US20230418918A1 - User information gathering and distribution system - Google Patents
User information gathering and distribution system Download PDFInfo
- Publication number
- US20230418918A1 US20230418918A1 US18/244,662 US202318244662A US2023418918A1 US 20230418918 A1 US20230418918 A1 US 20230418918A1 US 202318244662 A US202318244662 A US 202318244662A US 2023418918 A1 US2023418918 A1 US 2023418918A1
- Authority
- US
- United States
- Prior art keywords
- user information
- user
- information
- transaction
- entity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 84
- 230000000694 effects Effects 0.000 claims description 17
- 230000004044 response Effects 0.000 claims description 15
- 230000003044 adaptive effect Effects 0.000 claims description 4
- 238000012544 monitoring process Methods 0.000 claims 3
- 230000008569 process Effects 0.000 description 25
- 238000010586 diagram Methods 0.000 description 15
- 230000015654 memory Effects 0.000 description 14
- 230000036541 health Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 238000013475 authorization Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 210000001525 retina Anatomy 0.000 description 4
- 230000001052 transient effect Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 241001155433 Centrarchus macropterus Species 0.000 description 1
- 206010020751 Hypersensitivity Diseases 0.000 description 1
- 241001633663 Iris pseudacorus Species 0.000 description 1
- 230000007815 allergy Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000003990 capacitor Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 239000012530 fluid Substances 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000010970 precious metal Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000002255 vaccination Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Definitions
- the information may include basic information associated with the individual such as first name, last name, email address, phone number, birthday, home address and so on.
- the information may also include information confidential to the individual such as social security number, health information, credit information, insurance information and so on.
- individuals store this information in a variety of places (e.g., financial institution, safe, government agency, etc.).
- Individuals may also be asked to provide pieces of this information to many different entities during a transaction. For example, when an individual is getting approved for a mortgage, buying a new car, or visiting the hospital, the individual may be asked to provide a variety of information.
- the individual may not know what information is needed, or the individual may not have the information needed readily available. If the individual does not know what information is needed for certain transactions, the individual may provide too much or too little information to the entity. Providing too much information to an entity may be dangerous for the individual as the information may be used fraudulently by the entity or be available to others whom may use the information fraudulently.
- One embodiment of the invention relates to a method of alerting a user of user information to be sent to an entity during a transaction, the method being performed by a user information service (UIS) computing system associated with an information service.
- the method includes populating, by a UIS information circuit and an associated user database, an account with user information received from at least one of the user and a plurality of entities.
- the method further includes receiving, by the UIS information circuit over a network via a network interface circuit, a user information request relating to a transaction from an entity computing system associated with the entity.
- the method includes sending, by a security circuit of the UIS information circuit, an alert including an approval request to a user computing device associated with the user over the network, wherein the approval request contains an identification of user information requested in the user information request.
- the method further includes receiving, by the security circuit, an approval of the approval request from the user computing device.
- the method includes providing, by the UIS information circuit and the user information database, the approved information to the entity to complete the transaction.
- Another embodiment relates to a non-transitory computer readable media having computer-executable instructions embodied therein that, when executed by a computing system associated with a second party to an agreement causes the second party computing system to perform operations for demonstrating consensus agreement.
- the operations include populating, by an associated user database, an account with user information received from at least one of the user and a plurality of entities.
- the operations further include receiving a user information request relating to a transaction from an entity computing system associated with the entity, sending an alert including an approval request to a user computing device associated with the user over the network, wherein the approval request contains an identification of user information requested in the user information request.
- the operations further include receiving an approval of the approval request from the user computing device and providing, by the user information database, the approved information to the entity to complete the transaction.
- the device includes a network interface circuit configured to communicate with a user computing device associated with a user and an entity computing system.
- the method further includes at least one processor operatively coupled to a non-transient memory to form a UIS information circuit.
- the circuit is structured to populate, in a user information database, an account with user information.
- the circuit is further structured to receive, via a network interface circuit, a user information request from an entity computing system over a network.
- the circuit is structured to send, via a security circuit, an alert including an approval request indicating the user information requested in the user information request to the user computing device over the network.
- the circuit is further structured to receive a response to the approval request from the user computing device.
- the circuit is structured to provide user information corresponding to the user information request and the response to the approval request to the entity computing system.
- FIG. 1 is a diagram of a data exchanging system, according to an example embodiment.
- FIG. 2 is a diagram of information and data flows of the data exchanging system of FIG. 1 , according to an example embodiment.
- FIG. 3 is a flow diagram of a method of populating user information for a user account, according to an example embodiment.
- FIG. 4 is a flow diagram of a method of providing user information to an entity, according to an example embodiment.
- FIG. 5 is a flow diagram of a method of comparing a user information request from an entity, according to an example embodiment.
- FIG. 6 is a flow diagram of a method of preparing user information for a predicted transaction, according to an example embodiment.
- FIG. 7 is a flow diagram of a method of determining if a user has user information ready for a potential transaction, according to an example embodiment.
- the user information systems and methods are structured to receive a plurality of user information types (e.g., social security number, insurance information, etc.) associated with a user and to enable the user to manage and distribute the information in a secure, convenient, efficient, and time-saving manner.
- the user information system may be accessed with at least one user device (e.g., a mobile device, a smart watch, etc.).
- the user information system is structured to receive an information request from an entity (e.g., bank, car dealer, etc.) based on a transaction type (e.g., mortgage approval, buying a car, etc.), compare the information request to information requests from similar entities for similar transactions, and to provide the user information to the entity.
- entity e.g., bank, car dealer, etc.
- a transaction type e.g., mortgage approval, buying a car, etc.
- the user information functions allow the user to add, manage, and distribute the user information.
- the user information system also predicts and verifies the user information needed for a given transaction to protect the user from risks of giving too much or incorrect information to an entity.
- the computing system 100 includes a user 102 , a plurality of entities 108 , a user information service 120 , and a network 140 .
- the network 140 may include any of various types of data exchanging networks.
- the network 140 may include wireless networks (e.g., 802.11X, ZigBee′, Bluetooth, Internet, etc.), wired networks (e.g., Ethernet), or any combination thereof.
- the network 140 is structured to permit the exchange of data, values, instructions, messages, etc. between and among the user computing device 104 , the entity computing system 110 , and the user information service computing system 122 .
- the user 102 may include individuals, business representatives, large and small business owners, other entities, and so on.
- the user 102 is associated with a user computing device 104 .
- the user computing device 104 may be, but is not limited to, a mobile computing device (e.g., a smartphone, tablet computer, laptop computer, person digital assistant, etc.), a desktop computing device, a wearable computing device, etc.
- Wearable computing devices refer to any type of computing device that a user 102 wears including, but not limited to, a watch, glasses, bracelet, etc.
- the user computing device 104 includes a user information circuit 106 .
- the user information circuit 106 is structured to allow the user 102 to communicate with the user information service 120 .
- the user information circuit 106 may be structured to provide a user interface (e.g., a graphical user interface) that permits the user 102 to provide information (e.g., user information) that is communicated to a user information service computing system 122 associated with the user information service 120 .
- the user information circuit 106 may be communicably coupled to a processor, non-transient memory, and network interface enabling the user computing device 104 to exchange data over the network 140 .
- the user information circuit 106 communicates data to and from the user information service computing system 122 via network 140 .
- the user 102 may download a user information application (e.g., a software “app”) prior to use, which may be used to set up and configure the user information circuit 106 .
- the user information circuit 106 is hard coded into the memory of the user computing device 104 .
- the user information circuit 106 is a web-based interface application accessed via the Internet on a web browser executed on the user computing device 104 . In such arrangements, the user information circuit 106 is executed and maintained remotely (e.g., on the user information service computing system 110 ).
- the user 102 logs onto or accesses the web-based interface to access the user information circuit 106 .
- the user information circuit 106 is supported by a separate computing system comprising one or more servers, processors, network interface circuits, etc. that transmit the applications for use to the user computing device 104 .
- the user information circuit 106 may include an application programming interface (API) and/or a software development kit (SDK) that facilitates the integration of other applications with the user information circuit 106 .
- API application programming interface
- SDK software development kit
- Each of the entities 108 provide services to a plurality of users, including the user 102 .
- Examples of the entities 108 include financial institutions, merchants, insurance companies, utility companies, social media networks, e-mail systems, health care providers, etc.
- Each of the plurality of entities 108 operates and/or is associated with a respective entity computing system 110 .
- Each entity computing system 110 includes a processor 112 , memory 114 , a network interface circuit 116 and a user information database 118 .
- the network interface circuit 116 facilitates the sending and receiving of data, commands, instructions, values, etc. over the network 140 (e.g., to and from the user information service computing system 120 , etc.).
- Each entity computing system 110 is communicably coupled to the user information service computing system 122 and/or the user computing device 104 via the network 140 .
- the entity computing system 110 also includes a user information database 118 that stores user information relating to the user 102 .
- the entity computing system 110 may maintain information about one or more of the entities 108 , information regarding user 102 (e.g., accounts associated with the user 102 and a respective one of the entities 108 , etc.) and so on in the user information database 118 .
- more than one entity 108 with an associated entity computing system 110 may be communicably coupled to the components of FIG. 1 over the network 140 to accommodate user information associated the user 102 at a plurality of entities 108 .
- the user information database may store user account information including account numbers, balances, credit limits, and so on.
- the user information service 120 is affiliated with a given entity 108 (e.g., a financial institution). In other arrangements, the user information service 120 is not directly affiliated with a given entity 108 .
- the user information service 120 includes a user information service computing system 122 .
- the user information service computing system 120 includes a processor 124 , memory 126 , a network interface circuit 128 , and a user information service (“UIS”) information circuit 130 .
- the network interface circuit 128 facilitates the sending and receiving of data, commands, instructions, values, etc. over the network 140 (e.g., to and from the user computing device 104 , to and from the entity computing system 110 , etc.).
- the user information service computing system 122 is structured to provide storage of user information associated with the user 102 and distribution of user information associated with the user 102 to one or more of the entities 108 .
- the UIS information circuit 130 of the user information service computing system 122 provides storage and distribution of user information to the user 102 via the user information circuit 106 .
- the operation of the user information service computing system 122 and the UIS information circuit 130 are described in further detail with respect to FIGS. 2 through 7 .
- the UIS information circuit 130 at the user information service computing system 122 communicates data to and from the user information circuit 106 and the entity computing system 110 via the network 140 , and includes a user information database 132 , a transaction type database 134 , a security circuit 136 , and a prediction circuit 138 .
- the user information database 132 includes storage media or access thereto structured to retrievably store user information flowing into the UIS computing system 122 .
- the transaction type database 134 retrievably stores information relating to a plurality of different transaction types, including types of user information relevant to each of the plurality of different transaction types.
- the information in the user information database 132 is shared with the transaction type database 134 .
- the security circuit 136 is structured to maintain and apply various security protocols relating to information stored in the user information database 132 , as well as information requested from the user 102 .
- the prediction circuit 138 is structured to predict future transactions based on information flowing to the UIS computing system 122 (e.g., information from the user information circuit 106 ) and information stored at the user information database 132 and the transaction type database 134 .
- information flowing to the UIS computing system 122 e.g., information from the user information circuit 106
- information stored at the user information database 132 and the transaction type database 134 Various example operations of the UIS information circuit are discussed in more detail below.
- the user information service computing system 122 receives a plurality of inputs, including, but not limited to, incoming user information 202 , information request 204 , potential transaction 206 , user input 208 from at least the user information circuit 106 and the entity computing system 110 .
- Incoming user information 202 may be any type of information relating to the user 102 .
- the incoming user information 202 may be personal information (e.g., social security number, birthday, home address, name, etc.), financial information (e.g., credit score, bank account balances, etc.), health information (e.g., allergies, vaccinations, family medical history, etc.) and so on.
- the incoming user information 202 may be received by the user information service computing system 122 from the user computing device 104 .
- the incoming user information 202 may be received from the entity computing system 110 .
- the user information computing system 122 may receive health care information (incoming user information 202 ) associated with the user 102 from a computing system associated with a health care provider.
- Information request 204 may be a request from the entity computing system 110 for user information associated with the user 102 sent to the user information service computing system 122 .
- the information request 204 may include a list of specific user information that is being requested.
- the information request 204 may also include the entity 108 that is requesting the user information.
- the information request 204 may indicate a type of transaction for which the entity computing system 110 is requesting the user information.
- Potential transaction 206 is a transaction, indicated by the user 102 via the user information circuit 106 , that the user 102 may complete in the future. For example, if the user 102 is planning on purchasing a car, but not for a few months the user 102 may send the user information service computing system 122 a potential transaction 206 . In this case, the user 102 may want to plan ahead to gather additional user information that may be needed for the potential transaction 206 .
- the potential transaction 206 is received by the user information service computing system 122 from the user information circuit 106 .
- User input 208 refers to input received from the user 102 at the user information circuit 106 .
- the user input 208 may include user responses to approval request 212 , flagged request 214 , alert 216 , and/or predicted transaction 218 , discussed below.
- user input 208 also includes setting and preferences associated with a user account for the user 102 with the user information service 120 .
- the UIS information circuit 130 at the user information service computing system 122 is also structured to provide information, requests, and alerts 216 to the entity computing system 110 and the user information circuit 106 .
- An alert 216 is a notification to be received at the user computing device 104 , and may specify a type of pending request, an requested response from the user 102 , a notification, and so on.
- the user information circuit 106 may receive the alert 216 over the network 140 and use any of a variety of output devices at the user computing device 104 to bring the alert 216 to the attention of the user 102 .
- the alert 216 may be associated with any of the outgoing types of data from the UIS computing system 122 (e.g., an approval request 212 , a flagged request 214 , a predicted transaction 218 , etc.).
- the alert 216 may be sent via email, text message, push notification, etc.
- the user 102 may set up and configure alerts 216 and alert preferences when setting up the user account.
- the user information service computing system 122 may provide outgoing user information 210 to one or more of the plurality of entities 108 .
- Outgoing user information 210 may be substantially similar to incoming user information 202 in that outgoing user information 210 may include any of various types of information relating to a given user.
- outgoing user information 210 is a set of user information that will be provided to the entity computing system 110 .
- the outgoing user information 210 sent to the entity computing system 110 may only include name, address, and credit score.
- the security circuit 136 may provide an approval request 212 and a corresponding alert 216 to the user information circuit 106 to notify the user 102 of information relating to an information request 204 received from one or more of the plurality of entities 108 .
- the security circuit 136 may provide the user information circuit 106 with all the user information that was requested in the information request 204 , as well as information relating to the type of transaction for which the user information is being requested, and the entity 108 that is requesting the user information in the approval request 212 .
- the security circuit 136 may receive, from the user 102 via the user information circuit 106 , user input 208 indicating an approval of the user information of approval request 212 .
- a flagged request 214 and a corresponding alert 216 may be provided to the user information circuit 106 by the security circuit 136 to notify the user 102 of information relating to an information request 204 received from one or more of the plurality of entities 108 when a piece of user information requested is unusual (e.g., medical information requested when getting a car loan).
- the prediction circuit 138 is structured to predict a potential future transaction the user 102 may be making based on activity by the user 102 on the user computing device 104 .
- the prediction circuit 138 may provide a predicted transaction 218 and a corresponding alert 216 to the user information circuit 106 , which in turn may provide the predicted transaction 218 to the UIS information circuit 130 .
- the UIS information circuit 130 may provide transaction information 220 to the user information circuit 106 from the transaction type database 134 to inform the user 102 about a transaction that is presently occurring or is actually set to occur.
- the incoming user information 202 may be transmitted to the user information service computing system 122 via the user information circuit 106 of the user computing device 104 .
- the UIS information circuit 130 may treat the incoming user information 202 as a request to create an account with the user information service 120 .
- the user account contains incoming user information 202 received from the user 102 , and all of the incoming user information 202 may be stored in user information database 132 .
- the user information database 132 is configured to store and manage incoming user information 202 associated with user 102 at the user information service computing system 122 .
- the UIS information circuit 130 may also receive incoming user information 202 from one or more entities 108 associated with user 102 (e.g., social media, health care provider, etc.).
- entity 108 associated with user 102
- the user information database 132 maintains user account settings and preferences.
- the information request 204 is transmitted to the user information computing system 122 from the entity computing system 110 .
- the information request 204 may specify the entity 108 requesting the user information, the type of transaction occurring, and the user information being requested.
- the term “transaction” may refer to financial and non-financial transactions.
- An example of a non-financial transaction may be providing outgoing user information 210 to an entity.
- the term “transaction” may refer to any operation or interaction executed by the user 102 with an entity 108 (e.g., visiting the doctor, making a flight reservation using frequent flier miles, financial transactions, buying a car, getting approved for a loan, etc.).
- the UIS information circuit 130 may compare the information request 204 to other requests of similar transaction types using the transaction type database 134 .
- Information relating to different types of transactions and user information commonly requested for these types of transactions is stored in transaction type database 134 .
- the transaction type database 134 may be constantly updating the outgoing user information 210 requested for certain transactions. In this regard, the transaction type database 134 may be dynamic and adaptive to learn what user information is commonly requested for a transaction.
- the transaction type database 134 may be updated manually by personnel (e.g., employees, etc.) associated with the user information service 120 , or may use prior transactions of all users with accounts at the user information service 120 , including user 102 .
- the security circuit 136 is structured to determine if information requested by the entity is consistent with information normally requested by a similar entity for a similar transaction type.
- the security circuit 136 may also be structured to flag inconsistent information and send the user 102 a flagged request 214 and a corresponding alert 216 .
- the UIS information circuit 130 compares the information request 204 to similar information requests of the same or similar type that are maintained in the transaction type database 134 , user information that is requested in information request 204 that is not consistent with information requests of the same or similar type may be flagged by the security circuit 136 .
- the security circuit 136 may have different levels or criteria for flagging requested user information. The flagging levels may be preset or determined by the user 102 when the user account is created.
- the flagging levels may also be based on more than one type of criteria (e.g., frequency of request, level of security of information, etc.).
- the security circuit 136 is also structured to determine the level of security for each piece of information the user 102 provides, and maintain security protocol for sharing information with a certain security level. For example, the security circuit 136 may require the user 102 to provide a password before the UIS information circuit 130 can share the social security number of the user 102 with one of the entities 108 .
- the UIS information circuit 130 may provide the user 102 with an alert 216 via the user information circuit 106 when certain user information is requested.
- the UIS information circuit 130 may provide the user 102 with alert 216 via the user information circuit 106 when user information is requested that the user 102 does not have linked or stored in the user information database 132 .
- Alert 216 may also be provided to the user 102 via the user information circuit 106 to remind the user 102 to provide the user information service computing system 122 with user information that will be needed for a future transaction the user 102 has indicated (e.g., potential transaction 206 ).
- the UIS information circuit 130 may receive a potential transaction 206 generated and transmitted from the user information circuit 106 .
- the user 102 may be planning on completing a transaction (e.g., getting a loan, qualifying for a mortgage, buying a car, etc.) and use the user information circuit 106 to transmit a corresponding potential transaction 206 to the user information service computing system 122 .
- the UIS information circuit 130 may search the transaction type database 134 to determine the user information that may be needed to complete the potential transaction 206 . In view of the information returned from the transaction type database 134 , the user 102 may have time to gather additional user information that is needed and check to see if the user information is accurate before completing a transaction with any one or more entity 108 .
- the UIS information circuit 130 may receive the potential transaction 206 from entity computing system 110 .
- the user 102 may visit one or more of the entities 108 looking for information regarding a transaction.
- the entity computing system 110 may send a potential transaction 206 to the user information service computing system 122 indicating that user 102 may complete a transaction with entity 108 .
- the entity computing system 110 may also indicate what user information would be needed to complete the transaction. Again, the user 102 would have time to gather additional user information that may be needed and check to see if the user information is accurate before completing a transaction with entity 108 .
- the UIS information circuit 130 may cooperate with the prediction circuit 138 to provide predicted transactions 218 to the user 102 .
- a predicted transaction 218 is information relating to an anticipated transaction based on the past behavior of the user 102 .
- the user information service computing system 122 may monitor other applications on the user computing device 104 and/or monitor website activity on the user computing device 104 to predict a potential transaction 218 of the user 102 .
- the prediction circuit 138 may be set with different transactions that could be completed and information that may be indicative of the transaction. For example, if the user 102 is looking up homes or properties, the prediction circuit 138 may predict the user 102 will be purchasing a home.
- the UIS information circuit 130 may notify (e.g., via alert 216 ) the user 102 of the predicted transaction 218 via the user information circuit 106 .
- the user 102 may transmit user input 208 to the user information service computing system 122 indicating if the predicted transaction 218 is accurate.
- the UIS information circuit 130 may use the transaction type database 134 to provide the user 102 with outgoing user information 210 corresponding to user information that would likely be needed for the predicted transaction 218 .
- the user 102 may provide user input 208 to the user information service computing system 122 via the user information circuit 106 .
- the approval may include each piece of user information that is approved by user 102 to be sent to the entity computing system 110 .
- the security circuit 136 may require the user 102 to provide authorization with the user input 208 indicating an approval.
- the security circuit 136 may also require the entity 108 (e.g., an employee associated with entity 108 ) to provide authorization or authentication before outgoing user information 210 is provided.
- the entity 108 may have to provide the security circuit 136 with a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc.
- the user input 208 may include a selection of one or more entity 108 when the user 102 has already approved all the outgoing user information 210 to be sent to one or more entity 108 (e.g., potential transaction 206 , predicted transaction 218 , etc.).
- the user information service computing system 122 transmits the approved outgoing user information 210 to entity computing system 110 .
- FIG. 3 a flow diagram of a method 300 of populating user information for a user account with the user information service computing system 122 is shown, according to an example embodiment.
- the method 300 registers the user 102 with the user information service 120 and gathers user information associated with the user 102 .
- a user account is created at 302 .
- the user account created may be initiated by user 102 transmitting incoming user information 202 to the user information service computing system 122 via the user information circuit 106 .
- the user 102 may provide additional information that is optional for the user 102 to include for registration. For example, the user 102 may have the option to add a phone number, set preferences for the user account, and change the password associated with the user account.
- the user account may also include system preferences the user 102 defines.
- the system preferences may include security preferences, usage preferences, alert preferences, and so on.
- the security preference may define the requirements needed by the security circuit 136 before accessing the user information service computing system 122 via the user information circuit 106 .
- a security preference may require the user 102 to provide a password (e.g., word, phrase, alphanumeric value, etc.), a biometric scan (e.g., a fingerprint scan, a retina scan, a voice sample, etc.), a semi-random number (e.g., as generated by a changing security token device), or a combination thereof to the security circuit 136 before the user 102 may access the user information service computing system 122 .
- the security circuit 136 may also allow the user 102 to define user information (e.g., social security number, etc.) that require a second passcode to authorize transmission to entity computing system 110 .
- Alert preferences may include when alert 216 is sent to the user information circuit 106 (e.g., information request 204 received, social security number requested, etc.), a form of alert 216 (e.g., text message, email, notification, etc.) and information included in alert 216 (e.g., user information requested, transaction type, entity 108 requesting the information, etc.).
- a form of alert 216 e.g., text message, email, notification, etc.
- information included in alert 216 e.g., user information requested, transaction type, entity 108 requesting the information, etc.
- Incoming user information 202 is added to the user account by the UIS information circuit 130 at 304 .
- the user 102 may manually enter the user information via input devices associated with the user computing device 104 .
- the user information circuit 106 provides a graphical user interface with labeled spaces for the user 102 to enter specified information. For example, the user 102 may fill in the home address of user 102 in a box labeled “Home Address.”
- the user 102 may also include information about one or more of the entities 108 that may provide additional incoming user information 202 .
