requested. For example, if some type user information is always requested for the transaction type, and some type information is usually requested, these may both indicate a similar request and not cause the security circuit 136 to flag the information request 204 . However, if a particular type of user information is rarely or never requested for the transaction type, but appears in the information request 204 received at 502 , the information request 204 may not be considered similar.
  • approval request 212 and a corresponding alert 216 is sent to the user information circuit 106 at 508 .
  • Process 508 may be substantially similar to process 404 of method 400 . If there are user information types that are not similar to the user information types frequently requested for the transaction type, processes 510 - 512 occurs.
  • the user information service computing system 122 flags non-similar user information types in the information request 204 at 510 .
  • the user information service computing system 122 may use the security circuit 136 to determine how to flag the user information that was determined inconsistent with frequently requested user information when compared with other user information requests for similar entity types using the transaction type database 134 .
  • the security circuit 136 may have different levels of comparison that would cause user information to be flagged. For example, if a piece of information is sometimes requested, a first flag may be applied (e.g., a yellow flag, etc.). If a piece of information is rarely requested, a second flag may be applied (e.g., an orange flag, etc.).
  • a third flag may be applied (e.g., a red flag, etc.).
  • the information may be flagged based on a level of security associated with the user information. For example, the name of user 102 may have a low security level and therefore have one flag associated with the name, while the social security number of the user 102 may have a high security level and therefore have a different flag associated with the social security number.
  • the user information requested that is inconsistent with the user information commonly requested may be flagged with a first, second, third, etc. flag based on the level of security of the user information.
  • a piece of user information may receive multiple sets of flags based on different criteria (e.g., frequency of request and level of security, etc.).
  • the user information service computing system 122 sends a flagged request 214 and a corresponding alert 216 to the user 102 via the user information circuit 106 at 512 .
  • the flagged request 214 indicates any information that was flagged by the security circuit 136 at 510 .
  • the flagged request 214 may also include information consistent with the approval request 212 of process 404 of method 400 , such as transaction information 220 and information indicating the entity 108 that sent the information request 204 , in addition to the flagged user information.
  • the user information service computing system 122 receives the user response to the request at 514 via user input 208 from the user information circuit 106 regardless of whether or not the information request 204 received at 502 was similar to information requests of similar transaction types.
  • the user information service computing system 122 sends the approved outgoing user information 210 to the entity computing system 110 at 516 .
  • Process 514 - 516 may be substantially similar to processes 406 and 414 of method 400 , respectively.
  • FIG. 6 a flow diagram of a method 600 of preparing user information for a predicted transaction 218 is shown according to an example embodiment.
  • the method 600 is performed by user information service computing system 122 .
  • the method 600 predicts a transaction based on activity of the user 102 and provides recommendation to the user 102 based on the predicted transaction 218 .
  • the user information service computing system 122 predicts a transaction of the user 102 at 602 .
  • the user information service computing system 122 may monitor other software applications on the user computing device 104 and/or monitor website activity on the user computing device 104 to predict a potential transaction of the user 102 .
  • the prediction circuit 138 may be set with different transactions that could be completed and information that may be indicative of future transactions based on activity on the user computing device 104 . For example, if the user 102 is looking up homes or properties, the prediction circuit 138 may predict the user 102 will be purchasing a home.
  • the prediction circuit 138 of the user information service computing system 122 may be set to only predict a transaction after a given set of activity is monitored. For example, the user 102 may have to look at home and property listings multiple times in a given period of time before the prediction circuit 138 predicts the transaction to minimize the number of predicted transactions 218 generated.
  • the user information service computing system 122 sends the predicted transaction and a corresponding alert 216 to the user 102 via the user information circuit 106 at 604 .
  • the user information service computing system 122 may send the predicted transaction to the user information circuit 106 as an alert 216 .
  • the alert 216 may include the predicted transaction 218 as well as information indicating how the user information service computing system 122 predicted the transaction. For example, the alert may say “We noticed you have been viewing houses for sale frequently, are you planning on purchasing a home?”
  • the user 102 may respond to the alert via user input 208 to the user information circuit 106 .
  • the user information service computing system 122 determines if the user 102 confirmed the predicted transaction 218 or not at 606 . If the user 102 indicates that the predicted transaction 218 is not a transaction the user 102 is planning on completing, the user information service computing system 122 may delete the predicted transaction 218 at 608 .
  • the prediction circuit 138 may also make note of the fact that the user 102 is not planning on making the predicted transaction 218 so as to minimize the chance of sending the user 102 another alert 216 relating to a predicted transaction 218 that is the same as a previously predicted transaction. If the user 102 confirms via user input 108 to the user information circuit 106 that the predicted transaction 218 is a transaction the user 102 plans on completing in the future, processes 610 - 614 may occur.
  • the user information service computing system 122 analyzes the user information at 610 . Analyzing the user information may include determining the user information that is likely to be needed for a given transaction type by the transaction type database 134 .
  • the transaction type database 134 may determine different levels of user information. For example, the transaction type database 134 may determine user information that will most likely be needed for the identified transaction type. The transaction type database 134 may also determine user information that may be needed, depending on the entity 108 that the user 102 will be using to complete the transaction.
  • the transaction type database 134 may use methods similar to those used when comparing the user information request to similar user information requests as described with respect to FIG. 5 , specifically process 504 of the method 500 .
  • Analyzing the user information may also include comparing the user information needed for the transaction with the user information stored at the user information database 132 .
  • the user information service computing system 122 may compare the user information determined at 610 to the user information database 132 to determine if the user information database 132 has all the user information needed for the predicted transaction 218 .
  • Analyzing the user information may also include analyzing the content of the user information (e.g., financial information, etc.). Analyzing the content of the user information may provide the user information service computing system 122 with information regarding the likelihood of a successful transaction. For example, if the predicted transaction 218 is buying a car, but the user 102 does not have enough money saved for a down payment, analyzing the user information may indicate that the user 102 should be saving more money.
  • the user information service computing system 122 sends a predicted transaction recommendation and a corresponding alert 216 to the user 102 via the user information circuit 106 at 612 .
  • the predicted transaction recommendation is a recommendation to the user 102 based on the analysis of the user information at 610 .
  • the predicted transaction recommendation may include information relating to user information that is needed for the predicted transaction that the user 102 currently does not have associated with the user information service computing system 122 .
  • the predicted transaction recommendation may provide the user 102 with information regarding improvements that could be made to the user information to increase the likelihood of a successful transaction.
  • the user information service computing system 122 may provide the user 102 with the alert 216 via the user information circuit 106 indicating the predicted transaction recommendation.
  • Alert 216 may also be provided to the user 102 via the user information circuit 106 by the user information database 132 to remind the user 102 to provide the user information service computing system 122 with user information that will be needed for the potential transaction if the user 102 has not provided the user information needed in a set amount of time.
  • the predicted transaction recommendation may also include recommendations for changes in the activity of the user 102 in order to have a successful transaction when the user 102 is ready to complete the predicted transaction 218 . For example, if the predicted transaction is buying a car, the predicted transaction recommendation may include financial recommendations to increase the likelihood that the user 102 will be able to make car payments, information on the credit score of the user 102 and how to improve the credit score to get better car loans, etc.
  • the user information service computing system 122 sets the predicted transaction as a potential transaction at 614 . Since the user 102 has confirmed the predicted transaction is a transaction the user 102 is thinking about completing, the user information service computing system 122 , it is no longer a predicted transaction.
  • FIG. 7 a flow diagram of a method 700 of determining if the user 102 has the user information ready for a potential transaction 206 is shown, according to an example embodiment.
  • the method 700 is performed by the user information service computing system 122 .
  • the method 700 receives a potential transaction 206 , determines if the user 102 has the user information that will likely be need for the potential transaction 206 , and provides the entity computing system 110 with the approved outgoing user information 210 .
  • the potential transaction 206 is received as a product of method 600 .
  • Process 702 may be substantially similar to process 408 of method 400 .
  • the user information service computing system 122 determines the user information needed for the transaction at 704 , much like process 610 of method 600 when the transaction type database 134 analyzes the transaction type to determine the type of user information that will likely be needed for the potential transaction 206 . However, unlike process 610 of method 600 , the content of the user information is not analyzed to provide recommendations on changes in behavior.
  • the user information service computing system 122 determines if the user 102 has the user information determined at 704 for the potential transaction 206 received at 702 at 706 .
  • the transaction type database 134 may compare the user information determined at 704 to information in the user information database 132 to determine if the user information database 132 has the user information that will likely be needed for the potential transaction 206 . If the user information that will likely be needed is in the user information database 132 , the method 700 may proceed directly to process 712 . If user information is needed and is not in the user information database 132 , processes 708 - 710 occur.
  • the user information service computing system 122 alerts the user 102 of the missing user information at 708 .
  • the user information service computing system 122 may provide the user 102 with the alert 216 much like process 612 .
  • the alert 216 is received by the user 102 via the user information circuit 106 and indicates user information that was determined to be missing at 706 .
  • the user information service computing system 122 receives incoming user information 202 at 710 .
  • the incoming user information 202 is received from the user 102 via the user information circuit 106 in response to the alert 216 notifying the user 102 of user information that is missing.
  • Process 710 may be substantially similar to process 304 and 308 of method 300 .
  • the user information service computing system 122 receives the user 102 entity selection at 712 .
  • the user 102 entity selection is sent from the user information circuit 106 and indicates which entity 108 the user 102 has selected to complete the potential transaction 206 .
  • Process 712 may be substantially similar to process 412 of method 400 .
  • the user information service computing system 122 provides the approved outgoing user information 210 to the entity computing system 110 at 714 .
  • the entity computing system 110 that receives the approved outgoing user information 210 is the entity computing system 110 associated with the entity selected at 712 .
  • Process 714 may be substantially similar to process 414 of method 400 .
  • the user information service By using the user information service to store and manage user information, individuals gain ease of access to user information. In addition, with all the user information stored in a single location, information is protected, accessible and easy to distribute. Oftentimes, when individuals are asked for user information, the individual must get the information from a variety of places. The individual may have some information stored at home in a safe, while other information is stored electronically. The individual may also have to reach out to other entities to get the information needed. This can be cumbersome for the individual, and cause delays in transactions the user would like to complete. In addition, once the individual obtains all the information, it has to be shared with the entity the individual is completing the transaction with. This process can be tedious and the individual may makes mistakes when providing large amount of information. By using the user information service, individuals can easily provide all the needed information to an entity to quickly, and accurately, complete a transaction.
  • circuit may include hardware structured to execute the functions described herein.
  • each respective “circuit” may include machine-readable media for configuring the hardware to execute the functions described herein.
  • the circuit may be embodied as one or more circuitry components including, but not limited to, processing circuitry, network interfaces, peripheral devices, input devices, output devices, sensors, etc.
  • a circuit may take the form of one or more analog circuits, electronic circuits (e.g., integrated circuits (IC), discrete circuits, system on a chip (SOCs) circuits, etc.), telecommunication circuits, hybrid circuits, and any other type of “circuit.”
  • the “circuit” may include any type of component for accomplishing or facilitating achievement of the operations described herein.
  • a circuit as described herein may include one or more transistors, logic gates (e.g., NAND, AND, NOR, OR, XOR, NOT, XNOR, etc.), resistors, multiplexers, registers, capacitors, inductors, diodes, wiring, and so on).
  • the “circuit” may also include one or more processors communicatively coupled to one or more memory or memory devices.
  • the one or more processors may execute instructions stored in the memory or may execute instructions otherwise accessible to the one or more processors.
  • the one or more processors may be embodied in various ways.
  • the one or more processors may be constructed in a manner sufficient to perform at least the operations described herein.
  • the one or more processors may be shared by multiple circuits (e.g., circuit A and circuit B may comprise or otherwise share the same processor which, in some example embodiments, may execute instructions stored, or otherwise accessed, via different areas of memory).
  • the one or more processors may be structured to perform or otherwise execute certain operations independent of one or more co-processors.
  • two or more processors may be coupled via a bus to enable independent, parallel, pipelined, or multi-threaded instruction execution.
  • Each processor may be implemented as one or more general-purpose processors, application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), digital signal processors (DSPs), or other suitable electronic data processing components structured to execute instructions provided by memory.
  • the one or more processors may take the form of a single core processor, multi-core processor (e.g., a dual core processor, triple core processor, quad core processor, etc.), microprocessor, etc.
  • the one or more processors may be external to the apparatus, for example the one or more processors may be a remote processor (e.g., a cloud based processor). Alternatively or additionally, the one or more processors may be internal and/or local to the apparatus. In this regard, a given circuit or components thereof may be disposed locally (e.g., as part of a local server, a local computing system, etc.) or remotely (e.g., as part of a remote server such as a cloud based server). To that end, a “circuit” as described herein may include components that are distributed across one or more locations.
  • An exemplary system for implementing the overall system or portions of the embodiments might include a general purpose computing computers in the form of computers, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit.
  • Each memory device may include non-transient volatile storage media, non-volatile storage media, non-transitory storage media (e.g., one or more volatile and/or non-volatile memories), etc.
  • the non-volatile media may take the form of ROM, flash memory (e.g., flash memory such as NAND, 3D NAND, NOR, 3D NOR, etc.), EEPROM, MRAM, magnetic storage, hard discs, optical discs, etc.
  • the volatile storage media may take the form of RAM, TRAM, ZRAM, etc. Combinations of the above are also included within the scope of machine-readable media.
  • machine-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.
  • Each respective memory device may be operable to maintain or otherwise store information relating to the operations performed by one or more associated circuits, including processor instructions and related data (e.g., database components, object code components, script components, etc.), in accordance with the example embodiments described herein.
  • input devices may include any type of input device including, but not limited to, a keyboard, a keypad, a mouse, joystick or other input devices performing a similar function.
  • output device may include any type of output device including, but not limited to, a computer monitor, printer, facsimile machine, or other output devices performing a similar function.