- the user 102 may provide information regarding a health care provider or financial institution associated with the user 102 to the user information service computing system 122 via the user information circuit.
- the user 102 may link the user information circuit 106 to other applications used by the user 102 that include user information (e.g., mobile banking application, social media application, etc.).
- the user information service computing system 122 may request user information from the entity computing system 110 , at 306 .
- the UIS information circuit 130 may request healthcare information associated with user 102 from the health care provider indicated by the user 102 at 304 . Additionally, the user information service computing system 122 may request user information from the user 102 via the user information circuit 106 . If the UIS information circuit 130 has a set of user information (e.g., name, email, phone number, address, etc.) that is required for all users, including user 102 , the UIS information circuit 130 may send alert 216 to the user 102 via the user information circuit 106 indicating that user information is missing and/or incomplete.
- a set of user information e.g., name, email, phone number, address, etc.
- the UIS information circuit 130 of the user information service computing system 122 receives incoming user information 202 at 308 .
- the incoming user information 202 received at 308 may be the user information requested at 306 , or additional information provided to the UIS information circuit 130 via the user information circuit 106 or the entity computing system 110 .
- the information requested is information that remains constant (e.g., social security number, birthday, etc.), or relatively constant (e.g., home address, last name, insurance information, healthcare information, etc.)
- the user information database 132 may receive a copy of the user information.
- the UIS information circuit 130 may receive access to the user information instead of receiving copy of the user information.
- the incoming user information 202 received at 308 may be compared to the user information currently associated with the user account and/or other incoming user information 202 being received by the user information database 132 .
- the UIS information circuit 130 may send the alert 216 to the user 102 via the user information circuit 106 when a discrepancy is determined between pieces of user information. For example, if the home address associated with the user 102 received from one entity 108 is listed as “Pin Oak” and the home addressed associated with the user 102 at a different entity 108 is listed as “Pine Oak,” the user 102 may send user input 208 to the user information service computing system 122 indicating the information that is correct and should be stored in the user information database 132 . In some embodiments, the user information service computing system 122 may ask the user 102 via alert 216 to the user information circuit 106 to verify the user information received from the various entity computing systems 110 even if no discrepancies are found for the piece of user information.
- the UIS information circuit 130 of the user information service computing system 122 stores, manages, and distributes the user information at 310 .
- the user information that is constant or relatively constant may be stored by the user information computing system 122 . However, the user information may still be modified by user 102 via the user information circuit 106 , but may require manual updating of the user information.
- User information that is relatively fluid, or changes frequently may be managed by the user information database 132 . This information may be updated frequently as entities 108 associated with the user information (e.g., a financial institution associated with a financial account of user 102 ) update the user information. Additionally, some user information may be managed on a set cycle or by user input.
- the user 102 may indicate that the user 102 visits the eye doctor once a year, generally in March.
- the user information service computing system 122 may only request updated user information relating to the eye doctor (e.g., vision prescription, etc.) at the end of March, or may periodically check for user information updates during the month of March. If the user 102 instead visits the eye doctor in February, the user 102 may indicate via the user information circuit 106 , that the user information associated with the eye doctor has been updated.
- the user information service computing system 122 may request user information from a computing system (e.g., entity computing system 110 ) associated with the eye doctor (e.g., entity 108 ) based on the user input 208 indication received from user information circuit 106 . User information may then be selectively distributed to entity computing system 110 by the user information service computing system 122 . Additional methods for managing and distributing user information are explained in further detail below with respect to FIGS. 4 - 7 .
- FIG. 4 a flow diagram of a method 400 of providing user information to an entity using the user information service computing system 122 is shown, according to an example embodiment.
- the method 400 provides user information to computing system 122 based on a transaction occurring between the user 102 and one or more of the entities 108 .
- the method 400 may be initiated in two ways, by the user 102 , or by one or more of the entities 108 .
- the user information service computing system 122 receives an information request 204 from the entity computing system 110 at 402 .
- the information request 204 may include a list of all the user information (e.g., name, address, credit score, financial institution, etc.) being requested for the user 102 by the entity 108 for a transaction.
- the information request 204 may also include the type of transaction that is taking place (e.g., mortgage approval, etc.) and/or information relating to the entity 108 .
- the entity 108 may have to register (e.g., create an entity account, etc.) with the user information service computing system 122 before the information request 204 can be received from the entity computing system 110 .
- the entity 108 may not have to register with the user information service before the user information service computing system 122 can receive an information request 204 from the entity computing system 110 .
- the entity computing system 110 may have to provide at least basic user information (e.g., first and last name, phone number, etc.) to the user information service computing system 122 to identify the account associated with the user 102 at the user information service 120 .
- the security circuit 136 may require the entity computing system 110 to provide a form of authentication to ensure the entity computing system 110 is not trying to obtain user information for fraudulent purposes.
- the entity 108 may have to register an entity account and provide a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. to the security circuit 136 before the user information service computing system 122 responds to the information request 204 .
- a password e.g., phrase, number, alphanumeric sequence, etc.
- a biometric e.g., fingerprint, retina, etc.
- the entity 108 may have an entity number to associate the entity 108 with the user information service computing system 122 .
- the entity number may be associated with a user information service 120 account held by the user information service computing system 122 for the entity 108 .
- the entity account may contain information relating to transactions common for the entity 108 stored in the transaction type database 134 .
- a car dealership may have car loan and car purchase transactions associated with the entity account stored in the transaction type database 134 .
- the transaction type database 134 may also contain information commonly requested for the transactions associated with the entity 108 .
- the user information service computing system 122 can use this information to determine if the entity computing system 108 is requesting information consistent with information requests 204 made in the past.
- the security circuit 136 may suspect fraudulent activity relating to the entity computing system 110 . Inconsistent user information requests will be described in greater detail with respect to FIG. 5 .
- the user information service computing system 122 may send an approval request 212 and a corresponding alert 216 to the user 102 via the security circuit 136 of the user information circuit 106 at 404 .
- the approval request 212 may present the user information in a way that indicates the type of user information without revealing the user information. For example, the approval request 212 may indicate that the home address of user 102 was requested, without actually providing the home address of the user 102 .
- the user 102 may be notified by the user information service computing system 122 via the user information circuit 106 of the approval request 212 and have to log in to the user information computing system 122 to see the approval request 212 .
- the user 102 may receive a notification saying “Someone has requested user information, please login to approve this request,” etc.
- the approval request may also include information identifying the entity 108 that sent the information request 204 . By identifying the entity 108 , the user 102 can provide the correct outgoing user information 210 to the entity 108 .
- the approval request 212 may also include the transaction information 220 .
- the approval request 212 sent be the user information service computing system 122 may indicate that the user information is being requested to complete a car loan.
- the user 102 can verify the entity 108 requested the user information for the correct transaction.
- the approval request 212 may also indicate to the user 102 if any user information was requested that is not associated with the user information database 132 .
- the user information service computing system 122 receives a response to the approval request from the user 102 via user input 208 from the user information circuit 106 at 406 .
- the response to the approval request indicates which user information has been approved by the user 102 to share with the entity 108 that sent information request 204 .
- the user 102 may approve all, part or none of the user information in the user input 208 . If the user 102 does not approve any of the user information sought in the user information request 204 , the method 400 may terminate.
- outgoing user information 210 is provided to the entity computing system 110 of the entity 108 that sent the information request 204 at 414 .
- the response may indicate which user information is to be shared (e.g., checking account, one of the home addresses, etc.) with the entity computing system 110 for a given type of user information.
- the user 102 may choose to approve all pieces of the same type of user information with the user input 208 .
- the user 102 may approve the user information by checking a box next to the user information using a graphical user interface associated with the user information circuit 106 .
- the user 102 may have to provide authorization to the security circuit 136 in order to approve a piece of user information with high security. For example, if the user 102 is approving the social security number associated with the user 102 , the user may have to provide authorization to the security circuit 136 . For example, the user 102 may have to provide a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. to the security circuit before the outgoing user information 210 is authorized to be sent to the entity computing system 110 . In some embodiments, all user information requires authorization, while higher level security information requires secondary authorization from the security circuit 136 . Other methods of selecting and approving information for approval are intended to fall within the scope of the present disclosure.
- a password e.g., phrase, number, alphanumeric sequence, etc.
- a biometric e.g., fingerprint, retina, etc.
- the user information service computing system 122 may receive a potential transaction 206 from user 102 via the user information circuit 106 at 408 .
- the user information service computing system 122 may receive the potential transaction from the entity computing system 110 .
- the potential transaction 206 received from the entity computing system 110 by the user information service computing system 122 may contain information consistent with the information request 204 received at 402 .
- the entity computing system 110 is not requesting any user information, the entity computing system 110 is simply providing the user information service computing system 122 , and the user 102 , with an indication of what user information would be requested.
- the user information service computing system 122 receives selected user information from the user 102 via user input 208 from the user information circuit 106 at 410 . If the potential transaction 206 was received by the user information service computing system 122 from the user information circuit 106 , the transaction type database 134 may provide suggestions to the user 102 of what user information may be involved in the potential transaction 206 . The user 102 can select relevant user information from the user information stored and managed by the user information database 132 , or add additional user information relevant to the potential transaction. Alternatively, if the potential transaction was sent by the entity computing system 110 , the user 102 may approve the user information, much like was done at 406 . The selected user information may be stored in the user information database 132 so the user information is accessible when the user 102 is ready to complete a transaction.
- the user information service computing system 122 receives an entity selection at 412 from user input 208 from the user information circuit 106 . Since the potential transaction 206 may have been initiated by the user 102 at 408 , the entity 108 involved in the actual transaction may not be the entity 108 associated with the potential transaction 206 . If the potential transaction was initiated by the entity computing system 110 , the entity 108 may be saved in the user information database 132 with the user information for the potential transaction 206 . The user 102 may choose if the entity 108 that initiated the transaction should be saved with the potential transaction 206 by proving user input 208 via the user information circuit 106 .
- the user 102 can select entity 108 using the user information circuit 106 . If no entity was saved with the potential transaction, the user 102 may select an entity to complete the potential transaction by providing user input 208 via the user information circuit 106 .
- the user 102 may select an entity by providing the user information service computing system 122 with information about the entity (e.g., name, address, phone number, etc.) via the user information circuit 106 .
- the user 102 may select an entity by using a drop down list of entities 108 associated with the user information service computing system 122 on a graphical user interface associated with the user information circuit 106 .
- the user 102 may enter an entity identification number associated with the entity 108 and the user information service computing system 122 via the graphical user interface associated with the user information circuit 106 .
- the user 102 may receive the entity identification number from the entity 108 , or from a list provided to the user 102 via the user information circuit 106 from the user information service computing system 122 .
- the user 102 may use the user computing device 104 to scan a barcode, QR code, or other symbol at the entity 108 to indicate the entity 108 selected to the user information service computing system 122 .
- a more detailed method with regard to potential transactions can be seen with reference to FIG. 6 .
- the user information service computing system 122 provides the approved outgoing user information 210 to the entity computing system 110 of the selected entity 108 at 414 .
- the outgoing user information 210 may be provided to the entity computing system 110 in a number of ways.
- the user information service computing system 122 may provide the outgoing user information 210 in an email to the entity computing system 110 (e.g., in a PDF document, etc.).
- the user information service computing system 122 may populate a form associated with the entity computing system 110 to provide outgoing user information 210 .
- the user information service computing system 122 populates a database associated with the entity computing system 110 (e.g., user information database 118 ) to provide outgoing user information 210 .
- the entity 108 may determine how user information is sent based on setting associated with an entity account with the user information service 120 .
- the user information service computing system 122 determines how the outgoing user information 210 is sent to entity computing system 110 .
- the outgoing user information 210 is sent to the entity computing system 110 in different forms based on the level of security of the outgoing user information 210 determined by the security circuit 136 .
- the user information service computing system 122 updates the outgoing user information 210 for the transaction type at 416 .
- the user information service computing system 122 may update the transaction type database 134 .
- the transaction type database 134 may maintain all outgoing user information 210 requested for a plurality of transaction types.
- the transaction type database 134 may keep a single set of user information requested 210 for a given transaction type.
- the transaction type database 134 keeps all user information requested for a given transaction type for all users associated with the user information service computing system 122 .
- the transaction type database 134 may be adaptive and learn what user information is commonly requested for a given transaction type. This information may be used when determining if the information request 204 includes information not commonly requested, which will be described in greater detail with regard to FIG. 5 .
- FIG. 5 a flow diagram of a method 500 of comparing a user information request from an entity is shown, according to an example embodiment.
- the method 500 is performed by the user information service computing system 122 .
- the method 500 receives an information request 204 from entity computing system 110 at 502 , which may be substantially similar to process 402 of method 400 , compares the information request 204 to user information requests for the same transaction type and provides the entity computing system 110 with the outgoing user information 210 .
- the user information service computing system 122 compares the information request 204 to user information requests of similar transaction types at 504 .
- the information stored in the transaction type database 134 may also include the geographical location of the information request 204 , in case different geographical locations (e.g., different states, etc.) have different protocols for user information requested for certain transactions. Additionally, the transaction type database 134 may determine trends in the user information requested based on the dates of the information requests 204 .
- the user information service computing system 122 may compare the information request 204 received at 502 to individual user information requests stored in the transaction type database 134 . Alternatively, the user information service computing system 122 may compare the information request 204 received at 502 to an information request 204 that is representative of all of the information requests 204 stored in the transaction type database 134 .
- the user information service computing system 122 determines if the information request 204 received at 502 is similar to other user information requests for similar transaction types at 506 .
- the comparison may take into account the frequency of the user information requested. For example, if some type user information is always requested for the transaction type, and some type information is usually requested, these may both indicate a similar request and not cause the security circuit 136 to flag the information request 204 . However, if a particular type of user information is rarely or never requested for the transaction type, but appears in the information request 204 received at 502 , the information request 204 may not be considered similar.
- approval request 212 and a corresponding alert 216 is sent to the user information circuit 106 at 508 .
- Process 508 may be substantially similar to process 404 of method 400 . If there are user information types that are not similar to the user information types frequently requested for the transaction type, processes 510 - 512 occurs.
- the user information service computing system 122 flags non-similar user information types in the information request 204 at 510 .
- the user information service computing system 122 may use the security circuit 136 to determine how to flag the user information that was determined inconsistent with frequently requested user information when compared with other user information requests for similar entity types using the transaction type database 134 .
- the security circuit 136 may have different levels of comparison that would cause user information to be flagged. For example, if a piece of information is sometimes requested, a first flag may be applied (e.g., a yellow flag, etc.). If a piece of information is rarely requested, a second flag may be applied (e.g., an orange flag, etc.).
- a third flag may be applied (e.g., a red flag, etc.).
- the information may be flagged based on a level of security associated with the user information. For example, the name of user 102 may have a low security level and therefore have one flag associated with the name, while the social security number of the user 102 may have a high security level and therefore have a different flag associated with the social security number.
- the user information requested that is inconsistent with the user information commonly requested may be flagged with a first, second, third, etc. flag based on the level of security of the user information.
- a piece of user information may receive multiple sets of flags based on different criteria (e.g., frequency of request and level of security, etc.).
- the user information service computing system 122 sends a flagged request 214 and a corresponding alert 216 to the user 102 via the user information circuit 106 at 512 .
- the flagged request 214 indicates any information that was flagged by the security circuit 136 at 510 .
- the flagged request 214 may also include information consistent with the approval request 212 of process 404 of method 400 , such as transaction information 220 and information indicating the entity 108 that sent the information request 204 , in addition to the flagged user information.
- the user information service computing system 122 receives the user response to the request at 514 via user input 208 from the user information circuit 106 regardless of whether or not the information request 204 received at 502 was similar to information requests of similar transaction types.
- the user information service computing system 122 sends the approved outgoing user information 210 to the entity computing system 110 at 516 .
- Process 514 - 516 may be substantially similar to processes 406 and 414 of method 400 , respectively.
- FIG. 6 a flow diagram of a method 600 of preparing user information for a predicted transaction 218 is shown according to an example embodiment.
- the method 600 is performed by user information service computing system 122 .
- the method 600 predicts a transaction based on activity of the user 102 and provides recommendation to the user 102 based on the predicted transaction 218 .
- the user information service computing system 122 predicts a transaction of the user 102 at 602 .
- the user information service computing system 122 may monitor other software applications on the user computing device 104 and/or monitor website activity on the user computing device 104 to predict a potential transaction of the user 102 .
- the prediction circuit 138 may be set with different transactions that could be completed and information that may be indicative of future transactions based on activity on the user computing device 104 . For example, if the user 102 is looking up homes or properties, the prediction circuit 138 may predict the user 102 will be purchasing a home.
- the prediction circuit 138 of the user information service computing system 122 may be set to only predict a transaction after a given set of activity is monitored. For example, the user 102 may have to look at home and property listings multiple times in a given period of time before the prediction circuit 138 predicts the transaction to minimize the number of predicted transactions 218 generated.
- the user information service computing system 122 sends the predicted transaction and a corresponding alert 216 to the user 102 via the user information circuit 106 at 604 .
- the user information service computing system 122 may send the predicted transaction to the user information circuit 106 as an alert 216 .
- the alert 216 may include the predicted transaction 218 as well as information indicating how the user information service computing system 122 predicted the transaction. For example, the alert may say “We noticed you have been viewing houses for sale frequently, are you planning on purchasing a home?”
- the user 102 may respond to the alert via user input 208 to the user information circuit 106 .
- the user information service computing system 122 determines if the user 102 confirmed the predicted transaction 218 or not at 606 . If the user 102 indicates that the predicted transaction 218 is not a transaction the user 102 is planning on completing, the user information service computing system 122 may delete the predicted transaction 218 at 608 .
- the prediction circuit 138 may also make note of the fact that the user 102 is not planning on making the predicted transaction 218 so as to minimize the chance of sending the user 102 another alert 216 relating to a predicted transaction 218 that is the same as a previously predicted transaction. If the user 102 confirms via user input 108 to the user information circuit 106 that the predicted transaction 218 is a transaction the user 102 plans on completing in the future, processes 610 - 614 may occur.
- the user information service computing system 122 analyzes the user information at 610 . Analyzing the user information may include determining the user information that is likely to be needed for a given transaction type by the transaction type database 134 .
- the transaction type database 134 may determine different levels of user information. For example, the transaction type database 134 may determine user information that will most likely be needed for the identified transaction type. The transaction type database 134 may also determine user information that may be needed, depending on the entity 108 that the user 102 will be using to complete the transaction.
- the transaction type database 134 may use methods similar to those used when comparing the user information request to similar user information requests as described with respect to FIG. 5 , specifically process 504 of the method 500 .
- Analyzing the user information may also include comparing the user information needed for the transaction with the user information stored at the user information database 132 .
- the user information service computing system 122 may compare the user information determined at 610 to the user information database 132 to determine if the user information database 132 has all the user information needed for the predicted transaction 218 .
- Analyzing the user information may also include analyzing the content of the user information (e.g., financial information, etc.). Analyzing the content of the user information may provide the user information service computing system 122 with information regarding the likelihood of a successful transaction. For example, if the predicted transaction 218 is buying a car, but the user 102 does not have enough money saved for a down payment, analyzing the user information may indicate that the user 102 should be saving more money.
- the user information service computing system 122 sends a predicted transaction recommendation and a corresponding alert 216 to the user 102 via the user information circuit 106 at 612 .
- the predicted transaction recommendation is a recommendation to the user 102 based on the analysis of the user information at 610 .
- the predicted transaction recommendation may include information relating to user information that is needed for the predicted transaction that the user 102 currently does not have associated with the user information service computing system 122 .
- the predicted transaction recommendation may provide the user 102 with information regarding improvements that could be made to the user information to increase the likelihood of a successful transaction.
- the user information service computing system 122 may provide the user 102 with the alert 216 via the user information circuit 106 indicating the predicted transaction recommendation.
- Alert 216 may also be provided to the user 102 via the user information circuit 106 by the user information database 132 to remind the user 102 to provide the user information service computing system 122 with user information that will be needed for the potential transaction if the user 102 has not provided the user information needed in a set amount of time.
- the predicted transaction recommendation may also include recommendations for changes in the activity of the user 102 in order to have a successful transaction when the user 102 is ready to complete the predicted transaction 218 . For example, if the predicted transaction is buying a car, the predicted transaction recommendation may include financial recommendations to increase the likelihood that the user 102 will be able to make car payments, information on the credit score of the user 102 and how to improve the credit score to get better car loans, etc.
- the user information service computing system 122 sets the predicted transaction as a potential transaction at 614 . Since the user 102 has confirmed the predicted transaction is a transaction the user 102 is thinking about completing, the user information service computing system 122 , it is no longer a predicted transaction.
- FIG. 7 a flow diagram of a method 700 of determining if the user 102 has the user information ready for a potential transaction 206 is shown, according to an example embodiment.
- the method 700 is performed by the user information service computing system 122 .
- the method 700 receives a potential transaction 206 , determines if the user 102 has the user information that will likely be need for the potential transaction 206 , and provides the entity computing system 110 with the approved outgoing user information 210 .
- the potential transaction 206 is received as a product of method 600 .
- Process 702 may be substantially similar to process 408 of method 400 .
- the user information service computing system 122 determines the user information needed for the transaction at 704 , much like process 610 of method 600 when the transaction type database 134 analyzes the transaction type to determine the type of user information that will likely be needed for the potential transaction 206 . However, unlike process 610 of method 600 , the content of the user information is not analyzed to provide recommendations on changes in behavior.
- the user information service computing system 122 determines if the user 102 has the user information determined at 704 for the potential transaction 206 received at 702 at 706 .
- the transaction type database 134 may compare the user information determined at 704 to information in the user information database 132 to determine if the user information database 132 has the user information that will likely be needed for the potential transaction 206 . If the user information that will likely be needed is in the user information database 132 , the method 700 may proceed directly to process 712 . If user information is needed and is not in the user information database 132 , processes 708 - 710 occur.
- the user information service computing system 122 alerts the user 102 of the missing user information at 708 .
- the user information service computing system 122 may provide the user 102 with the alert 216 much like process 612 .
- the alert 216 is received by the user 102 via the user information circuit 106 and indicates user information that was determined to be missing at 706 .
- the user information service computing system 122 receives incoming user information 202 at 710 .
- the incoming user information 202 is received from the user 102 via the user information circuit 106 in response to the alert 216 notifying the user 102 of user information that is missing.
- Process 710 may be substantially similar to process 304 and 308 of method 300 .
- the user information service computing system 122 receives the user 102 entity selection at 712 .
- the user 102 entity selection is sent from the user information circuit 106 and indicates which entity 108 the user 102 has selected to complete the potential transaction 206 .
- Process 712 may be substantially similar to process 412 of method 400 .
- the user information service computing system 122 provides the approved outgoing user information 210 to the entity computing system 110 at 714 .
- the entity computing system 110 that receives the approved outgoing user information 210 is the entity computing system 110 associated with the entity selected at 712 .
- Process 714 may be substantially similar to process 414 of method 400 .
- the user information service By using the user information service to store and manage user information, individuals gain ease of access to user information. In addition, with all the user information stored in a single location, information is protected, accessible and easy to distribute. Oftentimes, when individuals are asked for user information, the individual must get the information from a variety of places. The individual may have some information stored at home in a safe, while other information is stored electronically. The individual may also have to reach out to other entities to get the information needed. This can be cumbersome for the individual, and cause delays in transactions the user would like to complete. In addition, once the individual obtains all the information, it has to be shared with the entity the individual is completing the transaction with. This process can be tedious and the individual may makes mistakes when providing large amount of information. By using the user information service, individuals can easily provide all the needed information to an entity to quickly, and accurately, complete a transaction.