Abstract

Systems and methods relating to alerting users as to user information to be exchanged during transactions. A user information system (UIS) information circuit and an associated user information database populates an account with user information received from at least one of the user and a plurality of entities. A user information request relating to a transaction is received from an entity computing system associated with an entity over a network via a network interface circuit. A security circuit sends an alert comprising an approval request containing an identification of user information requested in the user information request to a user computing device associated with the user over the network. The security circuit receives an approval of the approval request from the user computing device, and the UIS information circuit provides the approved information to the entity to complete the transaction.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 17/079,095, entitled “USER INFORMATION GATHERING AND DISTRIBUTION SYSTEM,” filed Oct. 23, 2020, which is a continuation of U.S. patent application Ser. No. 15/385,035, entitled “USER INFORMATION GATHERING AND DISTRIBUTION SYSTEM,” filed Dec. 20, 2016, issued as U.S. Pat. No. 10,817,593 on Oct. 27, 2020, which itself claims priority to U.S. Provisional Patent Application No. 62/272,422 entitled “USER INFORMATION GATHERING AND DISTRIBUTION SYSTEM,” filed Dec. 29, 2015, each of which are incorporated in their entireties and for all purposes.
  • BACKGROUND
  • Individuals often have a plurality of information associated with the individual that is shared with a plurality of entities. The information may include basic information associated with the individual such as first name, last name, email address, phone number, birthday, home address and so on. The information may also include information confidential to the individual such as social security number, health information, credit information, insurance information and so on. Often, individuals store this information in a variety of places (e.g., financial institution, safe, government agency, etc.). Individuals may also be asked to provide pieces of this information to many different entities during a transaction. For example, when an individual is getting approved for a mortgage, buying a new car, or visiting the hospital, the individual may be asked to provide a variety of information. However, the individual may not know what information is needed, or the individual may not have the information needed readily available. If the individual does not know what information is needed for certain transactions, the individual may provide too much or too little information to the entity. Providing too much information to an entity may be dangerous for the individual as the information may be used fraudulently by the entity or be available to others whom may use the information fraudulently.
  • SUMMARY
  • One embodiment of the invention relates to a method of alerting a user of user information to be sent to an entity during a transaction, the method being performed by a user information service (UIS) computing system associated with an information service. The method includes populating, by a UIS information circuit and an associated user database, an account with user information received from at least one of the user and a plurality of entities. The method further includes receiving, by the UIS information circuit over a network via a network interface circuit, a user information request relating to a transaction from an entity computing system associated with the entity. The method includes sending, by a security circuit of the UIS information circuit, an alert including an approval request to a user computing device associated with the user over the network, wherein the approval request contains an identification of user information requested in the user information request. The method further includes receiving, by the security circuit, an approval of the approval request from the user computing device. The method includes providing, by the UIS information circuit and the user information database, the approved information to the entity to complete the transaction.
  • Another embodiment relates to a non-transitory computer readable media having computer-executable instructions embodied therein that, when executed by a computing system associated with a second party to an agreement causes the second party computing system to perform operations for demonstrating consensus agreement. The operations include populating, by an associated user database, an account with user information received from at least one of the user and a plurality of entities. The operations further include receiving a user information request relating to a transaction from an entity computing system associated with the entity, sending an alert including an approval request to a user computing device associated with the user over the network, wherein the approval request contains an identification of user information requested in the user information request. The operations further include receiving an approval of the approval request from the user computing device and providing, by the user information database, the approved information to the entity to complete the transaction.
  • Yet another embodiment of the invention relates to a user information service (UIS) computing device. The device includes a network interface circuit configured to communicate with a user computing device associated with a user and an entity computing system. The method further includes at least one processor operatively coupled to a non-transient memory to form a UIS information circuit. The circuit is structured to populate, in a user information database, an account with user information. The circuit is further structured to receive, via a network interface circuit, a user information request from an entity computing system over a network. The circuit is structured to send, via a security circuit, an alert including an approval request indicating the user information requested in the user information request to the user computing device over the network. The circuit is further structured to receive a response to the approval request from the user computing device. The circuit is structured to provide user information corresponding to the user information request and the response to the approval request to the entity computing system.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a diagram of a data exchanging system, according to an example embodiment.
  • FIG. 2 is a diagram of information and data flows of the data exchanging system of FIG. 1 , according to an example embodiment.
  • FIG. 3 is a flow diagram of a method of populating user information for a user account, according to an example embodiment.
  • FIG. 4 is a flow diagram of a method of providing user information to an entity, according to an example embodiment.
  • FIG. 5 is a flow diagram of a method of comparing a user information request from an entity, according to an example embodiment.
  • FIG. 6 is a flow diagram of a method of preparing user information for a predicted transaction, according to an example embodiment.
  • FIG. 7 is a flow diagram of a method of determining if a user has user information ready for a potential transaction, according to an example embodiment.
  • DETAILED DESCRIPTION
  • Referring to the figures generally, user information gathering and distribution systems and methods are described. The user information systems and methods are structured to receive a plurality of user information types (e.g., social security number, insurance information, etc.) associated with a user and to enable the user to manage and distribute the information in a secure, convenient, efficient, and time-saving manner. The user information system may be accessed with at least one user device (e.g., a mobile device, a smart watch, etc.). In some arrangements, the user information system is structured to receive an information request from an entity (e.g., bank, car dealer, etc.) based on a transaction type (e.g., mortgage approval, buying a car, etc.), compare the information request to information requests from similar entities for similar transactions, and to provide the user information to the entity. The user information functions allow the user to add, manage, and distribute the user information. The user information system also predicts and verifies the user information needed for a given transaction to protect the user from risks of giving too much or incorrect information to an entity.
  • Referring now to FIG. 1 , a diagram of a data exchange system 100 is shown according to an example embodiment. The computing system 100 includes a user 102, a plurality of entities 108, a user information service 120, and a network 140. The network 140 may include any of various types of data exchanging networks. For example, the network 140 may include wireless networks (e.g., 802.11X, ZigBee′, Bluetooth, Internet, etc.), wired networks (e.g., Ethernet), or any combination thereof. The network 140 is structured to permit the exchange of data, values, instructions, messages, etc. between and among the user computing device 104, the entity computing system 110, and the user information service computing system 122.
  • The user 102 may include individuals, business representatives, large and small business owners, other entities, and so on. The user 102 is associated with a user computing device 104. The user computing device 104 may be, but is not limited to, a mobile computing device (e.g., a smartphone, tablet computer, laptop computer, person digital assistant, etc.), a desktop computing device, a wearable computing device, etc. Wearable computing devices refer to any type of computing device that a user 102 wears including, but not limited to, a watch, glasses, bracelet, etc.
  • The user computing device 104 includes a user information circuit 106. The user information circuit 106 is structured to allow the user 102 to communicate with the user information service 120. For example, the user information circuit 106 may be structured to provide a user interface (e.g., a graphical user interface) that permits the user 102 to provide information (e.g., user information) that is communicated to a user information service computing system 122 associated with the user information service 120. In this regard, the user information circuit 106 may be communicably coupled to a processor, non-transient memory, and network interface enabling the user computing device 104 to exchange data over the network 140.
  • In addition, the user information circuit 106 communicates data to and from the user information service computing system 122 via network 140. In some arrangements, the user 102 may download a user information application (e.g., a software “app”) prior to use, which may be used to set up and configure the user information circuit 106. In another arrangement, the user information circuit 106 is hard coded into the memory of the user computing device 104. In further arrangements, the user information circuit 106 is a web-based interface application accessed via the Internet on a web browser executed on the user computing device 104. In such arrangements, the user information circuit 106 is executed and maintained remotely (e.g., on the user information service computing system 110). In this instance, the user 102 logs onto or accesses the web-based interface to access the user information circuit 106. In some arrangements, the user information circuit 106 is supported by a separate computing system comprising one or more servers, processors, network interface circuits, etc. that transmit the applications for use to the user computing device 104. In certain embodiments, the user information circuit 106 may include an application programming interface (API) and/or a software development kit (SDK) that facilitates the integration of other applications with the user information circuit 106.
  • Each of the entities 108 provide services to a plurality of users, including the user 102. Examples of the entities 108 include financial institutions, merchants, insurance companies, utility companies, social media networks, e-mail systems, health care providers, etc. Each of the plurality of entities 108 operates and/or is associated with a respective entity computing system 110. Each entity computing system 110 includes a processor 112, memory 114, a network interface circuit 116 and a user information database 118. The network interface circuit 116 facilitates the sending and receiving of data, commands, instructions, values, etc. over the network 140 (e.g., to and from the user information service computing system 120, etc.). Each entity computing system 110 is communicably coupled to the user information service computing system 122 and/or the user computing device 104 via the network 140.
  • The entity computing system 110 also includes a user information database 118 that stores user information relating to the user 102. The entity computing system 110 may maintain information about one or more of the entities 108, information regarding user 102 (e.g., accounts associated with the user 102 and a respective one of the entities 108, etc.) and so on in the user information database 118. In this regard and as mentioned above, more than one entity 108 with an associated entity computing system 110 may be communicably coupled to the components of FIG. 1 over the network 140 to accommodate user information associated the user 102 at a plurality of entities 108. For example, if the entity 108 is a financial institution, the user information database may store user account information including account numbers, balances, credit limits, and so on.
  • In some arrangements, the user information service 120 is affiliated with a given entity 108 (e.g., a financial institution). In other arrangements, the user information service 120 is not directly affiliated with a given entity 108. The user information service 120 includes a user information service computing system 122. The user information service computing system 120 includes a processor 124, memory 126, a network interface circuit 128, and a user information service (“UIS”) information circuit 130. The network interface circuit 128 facilitates the sending and receiving of data, commands, instructions, values, etc. over the network 140 (e.g., to and from the user computing device 104, to and from the entity computing system 110, etc.). The user information service computing system 122 is structured to provide storage of user information associated with the user 102 and distribution of user information associated with the user 102 to one or more of the entities 108.
  • The UIS information circuit 130 of the user information service computing system 122 provides storage and distribution of user information to the user 102 via the user information circuit 106. The operation of the user information service computing system 122 and the UIS information circuit 130 are described in further detail with respect to FIGS. 2 through 7 .
  • Now referring to FIG. 2 , a diagram of information and data flows to and from the user information service computing system 122 of FIG. 1 is shown in greater detail, according to an example embodiment. The UIS information circuit 130 at the user information service computing system 122 communicates data to and from the user information circuit 106 and the entity computing system 110 via the network 140, and includes a user information database 132, a transaction type database 134, a security circuit 136, and a prediction circuit 138. The user information database 132 includes storage media or access thereto structured to retrievably store user information flowing into the UIS computing system 122. The transaction type database 134 retrievably stores information relating to a plurality of different transaction types, including types of user information relevant to each of the plurality of different transaction types. In some arrangements, the information in the user information database 132 is shared with the transaction type database 134. The security circuit 136 is structured to maintain and apply various security protocols relating to information stored in the user information database 132, as well as information requested from the user 102. The prediction circuit 138 is structured to predict future transactions based on information flowing to the UIS computing system 122 (e.g., information from the user information circuit 106) and information stored at the user information database 132 and the transaction type database 134. Various example operations of the UIS information circuit are discussed in more detail below.
  • The user information service computing system 122 receives a plurality of inputs, including, but not limited to, incoming user information 202, information request 204, potential transaction 206, user input 208 from at least the user information circuit 106 and the entity computing system 110.
  • Incoming user information 202 may be any type of information relating to the user 102. For example, the incoming user information 202 may be personal information (e.g., social security number, birthday, home address, name, etc.), financial information (e.g., credit score, bank account balances, etc.), health information (e.g., allergies, vaccinations, family medical history, etc.) and so on. The incoming user information 202 may be received by the user information service computing system 122 from the user computing device 104. Alternatively, the incoming user information 202 may be received from the entity computing system 110. For example, the user information computing system 122 may receive health care information (incoming user information 202) associated with the user 102 from a computing system associated with a health care provider.
  • Information request 204 may be a request from the entity computing system 110 for user information associated with the user 102 sent to the user information service computing system 122. The information request 204 may include a list of specific user information that is being requested. The information request 204 may also include the entity 108 that is requesting the user information. In addition, the information request 204 may indicate a type of transaction for which the entity computing system 110 is requesting the user information.
  • Potential transaction 206 is a transaction, indicated by the user 102 via the user information circuit 106, that the user 102 may complete in the future. For example, if the user 102 is planning on purchasing a car, but not for a few months the user 102 may send the user information service computing system 122 a potential transaction 206. In this case, the user 102 may want to plan ahead to gather additional user information that may be needed for the potential transaction 206. The potential transaction 206 is received by the user information service computing system 122 from the user information circuit 106.
  • User input 208 refers to input received from the user 102 at the user information circuit 106. The user input 208 may include user responses to approval request 212, flagged request 214, alert 216, and/or predicted transaction 218, discussed below. In some arrangements, user input 208 also includes setting and preferences associated with a user account for the user 102 with the user information service 120.
  • The UIS information circuit 130 at the user information service computing system 122 is also structured to provide information, requests, and alerts 216 to the entity computing system 110 and the user information circuit 106. An alert 216 is a notification to be received at the user computing device 104, and may specify a type of pending request, an requested response from the user 102, a notification, and so on. The user information circuit 106 may receive the alert 216 over the network 140 and use any of a variety of output devices at the user computing device 104 to bring the alert 216 to the attention of the user 102. The alert 216 may be associated with any of the outgoing types of data from the UIS computing system 122 (e.g., an approval request 212, a flagged request 214, a predicted transaction 218, etc.). The alert 216 may be sent via email, text message, push notification, etc. The user 102 may set up and configure alerts 216 and alert preferences when setting up the user account.
  • The user information service computing system 122 may provide outgoing user information 210 to one or more of the plurality of entities 108. Outgoing user information 210 may be substantially similar to incoming user information 202 in that outgoing user information 210 may include any of various types of information relating to a given user. However, outgoing user information 210 is a set of user information that will be provided to the entity computing system 110. For example, in one arrangement, while the user information collectively received by the user information service computing system 122 includes all the user information types described above, the outgoing user information 210 sent to the entity computing system 110 may only include name, address, and credit score.
  • The security circuit 136 may provide an approval request 212 and a corresponding alert 216 to the user information circuit 106 to notify the user 102 of information relating to an information request 204 received from one or more of the plurality of entities 108. As another example, the security circuit 136 may provide the user information circuit 106 with all the user information that was requested in the information request 204, as well as information relating to the type of transaction for which the user information is being requested, and the entity 108 that is requesting the user information in the approval request 212. The security circuit 136 may receive, from the user 102 via the user information circuit 106, user input 208 indicating an approval of the user information of approval request 212.
  • A flagged request 214 and a corresponding alert 216 may be provided to the user information circuit 106 by the security circuit 136 to notify the user 102 of information relating to an information request 204 received from one or more of the plurality of entities 108 when a piece of user information requested is unusual (e.g., medical information requested when getting a car loan).
  • The prediction circuit 138 is structured to predict a potential future transaction the user 102 may be making based on activity by the user 102 on the user computing device 104. When the prediction circuit 138 identifies a potential future transaction, the prediction circuit may provide a predicted transaction 218 and a corresponding alert 216 to the user information circuit 106, which in turn may provide the predicted transaction 218 to the UIS information circuit 130.
  • The UIS information circuit 130 may provide transaction information 220 to the user information circuit 106 from the transaction type database 134 to inform the user 102 about a transaction that is presently occurring or is actually set to occur.
  • In operation, the incoming user information 202 may be transmitted to the user information service computing system 122 via the user information circuit 106 of the user computing device 104. The first time the user 102 sends incoming user information 202 to the user information service computing system 122, the UIS information circuit 130 may treat the incoming user information 202 as a request to create an account with the user information service 120. The user account contains incoming user information 202 received from the user 102, and all of the incoming user information 202 may be stored in user information database 132. The user information database 132 is configured to store and manage incoming user information 202 associated with user 102 at the user information service computing system 122. The UIS information circuit 130 may also receive incoming user information 202 from one or more entities 108 associated with user 102 (e.g., social media, health care provider, etc.). In addition to storing and managing incoming user information 202, the user information database 132 maintains user account settings and preferences.
  • In operation, the information request 204 is transmitted to the user information computing system 122 from the entity computing system 110. The information request 204 may specify the entity 108 requesting the user information, the type of transaction occurring, and the user information being requested. As used herein, the term “transaction” may refer to financial and non-financial transactions. An example of a non-financial transaction may be providing outgoing user information 210 to an entity. Accordingly, the term “transaction” may refer to any operation or interaction executed by the user 102 with an entity 108 (e.g., visiting the doctor, making a flight reservation using frequent flier miles, financial transactions, buying a car, getting approved for a loan, etc.).
  • The UIS information circuit 130 may compare the information request 204 to other requests of similar transaction types using the transaction type database 134. Information relating to different types of transactions and user information commonly requested for these types of transactions is stored in transaction type database 134. The transaction type database 134 may be constantly updating the outgoing user information 210 requested for certain transactions. In this regard, the transaction type database 134 may be dynamic and adaptive to learn what user information is commonly requested for a transaction. The transaction type database 134 may be updated manually by personnel (e.g., employees, etc.) associated with the user information service 120, or may use prior transactions of all users with accounts at the user information service 120, including user 102.