- circuit may include hardware structured to execute the functions described herein.
- each respective “circuit” may include machine-readable media for configuring the hardware to execute the functions described herein.
- the circuit may be embodied as one or more circuitry components including, but not limited to, processing circuitry, network interfaces, peripheral devices, input devices, output devices, sensors, etc.
- a circuit may take the form of one or more analog circuits, electronic circuits (e.g., integrated circuits (IC), discrete circuits, system on a chip (SOCs) circuits, etc.), telecommunication circuits, hybrid circuits, and any other type of “circuit.”
- the “circuit” may include any type of component for accomplishing or facilitating achievement of the operations described herein.
- a circuit as described herein may include one or more transistors, logic gates (e.g., NAND, AND, NOR, OR, XOR, NOT, XNOR, etc.), resistors, multiplexers, registers, capacitors, inductors, diodes, wiring, and so on).
- the “circuit” may also include one or more processors communicatively coupled to one or more memory or memory devices.
- the one or more processors may execute instructions stored in the memory or may execute instructions otherwise accessible to the one or more processors.
- the one or more processors may be embodied in various ways.
- the one or more processors may be constructed in a manner sufficient to perform at least the operations described herein.
- the one or more processors may be shared by multiple circuits (e.g., circuit A and circuit B may comprise or otherwise share the same processor which, in some example embodiments, may execute instructions stored, or otherwise accessed, via different areas of memory).
- the one or more processors may be structured to perform or otherwise execute certain operations independent of one or more co-processors.
- two or more processors may be coupled via a bus to enable independent, parallel, pipelined, or multi-threaded instruction execution.
- Each processor may be implemented as one or more general-purpose processors, application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), digital signal processors (DSPs), or other suitable electronic data processing components structured to execute instructions provided by memory.
- the one or more processors may take the form of a single core processor, multi-core processor (e.g., a dual core processor, triple core processor, quad core processor, etc.), microprocessor, etc.
- the one or more processors may be external to the apparatus, for example the one or more processors may be a remote processor (e.g., a cloud based processor). Alternatively or additionally, the one or more processors may be internal and/or local to the apparatus. In this regard, a given circuit or components thereof may be disposed locally (e.g., as part of a local server, a local computing system, etc.) or remotely (e.g., as part of a remote server such as a cloud based server). To that end, a “circuit” as described herein may include components that are distributed across one or more locations.
- An exemplary system for implementing the overall system or portions of the embodiments might include a general purpose computing computers in the form of computers, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit.
- Each memory device may include non-transient volatile storage media, non-volatile storage media, non-transitory storage media (e.g., one or more volatile and/or non-volatile memories), etc.
- the non-volatile media may take the form of ROM, flash memory (e.g., flash memory such as NAND, 3D NAND, NOR, 3D NOR, etc.), EEPROM, MRAM, magnetic storage, hard discs, optical discs, etc.
- the volatile storage media may take the form of RAM, TRAM, ZRAM, etc. Combinations of the above are also included within the scope of machine-readable media.
- machine-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.
- Each respective memory device may be operable to maintain or otherwise store information relating to the operations performed by one or more associated circuits, including processor instructions and related data (e.g., database components, object code components, script components, etc.), in accordance with the example embodiments described herein.
- input devices may include any type of input device including, but not limited to, a keyboard, a keypad, a mouse, joystick or other input devices performing a similar function.
- output device may include any type of output device including, but not limited to, a computer monitor, printer, facsimile machine, or other output devices performing a similar function.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Biomedical Technology (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- This application is a continuation of U.S. patent application Ser. No. 17/079,095, entitled “USER INFORMATION GATHERING AND DISTRIBUTION SYSTEM,” filed Oct. 23, 2020, which is a continuation of U.S. patent application Ser. No. 15/385,035, entitled “USER INFORMATION GATHERING AND DISTRIBUTION SYSTEM,” filed Dec. 20, 2016, issued as U.S. Pat. No. 10,817,593 on Oct. 27, 2020, which itself claims priority to U.S. Provisional Patent Application No. 62/272,422 entitled “USER INFORMATION GATHERING AND DISTRIBUTION SYSTEM,” filed Dec. 29, 2015, each of which are incorporated in their entireties and for all purposes.
- Individuals often have a plurality of information associated with the individual that is shared with a plurality of entities. The information may include basic information associated with the individual such as first name, last name, email address, phone number, birthday, home address and so on. The information may also include information confidential to the individual such as social security number, health information, credit information, insurance information and so on. Often, individuals store this information in a variety of places (e.g., financial institution, safe, government agency, etc.). Individuals may also be asked to provide pieces of this information to many different entities during a transaction. For example, when an individual is getting approved for a mortgage, buying a new car, or visiting the hospital, the individual may be asked to provide a variety of information. However, the individual may not know what information is needed, or the individual may not have the information needed readily available. If the individual does not know what information is needed for certain transactions, the individual may provide too much or too little information to the entity. Providing too much information to an entity may be dangerous for the individual as the information may be used fraudulently by the entity or be available to others whom may use the information fraudulently.
- One embodiment of the invention relates to a method of alerting a user of user information to be sent to an entity during a transaction, the method being performed by a user information service (UIS) computing system associated with an information service. The method includes populating, by a UIS information circuit and an associated user database, an account with user information received from at least one of the user and a plurality of entities. The method further includes receiving, by the UIS information circuit over a network via a network interface circuit, a user information request relating to a transaction from an entity computing system associated with the entity. The method includes sending, by a security circuit of the UIS information circuit, an alert including an approval request to a user computing device associated with the user over the network, wherein the approval request contains an identification of user information requested in the user information request. The method further includes receiving, by the security circuit, an approval of the approval request from the user computing device. The method includes providing, by the UIS information circuit and the user information database, the approved information to the entity to complete the transaction.
- Another embodiment relates to a non-transitory computer readable media having computer-executable instructions embodied therein that, when executed by a computing system associated with a second party to an agreement causes the second party computing system to perform operations for demonstrating consensus agreement. The operations include populating, by an associated user database, an account with user information received from at least one of the user and a plurality of entities. The operations further include receiving a user information request relating to a transaction from an entity computing system associated with the entity, sending an alert including an approval request to a user computing device associated with the user over the network, wherein the approval request contains an identification of user information requested in the user information request. The operations further include receiving an approval of the approval request from the user computing device and providing, by the user information database, the approved information to the entity to complete the transaction.
- Yet another embodiment of the invention relates to a user information service (UIS) computing device. The device includes a network interface circuit configured to communicate with a user computing device associated with a user and an entity computing system. The method further includes at least one processor operatively coupled to a non-transient memory to form a UIS information circuit. The circuit is structured to populate, in a user information database, an account with user information. The circuit is further structured to receive, via a network interface circuit, a user information request from an entity computing system over a network. The circuit is structured to send, via a security circuit, an alert including an approval request indicating the user information requested in the user information request to the user computing device over the network. The circuit is further structured to receive a response to the approval request from the user computing device. The circuit is structured to provide user information corresponding to the user information request and the response to the approval request to the entity computing system.
-
FIG. 1 is a diagram of a data exchanging system, according to an example embodiment. -
FIG. 2 is a diagram of information and data flows of the data exchanging system ofFIG. 1 , according to an example embodiment. -
FIG. 3 is a flow diagram of a method of populating user information for a user account, according to an example embodiment. -
FIG. 4 is a flow diagram of a method of providing user information to an entity, according to an example embodiment. -
FIG. 5 is a flow diagram of a method of comparing a user information request from an entity, according to an example embodiment. -
FIG. 6 is a flow diagram of a method of preparing user information for a predicted transaction, according to an example embodiment. -
FIG. 7 is a flow diagram of a method of determining if a user has user information ready for a potential transaction, according to an example embodiment. - Referring to the figures generally, user information gathering and distribution systems and methods are described. The user information systems and methods are structured to receive a plurality of user information types (e.g., social security number, insurance information, etc.) associated with a user and to enable the user to manage and distribute the information in a secure, convenient, efficient, and time-saving manner. The user information system may be accessed with at least one user device (e.g., a mobile device, a smart watch, etc.). In some arrangements, the user information system is structured to receive an information request from an entity (e.g., bank, car dealer, etc.) based on a transaction type (e.g., mortgage approval, buying a car, etc.), compare the information request to information requests from similar entities for similar transactions, and to provide the user information to the entity. The user information functions allow the user to add, manage, and distribute the user information. The user information system also predicts and verifies the user information needed for a given transaction to protect the user from risks of giving too much or incorrect information to an entity.
- Referring now to
FIG. 1 , a diagram of adata exchange system 100 is shown according to an example embodiment. Thecomputing system 100 includes auser 102, a plurality ofentities 108, auser information service 120, and anetwork 140. Thenetwork 140 may include any of various types of data exchanging networks. For example, thenetwork 140 may include wireless networks (e.g., 802.11X, ZigBee′, Bluetooth, Internet, etc.), wired networks (e.g., Ethernet), or any combination thereof. Thenetwork 140 is structured to permit the exchange of data, values, instructions, messages, etc. between and among the user computing device 104, theentity computing system 110, and the user informationservice computing system 122. - The
user 102 may include individuals, business representatives, large and small business owners, other entities, and so on. Theuser 102 is associated with a user computing device 104. The user computing device 104 may be, but is not limited to, a mobile computing device (e.g., a smartphone, tablet computer, laptop computer, person digital assistant, etc.), a desktop computing device, a wearable computing device, etc. Wearable computing devices refer to any type of computing device that auser 102 wears including, but not limited to, a watch, glasses, bracelet, etc. - The user computing device 104 includes a user information circuit 106. The user information circuit 106 is structured to allow the
user 102 to communicate with theuser information service 120. For example, the user information circuit 106 may be structured to provide a user interface (e.g., a graphical user interface) that permits theuser 102 to provide information (e.g., user information) that is communicated to a user informationservice computing system 122 associated with theuser information service 120. In this regard, the user information circuit 106 may be communicably coupled to a processor, non-transient memory, and network interface enabling the user computing device 104 to exchange data over thenetwork 140. - In addition, the user information circuit 106 communicates data to and from the user information
service computing system 122 vianetwork 140. In some arrangements, theuser 102 may download a user information application (e.g., a software “app”) prior to use, which may be used to set up and configure the user information circuit 106. In another arrangement, the user information circuit 106 is hard coded into the memory of the user computing device 104. In further arrangements, the user information circuit 106 is a web-based interface application accessed via the Internet on a web browser executed on the user computing device 104. In such arrangements, the user information circuit 106 is executed and maintained remotely (e.g., on the user information service computing system 110). In this instance, theuser 102 logs onto or accesses the web-based interface to access the user information circuit 106. In some arrangements, the user information circuit 106 is supported by a separate computing system comprising one or more servers, processors, network interface circuits, etc. that transmit the applications for use to the user computing device 104. In certain embodiments, the user information circuit 106 may include an application programming interface (API) and/or a software development kit (SDK) that facilitates the integration of other applications with the user information circuit 106. - Each of the
entities 108 provide services to a plurality of users, including theuser 102. Examples of theentities 108 include financial institutions, merchants, insurance companies, utility companies, social media networks, e-mail systems, health care providers, etc. Each of the plurality ofentities 108 operates and/or is associated with a respectiveentity computing system 110. Eachentity computing system 110 includes aprocessor 112,memory 114, anetwork interface circuit 116 and auser information database 118. Thenetwork interface circuit 116 facilitates the sending and receiving of data, commands, instructions, values, etc. over the network 140 (e.g., to and from the user informationservice computing system 120, etc.). Eachentity computing system 110 is communicably coupled to the user informationservice computing system 122 and/or the user computing device 104 via thenetwork 140. - The
entity computing system 110 also includes auser information database 118 that stores user information relating to theuser 102. Theentity computing system 110 may maintain information about one or more of theentities 108, information regarding user 102 (e.g., accounts associated with theuser 102 and a respective one of theentities 108, etc.) and so on in theuser information database 118. In this regard and as mentioned above, more than oneentity 108 with an associatedentity computing system 110 may be communicably coupled to the components ofFIG. 1 over thenetwork 140 to accommodate user information associated theuser 102 at a plurality ofentities 108. For example, if theentity 108 is a financial institution, the user information database may store user account information including account numbers, balances, credit limits, and so on. - In some arrangements, the
user information service 120 is affiliated with a given entity 108 (e.g., a financial institution). In other arrangements, theuser information service 120 is not directly affiliated with a givenentity 108. Theuser information service 120 includes a user informationservice computing system 122. The user informationservice computing system 120 includes aprocessor 124,memory 126, anetwork interface circuit 128, and a user information service (“UIS”)information circuit 130. Thenetwork interface circuit 128 facilitates the sending and receiving of data, commands, instructions, values, etc. over the network 140 (e.g., to and from the user computing device 104, to and from theentity computing system 110, etc.). The user informationservice computing system 122 is structured to provide storage of user information associated with theuser 102 and distribution of user information associated with theuser 102 to one or more of theentities 108. - The
UIS information circuit 130 of the user informationservice computing system 122 provides storage and distribution of user information to theuser 102 via the user information circuit 106. The operation of the user informationservice computing system 122 and theUIS information circuit 130 are described in further detail with respect toFIGS. 2 through 7 . - Now referring to
FIG. 2 , a diagram of information and data flows to and from the user informationservice computing system 122 ofFIG. 1 is shown in greater detail, according to an example embodiment. TheUIS information circuit 130 at the user informationservice computing system 122 communicates data to and from the user information circuit 106 and theentity computing system 110 via thenetwork 140, and includes auser information database 132, atransaction type database 134, asecurity circuit 136, and aprediction circuit 138. Theuser information database 132 includes storage media or access thereto structured to retrievably store user information flowing into theUIS computing system 122. Thetransaction type database 134 retrievably stores information relating to a plurality of different transaction types, including types of user information relevant to each of the plurality of different transaction types. In some arrangements, the information in theuser information database 132 is shared with thetransaction type database 134. Thesecurity circuit 136 is structured to maintain and apply various security protocols relating to information stored in theuser information database 132, as well as information requested from theuser 102. Theprediction circuit 138 is structured to predict future transactions based on information flowing to the UIS computing system 122 (e.g., information from the user information circuit 106) and information stored at theuser information database 132 and thetransaction type database 134. Various example operations of the UIS information circuit are discussed in more detail below. - The user information
service computing system 122 receives a plurality of inputs, including, but not limited to,incoming user information 202,information request 204,potential transaction 206,user input 208 from at least the user information circuit 106 and theentity computing system 110. -
Incoming user information 202 may be any type of information relating to theuser 102. For example, theincoming user information 202 may be personal information (e.g., social security number, birthday, home address, name, etc.), financial information (e.g., credit score, bank account balances, etc.), health information (e.g., allergies, vaccinations, family medical history, etc.) and so on. Theincoming user information 202 may be received by the user informationservice computing system 122 from the user computing device 104. Alternatively, theincoming user information 202 may be received from theentity computing system 110. For example, the userinformation computing system 122 may receive health care information (incoming user information 202) associated with theuser 102 from a computing system associated with a health care provider. -
Information request 204 may be a request from theentity computing system 110 for user information associated with theuser 102 sent to the user informationservice computing system 122. Theinformation request 204 may include a list of specific user information that is being requested. Theinformation request 204 may also include theentity 108 that is requesting the user information. In addition, theinformation request 204 may indicate a type of transaction for which theentity computing system 110 is requesting the user information. -
Potential transaction 206 is a transaction, indicated by theuser 102 via the user information circuit 106, that theuser 102 may complete in the future. For example, if theuser 102 is planning on purchasing a car, but not for a few months theuser 102 may send the user information service computing system 122 apotential transaction 206. In this case, theuser 102 may want to plan ahead to gather additional user information that may be needed for thepotential transaction 206. Thepotential transaction 206 is received by the user informationservice computing system 122 from the user information circuit 106. -
User input 208 refers to input received from theuser 102 at the user information circuit 106. Theuser input 208 may include user responses toapproval request 212, flaggedrequest 214, alert 216, and/or predictedtransaction 218, discussed below. In some arrangements,user input 208 also includes setting and preferences associated with a user account for theuser 102 with theuser information service 120. - The
UIS information circuit 130 at the user informationservice computing system 122 is also structured to provide information, requests, and alerts 216 to theentity computing system 110 and the user information circuit 106. An alert 216 is a notification to be received at the user computing device 104, and may specify a type of pending request, an requested response from theuser 102, a notification, and so on. The user information circuit 106 may receive the alert 216 over thenetwork 140 and use any of a variety of output devices at the user computing device 104 to bring the alert 216 to the attention of theuser 102. The alert 216 may be associated with any of the outgoing types of data from the UIS computing system 122 (e.g., anapproval request 212, a flaggedrequest 214, a predictedtransaction 218, etc.). The alert 216 may be sent via email, text message, push notification, etc. Theuser 102 may set up and configurealerts 216 and alert preferences when setting up the user account. - The user information
service computing system 122 may provideoutgoing user information 210 to one or more of the plurality ofentities 108.Outgoing user information 210 may be substantially similar toincoming user information 202 in thatoutgoing user information 210 may include any of various types of information relating to a given user. However,outgoing user information 210 is a set of user information that will be provided to theentity computing system 110. For example, in one arrangement, while the user information collectively received by the user informationservice computing system 122 includes all the user information types described above, theoutgoing user information 210 sent to theentity computing system 110 may only include name, address, and credit score. - The
security circuit 136 may provide anapproval request 212 and acorresponding alert 216 to the user information circuit 106 to notify theuser 102 of information relating to aninformation request 204 received from one or more of the plurality ofentities 108. As another example, thesecurity circuit 136 may provide the user information circuit 106 with all the user information that was requested in theinformation request 204, as well as information relating to the type of transaction for which the user information is being requested, and theentity 108 that is requesting the user information in theapproval request 212. Thesecurity circuit 136 may receive, from theuser 102 via the user information circuit 106,user input 208 indicating an approval of the user information ofapproval request 212. - A flagged
request 214 and acorresponding alert 216 may be provided to the user information circuit 106 by thesecurity circuit 136 to notify theuser 102 of information relating to aninformation request 204 received from one or more of the plurality ofentities 108 when a piece of user information requested is unusual (e.g., medical information requested when getting a car loan). - The
prediction circuit 138 is structured to predict a potential future transaction theuser 102 may be making based on activity by theuser 102 on the user computing device 104. When theprediction circuit 138 identifies a potential future transaction, the prediction circuit may provide a predictedtransaction 218 and acorresponding alert 216 to the user information circuit 106, which in turn may provide the predictedtransaction 218 to theUIS information circuit 130. - The
UIS information circuit 130 may providetransaction information 220 to the user information circuit 106 from thetransaction type database 134 to inform theuser 102 about a transaction that is presently occurring or is actually set to occur. - In operation, the
incoming user information 202 may be transmitted to the user informationservice computing system 122 via the user information circuit 106 of the user computing device 104. The first time theuser 102 sendsincoming user information 202 to the user informationservice computing system 122, theUIS information circuit 130 may treat theincoming user information 202 as a request to create an account with theuser information service 120. The user account containsincoming user information 202 received from theuser 102, and all of theincoming user information 202 may be stored inuser information database 132. Theuser information database 132 is configured to store and manageincoming user information 202 associated withuser 102 at the user informationservice computing system 122. TheUIS information circuit 130 may also receiveincoming user information 202 from one ormore entities 108 associated with user 102 (e.g., social media, health care provider, etc.). In addition to storing and managingincoming user information 202, theuser information database 132 maintains user account settings and preferences. - In operation, the
information request 204 is transmitted to the userinformation computing system 122 from theentity computing system 110. Theinformation request 204 may specify theentity 108 requesting the user information, the type of transaction occurring, and the user information being requested. As used herein, the term “transaction” may refer to financial and non-financial transactions. An example of a non-financial transaction may be providingoutgoing user information 210 to an entity. Accordingly, the term “transaction” may refer to any operation or interaction executed by theuser 102 with an entity 108 (e.g., visiting the doctor, making a flight reservation using frequent flier miles, financial transactions, buying a car, getting approved for a loan, etc.). - The
UIS information circuit 130 may compare theinformation request 204 to other requests of similar transaction types using thetransaction type database 134. Information relating to different types of transactions and user information commonly requested for these types of transactions is stored intransaction type database 134. Thetransaction type database 134 may be constantly updating theoutgoing user information 210 requested for certain transactions. In this regard, thetransaction type database 134 may be dynamic and adaptive to learn what user information is commonly requested for a transaction. Thetransaction type database 134 may be updated manually by personnel (e.g., employees, etc.) associated with theuser information service 120, or may use prior transactions of all users with accounts at theuser information service 120, includinguser 102. - The
security circuit 136 is structured to determine if information requested by the entity is consistent with information normally requested by a similar entity for a similar transaction type. Thesecurity circuit 136 may also be structured to flag inconsistent information and send the user 102 a flaggedrequest 214 and acorresponding alert 216. When theUIS information circuit 130 compares theinformation request 204 to similar information requests of the same or similar type that are maintained in thetransaction type database 134, user information that is requested ininformation request 204 that is not consistent with information requests of the same or similar type may be flagged by thesecurity circuit 136. Thesecurity circuit 136 may have different levels or criteria for flagging requested user information. The flagging levels may be preset or determined by theuser 102 when the user account is created. The flagging levels may also be based on more than one type of criteria (e.g., frequency of request, level of security of information, etc.). Thesecurity circuit 136 is also structured to determine the level of security for each piece of information theuser 102 provides, and maintain security protocol for sharing information with a certain security level. For example, thesecurity circuit 136 may require theuser 102 to provide a password before theUIS information circuit 130 can share the social security number of theuser 102 with one of theentities 108. - The
UIS information circuit 130 may provide theuser 102 with an alert 216 via the user information circuit 106 when certain user information is requested. TheUIS information circuit 130 may provide theuser 102 withalert 216 via the user information circuit 106 when user information is requested that theuser 102 does not have linked or stored in theuser information database 132.Alert 216 may also be provided to theuser 102 via the user information circuit 106 to remind theuser 102 to provide the user informationservice computing system 122 with user information that will be needed for a future transaction theuser 102 has indicated (e.g., potential transaction 206). - The
UIS information circuit 130 may receive apotential transaction 206 generated and transmitted from the user information circuit 106. Theuser 102 may be planning on completing a transaction (e.g., getting a loan, qualifying for a mortgage, buying a car, etc.) and use the user information circuit 106 to transmit a correspondingpotential transaction 206 to the user informationservice computing system 122. TheUIS information circuit 130 may search thetransaction type database 134 to determine the user information that may be needed to complete thepotential transaction 206. In view of the information returned from thetransaction type database 134, theuser 102 may have time to gather additional user information that is needed and check to see if the user information is accurate before completing a transaction with any one ormore entity 108. Alternatively, theUIS information circuit 130 may receive thepotential transaction 206 fromentity computing system 110. Theuser 102 may visit one or more of theentities 108 looking for information regarding a transaction. In this regard, theentity computing system 110 may send apotential transaction 206 to the user informationservice computing system 122 indicating thatuser 102 may complete a transaction withentity 108. Theentity computing system 110 may also indicate what user information would be needed to complete the transaction. Again, theuser 102 would have time to gather additional user information that may be needed and check to see if the user information is accurate before completing a transaction withentity 108. - The
UIS information circuit 130 may cooperate with theprediction circuit 138 to provide predictedtransactions 218 to theuser 102. A predictedtransaction 218 is information relating to an anticipated transaction based on the past behavior of theuser 102. The user informationservice computing system 122 may monitor other applications on the user computing device 104 and/or monitor website activity on the user computing device 104 to predict apotential transaction 218 of theuser 102. Theprediction circuit 138 may be set with different transactions that could be completed and information that may be indicative of the transaction. For example, if theuser 102 is looking up homes or properties, theprediction circuit 138 may predict theuser 102 will be purchasing a home. TheUIS information circuit 130 may notify (e.g., via alert 216) theuser 102 of the predictedtransaction 218 via the user information circuit 106. Theuser 102 may transmituser input 208 to the user informationservice computing system 122 indicating if the predictedtransaction 218 is accurate. TheUIS information circuit 130 may use thetransaction type database 134 to provide theuser 102 withoutgoing user information 210 corresponding to user information that would likely be needed for the predictedtransaction 218. - When the
user 102 is ready to complete a transaction (e.g., send outgoing user information 210) with one or more of theentities 108, theuser 102 may provideuser input 208 to the user informationservice computing system 122 via the user information circuit 106. Where theuser input 208 is an approval, the approval may include each piece of user information that is approved byuser 102 to be sent to theentity computing system 110. Thesecurity circuit 136 may require theuser 102 to provide authorization with theuser input 208 indicating an approval. In some embodiments, thesecurity circuit 136 may also require the entity 108 (e.g., an employee associated with entity 108) to provide authorization or authentication beforeoutgoing user information 210 is provided. For example, theentity 108 may have to provide thesecurity circuit 136 with a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. Alternatively, theuser input 208 may include a selection of one ormore entity 108 when theuser 102 has already approved all theoutgoing user information 210 to be sent to one or more entity 108 (e.g.,potential transaction 206, predictedtransaction 218, etc.). The user informationservice computing system 122 transmits the approvedoutgoing user information 210 toentity computing system 110. - Now referring to
FIG. 3 , a flow diagram of amethod 300 of populating user information for a user account with the user informationservice computing system 122 is shown, according to an example embodiment. Themethod 300 registers theuser 102 with theuser information service 120 and gathers user information associated with theuser 102. - A user account is created at 302. The user account created may be initiated by
user 102 transmittingincoming user information 202 to the user informationservice computing system 122 via the user information circuit 106. Theuser 102 may provide additional information that is optional for theuser 102 to include for registration. For example, theuser 102 may have the option to add a phone number, set preferences for the user account, and change the password associated with the user account. The user account may also include system preferences theuser 102 defines. The system preferences may include security preferences, usage preferences, alert preferences, and so on. The security preference may define the requirements needed by thesecurity circuit 136 before accessing the user informationservice computing system 122 via the user information circuit 106. For example, a security preference may require theuser 102 to provide a password (e.g., word, phrase, alphanumeric value, etc.), a biometric scan (e.g., a fingerprint scan, a retina scan, a voice sample, etc.), a semi-random number (e.g., as generated by a changing security token device), or a combination thereof to thesecurity circuit 136 before theuser 102 may access the user informationservice computing system 122. Thesecurity circuit 136 may also allow theuser 102 to define user information (e.g., social security number, etc.) that require a second passcode to authorize transmission toentity computing system 110. Alert preferences may include when alert 216 is sent to the user information circuit 106 (e.g.,information request 204 received, social security number requested, etc.), a form of alert 216 (e.g., text message, email, notification, etc.) and information included in alert 216 (e.g., user information requested, transaction type,entity 108 requesting the information, etc.). -