  • The security circuit 136 is structured to determine if information requested by the entity is consistent with information normally requested by a similar entity for a similar transaction type. The security circuit 136 may also be structured to flag inconsistent information and send the user 102 a flagged request 214 and a corresponding alert 216. When the UIS information circuit 130 compares the information request 204 to similar information requests of the same or similar type that are maintained in the transaction type database 134, user information that is requested in information request 204 that is not consistent with information requests of the same or similar type may be flagged by the security circuit 136. The security circuit 136 may have different levels or criteria for flagging requested user information. The flagging levels may be preset or determined by the user 102 when the user account is created. The flagging levels may also be based on more than one type of criteria (e.g., frequency of request, level of security of information, etc.). The security circuit 136 is also structured to determine the level of security for each piece of information the user 102 provides, and maintain security protocol for sharing information with a certain security level. For example, the security circuit 136 may require the user 102 to provide a password before the UIS information circuit 130 can share the social security number of the user 102 with one of the entities 108.
  • The UIS information circuit 130 may provide the user 102 with an alert 216 via the user information circuit 106 when certain user information is requested. The UIS information circuit 130 may provide the user 102 with alert 216 via the user information circuit 106 when user information is requested that the user 102 does not have linked or stored in the user information database 132. Alert 216 may also be provided to the user 102 via the user information circuit 106 to remind the user 102 to provide the user information service computing system 122 with user information that will be needed for a future transaction the user 102 has indicated (e.g., potential transaction 206).
  • The UIS information circuit 130 may receive a potential transaction 206 generated and transmitted from the user information circuit 106. The user 102 may be planning on completing a transaction (e.g., getting a loan, qualifying for a mortgage, buying a car, etc.) and use the user information circuit 106 to transmit a corresponding potential transaction 206 to the user information service computing system 122. The UIS information circuit 130 may search the transaction type database 134 to determine the user information that may be needed to complete the potential transaction 206. In view of the information returned from the transaction type database 134, the user 102 may have time to gather additional user information that is needed and check to see if the user information is accurate before completing a transaction with any one or more entity 108. Alternatively, the UIS information circuit 130 may receive the potential transaction 206 from entity computing system 110. The user 102 may visit one or more of the entities 108 looking for information regarding a transaction. In this regard, the entity computing system 110 may send a potential transaction 206 to the user information service computing system 122 indicating that user 102 may complete a transaction with entity 108. The entity computing system 110 may also indicate what user information would be needed to complete the transaction. Again, the user 102 would have time to gather additional user information that may be needed and check to see if the user information is accurate before completing a transaction with entity 108.
  • The UIS information circuit 130 may cooperate with the prediction circuit 138 to provide predicted transactions 218 to the user 102. A predicted transaction 218 is information relating to an anticipated transaction based on the past behavior of the user 102. The user information service computing system 122 may monitor other applications on the user computing device 104 and/or monitor website activity on the user computing device 104 to predict a potential transaction 218 of the user 102. The prediction circuit 138 may be set with different transactions that could be completed and information that may be indicative of the transaction. For example, if the user 102 is looking up homes or properties, the prediction circuit 138 may predict the user 102 will be purchasing a home. The UIS information circuit 130 may notify (e.g., via alert 216) the user 102 of the predicted transaction 218 via the user information circuit 106. The user 102 may transmit user input 208 to the user information service computing system 122 indicating if the predicted transaction 218 is accurate. The UIS information circuit 130 may use the transaction type database 134 to provide the user 102 with outgoing user information 210 corresponding to user information that would likely be needed for the predicted transaction 218.
  • When the user 102 is ready to complete a transaction (e.g., send outgoing user information 210) with one or more of the entities 108, the user 102 may provide user input 208 to the user information service computing system 122 via the user information circuit 106. Where the user input 208 is an approval, the approval may include each piece of user information that is approved by user 102 to be sent to the entity computing system 110. The security circuit 136 may require the user 102 to provide authorization with the user input 208 indicating an approval. In some embodiments, the security circuit 136 may also require the entity 108 (e.g., an employee associated with entity 108) to provide authorization or authentication before outgoing user information 210 is provided. For example, the entity 108 may have to provide the security circuit 136 with a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. Alternatively, the user input 208 may include a selection of one or more entity 108 when the user 102 has already approved all the outgoing user information 210 to be sent to one or more entity 108 (e.g., potential transaction 206, predicted transaction 218, etc.). The user information service computing system 122 transmits the approved outgoing user information 210 to entity computing system 110.
  • Now referring to FIG. 3 , a flow diagram of a method 300 of populating user information for a user account with the user information service computing system 122 is shown, according to an example embodiment. The method 300 registers the user 102 with the user information service 120 and gathers user information associated with the user 102.
  • A user account is created at 302. The user account created may be initiated by user 102 transmitting incoming user information 202 to the user information service computing system 122 via the user information circuit 106. The user 102 may provide additional information that is optional for the user 102 to include for registration. For example, the user 102 may have the option to add a phone number, set preferences for the user account, and change the password associated with the user account. The user account may also include system preferences the user 102 defines. The system preferences may include security preferences, usage preferences, alert preferences, and so on. The security preference may define the requirements needed by the security circuit 136 before accessing the user information service computing system 122 via the user information circuit 106. For example, a security preference may require the user 102 to provide a password (e.g., word, phrase, alphanumeric value, etc.), a biometric scan (e.g., a fingerprint scan, a retina scan, a voice sample, etc.), a semi-random number (e.g., as generated by a changing security token device), or a combination thereof to the security circuit 136 before the user 102 may access the user information service computing system 122. The security circuit 136 may also allow the user 102 to define user information (e.g., social security number, etc.) that require a second passcode to authorize transmission to entity computing system 110. Alert preferences may include when alert 216 is sent to the user information circuit 106 (e.g., information request 204 received, social security number requested, etc.), a form of alert 216 (e.g., text message, email, notification, etc.) and information included in alert 216 (e.g., user information requested, transaction type, entity 108 requesting the information, etc.).
  • Incoming user information 202 is added to the user account by the UIS information circuit 130 at 304. The user 102 may manually enter the user information via input devices associated with the user computing device 104. In some arrangements, the user information circuit 106 provides a graphical user interface with labeled spaces for the user 102 to enter specified information. For example, the user 102 may fill in the home address of user 102 in a box labeled “Home Address.” The user 102 may also include information about one or more of the entities 108 that may provide additional incoming user information 202. For example, the user 102 may provide information regarding a health care provider or financial institution associated with the user 102 to the user information service computing system 122 via the user information circuit. Alternatively, the user 102 may link the user information circuit 106 to other applications used by the user 102 that include user information (e.g., mobile banking application, social media application, etc.).
  • The user information service computing system 122 may request user information from the entity computing system 110, at 306. For example, the UIS information circuit 130 may request healthcare information associated with user 102 from the health care provider indicated by the user 102 at 304. Additionally, the user information service computing system 122 may request user information from the user 102 via the user information circuit 106. If the UIS information circuit 130 has a set of user information (e.g., name, email, phone number, address, etc.) that is required for all users, including user 102, the UIS information circuit 130 may send alert 216 to the user 102 via the user information circuit 106 indicating that user information is missing and/or incomplete.
  • The UIS information circuit 130 of the user information service computing system 122 receives incoming user information 202 at 308. The incoming user information 202 received at 308 may be the user information requested at 306, or additional information provided to the UIS information circuit 130 via the user information circuit 106 or the entity computing system 110. If the information requested is information that remains constant (e.g., social security number, birthday, etc.), or relatively constant (e.g., home address, last name, insurance information, healthcare information, etc.), the user information database 132 may receive a copy of the user information. Alternatively, if the user information changes frequently (e.g., balance of financial accounts, credit score, etc.) the UIS information circuit 130 may receive access to the user information instead of receiving copy of the user information. The incoming user information 202 received at 308 may be compared to the user information currently associated with the user account and/or other incoming user information 202 being received by the user information database 132. The UIS information circuit 130 may send the alert 216 to the user 102 via the user information circuit 106 when a discrepancy is determined between pieces of user information. For example, if the home address associated with the user 102 received from one entity 108 is listed as “Pin Oak” and the home addressed associated with the user 102 at a different entity 108 is listed as “Pine Oak,” the user 102 may send user input 208 to the user information service computing system 122 indicating the information that is correct and should be stored in the user information database 132. In some embodiments, the user information service computing system 122 may ask the user 102 via alert 216 to the user information circuit 106 to verify the user information received from the various entity computing systems 110 even if no discrepancies are found for the piece of user information.
  • The UIS information circuit 130 of the user information service computing system 122 stores, manages, and distributes the user information at 310. The user information that is constant or relatively constant may be stored by the user information computing system 122. However, the user information may still be modified by user 102 via the user information circuit 106, but may require manual updating of the user information. User information that is relatively fluid, or changes frequently, may be managed by the user information database 132. This information may be updated frequently as entities 108 associated with the user information (e.g., a financial institution associated with a financial account of user 102) update the user information. Additionally, some user information may be managed on a set cycle or by user input. For example, the user 102 may indicate that the user 102 visits the eye doctor once a year, generally in March. The user information service computing system 122 may only request updated user information relating to the eye doctor (e.g., vision prescription, etc.) at the end of March, or may periodically check for user information updates during the month of March. If the user 102 instead visits the eye doctor in February, the user 102 may indicate via the user information circuit 106, that the user information associated with the eye doctor has been updated. The user information service computing system 122 may request user information from a computing system (e.g., entity computing system 110) associated with the eye doctor (e.g., entity 108) based on the user input 208 indication received from user information circuit 106. User information may then be selectively distributed to entity computing system 110 by the user information service computing system 122. Additional methods for managing and distributing user information are explained in further detail below with respect to FIGS. 4-7 .
  • Referring now to FIG. 4 , a flow diagram of a method 400 of providing user information to an entity using the user information service computing system 122 is shown, according to an example embodiment. The method 400 provides user information to computing system 122 based on a transaction occurring between the user 102 and one or more of the entities 108. The method 400 may be initiated in two ways, by the user 102, or by one or more of the entities 108.
  • The user information service computing system 122 receives an information request 204 from the entity computing system 110 at 402. The information request 204 may include a list of all the user information (e.g., name, address, credit score, financial institution, etc.) being requested for the user 102 by the entity 108 for a transaction. The information request 204 may also include the type of transaction that is taking place (e.g., mortgage approval, etc.) and/or information relating to the entity 108. The entity 108 may have to register (e.g., create an entity account, etc.) with the user information service computing system 122 before the information request 204 can be received from the entity computing system 110. Alternatively, the entity 108 may not have to register with the user information service before the user information service computing system 122 can receive an information request 204 from the entity computing system 110.
  • The entity computing system 110 may have to provide at least basic user information (e.g., first and last name, phone number, etc.) to the user information service computing system 122 to identify the account associated with the user 102 at the user information service 120. In some embodiments, the security circuit 136 may require the entity computing system 110 to provide a form of authentication to ensure the entity computing system 110 is not trying to obtain user information for fraudulent purposes. For example, the entity 108 may have to register an entity account and provide a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. to the security circuit 136 before the user information service computing system 122 responds to the information request 204.
  • The entity 108 may have an entity number to associate the entity 108 with the user information service computing system 122. The entity number may be associated with a user information service 120 account held by the user information service computing system 122 for the entity 108. The entity account may contain information relating to transactions common for the entity 108 stored in the transaction type database 134. For example, a car dealership may have car loan and car purchase transactions associated with the entity account stored in the transaction type database 134. The transaction type database 134 may also contain information commonly requested for the transactions associated with the entity 108. The user information service computing system 122 can use this information to determine if the entity computing system 108 is requesting information consistent with information requests 204 made in the past. For example, if the car dealership has a defined set of user information that is requested from the user 102 when the user 102 is getting a car loan, but an information request 204 contains more information than normally requested, the security circuit 136 may suspect fraudulent activity relating to the entity computing system 110. Inconsistent user information requests will be described in greater detail with respect to FIG. 5 .
  • The user information service computing system 122 may send an approval request 212 and a corresponding alert 216 to the user 102 via the security circuit 136 of the user information circuit 106 at 404. The approval request 212 may present the user information in a way that indicates the type of user information without revealing the user information. For example, the approval request 212 may indicate that the home address of user 102 was requested, without actually providing the home address of the user 102. Alternatively, the user 102 may be notified by the user information service computing system 122 via the user information circuit 106 of the approval request 212 and have to log in to the user information computing system 122 to see the approval request 212. For example, the user 102 may receive a notification saying “Someone has requested user information, please login to approve this request,” etc. The approval request may also include information identifying the entity 108 that sent the information request 204. By identifying the entity 108, the user 102 can provide the correct outgoing user information 210 to the entity 108. The approval request 212 may also include the transaction information 220. For example, the approval request 212 sent be the user information service computing system 122 may indicate that the user information is being requested to complete a car loan. By providing the transaction information 202 to the user 102 via the user information circuit 106, the user 102 can verify the entity 108 requested the user information for the correct transaction. The approval request 212 may also indicate to the user 102 if any user information was requested that is not associated with the user information database 132.
  • The user information service computing system 122 receives a response to the approval request from the user 102 via user input 208 from the user information circuit 106 at 406. The response to the approval request indicates which user information has been approved by the user 102 to share with the entity 108 that sent information request 204. The user 102 may approve all, part or none of the user information in the user input 208. If the user 102 does not approve any of the user information sought in the user information request 204, the method 400 may terminate.
  • If the user 102 approves part or all of the user information, outgoing user information 210 is provided to the entity computing system 110 of the entity 108 that sent the information request 204 at 414. If the user 102 has multiple pieces of the same type of user information (e.g., multiple accounts, two home addresses, etc.) the response may indicate which user information is to be shared (e.g., checking account, one of the home addresses, etc.) with the entity computing system 110 for a given type of user information. Alternatively, the user 102 may choose to approve all pieces of the same type of user information with the user input 208. The user 102 may approve the user information by checking a box next to the user information using a graphical user interface associated with the user information circuit 106. The user 102 may have to provide authorization to the security circuit 136 in order to approve a piece of user information with high security. For example, if the user 102 is approving the social security number associated with the user 102, the user may have to provide authorization to the security circuit 136. For example, the user 102 may have to provide a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. to the security circuit before the outgoing user information 210 is authorized to be sent to the entity computing system 110. In some embodiments, all user information requires authorization, while higher level security information requires secondary authorization from the security circuit 136. Other methods of selecting and approving information for approval are intended to fall within the scope of the present disclosure.
  • Instead of receiving an information request 204 from entity 108, the user information service computing system 122 may receive a potential transaction 206 from user 102 via the user information circuit 106 at 408. Alternatively, the user information service computing system 122 may receive the potential transaction from the entity computing system 110. The potential transaction 206 received from the entity computing system 110 by the user information service computing system 122 may contain information consistent with the information request 204 received at 402. However, in this case, the entity computing system 110 is not requesting any user information, the entity computing system 110 is simply providing the user information service computing system 122, and the user 102, with an indication of what user information would be requested.
  • The user information service computing system 122 receives selected user information from the user 102 via user input 208 from the user information circuit 106 at 410. If the potential transaction 206 was received by the user information service computing system 122 from the user information circuit 106, the transaction type database 134 may provide suggestions to the user 102 of what user information may be involved in the potential transaction 206. The user 102 can select relevant user information from the user information stored and managed by the user information database 132, or add additional user information relevant to the potential transaction. Alternatively, if the potential transaction was sent by the entity computing system 110, the user 102 may approve the user information, much like was done at 406. The selected user information may be stored in the user information database 132 so the user information is accessible when the user 102 is ready to complete a transaction.
  • When the user 102 is ready to complete the potential transaction 206, the user information service computing system 122 receives an entity selection at 412 from user input 208 from the user information circuit 106. Since the potential transaction 206 may have been initiated by the user 102 at 408, the entity 108 involved in the actual transaction may not be the entity 108 associated with the potential transaction 206. If the potential transaction was initiated by the entity computing system 110, the entity 108 may be saved in the user information database 132 with the user information for the potential transaction 206. The user 102 may choose if the entity 108 that initiated the transaction should be saved with the potential transaction 206 by proving user input 208 via the user information circuit 106. If the entity 108 was saved with the potential transaction 206, the user 102 can select entity 108 using the user information circuit 106. If no entity was saved with the potential transaction, the user 102 may select an entity to complete the potential transaction by providing user input 208 via the user information circuit 106. The user 102 may select an entity by providing the user information service computing system 122 with information about the entity (e.g., name, address, phone number, etc.) via the user information circuit 106. Alternatively, the user 102 may select an entity by using a drop down list of entities 108 associated with the user information service computing system 122 on a graphical user interface associated with the user information circuit 106. In another embodiment, the user 102 may enter an entity identification number associated with the entity 108 and the user information service computing system 122 via the graphical user interface associated with the user information circuit 106. The user 102 may receive the entity identification number from the entity 108, or from a list provided to the user 102 via the user information circuit 106 from the user information service computing system 122. Alternatively, the user 102 may use the user computing device 104 to scan a barcode, QR code, or other symbol at the entity 108 to indicate the entity 108 selected to the user information service computing system 122. A more detailed method with regard to potential transactions can be seen with reference to FIG. 6 .
  • The user information service computing system 122 provides the approved outgoing user information 210 to the entity computing system 110 of the selected entity 108 at 414. The outgoing user information 210 may be provided to the entity computing system 110 in a number of ways. The user information service computing system 122 may provide the outgoing user information 210 in an email to the entity computing system 110 (e.g., in a PDF document, etc.). Alternatively, the user information service computing system 122 may populate a form associated with the entity computing system 110 to provide outgoing user information 210. In another embodiment, the user information service computing system 122 populates a database associated with the entity computing system 110 (e.g., user information database 118) to provide outgoing user information 210. In some embodiments, the entity 108 may determine how user information is sent based on setting associated with an entity account with the user information service 120. In other embodiments, the user information service computing system 122 determines how the outgoing user information 210 is sent to entity computing system 110. In another embodiment, the outgoing user information 210 is sent to the entity computing system 110 in different forms based on the level of security of the outgoing user information 210 determined by the security circuit 136.
  • The user information service computing system 122 updates the outgoing user information 210 for the transaction type at 416. The user information service computing system 122 may update the transaction type database 134. The transaction type database 134 may maintain all outgoing user information 210 requested for a plurality of transaction types. The transaction type database 134 may keep a single set of user information requested 210 for a given transaction type. Alternatively, the transaction type database 134 keeps all user information requested for a given transaction type for all users associated with the user information service computing system 122. In this regard, the transaction type database 134 may be adaptive and learn what user information is commonly requested for a given transaction type. This information may be used when determining if the information request 204 includes information not commonly requested, which will be described in greater detail with regard to FIG. 5 .
  • Referring now to FIG. 5 , a flow diagram of a method 500 of comparing a user information request from an entity is shown, according to an example embodiment. The method 500 is performed by the user information service computing system 122. The method 500 receives an information request 204 from entity computing system 110 at 502, which may be substantially similar to process 402 of method 400, compares the information request 204 to user information requests for the same transaction type and provides the entity computing system 110 with the outgoing user information 210.
  • The user information service computing system 122 compares the information request 204 to user information requests of similar transaction types at 504. The information stored in the transaction type database 134 may also include the geographical location of the information request 204, in case different geographical locations (e.g., different states, etc.) have different protocols for user information requested for certain transactions. Additionally, the transaction type database 134 may determine trends in the user information requested based on the dates of the information requests 204. The user information service computing system 122 may compare the information request 204 received at 502 to individual user information requests stored in the transaction type database 134. Alternatively, the user information service computing system 122 may compare the information request 204 received at 502 to an information request 204 that is representative of all of the information requests 204 stored in the transaction type database 134.
  • The user information service computing system 122 determines if the information request 204 received at 502 is similar to other user information requests for similar transaction types at 506. The comparison may take into account the frequency of the user information requested. For example, if some type user information is always requested for the transaction type, and some type information is usually requested, these may both indicate a similar request and not cause the security circuit 136 to flag the information request 204. However, if a particular type of user information is rarely or never requested for the transaction type, but appears in the information request 204 received at 502, the information request 204 may not be considered similar. If the user information requested is similar to the user information frequently requested for the transaction type, approval request 212 and a corresponding alert 216 is sent to the user information circuit 106 at 508. Process 508 may be substantially similar to process 404 of method 400. If there are user information types that are not similar to the user information types frequently requested for the transaction type, processes 510-512 occurs.
  • The user information service computing system 122 flags non-similar user information types in the information request 204 at 510. The user information service computing system 122 may use the security circuit 136 to determine how to flag the user information that was determined inconsistent with frequently requested user information when compared with other user information requests for similar entity types using the transaction type database 134. The security circuit 136 may have different levels of comparison that would cause user information to be flagged. For example, if a piece of information is sometimes requested, a first flag may be applied (e.g., a yellow flag, etc.). If a piece of information is rarely requested, a second flag may be applied (e.g., an orange flag, etc.). If a piece of information is never, or should never, be requested a third flag may be applied (e.g., a red flag, etc.). Alternatively, the information may be flagged based on a level of security associated with the user information. For example, the name of user 102 may have a low security level and therefore have one flag associated with the name, while the social security number of the user 102 may have a high security level and therefore have a different flag associated with the social security number. In that regard, the user information requested that is inconsistent with the user information commonly requested may be flagged with a first, second, third, etc. flag based on the level of security of the user information. In some embodiments, a piece of user information may receive multiple sets of flags based on different criteria (e.g., frequency of request and level of security, etc.).
  • The user information service computing system 122 sends a flagged request 214 and a corresponding alert 216 to the user 102 via the user information circuit 106 at 512. The flagged request 214 indicates any information that was flagged by the security circuit 136 at 510. The flagged request 214 may also include information consistent with the approval request 212 of process 404 of method 400, such as transaction information 220 and information indicating the entity 108 that sent the information request 204, in addition to the flagged user information.
  • The user information service computing system 122 receives the user response to the request at 514 via user input 208 from the user information circuit 106 regardless of whether or not the information request 204 received at 502 was similar to information requests of similar transaction types. The user information service computing system 122 sends the approved outgoing user information 210 to the entity computing system 110 at 516. Process 514-516 may be substantially similar to processes 406 and 414 of method 400, respectively.
  • Referring now to FIG. 6 , a flow diagram of a method 600 of preparing user information for a predicted transaction 218 is shown according to an example embodiment. The method 600 is performed by user information service computing system 122. The method 600 predicts a transaction based on activity of the user 102 and provides recommendation to the user 102 based on the predicted transaction 218.
  • The user information service computing system 122 predicts a transaction of the user 102 at 602. The user information service computing system 122 may monitor other software applications on the user computing device 104 and/or monitor website activity on the user computing device 104 to predict a potential transaction of the user 102. The prediction circuit 138 may be set with different transactions that could be completed and information that may be indicative of future transactions based on activity on the user computing device 104. For example, if the user 102 is looking up homes or properties, the prediction circuit 138 may predict the user 102 will be purchasing a home. The prediction circuit 138 of the user information service computing system 122 may be set to only predict a transaction after a given set of activity is monitored. For example, the user 102 may have to look at home and property listings multiple times in a given period of time before the prediction circuit 138 predicts the transaction to minimize the number of predicted transactions 218 generated.
  • The user information service computing system 122 sends the predicted transaction and a corresponding alert 216 to the user 102 via the user information circuit 106 at 604. The user information service computing system 122 may send the predicted transaction to the user information circuit 106 as an alert 216. The alert 216 may include the predicted transaction 218 as well as information indicating how the user information service computing system 122 predicted the transaction. For example, the alert may say “We noticed you have been viewing houses for sale frequently, are you planning on purchasing a home?” The user 102 may respond to the alert via user input 208 to the user information circuit 106.
  • The user information service computing system 122 determines if the user 102 confirmed the predicted transaction 218 or not at 606. If the user 102 indicates that the predicted transaction 218 is not a transaction the user 102 is planning on completing, the user information service computing system 122 may delete the predicted transaction 218 at 608. The prediction circuit 138 may also make note of the fact that the user 102 is not planning on making the predicted transaction 218 so as to minimize the chance of sending the user 102 another alert 216 relating to a predicted transaction 218 that is the same as a previously predicted transaction. If the user 102 confirms via user input 108 to the user information circuit 106 that the predicted transaction 218 is a transaction the user 102 plans on completing in the future, processes 610-614 may occur.
  • The user information service computing system 122 analyzes the user information at 610. Analyzing the user information may include determining the user information that is likely to be needed for a given transaction type by the transaction type database 134. The transaction type database 134 may determine different levels of user information. For example, the transaction type database 134 may determine user information that will most likely be needed for the identified transaction type. The transaction type database 134 may also determine user information that may be needed, depending on the entity 108 that the user 102 will be using to complete the transaction. The transaction type database 134 may use methods similar to those used when comparing the user information request to similar user information requests as described with respect to FIG. 5 , specifically process 504 of the method 500. Analyzing the user information may also include comparing the user information needed for the transaction with the user information stored at the user information database 132. The user information service computing system 122 may compare the user information determined at 610 to the user information database 132 to determine if the user information database 132 has all the user information needed for the predicted transaction 218. Analyzing the user information may also include analyzing the content of the user information (e.g., financial information, etc.). Analyzing the content of the user information may provide the user information service computing system 122 with information regarding the likelihood of a successful transaction. For example, if the predicted transaction 218 is buying a car, but the user 102 does not have enough money saved for a down payment, analyzing the user information may indicate that the user 102 should be saving more money.
  • The user information service computing system 122 sends a predicted transaction recommendation and a corresponding alert 216 to the user 102 via the user information circuit 106 at 612. The predicted transaction recommendation is a recommendation to the user 102 based on the analysis of the user information at 610. The predicted transaction recommendation may include information relating to user information that is needed for the predicted transaction that the user 102 currently does not have associated with the user information service computing system 122. Alternatively, or in addition, the predicted transaction recommendation may provide the user 102 with information regarding improvements that could be made to the user information to increase the likelihood of a successful transaction. The user information service computing system 122 may provide the user 102 with the alert 216 via the user information circuit 106 indicating the predicted transaction recommendation. Alert 216 may also be provided to the user 102 via the user information circuit 106 by the user information database 132 to remind the user 102 to provide the user information service computing system 122 with user information that will be needed for the potential transaction if the user 102 has not provided the user information needed in a set amount of time. The predicted transaction recommendation may also include recommendations for changes in the activity of the user 102 in order to have a successful transaction when the user 102 is ready to complete the predicted transaction 218. For example, if the predicted transaction is buying a car, the predicted transaction recommendation may include financial recommendations to increase the likelihood that the user 102 will be able to make car payments, information on the credit score of the user 102 and how to improve the credit score to get better car loans, etc.
  • The user information service computing system 122 sets the predicted transaction as a potential transaction at 614. Since the user 102 has confirmed the predicted transaction is a transaction the user 102 is thinking about completing, the user information service computing system 122, it is no longer a predicted transaction.
  • Referring now to FIG. 7 , a flow diagram of a method 700 of determining if the user 102 has the user information ready for a potential transaction 206 is shown, according to an example embodiment. The method 700 is performed by the user information service computing system 122. The method 700 receives a potential transaction 206, determines if the user 102 has the user information that will likely be need for the potential transaction 206, and provides the entity computing system 110 with the approved outgoing user information 210. Alternatively, the potential transaction 206 is received as a product of method 600. Process 702 may be substantially similar to process 408 of method 400.
  • The user information service computing system 122 determines the user information needed for the transaction at 704, much like process 610 of method 600 when the transaction type database 134 analyzes the transaction type to determine the type of user information that will likely be needed for the potential transaction 206. However, unlike process 610 of method 600, the content of the user information is not analyzed to provide recommendations on changes in behavior.
  • The user information service computing system 122 determines if the user 102 has the user information determined at 704 for the potential transaction 206 received at 702 at 706. The transaction type database 134 may compare the user information determined at 704 to information in the user information database 132 to determine if the user information database 132 has the user information that will likely be needed for the potential transaction 206. If the user information that will likely be needed is in the user information database 132, the method 700 may proceed directly to process 712. If user information is needed and is not in the user information database 132, processes 708-710 occur.
  • The user information service computing system 122 alerts the user 102 of the missing user information at 708. The user information service computing system 122 may provide the user 102 with the alert 216 much like process 612. The alert 216 is received by the user 102 via the user information circuit 106 and indicates user information that was determined to be missing at 706.
  • The user information service computing system 122 receives incoming user information 202 at 710. The incoming user information 202 is received from the user 102 via the user information circuit 106 in response to the alert 216 notifying the user 102 of user information that is missing. Process 710 may be substantially similar to process 304 and 308 of method 300.
  • The user information service computing system 122 receives the user 102 entity selection at 712. The user 102 entity selection is sent from the user information circuit 106 and indicates which entity 108 the user 102 has selected to complete the potential transaction 206. Process 712 may be substantially similar to process 412 of method 400.
  • The user information service computing system 122 provides the approved outgoing user information 210 to the entity computing system 110 at 714. The entity computing system 110 that receives the approved outgoing user information 210 is the entity computing system 110 associated with the entity selected at 712. Process 714 may be substantially similar to process 414 of method 400.
  • By using the user information service to store and manage user information, individuals gain ease of access to user information. In addition, with all the user information stored in a single location, information is protected, accessible and easy to distribute. Oftentimes, when individuals are asked for user information, the individual must get the information from a variety of places. The individual may have some information stored at home in a safe, while other information is stored electronically. The individual may also have to reach out to other entities to get the information needed. This can be cumbersome for the individual, and cause delays in transactions the user would like to complete. In addition, once the individual obtains all the information, it has to be shared with the entity the individual is completing the transaction with. This process can be tedious and the individual may makes mistakes when providing large amount of information. By using the user information service, individuals can easily provide all the needed information to an entity to quickly, and accurately, complete a transaction.
  • The embodiments described herein have been described with reference to drawings. The drawings illustrate certain details of specific embodiments that implement the systems, methods and programs described herein. However, describing the embodiments with drawings should not be construed as imposing on the disclosure any limitations that may be present in the drawings.
  • It should be understood that no claim element herein is to be construed under the provisions of 35 U.S.C. § 112(f), unless the element is expressly recited using the phrase “means for.”
  • As used herein, the term “circuit” may include hardware structured to execute the functions described herein. In some embodiments, each respective “circuit” may include machine-readable media for configuring the hardware to execute the functions described herein. The circuit may be embodied as one or more circuitry components including, but not limited to, processing circuitry, network interfaces, peripheral devices, input devices, output devices, sensors, etc. In some embodiments, a circuit may take the form of one or more analog circuits, electronic circuits (e.g., integrated circuits (IC), discrete circuits, system on a chip (SOCs) circuits, etc.), telecommunication circuits, hybrid circuits, and any other type of “circuit.” In this regard, the “circuit” may include any type of component for accomplishing or facilitating achievement of the operations described herein. For example, a circuit as described herein may include one or more transistors, logic gates (e.g., NAND, AND, NOR, OR, XOR, NOT, XNOR, etc.), resistors, multiplexers, registers, capacitors, inductors, diodes, wiring, and so on).
  • The “circuit” may also include one or more processors communicatively coupled to one or more memory or memory devices. In this regard, the one or more processors may execute instructions stored in the memory or may execute instructions otherwise accessible to the one or more processors. In some embodiments, the one or more processors may be embodied in various ways. The one or more processors may be constructed in a manner sufficient to perform at least the operations described herein. In some embodiments, the one or more processors may be shared by multiple circuits (e.g., circuit A and circuit B may comprise or otherwise share the same processor which, in some example embodiments, may execute instructions stored, or otherwise accessed, via different areas of memory). Alternatively or additionally, the one or more processors may be structured to perform or otherwise execute certain operations independent of one or more co-processors. In other example embodiments, two or more processors may be coupled via a bus to enable independent, parallel, pipelined, or multi-threaded instruction execution. Each processor may be implemented as one or more general-purpose processors, application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), digital signal processors (DSPs), or other suitable electronic data processing components structured to execute instructions provided by memory. The one or more processors may take the form of a single core processor, multi-core processor (e.g., a dual core processor, triple core processor, quad core processor, etc.), microprocessor, etc. In some embodiments, the one or more processors may be external to the apparatus, for example the one or more processors may be a remote processor (e.g., a cloud based processor). Alternatively or additionally, the one or more processors may be internal and/or local to the apparatus. In this regard, a given circuit or components thereof may be disposed locally (e.g., as part of a local server, a local computing system, etc.) or remotely (e.g., as part of a remote server such as a cloud based server). To that end, a “circuit” as described herein may include components that are distributed across one or more locations.
  • An exemplary system for implementing the overall system or portions of the embodiments might include a general purpose computing computers in the form of computers, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit. Each memory device may include non-transient volatile storage media, non-volatile storage media, non-transitory storage media (e.g., one or more volatile and/or non-volatile memories), etc. In some embodiments, the non-volatile media may take the form of ROM, flash memory (e.g., flash memory such as NAND, 3D NAND, NOR, 3D NOR, etc.), EEPROM, MRAM, magnetic storage, hard discs, optical discs, etc. In other embodiments, the volatile storage media may take the form of RAM, TRAM, ZRAM, etc. Combinations of the above are also included within the scope of machine-readable media. In this regard, machine-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions. Each respective memory device may be operable to maintain or otherwise store information relating to the operations performed by one or more associated circuits, including processor instructions and related data (e.g., database components, object code components, script components, etc.), in accordance with the example embodiments described herein.
  • It should also be noted that the term “input devices,” as described herein, may include any type of input device including, but not limited to, a keyboard, a keypad, a mouse, joystick or other input devices performing a similar function. Comparatively, the term “output device,” as described herein, may include any type of output device including, but not limited to, a computer monitor, printer, facsimile machine, or other output devices performing a similar function.
  • Any foregoing references to currency or funds are intended to include fiat currencies, non-fiat currencies (e.g., precious metals), and math-based currencies (often referred to as cryptocurrencies). Examples of math-based currencies include Bitcoin, Litecoin, Dogecoin, and the like.
  • It should be noted that although the diagrams herein may show a specific order and composition of method steps, it is understood that the order of these steps may differ from what is depicted. For example, two or more steps may be performed concurrently or with partial concurrence. Also, some method steps that are performed as discrete steps may be combined, steps being performed as a combined step may be separated into discrete steps, the sequence of certain processes may be reversed or otherwise varied, and the nature or number of discrete processes may be altered or varied. The order or sequence of any element or apparatus may be varied or substituted according to alternative embodiments. Accordingly, all such modifications are intended to be included within the scope of the present disclosure as defined in the appended claims. Such variations will depend on the machine-readable media and hardware systems chosen and on designer choice. It is understood that all such variations are within the scope of the disclosure. Likewise, software and web implementations of the present disclosure could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various database searching steps, correlation steps, comparison steps and decision steps.
  • The foregoing description of embodiments has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the disclosure to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from this disclosure. The embodiments were chosen and described in order to explain the principals of the disclosure and its practical application to enable one skilled in the art to utilize the various embodiments and with various modifications as are suited to the particular use contemplated. Other substitutions, modifications, changes and omissions may be made in the design, operating conditions and arrangement of the embodiments without departing from the scope of the present disclosure as expressed in the appended claims.