Incoming user information 202 is added to the user account by theUIS information circuit 130 at 304. Theuser 102 may manually enter the user information via input devices associated with the user computing device 104. In some arrangements, the user information circuit 106 provides a graphical user interface with labeled spaces for theuser 102 to enter specified information. For example, theuser 102 may fill in the home address ofuser 102 in a box labeled “Home Address.” Theuser 102 may also include information about one or more of theentities 108 that may provide additionalincoming user information 202. For example, theuser 102 may provide information regarding a health care provider or financial institution associated with theuser 102 to the user informationservice computing system 122 via the user information circuit. Alternatively, theuser 102 may link the user information circuit 106 to other applications used by theuser 102 that include user information (e.g., mobile banking application, social media application, etc.). - The user information
service computing system 122 may request user information from theentity computing system 110, at 306. For example, theUIS information circuit 130 may request healthcare information associated withuser 102 from the health care provider indicated by theuser 102 at 304. Additionally, the user informationservice computing system 122 may request user information from theuser 102 via the user information circuit 106. If theUIS information circuit 130 has a set of user information (e.g., name, email, phone number, address, etc.) that is required for all users, includinguser 102, theUIS information circuit 130 may send alert 216 to theuser 102 via the user information circuit 106 indicating that user information is missing and/or incomplete. - The
UIS information circuit 130 of the user informationservice computing system 122 receivesincoming user information 202 at 308. Theincoming user information 202 received at 308 may be the user information requested at 306, or additional information provided to theUIS information circuit 130 via the user information circuit 106 or theentity computing system 110. If the information requested is information that remains constant (e.g., social security number, birthday, etc.), or relatively constant (e.g., home address, last name, insurance information, healthcare information, etc.), theuser information database 132 may receive a copy of the user information. Alternatively, if the user information changes frequently (e.g., balance of financial accounts, credit score, etc.) theUIS information circuit 130 may receive access to the user information instead of receiving copy of the user information. Theincoming user information 202 received at 308 may be compared to the user information currently associated with the user account and/or otherincoming user information 202 being received by theuser information database 132. TheUIS information circuit 130 may send the alert 216 to theuser 102 via the user information circuit 106 when a discrepancy is determined between pieces of user information. For example, if the home address associated with theuser 102 received from oneentity 108 is listed as “Pin Oak” and the home addressed associated with theuser 102 at adifferent entity 108 is listed as “Pine Oak,” theuser 102 may senduser input 208 to the user informationservice computing system 122 indicating the information that is correct and should be stored in theuser information database 132. In some embodiments, the user informationservice computing system 122 may ask theuser 102 viaalert 216 to the user information circuit 106 to verify the user information received from the variousentity computing systems 110 even if no discrepancies are found for the piece of user information. - The
UIS information circuit 130 of the user informationservice computing system 122 stores, manages, and distributes the user information at 310. The user information that is constant or relatively constant may be stored by the userinformation computing system 122. However, the user information may still be modified byuser 102 via the user information circuit 106, but may require manual updating of the user information. User information that is relatively fluid, or changes frequently, may be managed by theuser information database 132. This information may be updated frequently asentities 108 associated with the user information (e.g., a financial institution associated with a financial account of user 102) update the user information. Additionally, some user information may be managed on a set cycle or by user input. For example, theuser 102 may indicate that theuser 102 visits the eye doctor once a year, generally in March. The user informationservice computing system 122 may only request updated user information relating to the eye doctor (e.g., vision prescription, etc.) at the end of March, or may periodically check for user information updates during the month of March. If theuser 102 instead visits the eye doctor in February, theuser 102 may indicate via the user information circuit 106, that the user information associated with the eye doctor has been updated. The user informationservice computing system 122 may request user information from a computing system (e.g., entity computing system 110) associated with the eye doctor (e.g., entity 108) based on theuser input 208 indication received from user information circuit 106. User information may then be selectively distributed toentity computing system 110 by the user informationservice computing system 122. Additional methods for managing and distributing user information are explained in further detail below with respect toFIGS. 4-7 . - Referring now to
FIG. 4 , a flow diagram of amethod 400 of providing user information to an entity using the user informationservice computing system 122 is shown, according to an example embodiment. Themethod 400 provides user information tocomputing system 122 based on a transaction occurring between theuser 102 and one or more of theentities 108. Themethod 400 may be initiated in two ways, by theuser 102, or by one or more of theentities 108. - The user information
service computing system 122 receives aninformation request 204 from theentity computing system 110 at 402. Theinformation request 204 may include a list of all the user information (e.g., name, address, credit score, financial institution, etc.) being requested for theuser 102 by theentity 108 for a transaction. Theinformation request 204 may also include the type of transaction that is taking place (e.g., mortgage approval, etc.) and/or information relating to theentity 108. Theentity 108 may have to register (e.g., create an entity account, etc.) with the user informationservice computing system 122 before theinformation request 204 can be received from theentity computing system 110. Alternatively, theentity 108 may not have to register with the user information service before the user informationservice computing system 122 can receive aninformation request 204 from theentity computing system 110. - The
entity computing system 110 may have to provide at least basic user information (e.g., first and last name, phone number, etc.) to the user informationservice computing system 122 to identify the account associated with theuser 102 at theuser information service 120. In some embodiments, thesecurity circuit 136 may require theentity computing system 110 to provide a form of authentication to ensure theentity computing system 110 is not trying to obtain user information for fraudulent purposes. For example, theentity 108 may have to register an entity account and provide a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. to thesecurity circuit 136 before the user informationservice computing system 122 responds to theinformation request 204. - The
entity 108 may have an entity number to associate theentity 108 with the user informationservice computing system 122. The entity number may be associated with auser information service 120 account held by the user informationservice computing system 122 for theentity 108. The entity account may contain information relating to transactions common for theentity 108 stored in thetransaction type database 134. For example, a car dealership may have car loan and car purchase transactions associated with the entity account stored in thetransaction type database 134. Thetransaction type database 134 may also contain information commonly requested for the transactions associated with theentity 108. The user informationservice computing system 122 can use this information to determine if theentity computing system 108 is requesting information consistent withinformation requests 204 made in the past. For example, if the car dealership has a defined set of user information that is requested from theuser 102 when theuser 102 is getting a car loan, but aninformation request 204 contains more information than normally requested, thesecurity circuit 136 may suspect fraudulent activity relating to theentity computing system 110. Inconsistent user information requests will be described in greater detail with respect toFIG. 5 . - The user information
service computing system 122 may send anapproval request 212 and acorresponding alert 216 to theuser 102 via thesecurity circuit 136 of the user information circuit 106 at 404. Theapproval request 212 may present the user information in a way that indicates the type of user information without revealing the user information. For example, theapproval request 212 may indicate that the home address ofuser 102 was requested, without actually providing the home address of theuser 102. Alternatively, theuser 102 may be notified by the user informationservice computing system 122 via the user information circuit 106 of theapproval request 212 and have to log in to the userinformation computing system 122 to see theapproval request 212. For example, theuser 102 may receive a notification saying “Someone has requested user information, please login to approve this request,” etc. The approval request may also include information identifying theentity 108 that sent theinformation request 204. By identifying theentity 108, theuser 102 can provide the correctoutgoing user information 210 to theentity 108. Theapproval request 212 may also include thetransaction information 220. For example, theapproval request 212 sent be the user informationservice computing system 122 may indicate that the user information is being requested to complete a car loan. By providing thetransaction information 202 to theuser 102 via the user information circuit 106, theuser 102 can verify theentity 108 requested the user information for the correct transaction. Theapproval request 212 may also indicate to theuser 102 if any user information was requested that is not associated with theuser information database 132. - The user information
service computing system 122 receives a response to the approval request from theuser 102 viauser input 208 from the user information circuit 106 at 406. The response to the approval request indicates which user information has been approved by theuser 102 to share with theentity 108 that sentinformation request 204. Theuser 102 may approve all, part or none of the user information in theuser input 208. If theuser 102 does not approve any of the user information sought in theuser information request 204, themethod 400 may terminate. - If the
user 102 approves part or all of the user information,outgoing user information 210 is provided to theentity computing system 110 of theentity 108 that sent theinformation request 204 at 414. If theuser 102 has multiple pieces of the same type of user information (e.g., multiple accounts, two home addresses, etc.) the response may indicate which user information is to be shared (e.g., checking account, one of the home addresses, etc.) with theentity computing system 110 for a given type of user information. Alternatively, theuser 102 may choose to approve all pieces of the same type of user information with theuser input 208. Theuser 102 may approve the user information by checking a box next to the user information using a graphical user interface associated with the user information circuit 106. Theuser 102 may have to provide authorization to thesecurity circuit 136 in order to approve a piece of user information with high security. For example, if theuser 102 is approving the social security number associated with theuser 102, the user may have to provide authorization to thesecurity circuit 136. For example, theuser 102 may have to provide a password (e.g., phrase, number, alphanumeric sequence, etc.), a biometric (e.g., fingerprint, retina, etc.), etc. to the security circuit before theoutgoing user information 210 is authorized to be sent to theentity computing system 110. In some embodiments, all user information requires authorization, while higher level security information requires secondary authorization from thesecurity circuit 136. Other methods of selecting and approving information for approval are intended to fall within the scope of the present disclosure. - Instead of receiving an
information request 204 fromentity 108, the user informationservice computing system 122 may receive apotential transaction 206 fromuser 102 via the user information circuit 106 at 408. Alternatively, the user informationservice computing system 122 may receive the potential transaction from theentity computing system 110. Thepotential transaction 206 received from theentity computing system 110 by the user informationservice computing system 122 may contain information consistent with theinformation request 204 received at 402. However, in this case, theentity computing system 110 is not requesting any user information, theentity computing system 110 is simply providing the user informationservice computing system 122, and theuser 102, with an indication of what user information would be requested. - The user information
service computing system 122 receives selected user information from theuser 102 viauser input 208 from the user information circuit 106 at 410. If thepotential transaction 206 was received by the user informationservice computing system 122 from the user information circuit 106, thetransaction type database 134 may provide suggestions to theuser 102 of what user information may be involved in thepotential transaction 206. Theuser 102 can select relevant user information from the user information stored and managed by theuser information database 132, or add additional user information relevant to the potential transaction. Alternatively, if the potential transaction was sent by theentity computing system 110, theuser 102 may approve the user information, much like was done at 406. The selected user information may be stored in theuser information database 132 so the user information is accessible when theuser 102 is ready to complete a transaction. - When the
user 102 is ready to complete thepotential transaction 206, the user informationservice computing system 122 receives an entity selection at 412 fromuser input 208 from the user information circuit 106. Since thepotential transaction 206 may have been initiated by theuser 102 at 408, theentity 108 involved in the actual transaction may not be theentity 108 associated with thepotential transaction 206. If the potential transaction was initiated by theentity computing system 110, theentity 108 may be saved in theuser information database 132 with the user information for thepotential transaction 206. Theuser 102 may choose if theentity 108 that initiated the transaction should be saved with thepotential transaction 206 by provinguser input 208 via the user information circuit 106. If theentity 108 was saved with thepotential transaction 206, theuser 102 can selectentity 108 using the user information circuit 106. If no entity was saved with the potential transaction, theuser 102 may select an entity to complete the potential transaction by providinguser input 208 via the user information circuit 106. Theuser 102 may select an entity by providing the user informationservice computing system 122 with information about the entity (e.g., name, address, phone number, etc.) via the user information circuit 106. Alternatively, theuser 102 may select an entity by using a drop down list ofentities 108 associated with the user informationservice computing system 122 on a graphical user interface associated with the user information circuit 106. In another embodiment, theuser 102 may enter an entity identification number associated with theentity 108 and the user informationservice computing system 122 via the graphical user interface associated with the user information circuit 106. Theuser 102 may receive the entity identification number from theentity 108, or from a list provided to theuser 102 via the user information circuit 106 from the user informationservice computing system 122. Alternatively, theuser 102 may use the user computing device 104 to scan a barcode, QR code, or other symbol at theentity 108 to indicate theentity 108 selected to the user informationservice computing system 122. A more detailed method with regard to potential transactions can be seen with reference toFIG. 6 . - The user information
service computing system 122 provides the approvedoutgoing user information 210 to theentity computing system 110 of the selectedentity 108 at 414. Theoutgoing user information 210 may be provided to theentity computing system 110 in a number of ways. The user informationservice computing system 122 may provide theoutgoing user information 210 in an email to the entity computing system 110 (e.g., in a PDF document, etc.). Alternatively, the user informationservice computing system 122 may populate a form associated with theentity computing system 110 to provideoutgoing user information 210. In another embodiment, the user informationservice computing system 122 populates a database associated with the entity computing system 110 (e.g., user information database 118) to provideoutgoing user information 210. In some embodiments, theentity 108 may determine how user information is sent based on setting associated with an entity account with theuser information service 120. In other embodiments, the user informationservice computing system 122 determines how theoutgoing user information 210 is sent toentity computing system 110. In another embodiment, theoutgoing user information 210 is sent to theentity computing system 110 in different forms based on the level of security of theoutgoing user information 210 determined by thesecurity circuit 136. - The user information
service computing system 122 updates theoutgoing user information 210 for the transaction type at 416. The user informationservice computing system 122 may update thetransaction type database 134. Thetransaction type database 134 may maintain alloutgoing user information 210 requested for a plurality of transaction types. Thetransaction type database 134 may keep a single set of user information requested 210 for a given transaction type. Alternatively, thetransaction type database 134 keeps all user information requested for a given transaction type for all users associated with the user informationservice computing system 122. In this regard, thetransaction type database 134 may be adaptive and learn what user information is commonly requested for a given transaction type. This information may be used when determining if theinformation request 204 includes information not commonly requested, which will be described in greater detail with regard toFIG. 5 . - Referring now to
FIG. 5 , a flow diagram of amethod 500 of comparing a user information request from an entity is shown, according to an example embodiment. Themethod 500 is performed by the user informationservice computing system 122. Themethod 500 receives aninformation request 204 fromentity computing system 110 at 502, which may be substantially similar to process 402 ofmethod 400, compares theinformation request 204 to user information requests for the same transaction type and provides theentity computing system 110 with theoutgoing user information 210. - The user information
service computing system 122 compares theinformation request 204 to user information requests of similar transaction types at 504. The information stored in thetransaction type database 134 may also include the geographical location of theinformation request 204, in case different geographical locations (e.g., different states, etc.) have different protocols for user information requested for certain transactions. Additionally, thetransaction type database 134 may determine trends in the user information requested based on the dates of the information requests 204. The user informationservice computing system 122 may compare theinformation request 204 received at 502 to individual user information requests stored in thetransaction type database 134. Alternatively, the user informationservice computing system 122 may compare theinformation request 204 received at 502 to aninformation request 204 that is representative of all of the information requests 204 stored in thetransaction type database 134. - The user information
service computing system 122 determines if theinformation request 204 received at 502 is similar to other user information requests for similar transaction types at 506. The comparison may take into account the frequency of the user information requested. For example, if some type user information is always requested for the transaction type, and some type information is usually requested, these may both indicate a similar request and not cause thesecurity circuit 136 to flag theinformation request 204. However, if a particular type of user information is rarely or never requested for the transaction type, but appears in theinformation request 204 received at 502, theinformation request 204 may not be considered similar. If the user information requested is similar to the user information frequently requested for the transaction type,approval request 212 and acorresponding alert 216 is sent to the user information circuit 106 at 508.Process 508 may be substantially similar to process 404 ofmethod 400. If there are user information types that are not similar to the user information types frequently requested for the transaction type, processes 510-512 occurs. - The user information
service computing system 122 flags non-similar user information types in theinformation request 204 at 510. The user informationservice computing system 122 may use thesecurity circuit 136 to determine how to flag the user information that was determined inconsistent with frequently requested user information when compared with other user information requests for similar entity types using thetransaction type database 134. Thesecurity circuit 136 may have different levels of comparison that would cause user information to be flagged. For example, if a piece of information is sometimes requested, a first flag may be applied (e.g., a yellow flag, etc.). If a piece of information is rarely requested, a second flag may be applied (e.g., an orange flag, etc.). If a piece of information is never, or should never, be requested a third flag may be applied (e.g., a red flag, etc.). Alternatively, the information may be flagged based on a level of security associated with the user information. For example, the name ofuser 102 may have a low security level and therefore have one flag associated with the name, while the social security number of theuser 102 may have a high security level and therefore have a different flag associated with the social security number. In that regard, the user information requested that is inconsistent with the user information commonly requested may be flagged with a first, second, third, etc. flag based on the level of security of the user information. In some embodiments, a piece of user information may receive multiple sets of flags based on different criteria (e.g., frequency of request and level of security, etc.). - The user information
service computing system 122 sends a flaggedrequest 214 and acorresponding alert 216 to theuser 102 via the user information circuit 106 at 512. The flaggedrequest 214 indicates any information that was flagged by thesecurity circuit 136 at 510. The flaggedrequest 214 may also include information consistent with theapproval request 212 ofprocess 404 ofmethod 400, such astransaction information 220 and information indicating theentity 108 that sent theinformation request 204, in addition to the flagged user information. - The user information
service computing system 122 receives the user response to the request at 514 viauser input 208 from the user information circuit 106 regardless of whether or not theinformation request 204 received at 502 was similar to information requests of similar transaction types. The user informationservice computing system 122 sends the approvedoutgoing user information 210 to theentity computing system 110 at 516. Process 514-516 may be substantially similar toprocesses method 400, respectively. - Referring now to
FIG. 6 , a flow diagram of amethod 600 of preparing user information for a predictedtransaction 218 is shown according to an example embodiment. Themethod 600 is performed by user informationservice computing system 122. Themethod 600 predicts a transaction based on activity of theuser 102 and provides recommendation to theuser 102 based on the predictedtransaction 218. - The user information
service computing system 122 predicts a transaction of theuser 102 at 602. The user informationservice computing system 122 may monitor other software applications on the user computing device 104 and/or monitor website activity on the user computing device 104 to predict a potential transaction of theuser 102. Theprediction circuit 138 may be set with different transactions that could be completed and information that may be indicative of future transactions based on activity on the user computing device 104. For example, if theuser 102 is looking up homes or properties, theprediction circuit 138 may predict theuser 102 will be purchasing a home. Theprediction circuit 138 of the user informationservice computing system 122 may be set to only predict a transaction after a given set of activity is monitored. For example, theuser 102 may have to look at home and property listings multiple times in a given period of time before theprediction circuit 138 predicts the transaction to minimize the number of predictedtransactions 218 generated. - The user information
service computing system 122 sends the predicted transaction and acorresponding alert 216 to theuser 102 via the user information circuit 106 at 604. The user informationservice computing system 122 may send the predicted transaction to the user information circuit 106 as analert 216. The alert 216 may include the predictedtransaction 218 as well as information indicating how the user informationservice computing system 122 predicted the transaction. For example, the alert may say “We noticed you have been viewing houses for sale frequently, are you planning on purchasing a home?” Theuser 102 may respond to the alert viauser input 208 to the user information circuit 106. - The user information
service computing system 122 determines if theuser 102 confirmed the predictedtransaction 218 or not at 606. If theuser 102 indicates that the predictedtransaction 218 is not a transaction theuser 102 is planning on completing, the user informationservice computing system 122 may delete the predictedtransaction 218 at 608. Theprediction circuit 138 may also make note of the fact that theuser 102 is not planning on making the predictedtransaction 218 so as to minimize the chance of sending theuser 102 another alert 216 relating to a predictedtransaction 218 that is the same as a previously predicted transaction. If theuser 102 confirms viauser input 108 to the user information circuit 106 that the predictedtransaction 218 is a transaction theuser 102 plans on completing in the future, processes 610-614 may occur. - The user information
service computing system 122 analyzes the user information at 610. Analyzing the user information may include determining the user information that is likely to be needed for a given transaction type by thetransaction type database 134. Thetransaction type database 134 may determine different levels of user information. For example, thetransaction type database 134 may determine user information that will most likely be needed for the identified transaction type. Thetransaction type database 134 may also determine user information that may be needed, depending on theentity 108 that theuser 102 will be using to complete the transaction. Thetransaction type database 134 may use methods similar to those used when comparing the user information request to similar user information requests as described with respect toFIG. 5 , specifically process 504 of themethod 500. Analyzing the user information may also include comparing the user information needed for the transaction with the user information stored at theuser information database 132. The user informationservice computing system 122 may compare the user information determined at 610 to theuser information database 132 to determine if theuser information database 132 has all the user information needed for the predictedtransaction 218. Analyzing the user information may also include analyzing the content of the user information (e.g., financial information, etc.). Analyzing the content of the user information may provide the user informationservice computing system 122 with information regarding the likelihood of a successful transaction. For example, if the predictedtransaction 218 is buying a car, but theuser 102 does not have enough money saved for a down payment, analyzing the user information may indicate that theuser 102 should be saving more money. - The user information
service computing system 122 sends a predicted transaction recommendation and acorresponding alert 216 to theuser 102 via the user information circuit 106 at 612. The predicted transaction recommendation is a recommendation to theuser 102 based on the analysis of the user information at 610. The predicted transaction recommendation may include information relating to user information that is needed for the predicted transaction that theuser 102 currently does not have associated with the user informationservice computing system 122. Alternatively, or in addition, the predicted transaction recommendation may provide theuser 102 with information regarding improvements that could be made to the user information to increase the likelihood of a successful transaction. The user informationservice computing system 122 may provide theuser 102 with the alert 216 via the user information circuit 106 indicating the predicted transaction recommendation.Alert 216 may also be provided to theuser 102 via the user information circuit 106 by theuser information database 132 to remind theuser 102 to provide the user informationservice computing system 122 with user information that will be needed for the potential transaction if theuser 102 has not provided the user information needed in a set amount of time. The predicted transaction recommendation may also include recommendations for changes in the activity of theuser 102 in order to have a successful transaction when theuser 102 is ready to complete the predictedtransaction 218. For example, if the predicted transaction is buying a car, the predicted transaction recommendation may include financial recommendations to increase the likelihood that theuser 102 will be able to make car payments, information on the credit score of theuser 102 and how to improve the credit score to get better car loans, etc. - The user information
service computing system 122 sets the predicted transaction as a potential transaction at 614. Since theuser 102 has confirmed the predicted transaction is a transaction theuser 102 is thinking about completing, the user informationservice computing system 122, it is no longer a predicted transaction. - Referring now to
FIG. 7 , a flow diagram of amethod 700 of determining if theuser 102 has the user information ready for apotential transaction 206 is shown, according to an example embodiment. Themethod 700 is performed by the user informationservice computing system 122. Themethod 700 receives apotential transaction 206, determines if theuser 102 has the user information that will likely be need for thepotential transaction 206, and provides theentity computing system 110 with the approvedoutgoing user information 210. Alternatively, thepotential transaction 206 is received as a product ofmethod 600.Process 702 may be substantially similar to process 408 ofmethod 400. - The user information
service computing system 122 determines the user information needed for the transaction at 704, much likeprocess 610 ofmethod 600 when thetransaction type database 134 analyzes the transaction type to determine the type of user information that will likely be needed for thepotential transaction 206. However, unlikeprocess 610 ofmethod 600, the content of the user information is not analyzed to provide recommendations on changes in behavior. - The user information
service computing system 122 determines if theuser 102 has the user information determined at 704 for thepotential transaction 206 received at 702 at 706. Thetransaction type database 134 may compare the user information determined at 704 to information in theuser information database 132 to determine if theuser information database 132 has the user information that will likely be needed for thepotential transaction 206. If the user information that will likely be needed is in theuser information database 132, themethod 700 may proceed directly toprocess 712. If user information is needed and is not in theuser information database 132, processes 708-710 occur. - The user information
service computing system 122 alerts theuser 102 of the missing user information at 708. The user informationservice computing system 122 may provide theuser 102 with the alert 216 much likeprocess 612. The alert 216 is received by theuser 102 via the user information circuit 106 and indicates user information that was determined to be missing at 706. - The user information
service computing system 122 receivesincoming user information 202 at 710. Theincoming user information 202 is received from theuser 102 via the user information circuit 106 in response to the alert 216 notifying theuser 102 of user information that is missing.Process 710 may be substantially similar toprocess method 300. - The user information
service computing system 122 receives theuser 102 entity selection at 712. Theuser 102 entity selection is sent from the user information circuit 106 and indicates whichentity 108 theuser 102 has selected to complete thepotential transaction 206.Process 712 may be substantially similar to process 412 ofmethod 400. - The user information
service computing system 122 provides the approvedoutgoing user information 210 to theentity computing system 110 at 714. Theentity computing system 110 that receives the approvedoutgoing user information 210 is theentity computing system 110 associated with the entity selected at 712.Process 714 may be substantially similar to process 414 ofmethod 400. - By using the user information service to store and manage user information, individuals gain ease of access to user information. In addition, with all the user information stored in a single location, information is protected, accessible and easy to distribute. Oftentimes, when individuals are asked for user information, the individual must get the information from a variety of places. The individual may have some information stored at home in a safe, while other information is stored electronically. The individual may also have to reach out to other entities to get the information needed. This can be cumbersome for the individual, and cause delays in transactions the user would like to complete. In addition, once the individual obtains all the information, it has to be shared with the entity the individual is completing the transaction with. This process can be tedious and the individual may makes mistakes when providing large amount of information. By using the user information service, individuals can easily provide all the needed information to an entity to quickly, and accurately, complete a transaction.
- The embodiments described herein have been described with reference to drawings. The drawings illustrate certain details of specific embodiments that implement the systems, methods and programs described herein. However, describing the embodiments with drawings should not be construed as imposing on the disclosure any limitations that may be present in the drawings.
- It should be understood that no claim element herein is to be construed under the provisions of 35 U.S.C. § 112(f), unless the element is expressly recited using the phrase “means for.”
- As used herein, the term “circuit” may include hardware structured to execute the functions described herein. In some embodiments, each respective “circuit” may include machine-readable media for configuring the hardware to execute the functions described herein. The circuit may be embodied as one or more circuitry components including, but not limited to, processing circuitry, network interfaces, peripheral devices, input devices, output devices, sensors, etc. In some embodiments, a circuit may take the form of one or more analog circuits, electronic circuits (e.g., integrated circuits (IC), discrete circuits, system on a chip (SOCs) circuits, etc.), telecommunication circuits, hybrid circuits, and any other type of “circuit.” In this regard, the “circuit” may include any type of component for accomplishing or facilitating achievement of the operations described herein. For example, a circuit as described herein may include one or more transistors, logic gates (e.g., NAND, AND, NOR, OR, XOR, NOT, XNOR, etc.), resistors, multiplexers, registers, capacitors, inductors, diodes, wiring, and so on).
- The “circuit” may also include one or more processors communicatively coupled to one or more memory or memory devices. In this regard, the one or more processors may execute instructions stored in the memory or may execute instructions otherwise accessible to the one or more processors. In some embodiments, the one or more processors may be embodied in various ways. The one or more processors may be constructed in a manner sufficient to perform at least the operations described herein. In some embodiments, the one or more processors may be shared by multiple circuits (e.g., circuit A and circuit B may comprise or otherwise share the same processor which, in some example embodiments, may execute instructions stored, or otherwise accessed, via different areas of memory). Alternatively or additionally, the one or more processors may be structured to perform or otherwise execute certain operations independent of one or more co-processors. In other example embodiments, two or more processors may be coupled via a bus to enable independent, parallel, pipelined, or multi-threaded instruction execution. Each processor may be implemented as one or more general-purpose processors, application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), digital signal processors (DSPs), or other suitable electronic data processing components structured to execute instructions provided by memory. The one or more processors may take the form of a single core processor, multi-core processor (e.g., a dual core processor, triple core processor, quad core processor, etc.), microprocessor, etc. In some embodiments, the one or more processors may be external to the apparatus, for example the one or more processors may be a remote processor (e.g., a cloud based processor). Alternatively or additionally, the one or more processors may be internal and/or local to the apparatus. In this regard, a given circuit or components thereof may be disposed locally (e.g., as part of a local server, a local computing system, etc.) or remotely (e.g., as part of a remote server such as a cloud based server). To that end, a “circuit” as described herein may include components that are distributed across one or more locations.
- An exemplary system for implementing the overall system or portions of the embodiments might include a general purpose computing computers in the form of computers, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit. Each memory device may include non-transient volatile storage media, non-volatile storage media, non-transitory storage media (e.g., one or more volatile and/or non-volatile memories), etc. In some embodiments, the non-volatile media may take the form of ROM, flash memory (e.g., flash memory such as NAND, 3D NAND, NOR, 3D NOR, etc.), EEPROM, MRAM, magnetic storage, hard discs, optical discs, etc. In other embodiments, the volatile storage media may take the form of RAM, TRAM, ZRAM, etc. Combinations of the above are also included within the scope of machine-readable media. In this regard, machine-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions. Each respective memory device may be operable to maintain or otherwise store information relating to the operations performed by one or more associated circuits, including processor instructions and related data (e.g., database components, object code components, script components, etc.), in accordance with the example embodiments described herein.
- It should also be noted that the term “input devices,” as described herein, may include any type of input device including, but not limited to, a keyboard, a keypad, a mouse, joystick or other input devices performing a similar function. Comparatively, the term “output device,” as described herein, may include any type of output device including, but not limited to, a computer monitor, printer, facsimile machine, or other output devices performing a similar function.
- Any foregoing references to currency or funds are intended to include fiat currencies, non-fiat currencies (e.g., precious metals), and math-based currencies (often referred to as cryptocurrencies). Examples of math-based currencies include Bitcoin, Litecoin, Dogecoin, and the like.
- It should be noted that although the diagrams herein may show a specific order and composition of method steps, it is understood that the order of these steps may differ from what is depicted. For example, two or more steps may be performed concurrently or with partial concurrence. Also, some method steps that are performed as discrete steps may be combined, steps being performed as a combined step may be separated into discrete steps, the sequence of certain processes may be reversed or otherwise varied, and the nature or number of discrete processes may be altered or varied. The order or sequence of any element or apparatus may be varied or substituted according to alternative embodiments. Accordingly, all such modifications are intended to be included within the scope of the present disclosure as defined in the appended claims. Such variations will depend on the machine-readable media and hardware systems chosen and on designer choice. It is understood that all such variations are within the scope of the disclosure. Likewise, software and web implementations of the present disclosure could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various database searching steps, correlation steps, comparison steps and decision steps.
- The foregoing description of embodiments has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the disclosure to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from this disclosure. The embodiments were chosen and described in order to explain the principals of the disclosure and its practical application to enable one skilled in the art to utilize the various embodiments and with various modifications as are suited to the particular use contemplated. Other substitutions, modifications, changes and omissions may be made in the design, operating conditions and arrangement of the embodiments without departing from the scope of the present disclosure as expressed in the appended claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/244,662 US20230418918A1 (en) | 2015-12-29 | 2023-09-11 | User information gathering and distribution system |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562272422P | 2015-12-29 | 2015-12-29 | |
US15/385,035 US10817593B1 (en) | 2015-12-29 | 2016-12-20 | User information gathering and distribution system |
US17/079,095 US11755707B1 (en) | 2015-12-29 | 2020-10-23 | User information gathering and distribution system |
US18/244,662 US20230418918A1 (en) | 2015-12-29 | 2023-09-11 | User information gathering and distribution system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/079,095 Continuation US11755707B1 (en) | 2015-12-29 | 2020-10-23 | User information gathering and distribution system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20230418918A1 true US20230418918A1 (en) | 2023-12-28 |
Family
ID=72944795
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/385,035 Active 2037-08-24 US10817593B1 (en) | 2015-12-29 | 2016-12-20 | User information gathering and distribution system |
US17/079,095 Active 2037-07-03 US11755707B1 (en) | 2015-12-29 | 2020-10-23 | User information gathering and distribution system |
US18/244,662 Pending US20230418918A1 (en) | 2015-12-29 | 2023-09-11 | User information gathering and distribution system |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/385,035 Active 2037-08-24 US10817593B1 (en) | 2015-12-29 | 2016-12-20 | User information gathering and distribution system |
US17/079,095 Active 2037-07-03 US11755707B1 (en) | 2015-12-29 | 2020-10-23 | User information gathering and distribution system |
Country Status (1)
Country | Link |
---|---|
US (3) | US10817593B1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10951730B1 (en) * | 2017-08-09 | 2021-03-16 | Wells Fargo Bank, N.A. | Communication-based automated guidance |
CA3086531A1 (en) * | 2017-12-21 | 2019-06-27 | Taliware, Inc. | Blockchain network management implementing biometric based authentication of an individual |
WO2021214969A1 (en) * | 2020-04-24 | 2021-10-28 | 日本電気株式会社 | Authentication system, terminal, control method for terminal, and storage medium |
Citations (325)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4531023A (en) * | 1982-08-13 | 1985-07-23 | Hlf Corporation | Computer security system for a time shared computer accessed over telephone lines |
US5123047A (en) * | 1988-12-09 | 1992-06-16 | The Exchange System Limited Partnership | Method of updating encryption device monitor code in a multichannel data encryption system |
US5613012A (en) * | 1994-11-28 | 1997-03-18 | Smarttouch, Llc. | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US5764789A (en) * | 1994-11-28 | 1998-06-09 | Smarttouch, Llc | Tokenless biometric ATM access system |
US5781632A (en) * | 1995-02-08 | 1998-07-14 | Odom; Gregory Glen | Method and apparatus for secured transmission of confidential data over an unsecured network |
US5802199A (en) * | 1994-11-28 | 1998-09-01 | Smarttouch, Llc | Use sensitive identification system |
US5805719A (en) * | 1994-11-28 | 1998-09-08 | Smarttouch | Tokenless identification of individuals |
US5870723A (en) * | 1994-11-28 | 1999-02-09 | Pare, Jr.; David Ferrin | Tokenless biometric transaction authorization method and system |
US5892905A (en) * | 1996-12-23 | 1999-04-06 | International Business Machines Corporation | Computer apparatus and method for providing a common user interface for software applications accessed via the world-wide web |
US5983005A (en) * | 1996-05-09 | 1999-11-09 | Netcast Communications Corp. | Multicasting method and apparatus |
US6154879A (en) * | 1994-11-28 | 2000-11-28 | Smarttouch, Inc. | Tokenless biometric ATM access system |
US6233617B1 (en) * | 1997-02-26 | 2001-05-15 | Siebel Systems, Inc. | Determining the visibility to a remote database client |
US6275941B1 (en) * | 1997-03-28 | 2001-08-14 | Hiatchi, Ltd. | Security management method for network system |
US6307956B1 (en) * | 1998-04-07 | 2001-10-23 | Gerald R. Black | Writing implement for identity verification system |
US20010049785A1 (en) * | 2000-01-26 | 2001-12-06 | Kawan Joseph C. | System and method for user authentication |
US20020007453A1 (en) * | 2000-05-23 | 2002-01-17 | Nemovicher C. Kerry | Secured electronic mail system and method |
US20020026575A1 (en) * | 1998-11-09 | 2002-02-28 | Wheeler Lynn Henry | Account-based digital signature (ABDS) system |
US20020025062A1 (en) * | 1998-04-07 | 2002-02-28 | Black Gerald R. | Method for identity verification |
US20020035542A1 (en) * | 2000-09-15 | 2002-03-21 | Tumey David M. | Transaction authentication system utilizing a key with integrated biometric sensor |
US6366682B1 (en) * | 1994-11-28 | 2002-04-02 | Indivos Corporation | Tokenless electronic transaction system |
US20020054587A1 (en) * | 1997-09-26 | 2002-05-09 | Baker Thomas E. | Integrated customer web station for web based call management |
US6397198B1 (en) * | 1994-11-28 | 2002-05-28 | Indivos Corporation | Tokenless biometric electronic transactions using an audio signature to identify the transaction processor |
US20020073213A1 (en) * | 2000-10-13 | 2002-06-13 | Tsuyoshi Mekata | Apparatus for outputting individual authentication information |
US20020112177A1 (en) * | 2001-02-12 | 2002-08-15 | Voltmer William H. | Anonymous biometric authentication |
US20020184103A1 (en) * | 2001-05-31 | 2002-12-05 | Safwan Shah | Active transaction generation, processing, and routing system |
US20030014372A1 (en) * | 2000-08-04 | 2003-01-16 | Wheeler Lynn Henry | Trusted authentication digital signature (tads) system |
US20030023695A1 (en) * | 1999-02-26 | 2003-01-30 | Atabok Japan, Inc. | Modifying an electronic mail system to produce a secure delivery system |
US20030023874A1 (en) * | 2001-07-16 | 2003-01-30 | Rudy Prokupets | System for integrating security and access for facilities and information systems |
US20030026462A1 (en) * | 2001-08-02 | 2003-02-06 | Chung Kevin Kwong-Tai | Registration apparatus and method, as for voting |
US20030048173A1 (en) * | 2001-09-06 | 2003-03-13 | Satoshi Shigematsu | Authentication method, authentication system, and authentication token |
US20030056096A1 (en) * | 2001-04-18 | 2003-03-20 | Albert Roy David | Method and system for securely authenticating network access credentials for users |
US20030056092A1 (en) * | 2001-04-18 | 2003-03-20 | Edgett Jeff Steven | Method and system for associating a plurality of transaction data records generated in a service access system |
US20030061503A1 (en) * | 2001-09-27 | 2003-03-27 | Eyal Katz | Authentication for remote connections |
US20030065919A1 (en) * | 2001-04-18 | 2003-04-03 | Albert Roy David | Method and system for identifying a replay attack by an access device to a computer system |
US20030065626A1 (en) * | 2001-09-28 | 2003-04-03 | Allen Karl H. | User verification for conducting health-related transactions |
US20030097570A1 (en) * | 2000-08-04 | 2003-05-22 | First Data Corporation | Managing Database for Identifying to Recipients Security Features of Devices Generating Digital Signatures |
US20030097597A1 (en) * | 2001-11-16 | 2003-05-22 | Lewis John Ervin | System and method for password protecting a distribution list |
US20030101136A1 (en) * | 2000-08-04 | 2003-05-29 | First Data Corporation | Managing Account Database in ABDS System |
US20030105725A1 (en) * | 1994-11-28 | 2003-06-05 | Ned Hoffman | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US20030103653A1 (en) * | 2001-12-04 | 2003-06-05 | Yossi Avni | System for and method of web signature recognition system based on object map |
US20030115142A1 (en) * | 2001-12-12 | 2003-06-19 | Intel Corporation | Identity authentication portfolio system |
US20040019570A1 (en) * | 2000-06-16 | 2004-01-29 | International Business Machines Corporation | Business system and method using a distorted biometrics |
US6701378B1 (en) * | 1998-05-29 | 2004-03-02 | Research In Motion Limited | System and method for pushing information from a host system to a mobile data communication device |
US20040054911A1 (en) * | 2002-08-30 | 2004-03-18 | Sandeep Chennakeshu | Mobile terminal having virus resistant security module architecture |
US20040059952A1 (en) * | 2000-12-14 | 2004-03-25 | Peter Newport | Authentication system |
US20040059924A1 (en) * | 2002-07-03 | 2004-03-25 | Aurora Wireless Technologies, Ltd. | Biometric private key infrastructure |
US20040097217A1 (en) * | 2002-08-06 | 2004-05-20 | Mcclain Fred | System and method for providing authentication and authorization utilizing a personal wireless communication device |
US20040133778A1 (en) * | 2003-01-07 | 2004-07-08 | Masih Madani | Virtual pad |
US20040147265A1 (en) * | 2002-07-23 | 2004-07-29 | Mark Kelley | System and method for an adaptive user communications device |
US20040177073A1 (en) * | 2003-01-17 | 2004-09-09 | Harry Snyder | Executable application access management system |
US20040243832A1 (en) * | 2001-10-17 | 2004-12-02 | Saar Wilf | Verification of a person identifier received online |
US20040243856A1 (en) * | 2003-05-29 | 2004-12-02 | Will Shatford | Four factor authentication system and method |
US6836554B1 (en) * | 2000-06-16 | 2004-12-28 | International Business Machines Corporation | System and method for distorting a biometric for transactions with enhanced security and privacy |
US20050010786A1 (en) * | 2001-03-30 | 2005-01-13 | Michener John R. | Trusted authorization device |
US20050075973A1 (en) * | 2000-08-22 | 2005-04-07 | Siamack Yousofi | Validation of transactions |
US20050114713A1 (en) * | 2003-11-25 | 2005-05-26 | Shawn Beckman | Automated subscription and purchasing service for a data computing device |
US20050160052A1 (en) * | 2003-11-25 | 2005-07-21 | Schneider John K. | Biometric authorization method and system |
US20050180618A1 (en) * | 1999-02-10 | 2005-08-18 | Black Gerald R. | Method for identity verification |
US20050216824A1 (en) * | 1999-06-01 | 2005-09-29 | Hill Ferguson | Method and apparatus for configuring and establishing a secure credential-based network link between a client and a service over a data-packet-network |
US20050228887A1 (en) * | 2004-04-07 | 2005-10-13 | Ynjiun Wang | Routing device and method for use with a HTTP enabled computer peripheral |
US20050234833A1 (en) * | 2004-04-16 | 2005-10-20 | First Data Corporation | Methods and systems for online transaction processing |
US20050268345A1 (en) * | 2004-05-29 | 2005-12-01 | Harrison Robert B | Method and apparatus for providing temporary access to a network device |
US6980670B1 (en) * | 1998-02-09 | 2005-12-27 | Indivos Corporation | Biometric tokenless electronic rewards system and method |
US20050289058A1 (en) * | 1994-11-28 | 2005-12-29 | Ned Hoffman | System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse |
US20060005024A1 (en) * | 2004-06-16 | 2006-01-05 | Pccw-Hkt Datacom Services Limited | Dual-path pre-approval authentication method |
US6985887B1 (en) * | 1999-03-19 | 2006-01-10 | Suncrest Llc | Apparatus and method for authenticated multi-user personal information database |
US20060010487A1 (en) * | 2004-07-09 | 2006-01-12 | Fierer Robert G | System and method of verifying personal identities |
US6990588B1 (en) * | 1998-05-21 | 2006-01-24 | Yutaka Yasukura | Authentication card system |
US20060020793A1 (en) * | 2004-05-19 | 2006-01-26 | Computer Associates Think, Inc. | Method and system for authentication in a computer network |
US20060029261A1 (en) * | 1994-11-28 | 2006-02-09 | Ned Hoffman | Tokenless electronic transaction system |
US20060074986A1 (en) * | 2004-08-20 | 2006-04-06 | Viisage Technology, Inc. | Method and system to authenticate an object |
US20060090073A1 (en) * | 2004-04-27 | 2006-04-27 | Shira Steinberg | System and method of using human friendly representations of mathematical values and activity analysis to confirm authenticity |
US20060095780A1 (en) * | 2004-10-28 | 2006-05-04 | Hillis W D | System and method to facilitate importation of user profile data over a network |
US20060123092A1 (en) * | 2004-12-03 | 2006-06-08 | Madams Peter H | Architecture for general purpose trusted personal access system and methods therefor |
US20060143462A1 (en) * | 2002-07-02 | 2006-06-29 | Michael Jacobs | Storage and authentication of data transactions |
US7082415B1 (en) * | 2001-09-21 | 2006-07-25 | Biopay, Llc | System and method for biometrically-initiated refund transactions |
US20060165060A1 (en) * | 2005-01-21 | 2006-07-27 | Robin Dua | Method and apparatus for managing credentials through a wireless network |
US20060194592A1 (en) * | 2005-02-28 | 2006-08-31 | Research In Motion Limited | Method and system for enhanced security using location-based wireless authentication |
US20060206709A1 (en) * | 2002-08-08 | 2006-09-14 | Fujitsu Limited | Authentication services using mobile device |
US20060282528A1 (en) * | 2004-12-03 | 2006-12-14 | Madams Peter H C | Apparatus for executing an application function using a smart card and methods therefor |
US20060294387A1 (en) * | 2003-05-15 | 2006-12-28 | Mccracken Douglas W | Method of controlling access |
US20070011261A1 (en) * | 2004-12-03 | 2007-01-11 | Madams Peter H C | Apparatus for executing an application function using a mail link and methods therefor |
US20070050840A1 (en) * | 2005-07-29 | 2007-03-01 | Michael Grandcolas | Methods and systems for secure user authentication |
US20070061590A1 (en) * | 2005-09-13 | 2007-03-15 | Boye Dag E | Secure biometric authentication system |
US7210164B1 (en) * | 2002-05-30 | 2007-04-24 | Jandrell Louis H M | Method to remotely geolocate and activate or deactivate valuable equipment |
US20070118745A1 (en) * | 2005-11-16 | 2007-05-24 | Broadcom Corporation | Multi-factor authentication using a smartcard |
US20070198432A1 (en) * | 2001-01-19 | 2007-08-23 | Pitroda Satyan G | Transactional services |
US20070198436A1 (en) * | 2006-02-21 | 2007-08-23 | Weiss Kenneth P | Method and apparatus for secure access payment and identification |
US20070245158A1 (en) * | 2005-11-30 | 2007-10-18 | Giobbi John J | Single step transaction authentication using proximity and biometric input |
US7290288B2 (en) * | 1997-06-11 | 2007-10-30 | Prism Technologies, L.L.C. | Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network |