Claims (20)

What is claimed is:
1. A method, comprising:
determining, by a User Information Service (UIS) system, that a user of a user computing device is predicted to engage in a potential transaction based on monitoring software applications executed on the user computing device and website activities on the user computing device;
determining, by the UIS system based on a transaction type of the potential transaction and an entity of the potential transaction, first user information corresponding to the potential transaction by comparing the potential transaction to a plurality of prior transactions of the same transaction type;
determining, by the UIS system, second user information of the user stored in a user information database;
determining, by the UIS system, whether the second user information is sufficient for the potential transaction by comparing the first user information and the second user information;
in response to determining that the second user information is not sufficient for the potential transaction, sending, by the UIS system to the user computing device, an alert indicating third user information different from the second user information;
receiving, by the UIS system from the user computing device, the third user information; and
providing, by the UIS system to an entity computing system of the entity, the second user information and the third user information.
2. The method of claim 1, further comprising:
determining the type of transactions based on monitoring the software applications and the web site activities; and
determining that the software applications and the website activities comprise multiple instances of the type of transactions over a period of time.
3. The method of claim 1, further comprising:
sending, by the UIS system to the user computing device, an alert indicative of the potential transaction; and
determining, by the UIS system from the user computing device, whether the user computing device confirms the potential transaction.
4. The method of claim 3, further comprising in response to determining that the user computing device rejects the potential transaction, deleting, by the UIS system, the potential transaction.
5. The method of claim 1, further comprising populating, by the UIS system in the user information database, an account of the user with the second user information received from at least one of the user computing system and a plurality of entity computing systems.
6. The method of claim 1, further comprising analyzing, by the UIS system, a likelihood that the potential transaction is successful by comparing a first value corresponding to the transaction type to a second value comprised in the second user information.
7. The method of claim 1, wherein the user information database is adaptive, constantly updates user information requested for certain types of transactions, and learns what user information requests to compare based on a given transaction type of prior user information requests
8. At least one non-transitory computer readable medium having computer-executable instructions embodied therein that, when executed by at least one processor, causes the at least one processor to:
determine that a user of a user computing device is predicted to engage in a potential transaction based on monitoring software applications executed on the user computing device and website activities on the user computing device;
determine based on a transaction type of the potential transaction and an entity of the potential transaction, first user information corresponding to the potential transaction by comparing the potential transaction to a plurality of prior transactions of the same transaction type;
determine second user information of the user stored in a user information database;
determine whether the second user information is sufficient for the potential transaction by comparing the first user information and the second user information;
in response to determining that the second user information is not sufficient for the potential transaction, send, to the user computing device, an alert indicating third user information different from the second user information;
receive from the user computing device, the third user information; and
provide, to an entity computing system of the entity, the second user information and the third user information.
9. The non-transitory computer readable medium of claim 8, wherein the at least one processor is further caused to:
determine the type of transactions based on monitoring the software applications and the website activities; and
determine that the software applications and the website activities comprise multiple instances of the type of transactions over a period of time.
10. The non-transitory computer readable medium of claim 8, wherein the at least one processor is further caused to:
send, to the user computing device, an alert indicative of the potential transaction; and
determine, from the user computing device, whether the user computing device confirms the potential transaction.
11. The non-transitory computer readable medium of claim 10, wherein the at least one processor is further caused to: in response to determining that the user computing device rejects the potential transaction, deleting, by the UIS system, the potential transaction.
12. The non-transitory computer readable medium of claim 8, wherein the at least one processor is further caused to populate in the user information database an account of the user with the second user information received from at least one of the user computing system and a plurality of entity computing systems.
13. The non-transitory computer readable medium of claim 8, wherein the at least one processor is further caused to analyze a likelihood that the potential transaction is successful by comparing a first value corresponding to the transaction type to a second value comprised in the second user information.
14. The non-transitory computer readable medium of claim 8, wherein the user information database is adaptive, constantly updates user information requested for certain types of transactions, and learns what user information requests to compare based on a given transaction type of prior user information requests
15. A system, comprising at least one processor configured to:
determine that a user of a user computing device is predicted to engage in a potential transaction based on monitoring software applications executed on the user computing device and website activities on the user computing device;
determine based on a transaction type of the potential transaction and an entity of the potential transaction, first user information corresponding to the potential transaction by comparing the potential transaction to a plurality of prior transactions of the same transaction type;
determine second user information of the user stored in a user information database;
determine whether the second user information is sufficient for the potential transaction by comparing the first user information and the second user information;
in response to determining that the second user information is not sufficient for the potential transaction, send, to the user computing device, an alert indicating third user information different from the second user information;
receive from the user computing device, the third user information; and
provide, to an entity computing system of the entity, the second user information and the third user information.
16. The system of claim 15, wherein the at least one processor is further configured to:
determine the type of transactions based on monitoring the software applications and the website activities; and
determine that the software applications and the website activities comprise multiple instances of the type of transactions over a period of time.
17. The system of claim 15, wherein the at least one processor is further configured to:
send, to the user computing device, an alert indicative of the potential transaction; and
determine, from the user computing device, whether the user computing device confirms the potential transaction.
18. The system of claim 10, wherein the at least one processor is further configured to: in response to determining that the user computing device rejects the potential transaction, deleting, by the UIS system, the potential transaction.
19. The system of claim 8, wherein the at least one processor is further configured to populate in the user information database an account of the user with the second user information received from at least one of the user computing system and a plurality of entity computing systems.
20. The system of claim 8, wherein the at least one processor is further configured to analyze a likelihood that the potential transaction is successful by comparing a first value corresponding to the transaction type to a second value comprised in the second user information.
US18/244,662 2015-12-29 2023-09-11 User information gathering and distribution system Pending US20230418918A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/244,662 US20230418918A1 (en) 2015-12-29 2023-09-11 User information gathering and distribution system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201562272422P 2015-12-29 2015-12-29
US15/385,035 US10817593B1 (en) 2015-12-29 2016-12-20 User information gathering and distribution system
US17/079,095 US11755707B1 (en) 2015-12-29 2020-10-23 User information gathering and distribution system
US18/244,662 US20230418918A1 (en) 2015-12-29 2023-09-11 User information gathering and distribution system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US17/079,095 Continuation US11755707B1 (en) 2015-12-29 2020-10-23 User information gathering and distribution system

Publications (1)

Publication Number Publication Date
US20230418918A1 true US20230418918A1 (en) 2023-12-28

Family

ID=72944795

Family Applications (3)

Application Number Title Priority Date Filing Date
US15/385,035 Active 2037-08-24 US10817593B1 (en) 2015-12-29 2016-12-20 User information gathering and distribution system
US17/079,095 Active 2037-07-03 US11755707B1 (en) 2015-12-29 2020-10-23 User information gathering and distribution system
US18/244,662 Pending US20230418918A1 (en) 2015-12-29 2023-09-11 User information gathering and distribution system

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US15/385,035 Active 2037-08-24 US10817593B1 (en) 2015-12-29 2016-12-20 User information gathering and distribution system
US17/079,095 Active 2037-07-03 US11755707B1 (en) 2015-12-29 2020-10-23 User information gathering and distribution system

Country Status (1)

Country Link
US (3) US10817593B1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10951730B1 (en) * 2017-08-09 2021-03-16 Wells Fargo Bank, N.A. Communication-based automated guidance
WO2019126471A1 (en) * 2017-12-21 2019-06-27 Taliware, Inc. Blockchain network management implementing biometric based authentication of an individual