US20070253553A1 (en) * | 2004-07-12 | 2007-11-01 | Abdul Rahman Syed Ibrahim A H | System, Method of Generation and Use of Bilaterally Generated Variable Instant Passwords. |
US20070260544A1 (en) * | 2004-11-10 | 2007-11-08 | John Wankmueller | Method and system for performing a transaction using a dynamic authorization code |
US20070266439A1 (en) * | 2005-11-30 | 2007-11-15 | Harold Kraft | Privacy management and transaction system |
US20070289011A1 (en) * | 2003-12-23 | 2007-12-13 | Symbian Software Limited | Method for Secure Operation a Computing Device |
US20070291995A1 (en) * | 2006-06-09 | 2007-12-20 | Rivera Paul G | System, Method, and Apparatus for Preventing Identity Fraud Associated With Payment and Identity Cards |
US20080046988A1 (en) * | 2004-10-20 | 2008-02-21 | Salt Group Pty Ltd | Authentication Method |
US7349557B2 (en) * | 1998-06-19 | 2008-03-25 | Solidus Networks, Inc. | Electronic transaction verification system |
US20080120240A1 (en) * | 1995-02-13 | 2008-05-22 | Intertrust Tecnologies Corporation | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management |
US20080172382A1 (en) * | 2004-03-16 | 2008-07-17 | Michael Hugh Prettejohn | Security Component for Use With an Internet Browser Application and Method and Apparatus Associated Therewith |
US20080172341A1 (en) * | 2005-01-21 | 2008-07-17 | Innovative Inventions, Inc. | Methods For Authentication |
US7427033B1 (en) * | 2005-02-26 | 2008-09-23 | James Roskind | Time-varying security code for enabling authorizations and other uses of financial accounts |
US20080275748A1 (en) * | 2007-05-04 | 2008-11-06 | Michael Sasha John | Systems and methods for facilitating electronic transactions and deterring fraud |
US20080319915A1 (en) * | 1999-11-30 | 2008-12-25 | Russell David C | Biometric identification device and methods for secure transactions |
US20080320151A1 (en) * | 2002-10-30 | 2008-12-25 | Riverbed Technology, Inc. | Transaction accelerator for client-server communications systems |
US20090037978A1 (en) * | 2004-12-22 | 2009-02-05 | Merkatum Corporation | Self-adaptive multimodal biometric authentication method and system for performance thereof |
US20090049301A1 (en) * | 2007-08-08 | 2009-02-19 | Memory Experts International Inc. | Method of Providing Assured Transactions by Watermarked File Display Verification |
US20090055910A1 (en) * | 2007-08-20 | 2009-02-26 | Lee Mark C | System and methods for weak authentication data reinforcement |
US20090069050A1 (en) * | 2007-09-12 | 2009-03-12 | Devicefidelity, Inc. | Updating mobile devices with additional elements |
US20090106556A1 (en) * | 2007-10-19 | 2009-04-23 | Memory Experts International Inc. | Method of providing assured transactions using secure transaction appliance and watermark verification |
US20090119214A1 (en) * | 2007-10-22 | 2009-05-07 | Oberthur Technologies | Method and device for exchanging values between personal protable electronic entities |
US20090138405A1 (en) * | 2007-11-26 | 2009-05-28 | Biometry.Com Ag | System and method for performing secure online transactions |
US20090171850A1 (en) * | 2007-12-26 | 2009-07-02 | Microsoft Corporation | Transaction authentication platform using video |
US7565545B2 (en) * | 2003-02-19 | 2009-07-21 | International Business Machines Corporation | Method, system and program product for auditing electronic transactions based on biometric readings |
US20090189736A1 (en) * | 2005-03-23 | 2009-07-30 | Ihc Corporation | Authentication System |
US20090264070A1 (en) * | 2008-04-22 | 2009-10-22 | Soon Hock Lim | Data Communications Between Short-Range Enabled Wireless Devices Over Networks and Proximity Marketing to Such Devices |
US20090292641A1 (en) * | 2007-02-21 | 2009-11-26 | Weiss Kenneth P | Universal secure registry |
US20090294523A1 (en) * | 2005-01-03 | 2009-12-03 | Marano Robert F | Method, System and Device for Identification from Multiple Data Inputs |
US7631193B1 (en) * | 1994-11-28 | 2009-12-08 | Yt Acquisition Corporation | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US20100049659A1 (en) * | 2006-07-05 | 2010-02-25 | Jean Cassone | Method, device, server and system for identity authentication using biometrics |
US20100115583A1 (en) * | 2008-11-03 | 2010-05-06 | International Business Machines Corporation | Method for fault-tolerant user information authentication |
US20100180328A1 (en) * | 2007-06-26 | 2010-07-15 | Marks & Clerk, Llp | Authentication system and method |
US20100180327A1 (en) * | 2009-01-15 | 2010-07-15 | Sheets John F | Secure remote authentication through an untrusted network |
US20100229245A1 (en) * | 2009-03-05 | 2010-09-09 | Tara Chand Singhal | System of security that prevents abuse of identity data in global commerce via mobile wireless authorizations |
US20110006880A1 (en) * | 2009-07-09 | 2011-01-13 | Medtronic Minimed, Inc. | Fingerprint-linked control of a portable medical device |
US20110086616A1 (en) * | 2008-12-03 | 2011-04-14 | Entersect Technologies (Pty) Ltd | Secure Transaction Authentication |
US20110099112A1 (en) * | 2007-08-31 | 2011-04-28 | Mages Kenneth G | Apparatus and method for conducting securing financial transactions |
US20110185181A1 (en) * | 2010-01-27 | 2011-07-28 | Keypasco Ab | Network authentication method and device for implementing the same |
US20110207434A1 (en) * | 2008-11-06 | 2011-08-25 | Rozhkov Alexander Gennadievich | Transaction Verification Method, Automatic Transaction Verification System and Transaction Verification Unit (Variants) |
US20110219230A1 (en) * | 2010-03-03 | 2011-09-08 | Jon Oberheide | System and method of notifying mobile devices to complete transactions |
US20110224509A1 (en) * | 2010-03-12 | 2011-09-15 | Fish Gila | Secured personal data handling and management system |
US20110221568A1 (en) * | 2010-03-15 | 2011-09-15 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US20110238517A1 (en) * | 2010-03-23 | 2011-09-29 | Harsha Ramalingam | User Profile and Geolocation for Efficient Transactions |
US20110246817A1 (en) * | 2010-03-31 | 2011-10-06 | Security First Corp. | Systems and methods for securing data in motion |
US20110265149A1 (en) * | 2010-04-26 | 2011-10-27 | Hawk And Seal, Inc. | Secure and efficient login and transaction authentication using iphonestm and other smart mobile communication devices |
US20110270751A1 (en) * | 2009-12-14 | 2011-11-03 | Andrew Csinger | Electronic commerce system and system and method for establishing a trusted session |
US20110289092A1 (en) * | 2004-02-27 | 2011-11-24 | Ebay Inc. | Method and system to monitor a diverse heterogeneous application environment |
US20110302273A1 (en) * | 2002-04-22 | 2011-12-08 | International Business Machines Corporation | Efficient browser-based identity management providing personal control and anonymity |
US20120072353A1 (en) * | 2010-02-11 | 2012-03-22 | Christopher Boone | Enhanced system and method for multipath contactless transactions |
US20120079581A1 (en) * | 2010-09-24 | 2012-03-29 | Patterson Barbara E | Method and System Using Universal ID and Biometrics |
US20120110341A1 (en) * | 2010-11-02 | 2012-05-03 | Homayoon Beigi | Mobile Device Transaction Using Multi-Factor Authentication |
US20120124651A1 (en) * | 2009-11-02 | 2012-05-17 | Authentify, Inc. | Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iphones |
US20120131657A1 (en) * | 1999-03-19 | 2012-05-24 | Gold Standard Technology Llc | Apparatus and Method for Authenticated Multi-User Personal Information Database |
US8200980B1 (en) * | 2001-09-21 | 2012-06-12 | Open Invention Network, Llc | System and method for enrolling in a biometric system |
US20120240198A1 (en) * | 2012-03-21 | 2012-09-20 | Arctran Security Systems Ltd | Computerized authorization system and method |
US20120272056A1 (en) * | 2011-04-19 | 2012-10-25 | Hawk And Seal, Inc. | Key management using quasi out of band authentication architecture |
US20130007874A1 (en) * | 2011-06-28 | 2013-01-03 | Bank Of America Corporation | System and method for authenticating a user |
US20130013931A1 (en) * | 2011-03-07 | 2013-01-10 | Security First Corp. | Secure file sharing method and system |
US20130036370A1 (en) * | 2011-08-03 | 2013-02-07 | Avaya Inc. | Exclusion of selected data from access by collaborators |
US20130055346A1 (en) * | 2011-08-25 | 2013-02-28 | Alcatel-Lucent Usa Inc. | Event Driven Multi-Factor Authentications For Internet Transactions |
US20130061333A1 (en) * | 2011-09-07 | 2013-03-07 | Elwha LLC, a limited liability company of the State of Delaware | Computational systems and methods for verifying personal information during transactions |
US20130091172A1 (en) * | 2011-10-10 | 2013-04-11 | George Peter Kelesis | Journaling system with segregated data access |
US20130124292A1 (en) * | 2010-07-29 | 2013-05-16 | Nirmal Juthani | System and method for generating a strong multi factor personalized server key from a simple user password |
US20130130623A1 (en) * | 2010-05-20 | 2013-05-23 | Natural Security | Portable communication equipment, system and method for communicating between a local terminal and a plurality of portable equipment |
US20130145360A1 (en) * | 2011-11-16 | 2013-06-06 | Flextronics Ap, Llc | Vehicle application store for console |
US20130179681A1 (en) * | 2012-01-10 | 2013-07-11 | Jpmorgan Chase Bank, N.A. | System And Method For Device Registration And Authentication |
US20130185210A1 (en) * | 2011-10-21 | 2013-07-18 | The Board of Trustees of the Leland Stanford, Junior, University | Method and System for Making Digital Payments |
US20130198834A1 (en) * | 2012-01-18 | 2013-08-01 | OneID Inc. | Methods and systems for device disablement |
US20130212655A1 (en) * | 2006-10-02 | 2013-08-15 | Hector T. Hoyos | Efficient prevention fraud |
US20130251216A1 (en) * | 2012-03-23 | 2013-09-26 | Microsoft Corporation | Personal Identification Combining Proximity Sensing with Biometrics |
US20130268589A1 (en) * | 2012-04-04 | 2013-10-10 | Richard Torgersrud | Secure social network |
US20130282637A1 (en) * | 2012-04-24 | 2013-10-24 | Behaviometrics Ab | System and method for distinguishing human swipe input sequence behavior |
US20130282844A1 (en) * | 2012-04-23 | 2013-10-24 | Contact Solutions LLC | Apparatus and methods for multi-mode asynchronous communication |
US8577810B1 (en) * | 2011-09-29 | 2013-11-05 | Intuit Inc. | Secure mobile payment authorization |
US20130318580A1 (en) * | 2012-05-22 | 2013-11-28 | Verizon Patent And Licensing Inc. | Security based on usage activity associated with user device |
US20130333006A1 (en) * | 2012-06-07 | 2013-12-12 | Authentify, Inc. | Enterprise triggered 2chk association |
US20130332353A1 (en) * | 2012-06-08 | 2013-12-12 | American Express Travel Related Services Company, Inc. | System and method for using flexible circuitry in payment accessories |
US20140020089A1 (en) * | 2012-07-13 | 2014-01-16 | II Remo Peter Perini | Access Control System using Stimulus Evoked Cognitive Response |
US20140033273A1 (en) * | 2012-07-30 | 2014-01-30 | George Steven Rathbun | Automating calls between separate and distinct applications for invoking an identity verification function |
US8646060B1 (en) * | 2013-07-30 | 2014-02-04 | Mourad Ben Ayed | Method for adaptive authentication using a mobile device |
US20140040989A1 (en) * | 2011-09-24 | 2014-02-06 | Marc E. Davis | Multi-device behavioral fingerprinting |
US20140047560A1 (en) * | 2012-04-27 | 2014-02-13 | Intralinks, Inc. | Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment |
US20140075525A1 (en) * | 2011-03-30 | 2014-03-13 | Banque Accord | Strong authentication by presentation of the number |
US20140074658A1 (en) * | 2012-09-11 | 2014-03-13 | First Data Corporation | Systems and methods for facilitating item searching and linking transactions functionality in mobile commerce |
US20140074696A1 (en) * | 2012-09-07 | 2014-03-13 | Lawrence F. Glaser | Credit card form factor secure mobile computer and methods |
US20140088987A1 (en) * | 2005-02-25 | 2014-03-27 | Virtual Radiologic Corporation | Teleradiology image processing system |
US8713674B1 (en) * | 2010-12-17 | 2014-04-29 | Zscaler, Inc. | Systems and methods for excluding undesirable network transactions |
US20140143831A1 (en) * | 2012-04-27 | 2014-05-22 | Intralinks, Inc. | Computerized method and system for managing amendment voting in a networked secure collaborative exchange environment |
US20140149747A1 (en) * | 2002-07-19 | 2014-05-29 | Charles R. Bowers | Method and apparatus for managing confidential information |
US20140162598A1 (en) * | 2010-11-17 | 2014-06-12 | Antony-Euclid C. Villa-Real | Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true- personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions |
US20140165184A1 (en) * | 2012-12-12 | 2014-06-12 | Daniel H. Lange | Electro-Biometric Authentication |
US20140183269A1 (en) * | 2012-09-07 | 2014-07-03 | Lawrence F. Glaser | Communication device |
US20140201538A1 (en) * | 2011-01-27 | 2014-07-17 | Security First Corp. | Systems and methods for securing data |
US8793305B2 (en) * | 2007-12-13 | 2014-07-29 | Seven Networks, Inc. | Content delivery to a mobile device from a content service |
US20140237578A1 (en) * | 2011-09-30 | 2014-08-21 | Ioculi, Inc. | Location based augmented reality system for exchange of items based on location sensing methods and devices related thereto |
US20140244744A1 (en) * | 2013-02-26 | 2014-08-28 | Philip Scott Lyren | Exchanging personal information to determine a common interest |
US20140250128A1 (en) * | 2013-03-01 | 2014-09-04 | Ebay | System and method of selecting events or locations based on content |
US8838988B2 (en) * | 2011-04-12 | 2014-09-16 | International Business Machines Corporation | Verification of transactional integrity |
US20140279514A1 (en) * | 2013-03-14 | 2014-09-18 | Nuance Communications, Inc. | Pro-active identity verification for authentication of transaction initiated via non-voice channel |
US20140282978A1 (en) * | 2013-03-15 | 2014-09-18 | Sergio Demian LERNER | Method and apparatus for secure interaction with a computer service provider |
US20140283113A1 (en) * | 2013-03-15 | 2014-09-18 | Eyelock, Inc. | Efficient prevention of fraud |
US20140289867A1 (en) * | 2013-03-20 | 2014-09-25 | Dror Bukai | Automatic Learning Multi-Modal Fraud Prevention (LMFP) System |
US20140289790A1 (en) * | 2013-03-22 | 2014-09-25 | Brendon Wilson | System and method for adaptive application of authentication policies |
US20140289833A1 (en) * | 2013-03-22 | 2014-09-25 | Marc Briceno | Advanced authentication techniques and applications |
US20140310174A1 (en) * | 2011-05-13 | 2014-10-16 | Thomas W. Heeter | Methods for conducting electronic payment transactions with scannable codes |
US20140309789A1 (en) * | 2013-04-15 | 2014-10-16 | Flextronics Ap, Llc | Vehicle Location-Based Home Automation Triggers |
US20140306833A1 (en) * | 2012-03-14 | 2014-10-16 | Flextronics Ap, Llc | Providing Home Automation Information via Communication with a Vehicle |
US20140310786A1 (en) * | 2013-04-16 | 2014-10-16 | Imageware Systems, Inc. | Integrated interactive messaging and biometric enrollment, verification, and identification system |
US20140310075A1 (en) * | 2013-04-15 | 2014-10-16 | Flextronics Ap, Llc | Automatic Payment of Fees Based on Vehicle Location and User Detection |
US20140337243A1 (en) * | 2012-04-17 | 2014-11-13 | Zighra Inc. | Context-dependent authentication system, method and device |
US20140333415A1 (en) * | 2013-05-08 | 2014-11-13 | Jpmorgan Chase Bank, N.A. | Systems And Methods For High Fidelity Multi-Modal Out-Of-Band Biometric Authentication With Human Cross-Checking |
US20140337930A1 (en) * | 2013-05-13 | 2014-11-13 | Hoyos Labs Corp. | System and method for authorizing access to access-controlled environments |
US8902045B1 (en) * | 2011-12-23 | 2014-12-02 | Emc Corporation | Controlling access to a computerized resource based on authentication using pulse data |
US20140357295A1 (en) * | 2013-06-03 | 2014-12-04 | The Morey Corporation | Geospatial asset tracking systems, methods and apparatus for acquiring, manipulating and presenting telematic metadata |
US20140357187A1 (en) * | 2011-09-08 | 2014-12-04 | Yubico Inc. | Devices and Methods for Identification, Authentication and Signing Purposes |
US20140363058A1 (en) * | 2013-06-07 | 2014-12-11 | EyeD, LLC | Systems And Methods For Uniquely Identifying An Individual |
US8917826B2 (en) * | 2012-07-31 | 2014-12-23 | International Business Machines Corporation | Detecting man-in-the-middle attacks in electronic transactions using prompts |
US8918854B1 (en) * | 2010-07-15 | 2014-12-23 | Proxense, Llc | Proximity-based system for automatic application initialization |
US8923838B1 (en) * | 2004-08-19 | 2014-12-30 | Nuance Communications, Inc. | System, method and computer program product for activating a cellular phone account |
US20150033299A1 (en) * | 2013-07-23 | 2015-01-29 | Kaspersky Lab Zao | System and methods for ensuring confidentiality of information used during authentication and authorization operations |
US20150033305A1 (en) * | 2013-03-15 | 2015-01-29 | Advanced Elemental Technologies, Inc. | Methods and systems for secure and reliable identity-based computing |
US20150039315A1 (en) * | 2008-06-23 | 2015-02-05 | The John Nicholas Gross and Kristin Gross Trust U/A/D April 13, 2010 | System & Method for Controlling Access to Resources with a Spoken CAPTCHA Test |
US20150059003A1 (en) * | 2013-08-23 | 2015-02-26 | Morphotrust Usa, Llc | System and Method for Identity Management |
US20150058931A1 (en) * | 2013-08-23 | 2015-02-26 | Morphotrust Usa, Llc | System and Method for Identity Management |
US20150073987A1 (en) * | 2012-04-17 | 2015-03-12 | Zighra Inc. | Fraud detection system, method, and device |
US9002750B1 (en) * | 2005-12-09 | 2015-04-07 | Citicorp Credit Services, Inc. (Usa) | Methods and systems for secure user authentication |
US9009797B1 (en) * | 2008-06-13 | 2015-04-14 | West Corporation | MRCP resource access control mechanism for mobile devices |
US20150106195A1 (en) * | 2013-10-10 | 2015-04-16 | Elwha Llc | Methods, systems, and devices for handling inserted data into captured images |
US20150106949A1 (en) * | 2013-10-10 | 2015-04-16 | Elwha Llc | Devices, methods, and systems for managing representations of entities through use of privacy indicators |
US20150106288A1 (en) * | 2013-10-10 | 2015-04-16 | Elwha Llc | Devices, methods, and systems for managing representations of entities through use of privacy beacons |
US9032498B1 (en) * | 2014-05-25 | 2015-05-12 | Mourad Ben Ayed | Method for changing authentication for a legacy access interface |
US20150135300A1 (en) * | 2013-11-14 | 2015-05-14 | Intralinks, Inc. | Litigation support in cloud-hosted file sharing and collaboration |
US20150172257A1 (en) * | 2013-08-15 | 2015-06-18 | Teleperformance SA | Securely and efficiently transferring sensitive information via a telephone |
US9064376B1 (en) * | 2014-06-06 | 2015-06-23 | Aviel David Rubin | Utilization of multiple devices to secure online transactions |
US20150189505A1 (en) * | 2013-12-31 | 2015-07-02 | Vasco Data Security, Inc. | Method and apparatus for securing a mobile application |
US20150188891A1 (en) * | 2013-12-30 | 2015-07-02 | Vasco Data Security, Inc. | Authentication apparatus with a bluetooth interface |
US20150205957A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating between a legitimate user and a cyber-attacker |
US20150205944A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating among users based on platform configurations |
US20150203125A1 (en) * | 2011-04-22 | 2015-07-23 | Angel A. Penilla | Valet mode for restricted operation of a vehicle and cloud access of a history of use made during valet mode use |
US20150205955A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating among users based on responses to injected interferences |
US20150205958A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating among users based on user classification |
US20150210287A1 (en) * | 2011-04-22 | 2015-07-30 | Angel A. Penilla | Vehicles and vehicle systems for providing access to vehicle controls, functions, environment and applications to guests/passengers via mobile devices |
US20150213246A1 (en) * | 2010-11-29 | 2015-07-30 | Biocatch Ltd. | Method, device, and system of generating fraud-alerts for cyber-attacks |
US20150213251A1 (en) * | 2010-11-29 | 2015-07-30 | Biocatch Ltd. | Method, device, and system of protecting a log-in process of a computerized service |
US20150227938A1 (en) * | 2014-02-11 | 2015-08-13 | Mastercard International Incorporated | Transaction authorisations method and system |
US9111085B1 (en) * | 2012-09-21 | 2015-08-18 | Girling Kelly Design Group, LLC | Computer-implemented system and method for electronic personal identity verification |
US20150237045A1 (en) * | 2014-02-18 | 2015-08-20 | Werner Blessing | Method and system for enhanced biometric authentication |
US9119539B1 (en) * | 2011-12-23 | 2015-09-01 | Emc Corporation | Performing an authentication operation during user access to a computerized resource |
US20150249663A1 (en) * | 2011-09-23 | 2015-09-03 | Jerome Svigals | Security for the Internet Of Things |
US20150261948A1 (en) * | 2014-03-12 | 2015-09-17 | Cognitas Technologies, Inc. | Two-factor authentication methods and systems |
US20150271777A1 (en) * | 2014-03-22 | 2015-09-24 | Telmate, Llc | Mobile device-based community corrections supervision system |
US20150269946A1 (en) * | 2014-03-21 | 2015-09-24 | Wells Fargo Bank, N.A. | Fraud detection database |
US9148424B1 (en) * | 2015-03-13 | 2015-09-29 | Snapchat, Inc. | Systems and methods for IP-based intrusion detection |
US20150278820A1 (en) * | 2014-03-25 | 2015-10-01 | Mark Stephen Meadows | Systems and methods for executing cryptographically secure transactions using voice and natural language processing |
US20150286813A1 (en) * | 2014-04-04 | 2015-10-08 | Qualcomm Incorporated | Method and apparatus that facilitates a wearable identity manager |
US20150310188A1 (en) * | 2014-04-23 | 2015-10-29 | Intralinks, Inc. | Systems and methods of secure data exchange |
US20150319158A1 (en) * | 2014-05-05 | 2015-11-05 | Phillip Kumnick | System and method for token domain control |
US20150326559A1 (en) * | 2009-02-03 | 2015-11-12 | Inbay Technologies Inc. | Method and system for authorizing secure electronic transactions using a security device |
US20150326565A1 (en) * | 2009-02-03 | 2015-11-12 | Inbay Technologies Inc. | Method and system for authorizing secure electronic transactions using a security device having a quick response code scanner |
US20150332274A1 (en) * | 2012-12-20 | 2015-11-19 | Unicredit S.P.A. | Biometric recognition method with speed and security feature suitable for pos/atm applications |
US20150341370A1 (en) * | 2014-02-25 | 2015-11-26 | Sal Khan | Systems and methods relating to the authenticity and verification of photographic identity documents |
US20150347713A1 (en) * | 2012-12-03 | 2015-12-03 | Empire Technology Development Llc | Interactive adherence drug dispensing and communications platform |
US20150347734A1 (en) * | 2010-11-02 | 2015-12-03 | Homayoon Beigi | Access Control Through Multifactor Authentication with Multimodal Biometrics |
US20150356316A1 (en) * | 2014-06-04 | 2015-12-10 | Idscan Biometrics Limited | System, method and program for managing a repository of authenticated personal data |
US20150363986A1 (en) * | 2014-06-11 | 2015-12-17 | Hoyos Labs Corp. | System and method for facilitating user access to vehicles based on biometric information |
US20150381602A1 (en) * | 2011-10-25 | 2015-12-31 | Salesforce.Com, Inc. | Automated authorization response techniques |
US20150379488A1 (en) * | 2014-06-27 | 2015-12-31 | Clear Path Financial | Automated proactive electronic resource allocation processing system |
US20150382195A1 (en) * | 2011-10-25 | 2015-12-31 | Salesforce.Com, Inc. | Preemptive authorization automation |
US20150381664A1 (en) * | 2014-06-27 | 2015-12-31 | American Express Travel Related Services Company, Inc. | System and Method for Connectivity Contextual Services Local Online Experience |
US20150381633A1 (en) * | 2011-10-25 | 2015-12-31 | Salesforce.Com, Inc. | Automated authorization response techniques |
US20160006716A1 (en) * | 2014-07-01 | 2016-01-07 | Barabajagal, LLC | System and method for secure digital content delivery |
US20160028715A1 (en) * | 2014-06-23 | 2016-01-28 | The Toronto-Dominion Bank | Systems and methods for authenticating user identities in networked computer systems |
US20160036805A1 (en) * | 2010-01-27 | 2016-02-04 | Keypasco Ab | Network authentication method and device for implementing the same |
US20160036798A1 (en) * | 2014-08-04 | 2016-02-04 | Mobile Search Security LLC | Secure mobile contact system (smcs) |
US20160050199A1 (en) * | 2011-04-19 | 2016-02-18 | Authentify, Inc. | Key management using quasi out of band authentication architecture |
US20160050318A1 (en) * | 2014-08-18 | 2016-02-18 | Alibaba Group Holding Limited | Information exchange method and apparatus |
US20160055322A1 (en) * | 2010-05-06 | 2016-02-25 | John K. Thomas | Verification system for secure transmission in a distributed processing network |
US20160063235A1 (en) * | 2014-08-28 | 2016-03-03 | Kevin Alan Tussy | Facial Recognition Authentication System Including Path Parameters |
US20160065592A1 (en) * | 2011-09-23 | 2016-03-03 | Jerome Svigals | Internet Of Things Security |
US20160071390A1 (en) * | 2014-09-05 | 2016-03-10 | Vision Service Plan | System for monitoring individuals as they age in place |
US20160072800A1 (en) * | 2014-09-03 | 2016-03-10 | Nantomics, Llc | Synthetic genomic variant-based secure transaction devices, systems and methods |
US20160087952A1 (en) * | 2014-09-23 | 2016-03-24 | Qualcomm Incorporated | Scalable authentication process selection based upon sensor inputs |
US9300661B1 (en) * | 2014-06-30 | 2016-03-29 | Emc Corporation | Method, apparatus, and computer program product for determining whether to suspend authentication by an authentication device |
US20160109954A1 (en) * | 2014-05-16 | 2016-04-21 | Visa International Service Association | Gesture Recognition Cloud Command Platform, System, Method, and Apparatus |
US20160164880A1 (en) * | 2014-12-03 | 2016-06-09 | Bitdefender IPR Management Ltd. | Systems And Methods Of Transaction Authorization Using Server-Triggered Switching To An Integrity-Attested Virtual Machine |
US20160162900A1 (en) * | 2014-12-09 | 2016-06-09 | Zighra Inc. | Fraud detection system, method, and device |
US20160164958A1 (en) * | 2014-12-08 | 2016-06-09 | Ebay Inc | Delivering personalized content to authenticated user devices |
US20160165036A1 (en) * | 2014-12-07 | 2016-06-09 | Chon Hock LEOW | System and method of secure personal identification |
US20160164866A1 (en) * | 2014-12-09 | 2016-06-09 | Duo Security, Inc. | System and method for applying digital fingerprints in multi-factor authentication |
US20160171361A1 (en) * | 2014-12-10 | 2016-06-16 | Paypal, Inc. | Anti-skimming payment card |
US20160182503A1 (en) * | 2014-12-18 | 2016-06-23 | Sri International | Continuous authentication of mobile device users |
US20160189147A1 (en) * | 2012-12-07 | 2016-06-30 | Microsec Szamitastechnikai Fejleszto Zrt | Method And System For Authenticating A User |
US20160191511A1 (en) * | 2014-12-24 | 2016-06-30 | Paypal Inc. | Wearable device authentication |
US20160191514A1 (en) * | 2013-07-28 | 2016-06-30 | Eli Talmor | Secure transaction and access using insecure device |
US20160226862A1 (en) * | 2013-09-17 | 2016-08-04 | Sctechone Co., Ltd. | Wireless authentication system and wireless authentication method for one time password of mobile communication terminal having near field communication function |
US20160232339A1 (en) * | 2015-02-06 | 2016-08-11 | Qualcomm Incorporated | Apparatuses and methods for secure display on secondary display device |
US20160253675A1 (en) * | 2013-10-25 | 2016-09-01 | Christophe REMILLET | A method and a system for performing 3d-based identity verification of individuals with mobile devices |
US20160269181A1 (en) * | 2013-10-28 | 2016-09-15 | Singou Technology Ltd. | Method and Device for Information System Access Authentication |
US9449319B1 (en) * | 2008-06-30 | 2016-09-20 | Amazon Technologies, Inc. | Conducting transactions with dynamic passwords |
US9449180B2 (en) * | 1999-09-20 | 2016-09-20 | Security First Corp. | Secure data parser method and system |
US20160277412A1 (en) * | 2010-11-17 | 2016-09-22 | Invysta Technology Group | Methodology for identifying local/mobile client computing devices using a network based database containing records of hashed distinctive hardware, software, and user provided biometric makers for authorization of electronic transactions and right of entry to secure locations |
US9454526B1 (en) * | 2009-10-16 | 2016-09-27 | Iqor Holdings Inc., Iqor US Inc. | Apparatuses, methods and systems for a chart of accounts simplifier |
US9465368B1 (en) * | 2011-12-08 | 2016-10-11 | Navroop Pal Singh Mitter | Authentication system and method thereof |
US20160314462A1 (en) * | 2013-12-20 | 2016-10-27 | Secuve Co.,Ltd. | System and method for authentication using quick response code |
US20160337334A1 (en) * | 2014-01-16 | 2016-11-17 | Artz MURR | Device, system and method of mobile identity verification |
US20160335426A1 (en) * | 2014-01-21 | 2016-11-17 | Circurre Pty Ltd | Personal identification system and method |
US9509688B1 (en) * | 2013-03-13 | 2016-11-29 | EMC IP Holding Company LLC | Providing malicious identity profiles from failed authentication attempts involving biometrics |
US9516035B1 (en) * | 2012-03-20 | 2016-12-06 | United Services Automobile Association | Behavioral profiling method and system to authenticate a user |
US20160357954A1 (en) * | 2014-11-21 | 2016-12-08 | Evidian | Method for controlling access to a production system of a computer system not connected to an information system of said computer system |
US20160378417A1 (en) * | 2015-06-23 | 2016-12-29 | Airwatch, Llc | Collaboration Systems With Managed Screen Sharing |
US20170012951A1 (en) * | 2014-10-31 | 2017-01-12 | Vasco Data Security, Inc. | Multi-user strong authentication token |
US20170041296A1 (en) * | 2015-08-05 | 2017-02-09 | Intralinks, Inc. | Systems and methods of secure data exchange |
US20170048218A1 (en) * | 2014-05-02 | 2017-02-16 | Nok Nok Labs, Inc. | Enhanced security for registration of authentication devices |
US20170046560A1 (en) * | 2014-04-23 | 2017-02-16 | Signpass Ltd. | Methods and systems for signature analysis and authentication |
US20170063840A1 (en) * | 2015-08-24 | 2017-03-02 | Paypal, Inc. | Optimizing tokens for identity platforms |
US20170063550A1 (en) * | 2015-04-23 | 2017-03-02 | Keith J Brodie | Secure Digital Signature Apparatus and Methods |
US20170076280A1 (en) * | 2015-09-11 | 2017-03-16 | Bank Of America Corporation | Controlling Access to Data |
US20170091757A1 (en) * | 2015-09-30 | 2017-03-30 | Bank Of America Corporation | Tokenization provisioning and allocating system |
US20170103194A1 (en) * | 2014-05-30 | 2017-04-13 | Pcms Holdings, Inc. | Systems and methods for active authentication |
US20170103408A1 (en) * | 2015-10-09 | 2017-04-13 | VTU de Colombia S.A. | Coupon registration and validation system |
US9635011B1 (en) * | 2014-08-27 | 2017-04-25 | Jonetix Corporation | Encryption and decryption techniques using shuffle function |
US9639689B1 (en) * | 2013-12-23 | 2017-05-02 | EMC IP Holding Company LLC | User authentication |
US20170132643A1 (en) * | 2015-11-06 | 2017-05-11 | Mastercard International Incorporated | Systems and methods for mapping online data to data of interest |
US9654469B1 (en) * | 2014-05-02 | 2017-05-16 | Nok Nok Labs, Inc. | Web-based user authentication techniques and applications |
US20170148009A1 (en) * | 2015-11-20 | 2017-05-25 | Afirma Consulting & Technologies, S.L. | Dynamic multilayer security for internet mobile-related transactions |
US20170242961A1 (en) * | 2014-01-24 | 2017-08-24 | Indiscine, Llc | Systems and methods for personal omic transactions |
US20170318007A1 (en) * | 2014-10-30 | 2017-11-02 | Touch Networks Australia Pty Ltd | Identification system and method |
US20170337545A1 (en) * | 2014-11-07 | 2017-11-23 | Tendyron Corporation | Data interaction method and system |
US9887983B2 (en) * | 2013-10-29 | 2018-02-06 | Nok Nok Labs, Inc. | Apparatus and method for implementing composite authenticators |
US9906519B1 (en) * | 2015-04-28 | 2018-02-27 | Wells Fargo Bank, N.A. | Contextual and time sensitive out of band transactional signing |
US9954867B1 (en) * | 2015-12-15 | 2018-04-24 | Amazon Technologies, Inc. | Verification of credential reset |
US10075334B1 (en) * | 2012-04-11 | 2018-09-11 | Google Llc | Systems and methods for commissioning a smart hub device |
US10078743B1 (en) * | 2013-01-31 | 2018-09-18 | Narus, Inc. | Cross identification of users in cyber space and physical world |
US10592882B1 (en) * | 2014-12-31 | 2020-03-17 | Groupon, Inc. | Prescient and adaptive point-of-sale systems |
US10686781B1 (en) * | 2013-12-24 | 2020-06-16 | Affirm Inc. | System and method for passwordless logins |
US20210027295A1 (en) * | 2015-08-24 | 2021-01-28 | Jpmorgan Chase Bank, N.A. | System and method for implementing cardless authentication |
Family Cites Families (210)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5987132A (en) * | 1996-06-17 | 1999-11-16 | Verifone, Inc. | System, method and article of manufacture for conditionally accepting a payment method utilizing an extensible, flexible architecture |
US5850446A (en) * | 1996-06-17 | 1998-12-15 | Verifone, Inc. | System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible architecture |
US5978840A (en) * | 1996-09-26 | 1999-11-02 | Verifone, Inc. | System, method and article of manufacture for a payment gateway system architecture for processing encrypted payment transactions utilizing a multichannel, extensible, flexible architecture |
US6169789B1 (en) * | 1996-12-16 | 2001-01-02 | Sanjay K. Rao | Intelligent keyboard system |
US5996076A (en) * | 1997-02-19 | 1999-11-30 | Verifone, Inc. | System, method and article of manufacture for secure digital certification of electronic commerce |
US6233565B1 (en) * | 1998-02-13 | 2001-05-15 | Saranac Software, Inc. | Methods and apparatus for internet based financial transactions with evidence of payment |
US7100195B1 (en) * | 1999-07-30 | 2006-08-29 | Accenture Llp | Managing user information on an e-commerce system |
US20050108096A1 (en) * | 1999-09-28 | 2005-05-19 | Chameleon Network Inc. | Portable electronic authorization system and method |
US7236956B1 (en) * | 1999-10-18 | 2007-06-26 | Stamps.Com | Role assignments in a cryptographic module for secure processing of value-bearing items |
US6671818B1 (en) * | 1999-11-22 | 2003-12-30 | Accenture Llp | Problem isolation through translating and filtering events into a standard object format in a network based supply chain |
US6526125B1 (en) * | 1999-12-11 | 2003-02-25 | Lucent Technologies Inc. | System and method for automatic location identification discrepancy notification |
US7257581B1 (en) | 2000-08-04 | 2007-08-14 | Guardian Networks, Llc | Storage, management and distribution of consumer information |
US7206941B2 (en) * | 2000-08-28 | 2007-04-17 | Contentguard Holdings, Inc. | Method and apparatus for validating security components through a request for content |
US7743259B2 (en) * | 2000-08-28 | 2010-06-22 | Contentguard Holdings, Inc. | System and method for digital rights management using a standard rendering engine |
US20060074727A1 (en) * | 2000-09-07 | 2006-04-06 | Briere Daniel D | Method and apparatus for collection and dissemination of information over a computer network |
US8996698B1 (en) * | 2000-11-03 | 2015-03-31 | Truphone Limited | Cooperative network for mobile internet access |
US7343317B2 (en) * | 2001-01-18 | 2008-03-11 | Nokia Corporation | Real-time wireless e-coupon (promotion) definition based on available segment |
US7150037B2 (en) * | 2001-03-21 | 2006-12-12 | Intelliden, Inc. | Network configuration manager |
US20020143655A1 (en) * | 2001-04-02 | 2002-10-03 | Stephen Elston | Remote ordering system for mobile commerce |
US20030028427A1 (en) | 2001-08-02 | 2003-02-06 | International Business Machines Corporation | User control of electronic personal information while browsing the Web |
AU2002355530A1 (en) * | 2001-08-03 | 2003-02-24 | John Allen Ananian | Personalized interactive digital catalog profiling |
US7162451B2 (en) | 2001-11-30 | 2007-01-09 | International Business Machines Corporation | Information content distribution based on privacy and/or personal information |
US7627521B1 (en) * | 2002-01-15 | 2009-12-01 | Jpmorgan Chase Bank, N.A. | System and method for processing mircotransactions |
US7370356B1 (en) * | 2002-01-23 | 2008-05-06 | Symantec Corporation | Distributed network monitoring system and method |
WO2004017592A1 (en) * | 2002-08-19 | 2004-02-26 | Research In Motion Limited | System and method for secure control of resources of wireless mobile communication device |
US9105032B2 (en) * | 2007-05-03 | 2015-08-11 | Yellowpages.Com Llc | Systems and methods to provide advertisements for real time communications |
US20050086531A1 (en) * | 2003-10-20 | 2005-04-21 | Pss Systems, Inc. | Method and system for proxy approval of security changes for a file security system |
US20130179949A1 (en) * | 2004-01-22 | 2013-07-11 | Jpay, Inc. | Secure exchange of digital content |
US7280644B2 (en) * | 2004-12-07 | 2007-10-09 | Ewi Holdings, Inc. | Transaction processing platform for faciliating electronic distribution of plural prepaid services |
US8990254B2 (en) * | 2004-07-02 | 2015-03-24 | Ellie Mae, Inc. | Loan origination software system for processing mortgage loans over a distributed network |
US20110110568A1 (en) * | 2005-04-08 | 2011-05-12 | Gregory Vesper | Web enabled medical image repository |
US20140337503A1 (en) * | 2005-04-26 | 2014-11-13 | Guy Hefetz | Methods for acquiring an internet user's consent to be located |
US9401900B2 (en) * | 2005-07-01 | 2016-07-26 | Cirius Messaging Inc. | Secure electronic mail system with thread/conversation opt out |
US7870204B2 (en) * | 2005-07-01 | 2011-01-11 | 0733660 B.C. Ltd. | Electronic mail system with aggregation and integrated display of related messages |
US8688790B2 (en) * | 2005-07-01 | 2014-04-01 | Email2 Scp Solutions Inc. | Secure electronic mail system with for your eyes only features |
US8418233B1 (en) * | 2005-07-29 | 2013-04-09 | F5 Networks, Inc. | Rule based extensible authentication |
US9674145B2 (en) * | 2005-09-06 | 2017-06-06 | Daniel Chien | Evaluating a questionable network communication |
US9015090B2 (en) * | 2005-09-06 | 2015-04-21 | Daniel Chien | Evaluating a questionable network communication |
US8682795B2 (en) * | 2005-09-16 | 2014-03-25 | Oracle International Corporation | Trusted information exchange based on trust agreements |
US8458465B1 (en) * | 2005-11-16 | 2013-06-04 | AT&T Intellectual Property II, L. P. | Biometric authentication |
US7836303B2 (en) * | 2005-12-09 | 2010-11-16 | University Of Washington | Web browser operating system |
US20070150299A1 (en) * | 2005-12-22 | 2007-06-28 | Flory Clive F | Method, system, and apparatus for the management of the electronic files |
US8249965B2 (en) * | 2006-03-30 | 2012-08-21 | Obopay, Inc. | Member-supported mobile payment system |
US9195834B1 (en) * | 2007-03-19 | 2015-11-24 | Ravenwhite Inc. | Cloud authentication |
KR100842270B1 (en) * | 2006-12-04 | 2008-06-30 | 한국전자통신연구원 | Electric tag for privacy protection and method for privacy protection using the electric tag |
US8655939B2 (en) * | 2007-01-05 | 2014-02-18 | Digital Doors, Inc. | Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor |
US8126506B2 (en) * | 2007-02-14 | 2012-02-28 | Nuance Communications, Inc. | System and method for securely managing data stored on mobile devices, such as enterprise mobility data |
US20080209213A1 (en) * | 2007-02-23 | 2008-08-28 | Sony Ericsson Mobile Communications Ab | Authorizing secure resources |
US9003488B2 (en) * | 2007-06-06 | 2015-04-07 | Datavalet Technologies | System and method for remote device recognition at public hotspots |
US10523689B2 (en) * | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US8311513B1 (en) * | 2007-06-27 | 2012-11-13 | ENORCOM Corporation | Automated mobile system |
US20090043691A1 (en) | 2007-08-06 | 2009-02-12 | Sheldon Kasower | System and method for gathering, processing, authenticating and distributing personal information |
US8214291B2 (en) * | 2007-10-19 | 2012-07-03 | Ebay Inc. | Unified identity verification |
US8201229B2 (en) * | 2007-11-12 | 2012-06-12 | Bally Gaming, Inc. | User authorization system and methods |
US20090260064A1 (en) * | 2008-04-15 | 2009-10-15 | Problem Resolution Enterprise, Llc | Method and process for registering a device to verify transactions |
US8626115B2 (en) * | 2009-01-28 | 2014-01-07 | Headwater Partners I Llc | Wireless network service interfaces |
US8589541B2 (en) * | 2009-01-28 | 2013-11-19 | Headwater Partners I Llc | Device-assisted services for protecting network capacity |
US20100192170A1 (en) * | 2009-01-28 | 2010-07-29 | Gregory G. Raleigh | Device assisted service profile management with user preference, adaptive policy, network neutrality, and user privacy |
EP2151795A1 (en) * | 2008-08-08 | 2010-02-10 | France Telecom | Secure electronic coupon delivery to mobile device |
US8073778B2 (en) * | 2008-09-11 | 2011-12-06 | Linden Research, Inc. | Scalable distributed transaction manager for multi-host transactions |
US8146134B2 (en) * | 2008-10-28 | 2012-03-27 | Yahoo! Inc. | Scalable firewall policy management platform |
US8745213B2 (en) * | 2008-12-19 | 2014-06-03 | Openpeak Inc. | Managed services platform and method of operation of same |
US8364567B2 (en) * | 2008-12-29 | 2013-01-29 | Bank Of America Corporation | Secure platforms for financial transaction applications |
US8843997B1 (en) * | 2009-01-02 | 2014-09-23 | Resilient Network Systems, Inc. | Resilient trust network services |
US8162208B2 (en) * | 2009-01-23 | 2012-04-24 | HSBC Card Services Inc. | Systems and methods for user identification string generation for selection of a function |
US8793758B2 (en) * | 2009-01-28 | 2014-07-29 | Headwater Partners I Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US9578182B2 (en) * | 2009-01-28 | 2017-02-21 | Headwater Partners I Llc | Mobile device and service management |
US10019677B2 (en) * | 2009-11-20 | 2018-07-10 | Alert Enterprise, Inc. | Active policy enforcement |
US10027711B2 (en) * | 2009-11-20 | 2018-07-17 | Alert Enterprise, Inc. | Situational intelligence |
US8775245B2 (en) * | 2010-02-11 | 2014-07-08 | News America Marketing Properties, Llc | Secure coupon distribution |
US9270663B2 (en) * | 2010-04-30 | 2016-02-23 | T-Central, Inc. | System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added |
US9461996B2 (en) * | 2010-05-07 | 2016-10-04 | Citrix Systems, Inc. | Systems and methods for providing a single click access to enterprise, SAAS and cloud hosted application |
US8560610B2 (en) | 2010-06-16 | 2013-10-15 | Brighttag Inc. | Unified collection and distribution of data |
US9253288B2 (en) * | 2010-07-01 | 2016-02-02 | Ishai Binenstock | Location-aware mobile connectivity and information exchange system |
US20120066262A1 (en) | 2010-09-14 | 2012-03-15 | Greenberg David M | User-Controlled Management and Distribution of User Information |
US8661076B2 (en) * | 2010-09-23 | 2014-02-25 | Salesforce.Com, Inc. | Business networking information feed alerts |
US9552431B2 (en) * | 2010-11-24 | 2017-01-24 | Visa International Service Association | Unified online content manager apparatuses, methods, and systems |
US8498994B2 (en) * | 2010-12-03 | 2013-07-30 | Salesforce.Com, Inc. | Social files |
US8700524B2 (en) * | 2011-01-04 | 2014-04-15 | Boku, Inc. | Systems and methods to restrict payment transactions |