Family Cites Families (223)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5987132A (en) * 1996-06-17 1999-11-16 Verifone, Inc. System, method and article of manufacture for conditionally accepting a payment method utilizing an extensible, flexible architecture
US5850446A (en) * 1996-06-17 1998-12-15 Verifone, Inc. System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible architecture
US5978840A (en) * 1996-09-26 1999-11-02 Verifone, Inc. System, method and article of manufacture for a payment gateway system architecture for processing encrypted payment transactions utilizing a multichannel, extensible, flexible architecture
US6169789B1 (en) * 1996-12-16 2001-01-02 Sanjay K. Rao Intelligent keyboard system
US5996076A (en) * 1997-02-19 1999-11-30 Verifone, Inc. System, method and article of manufacture for secure digital certification of electronic commerce
US6233565B1 (en) * 1998-02-13 2001-05-15 Saranac Software, Inc. Methods and apparatus for internet based financial transactions with evidence of payment
US7100195B1 (en) * 1999-07-30 2006-08-29 Accenture Llp Managing user information on an e-commerce system
US20050108096A1 (en) * 1999-09-28 2005-05-19 Chameleon Network Inc. Portable electronic authorization system and method
US7236956B1 (en) * 1999-10-18 2007-06-26 Stamps.Com Role assignments in a cryptographic module for secure processing of value-bearing items
US6671818B1 (en) * 1999-11-22 2003-12-30 Accenture Llp Problem isolation through translating and filtering events into a standard object format in a network based supply chain
US6526125B1 (en) * 1999-12-11 2003-02-25 Lucent Technologies Inc. System and method for automatic location identification discrepancy notification
US7257581B1 (en) 2000-08-04 2007-08-14 Guardian Networks, Llc Storage, management and distribution of consumer information
US7603319B2 (en) * 2000-08-28 2009-10-13 Contentguard Holdings, Inc. Method and apparatus for preserving customer identity in on-line transactions
US7743259B2 (en) * 2000-08-28 2010-06-22 Contentguard Holdings, Inc. System and method for digital rights management using a standard rendering engine
US20060074727A1 (en) * 2000-09-07 2006-04-06 Briere Daniel D Method and apparatus for collection and dissemination of information over a computer network
US8996698B1 (en) * 2000-11-03 2015-03-31 Truphone Limited Cooperative network for mobile internet access
US7343317B2 (en) * 2001-01-18 2008-03-11 Nokia Corporation Real-time wireless e-coupon (promotion) definition based on available segment
US7150037B2 (en) * 2001-03-21 2006-12-12 Intelliden, Inc. Network configuration manager
US20020143655A1 (en) * 2001-04-02 2002-10-03 Stephen Elston Remote ordering system for mobile commerce
US20030028427A1 (en) 2001-08-02 2003-02-06 International Business Machines Corporation User control of electronic personal information while browsing the Web
WO2003014867A2 (en) * 2001-08-03 2003-02-20 John Allen Ananian Personalized interactive digital catalog profiling
US7162451B2 (en) 2001-11-30 2007-01-09 International Business Machines Corporation Information content distribution based on privacy and/or personal information
US7627521B1 (en) * 2002-01-15 2009-12-01 Jpmorgan Chase Bank, N.A. System and method for processing mircotransactions
US7370356B1 (en) * 2002-01-23 2008-05-06 Symantec Corporation Distributed network monitoring system and method
US20040147265A1 (en) * 2002-07-23 2004-07-29 Mark Kelley System and method for an adaptive user communications device
WO2004017592A1 (en) * 2002-08-19 2004-02-26 Research In Motion Limited System and method for secure control of resources of wireless mobile communication device
US9105032B2 (en) * 2007-05-03 2015-08-11 Yellowpages.Com Llc Systems and methods to provide advertisements for real time communications
US20050086531A1 (en) * 2003-10-20 2005-04-21 Pss Systems, Inc. Method and system for proxy approval of security changes for a file security system
US20130179949A1 (en) * 2004-01-22 2013-07-11 Jpay, Inc. Secure exchange of digital content
GB2412189B (en) * 2004-03-16 2007-04-04 Netcraft Ltd Security component for use with an internet browser application and method and apparatus associated therewith
US7280644B2 (en) * 2004-12-07 2007-10-09 Ewi Holdings, Inc. Transaction processing platform for faciliating electronic distribution of plural prepaid services
US8990254B2 (en) * 2004-07-02 2015-03-24 Ellie Mae, Inc. Loan origination software system for processing mortgage loans over a distributed network
US8700729B2 (en) * 2005-01-21 2014-04-15 Robin Dua Method and apparatus for managing credentials through a wireless network
US8195481B2 (en) * 2005-02-25 2012-06-05 Virtual Radiologic Corporaton Teleradiology image processing system
US20110110568A1 (en) * 2005-04-08 2011-05-12 Gregory Vesper Web enabled medical image repository
US20140337503A1 (en) * 2005-04-26 2014-11-13 Guy Hefetz Methods for acquiring an internet user's consent to be located
US9401900B2 (en) * 2005-07-01 2016-07-26 Cirius Messaging Inc. Secure electronic mail system with thread/conversation opt out
WO2007029116A2 (en) * 2005-07-01 2007-03-15 0733660 B.C. Ltd. Dba E-Mail2, Inc. Electronic mail messaging system
US8688790B2 (en) * 2005-07-01 2014-04-01 Email2 Scp Solutions Inc. Secure electronic mail system with for your eyes only features
US8418233B1 (en) * 2005-07-29 2013-04-09 F5 Networks, Inc. Rule based extensible authentication
US9015090B2 (en) * 2005-09-06 2015-04-21 Daniel Chien Evaluating a questionable network communication
US9674145B2 (en) * 2005-09-06 2017-06-06 Daniel Chien Evaluating a questionable network communication
US8682795B2 (en) * 2005-09-16 2014-03-25 Oracle International Corporation Trusted information exchange based on trust agreements
US8458465B1 (en) * 2005-11-16 2013-06-04 AT&T Intellectual Property II, L. P. Biometric authentication
US7836303B2 (en) * 2005-12-09 2010-11-16 University Of Washington Web browser operating system
US20070150299A1 (en) * 2005-12-22 2007-06-28 Flory Clive F Method, system, and apparatus for the management of the electronic files
WO2007145687A1 (en) * 2006-02-21 2007-12-21 Weiss Kenneth P Method and apparatus for secure access payment and identification
US8234220B2 (en) * 2007-02-21 2012-07-31 Weiss Kenneth P Universal secure registry
US8249965B2 (en) * 2006-03-30 2012-08-21 Obopay, Inc. Member-supported mobile payment system
US9195834B1 (en) * 2007-03-19 2015-11-24 Ravenwhite Inc. Cloud authentication
KR100842270B1 (en) * 2006-12-04 2008-06-30 한국전자통신연구원 Electric tag for privacy protection and method for privacy protection using the electric tag
US8655939B2 (en) * 2007-01-05 2014-02-18 Digital Doors, Inc. Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor
US8126506B2 (en) * 2007-02-14 2012-02-28 Nuance Communications, Inc. System and method for securely managing data stored on mobile devices, such as enterprise mobility data
US20080209213A1 (en) * 2007-02-23 2008-08-28 Sony Ericsson Mobile Communications Ab Authorizing secure resources
US9003488B2 (en) * 2007-06-06 2015-04-07 Datavalet Technologies System and method for remote device recognition at public hotspots
US10523689B2 (en) * 2007-06-12 2019-12-31 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US8311513B1 (en) * 2007-06-27 2012-11-13 ENORCOM Corporation Automated mobile system
US20090043691A1 (en) 2007-08-06 2009-02-12 Sheldon Kasower System and method for gathering, processing, authenticating and distributing personal information
US8214291B2 (en) * 2007-10-19 2012-07-03 Ebay Inc. Unified identity verification
US8201229B2 (en) * 2007-11-12 2012-06-12 Bally Gaming, Inc. User authorization system and methods
US20090260064A1 (en) * 2008-04-15 2009-10-15 Problem Resolution Enterprise, Llc Method and process for registering a device to verify transactions
US8626115B2 (en) * 2009-01-28 2014-01-07 Headwater Partners I Llc Wireless network service interfaces
US8583781B2 (en) * 2009-01-28 2013-11-12 Headwater Partners I Llc Simplified service network architecture
US8589541B2 (en) * 2009-01-28 2013-11-19 Headwater Partners I Llc Device-assisted services for protecting network capacity
EP2151795A1 (en) * 2008-08-08 2010-02-10 France Telecom Secure electronic coupon delivery to mobile device
US8073778B2 (en) * 2008-09-11 2011-12-06 Linden Research, Inc. Scalable distributed transaction manager for multi-host transactions
US8146134B2 (en) * 2008-10-28 2012-03-27 Yahoo! Inc. Scalable firewall policy management platform
US8745213B2 (en) * 2008-12-19 2014-06-03 Openpeak Inc. Managed services platform and method of operation of same
US8364567B2 (en) * 2008-12-29 2013-01-29 Bank Of America Corporation Secure platforms for financial transaction applications
US8843997B1 (en) * 2009-01-02 2014-09-23 Resilient Network Systems, Inc. Resilient trust network services
US20100191652A1 (en) * 2009-01-23 2010-07-29 Eckert Daniel J Systems and methods for adding functionality to a uis for use at a point of interaction
US9578182B2 (en) * 2009-01-28 2017-02-21 Headwater Partners I Llc Mobile device and service management
US8793758B2 (en) * 2009-01-28 2014-07-29 Headwater Partners I Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US10019677B2 (en) * 2009-11-20 2018-07-10 Alert Enterprise, Inc. Active policy enforcement
US10027711B2 (en) * 2009-11-20 2018-07-17 Alert Enterprise, Inc. Situational intelligence
US20110270751A1 (en) * 2009-12-14 2011-11-03 Andrew Csinger Electronic commerce system and system and method for establishing a trusted session
US8775245B2 (en) * 2010-02-11 2014-07-08 News America Marketing Properties, Llc Secure coupon distribution
US9270663B2 (en) * 2010-04-30 2016-02-23 T-Central, Inc. System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US9461996B2 (en) * 2010-05-07 2016-10-04 Citrix Systems, Inc. Systems and methods for providing a single click access to enterprise, SAAS and cloud hosted application
US8560610B2 (en) 2010-06-16 2013-10-15 Brighttag Inc. Unified collection and distribution of data
US9253288B2 (en) * 2010-07-01 2016-02-02 Ishai Binenstock Location-aware mobile connectivity and information exchange system
US20120066262A1 (en) 2010-09-14 2012-03-15 Greenberg David M User-Controlled Management and Distribution of User Information
US8661076B2 (en) * 2010-09-23 2014-02-25 Salesforce.Com, Inc. Business networking information feed alerts
US9552431B2 (en) * 2010-11-24 2017-01-24 Visa International Service Association Unified online content manager apparatuses, methods, and systems
US8756221B2 (en) * 2010-12-03 2014-06-17 Salesforce.Com, Inc. Social files
US8700524B2 (en) * 2011-01-04 2014-04-15 Boku, Inc. Systems and methods to restrict payment transactions
US9531758B2 (en) * 2011-03-18 2016-12-27 Zscaler, Inc. Dynamic user identification and policy enforcement in cloud-based secure web gateways
US9369433B1 (en) * 2011-03-18 2016-06-14 Zscaler, Inc. Cloud based social networking policy and compliance systems and methods
US20130006862A1 (en) * 2011-07-03 2013-01-03 Robert William Graham System and Method of Controlling Transactions
US8429068B1 (en) * 2011-07-08 2013-04-23 Intuit Inc. Data aggregation for transaction banking partnerships
US20130024910A1 (en) * 2011-07-22 2013-01-24 Salesforce.Com, Inc. Computer implemented methods and apparatus for integrating a social network information feed with a network communications application
US9591090B2 (en) * 2011-08-22 2017-03-07 Salesforce.Com, Inc. Computer implemented methods and apparatus for sharing data of an information feed of an online social network
US10158638B2 (en) * 2011-08-31 2018-12-18 Salesforce.Com, Inc. Computer implemented methods and apparatus for providing access to an online social network
US8726082B2 (en) * 2011-09-02 2014-05-13 Verizon Patent And Licensing Inc. Method and system for providing incomplete action monitoring and service for data transactions
US20140032733A1 (en) * 2011-10-11 2014-01-30 Citrix Systems, Inc. Policy-Based Application Management
US9137262B2 (en) * 2011-10-11 2015-09-15 Citrix Systems, Inc. Providing secure mobile device access to enterprise resources using application tunnels
US9330398B2 (en) * 2011-11-04 2016-05-03 At&T Intellectual Property I, L.P. Internet protocol multi-media system value voucher distribution with network storage and redemption
DE202012100620U1 (en) * 2011-11-22 2012-06-13 Square, Inc. System for processing cardless payment transactions
US9787681B2 (en) * 2012-01-06 2017-10-10 Optio Labs, Inc. Systems and methods for enforcing access control policies on privileged accesses for mobile devices
US8793804B2 (en) * 2012-01-09 2014-07-29 Ezshield, Inc. Computer implemented method, computer system and nontransitory computer readable storage medium having HTTP module
WO2013126713A1 (en) * 2012-02-22 2013-08-29 Pave, Inc. Apparatuses, methods and systems for facilitating communities of social based investment
US9143402B2 (en) 2012-02-24 2015-09-22 Qualcomm Incorporated Sensor based configuration and control of network devices
US9251360B2 (en) * 2012-04-27 2016-02-02 Intralinks, Inc. Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment
US9253176B2 (en) * 2012-04-27 2016-02-02 Intralinks, Inc. Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment
US20140245015A1 (en) * 2012-04-27 2014-08-28 Intralinks, Inc. Offline file access
US20140304836A1 (en) * 2012-04-27 2014-10-09 Intralinks, Inc. Digital rights management through virtual container partitioning
US20140189483A1 (en) * 2012-04-27 2014-07-03 Intralinks, Inc. Spreadsheet viewer facility
US9553860B2 (en) * 2012-04-27 2017-01-24 Intralinks, Inc. Email effectivity facility in a networked secure collaborative exchange environment
US9124419B2 (en) * 2012-05-08 2015-09-01 Discretix Technologies Ltd. Method, device, and system of secure entry and handling of passwords
US9195819B2 (en) * 2012-07-26 2015-11-24 Bitlit Media Inc. Methods and systems for verifying ownership of a physical work or facilitating access to an electronic resource associated with a physical work
US20150235215A1 (en) * 2012-08-16 2015-08-20 Tango Mobile, LLC System and Method for Mobile or Web-Based Payment/Credential Process
US9747388B2 (en) * 2012-08-31 2017-08-29 Salesforce.Com, Inc. Systems and methods for providing access to external content objects
US9990426B2 (en) * 2012-08-31 2018-06-05 Salesforce.Com, Inc. Systems and methods for content management in an on-demand environment
US20140089121A1 (en) * 2012-09-26 2014-03-27 Symbol Technologies, Inc. Arrangement for and method of alerting a user to context-based transactional information under which products are to be transacted at a point-of-transaction site
US20140109176A1 (en) * 2012-10-15 2014-04-17 Citrix Systems, Inc. Configuring and providing profiles that manage execution of mobile applications
EP3726337A1 (en) * 2012-11-12 2020-10-21 Enorcom Corporation Automated mobile system
US10102510B2 (en) 2012-11-28 2018-10-16 Hoverkey Ltd. Method and system of conducting a cryptocurrency payment via a mobile device using a contactless token to store and protect a user's secret key
US9445262B2 (en) * 2012-12-10 2016-09-13 Lg Uplus Corp. Authentication server, mobile terminal and method for issuing radio frequency card key using authentication server and mobile terminal
US9185078B2 (en) * 2012-12-18 2015-11-10 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing cross organizational data sharing
CA2895126C (en) * 2012-12-20 2021-08-03 Airbiquity Inc. Efficient headunit communication integration
US9374369B2 (en) * 2012-12-28 2016-06-21 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
US8781104B1 (en) * 2013-01-11 2014-07-15 American Express Travel Related Services Company, Inc. System and method for enabling tracking of contract provisions in a service message switching marketplace
MY187537A (en) * 2013-02-22 2021-09-28 Mastercard International Inc Systems, apparatus and methods for mobile companion prepaid card
US9300645B1 (en) * 2013-03-14 2016-03-29 Ip Holdings, Inc. Mobile IO input and output for smartphones, tablet, and wireless devices including touch screen, voice, pen, and gestures
US9904579B2 (en) * 2013-03-15 2018-02-27 Advanced Elemental Technologies, Inc. Methods and systems for purposeful computing
US8875235B1 (en) * 2013-03-15 2014-10-28 Rex Hakimian Independent administering of verified user-controlled electronic identifications utilizing specifically programmed computer-implemented methods and computer systems
US9378065B2 (en) * 2013-03-15 2016-06-28 Advanced Elemental Technologies, Inc. Purposeful computing
US10075384B2 (en) * 2013-03-15 2018-09-11 Advanced Elemental Technologies, Inc. Purposeful computing
US9832205B2 (en) * 2013-03-15 2017-11-28 International Business Machines Corporation Cross provider security management functionality within a cloud service brokerage platform
US9898726B2 (en) * 2013-03-28 2018-02-20 Glory Global Solutions (International) Limited Security system
US20140310160A1 (en) * 2013-04-11 2014-10-16 Pawan Kumar Alert System with Multiple Transaction Indicators
US9792459B2 (en) * 2013-04-29 2017-10-17 Sri International Flexible policy arbitration control suite
EP3036675B1 (en) * 2013-08-23 2021-03-10 IDEMIA Identity & Security USA LLC Method for identity management
US9536065B2 (en) * 2013-08-23 2017-01-03 Morphotrust Usa, Llc System and method for identity management
US10872077B2 (en) 2013-09-23 2020-12-22 David D. Wright, SR. Management of entitlements using blockchain
KR102252136B1 (en) * 2013-10-25 2021-05-13 더 리젠츠 오브 더 유니버시티 오브 미시건 Controlling unregulated aggregation of mobile app usage
US9203843B2 (en) * 2013-11-08 2015-12-01 At&T Mobility Ii Llc Mobile device enabled tiered data exchange via a vehicle
WO2015073708A1 (en) * 2013-11-14 2015-05-21 Intralinks, Inc. Litigation support in cloud-hosted file sharing and collaboration
WO2015088986A1 (en) * 2013-12-09 2015-06-18 Sureclinical Inc. System and method for high trust cloud digital signing and workflow automation in health sciences
EP3080742A4 (en) * 2013-12-11 2017-08-30 Intralinks, Inc. Customizable secure data exchange environment
US20150188779A1 (en) * 2013-12-31 2015-07-02 Jut, Inc. Split-application infrastructure
US20160140331A1 (en) * 2014-01-15 2016-05-19 Michael Geronimo Perez Method and system for biometric identification and verification
US10497037B2 (en) 2014-03-31 2019-12-03 Monticello Enterprises LLC System and method for managing cryptocurrency payments via the payment request API
CA2945158A1 (en) 2014-04-08 2015-10-15 Capital One Financial Corporation Systems and methods for transacting at an atm using a mobile device
US9613190B2 (en) * 2014-04-23 2017-04-04 Intralinks, Inc. Systems and methods of secure data exchange
US9781123B2 (en) * 2014-04-25 2017-10-03 Samsung Electronics Co., Ltd. Methods of providing social network service and server performing the same
US20150348032A1 (en) 2014-05-30 2015-12-03 Apple Inc. Real time approval of digital store purchases for a shared content storage account
US9531714B2 (en) * 2014-06-27 2016-12-27 Citrix Systems, Inc. Enterprise authentication via third party authentication support
WO2015199977A1 (en) * 2014-06-27 2015-12-30 Psi Systems, Inc. Systems and methods providing payment transactions
US10956907B2 (en) * 2014-07-10 2021-03-23 Datalogic Usa, Inc. Authorization of transactions based on automated validation of customer speech
US20160048700A1 (en) * 2014-08-14 2016-02-18 Nagravision S.A. Securing personal information
US20160072839A1 (en) * 2014-09-05 2016-03-10 Salesforce.Com, Inc. Facilitating dynamic management of participating devices within a network in an on-demand services environment
US9800615B2 (en) * 2014-09-09 2017-10-24 Bank Of America Corporation Real-time security monitoring using cross-channel event processor
KR102036758B1 (en) * 2014-09-30 2019-10-28 사이트릭스 시스템스, 인크. Fast smart card logon and federated full domain logon
US9544307B2 (en) * 2014-10-29 2017-01-10 Salesforce.Com, Inc. Providing a security mechanism on a mobile device
US10027667B2 (en) * 2014-11-12 2018-07-17 Time Warner Cable Enterprises Llc Methods and apparatus for provisioning services which require a device to be securely associated with an account
US9876822B2 (en) * 2014-11-28 2018-01-23 International Business Machines Corporation Administration of a context-based cloud security assurance system
US9503451B1 (en) * 2014-12-15 2016-11-22 Amazon Technologies, Inc. Compromised authentication information clearing house
US9838384B1 (en) * 2014-12-15 2017-12-05 Amazon Technologies, Inc. Password-based fraud detection
US9998434B2 (en) * 2015-01-26 2018-06-12 Listat Ltd. Secure dynamic communication network and protocol
JP5956623B1 (en) * 2015-01-30 2016-07-27 株式会社Pfu system
US9807086B2 (en) * 2015-04-15 2017-10-31 Citrix Systems, Inc. Authentication of a client device based on entropy from a server or other device
US10026082B2 (en) 2015-05-21 2018-07-17 Mastercard International Incorporated Method and system for linkage of blockchain-based assets to fiat currency accounts
US20160342989A1 (en) 2015-05-21 2016-11-24 Mastercard International Incorporated Method and system for processing blockchain-based transactions on existing payment networks
US9870562B2 (en) 2015-05-21 2018-01-16 Mastercard International Incorporated Method and system for integration of market exchange and issuer processing for blockchain-based transactions
US10963881B2 (en) 2015-05-21 2021-03-30 Mastercard International Incorporated Method and system for fraud control of blockchain-based transactions
US20160371697A1 (en) * 2015-06-22 2016-12-22 International Business Machines Corporation Transaction fraud detection
JP6636058B2 (en) 2015-07-02 2020-01-29 ナスダック, インコーポレイテッドNasdaq, Inc. Source guarantee system and method in a distributed transaction database
GB201511964D0 (en) 2015-07-08 2015-08-19 Barclays Bank Plc Secure digital data operations
US10033702B2 (en) * 2015-08-05 2018-07-24 Intralinks, Inc. Systems and methods of secure data exchange
US10582001B2 (en) * 2015-08-11 2020-03-03 Oracle International Corporation Asynchronous pre-caching of synchronously loaded resources
US10402792B2 (en) 2015-08-13 2019-09-03 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
JP6951329B2 (en) 2015-10-14 2021-10-20 ケンブリッジ ブロックチェーン,エルエルシー Systems and methods for managing digital identities
US10255589B1 (en) * 2015-10-23 2019-04-09 Wells Fargo Bank, N.A. Access controls for transfer transactions
US20170132615A1 (en) 2015-11-11 2017-05-11 Bank Of America Corporation Block chain alias for person-to-person payments
CN106911641A (en) 2015-12-23 2017-06-30 索尼公司 For authorizing the client terminal device for accessing, server unit and access control system
US10679215B2 (en) 2016-02-22 2020-06-09 Bank Of America Corporation System for control of device identity and usage in a process data network
EP3424177B1 (en) 2016-02-29 2021-10-13 SecureKey Technologies Inc. Systems and methods for distributed identity verification
US10643203B2 (en) 2016-04-12 2020-05-05 Digicash Pty Ltd. Secure transaction controller for value token exchange systems
US10521775B2 (en) 2016-04-18 2019-12-31 R3 Ltd. Secure processing of electronic transactions by a decentralized, distributed ledger system
US10333705B2 (en) 2016-04-30 2019-06-25 Civic Technologies, Inc. Methods and apparatus for providing attestation of information using a centralized or distributed ledger
WO2017190175A1 (en) 2016-05-06 2017-11-09 Othera Pty Ltd Methods and systems for blockchain based "segmented risk based securities"
US9635000B1 (en) 2016-05-25 2017-04-25 Sead Muftic Blockchain identity management system based on public identities ledger
WO2018039312A1 (en) 2016-08-23 2018-03-01 BBM Health LLC Blockchain-based mechanisms for secure health information resource exchange
US10282558B2 (en) 2016-09-02 2019-05-07 The Toronto-Dominion Bank System and method for maintaining a segregated database in a multiple distributed ledger system
US20180075421A1 (en) 2016-09-09 2018-03-15 BitPagos, Inc. Loan processing service utilizing a distributed ledger digital asset as collateral
US11651359B2 (en) 2016-10-05 2023-05-16 The Toronto-Dominion Bank Distributed electronic ledger with metadata
US20180343120A1 (en) 2016-10-26 2018-11-29 Black Gold Coin, Inc. Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
US20180114218A1 (en) 2016-10-26 2018-04-26 International Business Machines Corporation Blockchain: automatic fork protection
US20180130034A1 (en) 2016-11-07 2018-05-10 LedgerDomain, LLC Extended blockchains for event tracking and management
EP3639536A2 (en) 2016-12-30 2020-04-22 INTEL Corporation Naming and blockchain recording for the internet of things
US11797982B2 (en) 2017-01-06 2023-10-24 FirstBlood Technologies, Inc. Digital ledger authentication using address encoding
US20180247191A1 (en) 2017-02-03 2018-08-30 Milestone Entertainment Llc Architectures, systems and methods for program defined entertainment state system, decentralized cryptocurrency system and system with segregated secure functions and public functions
US20180225661A1 (en) 2017-02-07 2018-08-09 Microsoft Technology Licensing, Llc Consortium blockchain network with verified blockchain and consensus protocols
US20200394652A1 (en) 2017-03-08 2020-12-17 Ip Oversight Corporation A method for creating commodity assets from unrefined commodity reserves utilizing blockchain and distributed ledger technology
WO2018170504A1 (en) 2017-03-17 2018-09-20 Labyrinth Research Llc Unified control of privacy-impacting devices
US20200067697A1 (en) 2017-03-22 2020-02-27 NEC Laboratories Europe GmbH Method for operating a blockchain
US10102526B1 (en) 2017-03-31 2018-10-16 Vijay K. Madisetti Method and system for blockchain-based combined identity, ownership, integrity and custody management
US20180308072A1 (en) 2017-04-21 2018-10-25 Gem Method and apparatus for blockchain management
US20180315055A1 (en) 2017-05-01 2018-11-01 International Business Machines Corporation Blockchain For Issue/Defect Tracking System
WO2018204541A1 (en) 2017-05-02 2018-11-08 Luther Systems Financial derivative contract execution platform, system and method
US10657607B2 (en) 2017-05-06 2020-05-19 Adp, Llc Implementation of payroll smart contract on a distributed ledger
US10708070B2 (en) 2017-05-24 2020-07-07 Nxm Labs Canada Inc. System and method for utilizing connected devices to enable secure and anonymous electronic interaction in a decentralized manner
CN110692214B (en) 2017-06-02 2023-10-31 维萨国际服务协会 Method and system for ownership verification using blockchain
WO2018222797A1 (en) 2017-06-02 2018-12-06 Walmart Apollo, Llc Systems and methods for product review management with distributed database
US20180349896A1 (en) 2017-06-05 2018-12-06 Mastercard International Incorporated Method and system for anonymization of electronic transactions via blockchain
EP3416334B1 (en) 2017-06-15 2020-01-15 Accenture Global Solutions Limited Portable biometric identity on a distributed data storage layer
US11922363B2 (en) 2017-07-05 2024-03-05 United Parcel Service Of America, Inc. Counterparty physical proximity verification for digital asset transfers
WO2019010392A1 (en) 2017-07-07 2019-01-10 Symbiont.Io, Inc. Systems, methods, and devices for reducing and/or eliminating data leakage in electronic ledger technologies for trustless order matching
EP3649557A4 (en) 2017-07-07 2020-12-09 Visa International Service Association System, method, and apparatus for implementing a blockchain-based entity identification network
EP3649593A4 (en) 2017-07-07 2021-03-24 Visa International Service Association System, method, and apparatus for implementing a blockchain-based rewards network
US20190020653A1 (en) 2017-07-12 2019-01-17 Averon Us, Inc. Method and apparatus for secure cross-service content selection and delivery based on mobile device identity
US10984134B2 (en) 2017-07-14 2021-04-20 Microsoft Technology Licensing, Llc Blockchain system for leveraging member nodes to achieve consensus
US10664797B2 (en) 2017-07-19 2020-05-26 Amazon Technologies, Inc. Distributed ledger certification
US10839379B2 (en) 2017-07-20 2020-11-17 Chicago Mercantile Exchange Inc. Blockchain including linked digital assets
US10055715B1 (en) 2017-07-26 2018-08-21 Square, Inc. Cryptocurrency payment network
US10829088B2 (en) 2017-09-22 2020-11-10 Sensormatic Electronics, LLC Identity management for implementing vehicle access and operation management
US10607484B2 (en) 2017-12-28 2020-03-31 Intel Corporation Privacy-preserving distributed visual data processing
US11288740B2 (en) 2017-12-29 2022-03-29 Intel Corporation Securing distributed electronic wallet shares
US11502841B2 (en) 2018-03-07 2022-11-15 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11716320B2 (en) 2018-03-27 2023-08-01 Workday, Inc. Digital credentials for primary factor authentication
US11836721B2 (en) 2018-06-29 2023-12-05 Intel Corporation Protection of information in an information exchange
US11432149B1 (en) 2019-10-10 2022-08-30 Wells Fargo Bank, N.A. Self-sovereign identification via digital credentials for selected identity attributes