US9531758B2 (en) * | 2011-03-18 | 2016-12-27 | Zscaler, Inc. | Dynamic user identification and policy enforcement in cloud-based secure web gateways |
US9369433B1 (en) * | 2011-03-18 | 2016-06-14 | Zscaler, Inc. | Cloud based social networking policy and compliance systems and methods |
US20130006862A1 (en) * | 2011-07-03 | 2013-01-03 | Robert William Graham | System and Method of Controlling Transactions |
US8429068B1 (en) * | 2011-07-08 | 2013-04-23 | Intuit Inc. | Data aggregation for transaction banking partnerships |
US20130024910A1 (en) * | 2011-07-22 | 2013-01-24 | Salesforce.Com, Inc. | Computer implemented methods and apparatus for integrating a social network information feed with a network communications application |
US9591090B2 (en) * | 2011-08-22 | 2017-03-07 | Salesforce.Com, Inc. | Computer implemented methods and apparatus for sharing data of an information feed of an online social network |
US9178753B2 (en) * | 2011-08-31 | 2015-11-03 | Salesforce.Com, Inc. | Computer implemented methods and apparatus for providing access to an online social network |
US8726082B2 (en) * | 2011-09-02 | 2014-05-13 | Verizon Patent And Licensing Inc. | Method and system for providing incomplete action monitoring and service for data transactions |
US8869235B2 (en) * | 2011-10-11 | 2014-10-21 | Citrix Systems, Inc. | Secure mobile browser for protecting enterprise data |
US20140032733A1 (en) * | 2011-10-11 | 2014-01-30 | Citrix Systems, Inc. | Policy-Based Application Management |
US9330398B2 (en) * | 2011-11-04 | 2016-05-03 | At&T Intellectual Property I, L.P. | Internet protocol multi-media system value voucher distribution with network storage and redemption |
DE202012100620U1 (en) * | 2011-11-22 | 2012-06-13 | Square, Inc. | System for processing cardless payment transactions |
US9787681B2 (en) * | 2012-01-06 | 2017-10-10 | Optio Labs, Inc. | Systems and methods for enforcing access control policies on privileged accesses for mobile devices |
US8793804B2 (en) * | 2012-01-09 | 2014-07-29 | Ezshield, Inc. | Computer implemented method, computer system and nontransitory computer readable storage medium having HTTP module |
WO2013126713A1 (en) * | 2012-02-22 | 2013-08-29 | Pave, Inc. | Apparatuses, methods and systems for facilitating communities of social based investment |
US9143402B2 (en) | 2012-02-24 | 2015-09-22 | Qualcomm Incorporated | Sensor based configuration and control of network devices |
US9253176B2 (en) * | 2012-04-27 | 2016-02-02 | Intralinks, Inc. | Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment |
US20140304836A1 (en) * | 2012-04-27 | 2014-10-09 | Intralinks, Inc. | Digital rights management through virtual container partitioning |
US20140189483A1 (en) * | 2012-04-27 | 2014-07-03 | Intralinks, Inc. | Spreadsheet viewer facility |
US9553860B2 (en) * | 2012-04-27 | 2017-01-24 | Intralinks, Inc. | Email effectivity facility in a networked secure collaborative exchange environment |
US20140245015A1 (en) * | 2012-04-27 | 2014-08-28 | Intralinks, Inc. | Offline file access |
US9124419B2 (en) * | 2012-05-08 | 2015-09-01 | Discretix Technologies Ltd. | Method, device, and system of secure entry and handling of passwords |
EP2862128A4 (en) * | 2012-07-26 | 2015-10-21 | Bitlit Media Inc | Method, apparatus and system for electronically establishing ownership of a physical media carrier |
WO2014028510A2 (en) * | 2012-08-16 | 2014-02-20 | Kumar Himalesh Cherukuvada | System and method for secure transactions |
US9747388B2 (en) * | 2012-08-31 | 2017-08-29 | Salesforce.Com, Inc. | Systems and methods for providing access to external content objects |
US9990426B2 (en) * | 2012-08-31 | 2018-06-05 | Salesforce.Com, Inc. | Systems and methods for content management in an on-demand environment |
US20140089121A1 (en) * | 2012-09-26 | 2014-03-27 | Symbol Technologies, Inc. | Arrangement for and method of alerting a user to context-based transactional information under which products are to be transacted at a point-of-transaction site |
US20140109176A1 (en) * | 2012-10-15 | 2014-04-17 | Citrix Systems, Inc. | Configuring and providing profiles that manage execution of mobile applications |
CN104937586B (en) * | 2012-11-12 | 2019-11-01 | 伊诺卡姆公司 | The mobile system of automation |
US10102510B2 (en) | 2012-11-28 | 2018-10-16 | Hoverkey Ltd. | Method and system of conducting a cryptocurrency payment via a mobile device using a contactless token to store and protect a user's secret key |
US9445262B2 (en) * | 2012-12-10 | 2016-09-13 | Lg Uplus Corp. | Authentication server, mobile terminal and method for issuing radio frequency card key using authentication server and mobile terminal |
US9185078B2 (en) * | 2012-12-18 | 2015-11-10 | Salesforce.Com, Inc. | Systems, methods, and apparatuses for implementing cross organizational data sharing |
WO2014100489A2 (en) * | 2012-12-20 | 2014-06-26 | Airbiquity Inc. | Efficient headunit communication integration |
US9374369B2 (en) * | 2012-12-28 | 2016-06-21 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
US8787554B1 (en) * | 2013-01-11 | 2014-07-22 | American Express Travel Related Services Company, Inc. | System and method for a digital network for switching web service messages |
US9043240B2 (en) * | 2013-02-22 | 2015-05-26 | Mastercard International Incorporated | Systems, apparatus and methods for mobile companion prepaid card |
US9300645B1 (en) * | 2013-03-14 | 2016-03-29 | Ip Holdings, Inc. | Mobile IO input and output for smartphones, tablet, and wireless devices including touch screen, voice, pen, and gestures |
US10075384B2 (en) * | 2013-03-15 | 2018-09-11 | Advanced Elemental Technologies, Inc. | Purposeful computing |
US9378065B2 (en) * | 2013-03-15 | 2016-06-28 | Advanced Elemental Technologies, Inc. | Purposeful computing |
US9832205B2 (en) * | 2013-03-15 | 2017-11-28 | International Business Machines Corporation | Cross provider security management functionality within a cloud service brokerage platform |
US9904579B2 (en) * | 2013-03-15 | 2018-02-27 | Advanced Elemental Technologies, Inc. | Methods and systems for purposeful computing |
US8875235B1 (en) * | 2013-03-15 | 2014-10-28 | Rex Hakimian | Independent administering of verified user-controlled electronic identifications utilizing specifically programmed computer-implemented methods and computer systems |
US9898726B2 (en) * | 2013-03-28 | 2018-02-20 | Glory Global Solutions (International) Limited | Security system |
US20140310160A1 (en) * | 2013-04-11 | 2014-10-16 | Pawan Kumar | Alert System with Multiple Transaction Indicators |
US9495560B2 (en) * | 2013-04-29 | 2016-11-15 | Sri International | Polymorphic virtual appliance rule set |
US10872077B2 (en) | 2013-09-23 | 2020-12-22 | David D. Wright, SR. | Management of entitlements using blockchain |
WO2015061644A1 (en) * | 2013-10-25 | 2015-04-30 | The Regents Of The University Of Michigan | Controlling unregulated aggregation of mobile app usage |
US9203843B2 (en) * | 2013-11-08 | 2015-12-01 | At&T Mobility Ii Llc | Mobile device enabled tiered data exchange via a vehicle |
WO2015088986A1 (en) * | 2013-12-09 | 2015-06-18 | Sureclinical Inc. | System and method for high trust cloud digital signing and workflow automation in health sciences |
CA2899996C (en) * | 2013-12-11 | 2020-04-14 | Intralinks, Inc. | Customizable secure data exchange environment |
US20150188779A1 (en) * | 2013-12-31 | 2015-07-02 | Jut, Inc. | Split-application infrastructure |
US20160140331A1 (en) * | 2014-01-15 | 2016-05-19 | Michael Geronimo Perez | Method and system for biometric identification and verification |
US10497037B2 (en) | 2014-03-31 | 2019-12-03 | Monticello Enterprises LLC | System and method for managing cryptocurrency payments via the payment request API |
WO2015157295A1 (en) | 2014-04-08 | 2015-10-15 | Capital One Financial Corporation | Systems and methods for transacting at an atm using a mobile device |
US9781123B2 (en) * | 2014-04-25 | 2017-10-03 | Samsung Electronics Co., Ltd. | Methods of providing social network service and server performing the same |
US20150348032A1 (en) | 2014-05-30 | 2015-12-03 | Apple Inc. | Real time approval of digital store purchases for a shared content storage account |
WO2015199977A1 (en) * | 2014-06-27 | 2015-12-30 | Psi Systems, Inc. | Systems and methods providing payment transactions |
US9531714B2 (en) * | 2014-06-27 | 2016-12-27 | Citrix Systems, Inc. | Enterprise authentication via third party authentication support |
US10956907B2 (en) * | 2014-07-10 | 2021-03-23 | Datalogic Usa, Inc. | Authorization of transactions based on automated validation of customer speech |
US20160048700A1 (en) * | 2014-08-14 | 2016-02-18 | Nagravision S.A. | Securing personal information |
US20160072839A1 (en) * | 2014-09-05 | 2016-03-10 | Salesforce.Com, Inc. | Facilitating dynamic management of participating devices within a network in an on-demand services environment |
US9800615B2 (en) * | 2014-09-09 | 2017-10-24 | Bank Of America Corporation | Real-time security monitoring using cross-channel event processor |
KR102036758B1 (en) * | 2014-09-30 | 2019-10-28 | 사이트릭스 시스템스, 인크. | Fast smart card logon and federated full domain logon |
US9544307B2 (en) * | 2014-10-29 | 2017-01-10 | Salesforce.Com, Inc. | Providing a security mechanism on a mobile device |
US10027667B2 (en) * | 2014-11-12 | 2018-07-17 | Time Warner Cable Enterprises Llc | Methods and apparatus for provisioning services which require a device to be securely associated with an account |
US9838431B2 (en) * | 2014-11-28 | 2017-12-05 | International Business Machines Corporation | Context-based cloud security assurance system |
US9503451B1 (en) * | 2014-12-15 | 2016-11-22 | Amazon Technologies, Inc. | Compromised authentication information clearing house |
US9838384B1 (en) * | 2014-12-15 | 2017-12-05 | Amazon Technologies, Inc. | Password-based fraud detection |
US9998434B2 (en) * | 2015-01-26 | 2018-06-12 | Listat Ltd. | Secure dynamic communication network and protocol |
JP5956623B1 (en) * | 2015-01-30 | 2016-07-27 | 株式会社Pfu | system |
US9807086B2 (en) * | 2015-04-15 | 2017-10-31 | Citrix Systems, Inc. | Authentication of a client device based on entropy from a server or other device |
US10026082B2 (en) | 2015-05-21 | 2018-07-17 | Mastercard International Incorporated | Method and system for linkage of blockchain-based assets to fiat currency accounts |
US9870562B2 (en) | 2015-05-21 | 2018-01-16 | Mastercard International Incorporated | Method and system for integration of market exchange and issuer processing for blockchain-based transactions |
US20160342989A1 (en) | 2015-05-21 | 2016-11-24 | Mastercard International Incorporated | Method and system for processing blockchain-based transactions on existing payment networks |
US10963881B2 (en) | 2015-05-21 | 2021-03-30 | Mastercard International Incorporated | Method and system for fraud control of blockchain-based transactions |
US20160371697A1 (en) * | 2015-06-22 | 2016-12-22 | International Business Machines Corporation | Transaction fraud detection |
EP3317775B1 (en) | 2015-07-02 | 2022-02-16 | Nasdaq, Inc. | Systems and methods of secure provenance for distributed transaction databases |
GB201511964D0 (en) | 2015-07-08 | 2015-08-19 | Barclays Bank Plc | Secure digital data operations |
US10582001B2 (en) * | 2015-08-11 | 2020-03-03 | Oracle International Corporation | Asynchronous pre-caching of synchronously loaded resources |
US10402792B2 (en) | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
SG11201803010UA (en) | 2015-10-14 | 2018-05-30 | Cambridge Blockchain Llc | Systems and methods for managing digital identities |
US10255589B1 (en) * | 2015-10-23 | 2019-04-09 | Wells Fargo Bank, N.A. | Access controls for transfer transactions |
US20170132615A1 (en) | 2015-11-11 | 2017-05-11 | Bank Of America Corporation | Block chain alias for person-to-person payments |
CN106911641A (en) | 2015-12-23 | 2017-06-30 | 索尼公司 | For authorizing the client terminal device for accessing, server unit and access control system |
US10679215B2 (en) | 2016-02-22 | 2020-06-09 | Bank Of America Corporation | System for control of device identity and usage in a process data network |
EP3424177B1 (en) | 2016-02-29 | 2021-10-13 | SecureKey Technologies Inc. | Systems and methods for distributed identity verification |
US10643203B2 (en) | 2016-04-12 | 2020-05-05 | Digicash Pty Ltd. | Secure transaction controller for value token exchange systems |
US10521775B2 (en) | 2016-04-18 | 2019-12-31 | R3 Ltd. | Secure processing of electronic transactions by a decentralized, distributed ledger system |
US10333705B2 (en) | 2016-04-30 | 2019-06-25 | Civic Technologies, Inc. | Methods and apparatus for providing attestation of information using a centralized or distributed ledger |
WO2017190175A1 (en) | 2016-05-06 | 2017-11-09 | Othera Pty Ltd | Methods and systems for blockchain based "segmented risk based securities" |
US9635000B1 (en) | 2016-05-25 | 2017-04-25 | Sead Muftic | Blockchain identity management system based on public identities ledger |
US11227675B2 (en) | 2016-08-23 | 2022-01-18 | BBM Health LLC | Blockchain-based mechanisms for secure health information resource exchange |
US10282558B2 (en) | 2016-09-02 | 2019-05-07 | The Toronto-Dominion Bank | System and method for maintaining a segregated database in a multiple distributed ledger system |
US20180075421A1 (en) | 2016-09-09 | 2018-03-15 | BitPagos, Inc. | Loan processing service utilizing a distributed ledger digital asset as collateral |
US11651359B2 (en) | 2016-10-05 | 2023-05-16 | The Toronto-Dominion Bank | Distributed electronic ledger with metadata |
US20180343120A1 (en) | 2016-10-26 | 2018-11-29 | Black Gold Coin, Inc. | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features |
US20180114218A1 (en) | 2016-10-26 | 2018-04-26 | International Business Machines Corporation | Blockchain: automatic fork protection |
US20180130034A1 (en) | 2016-11-07 | 2018-05-10 | LedgerDomain, LLC | Extended blockchains for event tracking and management |
EP3563545B1 (en) | 2016-12-30 | 2024-07-17 | INTEL Corporation | Blockchains for securing iot devices |
US11797982B2 (en) | 2017-01-06 | 2023-10-24 | FirstBlood Technologies, Inc. | Digital ledger authentication using address encoding |
US20180247191A1 (en) | 2017-02-03 | 2018-08-30 | Milestone Entertainment Llc | Architectures, systems and methods for program defined entertainment state system, decentralized cryptocurrency system and system with segregated secure functions and public functions |
US10764259B2 (en) | 2017-02-07 | 2020-09-01 | Microsoft Technology Licensing, Llc | Transaction processing for consortium blockchain network |
US20200394652A1 (en) | 2017-03-08 | 2020-12-17 | Ip Oversight Corporation | A method for creating commodity assets from unrefined commodity reserves utilizing blockchain and distributed ledger technology |
WO2018170504A1 (en) | 2017-03-17 | 2018-09-20 | Labyrinth Research Llc | Unified control of privacy-impacting devices |
WO2018172439A1 (en) | 2017-03-22 | 2018-09-27 | NEC Laboratories Europe GmbH | Method for operating a blockchain |
US10102526B1 (en) | 2017-03-31 | 2018-10-16 | Vijay K. Madisetti | Method and system for blockchain-based combined identity, ownership, integrity and custody management |
US12026685B2 (en) | 2017-04-21 | 2024-07-02 | Blockdaemon Inc. | Method and apparatus for blockchain management |
US20180315055A1 (en) | 2017-05-01 | 2018-11-01 | International Business Machines Corporation | Blockchain For Issue/Defect Tracking System |
GB2576461A (en) | 2017-05-02 | 2020-02-19 | Luther Systems | Financial derivative contract execution platform, system and method |
US10657607B2 (en) | 2017-05-06 | 2020-05-19 | Adp, Llc | Implementation of payroll smart contract on a distributed ledger |
US10708070B2 (en) | 2017-05-24 | 2020-07-07 | Nxm Labs Canada Inc. | System and method for utilizing connected devices to enable secure and anonymous electronic interaction in a decentralized manner |
WO2018222797A1 (en) | 2017-06-02 | 2018-12-06 | Walmart Apollo, Llc | Systems and methods for product review management with distributed database |
CN117579281A (en) | 2017-06-02 | 2024-02-20 | 维萨国际服务协会 | Method and system for ownership verification using blockchain |
US20180349896A1 (en) | 2017-06-05 | 2018-12-06 | Mastercard International Incorporated | Method and system for anonymization of electronic transactions via blockchain |
EP3416334B1 (en) | 2017-06-15 | 2020-01-15 | Accenture Global Solutions Limited | Portable biometric identity on a distributed data storage layer |
US11922363B2 (en) | 2017-07-05 | 2024-03-05 | United Parcel Service Of America, Inc. | Counterparty physical proximity verification for digital asset transfers |
WO2019010392A1 (en) | 2017-07-07 | 2019-01-10 | Symbiont.Io, Inc. | Systems, methods, and devices for reducing and/or eliminating data leakage in electronic ledger technologies for trustless order matching |
SG11201913347TA (en) | 2017-07-07 | 2020-01-30 | Visa Int Service Ass | System, method, and apparatus for implementing a blockchain-based entity identification network |
EP3649593A4 (en) | 2017-07-07 | 2021-03-24 | Visa International Service Association | System, method, and apparatus for implementing a blockchain-based rewards network |
US20190020653A1 (en) | 2017-07-12 | 2019-01-17 | Averon Us, Inc. | Method and apparatus for secure cross-service content selection and delivery based on mobile device identity |
US10984134B2 (en) | 2017-07-14 | 2021-04-20 | Microsoft Technology Licensing, Llc | Blockchain system for leveraging member nodes to achieve consensus |
US10664797B2 (en) | 2017-07-19 | 2020-05-26 | Amazon Technologies, Inc. | Distributed ledger certification |
US10839379B2 (en) | 2017-07-20 | 2020-11-17 | Chicago Mercantile Exchange Inc. | Blockchain including linked digital assets |
US10055715B1 (en) | 2017-07-26 | 2018-08-21 | Square, Inc. | Cryptocurrency payment network |
US10829088B2 (en) | 2017-09-22 | 2020-11-10 | Sensormatic Electronics, LLC | Identity management for implementing vehicle access and operation management |
US20190034716A1 (en) | 2017-12-28 | 2019-01-31 | Intel Corporation | Privacy-preserving demographics identification |
US11288740B2 (en) | 2017-12-29 | 2022-03-29 | Intel Corporation | Securing distributed electronic wallet shares |
US11502841B2 (en) | 2018-03-07 | 2022-11-15 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
US11716320B2 (en) | 2018-03-27 | 2023-08-01 | Workday, Inc. | Digital credentials for primary factor authentication |
US11836721B2 (en) | 2018-06-29 | 2023-12-05 | Intel Corporation | Protection of information in an information exchange |
US11432149B1 (en) | 2019-10-10 | 2022-08-30 | Wells Fargo Bank, N.A. | Self-sovereign identification via digital credentials for selected identity attributes |
-
2016
- 2016-12-20 US US15/385,035 patent/US10817593B1/en active Active
-
2020
- 2020-10-23 US US17/079,095 patent/US11755707B1/en active Active
-
2023
- 2023-09-11 US US18/244,662 patent/US20230418918A1/en active Pending
Patent Citations (334)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4531023A (en) * | 1982-08-13 | 1985-07-23 | Hlf Corporation | Computer security system for a time shared computer accessed over telephone lines |
US5123047A (en) * | 1988-12-09 | 1992-06-16 | The Exchange System Limited Partnership | Method of updating encryption device monitor code in a multichannel data encryption system |
US6366682B1 (en) * | 1994-11-28 | 2002-04-02 | Indivos Corporation | Tokenless electronic transaction system |
US5613012A (en) * | 1994-11-28 | 1997-03-18 | Smarttouch, Llc. | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US20060029261A1 (en) * | 1994-11-28 | 2006-02-09 | Ned Hoffman | Tokenless electronic transaction system |
US5802199A (en) * | 1994-11-28 | 1998-09-01 | Smarttouch, Llc | Use sensitive identification system |
US5805719A (en) * | 1994-11-28 | 1998-09-08 | Smarttouch | Tokenless identification of individuals |
US5870723A (en) * | 1994-11-28 | 1999-02-09 | Pare, Jr.; David Ferrin | Tokenless biometric transaction authorization method and system |
US7606401B2 (en) * | 1994-11-28 | 2009-10-20 | Yt Acquisition Corporation | System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse |
US5764789A (en) * | 1994-11-28 | 1998-06-09 | Smarttouch, Llc | Tokenless biometric ATM access system |
US6154879A (en) * | 1994-11-28 | 2000-11-28 | Smarttouch, Inc. | Tokenless biometric ATM access system |
US6397198B1 (en) * | 1994-11-28 | 2002-05-28 | Indivos Corporation | Tokenless biometric electronic transactions using an audio signature to identify the transaction processor |
US20030105725A1 (en) * | 1994-11-28 | 2003-06-05 | Ned Hoffman | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US7631193B1 (en) * | 1994-11-28 | 2009-12-08 | Yt Acquisition Corporation | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US20050289058A1 (en) * | 1994-11-28 | 2005-12-29 | Ned Hoffman | System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse |
US5781632A (en) * | 1995-02-08 | 1998-07-14 | Odom; Gregory Glen | Method and apparatus for secured transmission of confidential data over an unsecured network |
US20080120240A1 (en) * | 1995-02-13 | 2008-05-22 | Intertrust Tecnologies Corporation | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management |
US5983005A (en) * | 1996-05-09 | 1999-11-09 | Netcast Communications Corp. | Multicasting method and apparatus |
US5892905A (en) * | 1996-12-23 | 1999-04-06 | International Business Machines Corporation | Computer apparatus and method for providing a common user interface for software applications accessed via the world-wide web |
US6233617B1 (en) * | 1997-02-26 | 2001-05-15 | Siebel Systems, Inc. | Determining the visibility to a remote database client |
US6275941B1 (en) * | 1997-03-28 | 2001-08-14 | Hiatchi, Ltd. | Security management method for network system |
US7290288B2 (en) * | 1997-06-11 | 2007-10-30 | Prism Technologies, L.L.C. | Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network |
US20020054587A1 (en) * | 1997-09-26 | 2002-05-09 | Baker