Also Published As

Publication number Publication date
US10817593B1 (en) 2020-10-27
US11755707B1 (en) 2023-09-12

Similar Documents

Publication Publication Date Title
US11120158B2 (en) Secure permissioning of access to user accounts, including secure distribution of aggregated user account data
US11593476B2 (en) Data breach score and method
US10963878B2 (en) System and method for financial management
CN109155030B (en) System and method for facilitating network transactions
US20230033992A1 (en) Transaction completion via application interaction
RU2602394C2 (en) Payment privacy tokenisation apparatus, methods and systems
US9922324B2 (en) Verified purchasing by email
US20230418918A1 (en) User information gathering and distribution system
US20160321722A1 (en) Systems and methods for obtaining consumer data
US20200380481A1 (en) Autonomous bill pay bot with automatic social overdraft protection
KR20220035050A (en) Identity and risk scoring of tokenized assets and associated token transactions backed by government bonds
BR112013021057A2 (en) universal electronic payment devices, methods and systems
US11373176B2 (en) Systems and methods for federated identity management
US20230252467A1 (en) Predicting and making payments via preferred payment methods
CN110494842A (en) Safety certification and Financial Attribute service
US11188887B1 (en) Systems and methods for payment information access management
US20240007506A1 (en) Enterprise account aggregation and visualization system
US20170099294A1 (en) Multi-Party Secure Information Integration System
US20210383382A1 (en) Systems and methods for customer control of data
US20150081496A1 (en) System and Method for an Integrated Financial Management Tool
US20210192612A1 (en) Peer-to-peer lending platform based on financial health analysis
US20200160427A1 (en) Systems and methods for aggregating, exchanging, and filtering data over a communications network
CA3037134A1 (en) Systems and methods of generating a pooled investment vehicle using shared data
US11281765B1 (en) Token management systems and methods
WO2018142272A9 (en) A method of controlling personal information and allowing interaction with authenticated users

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION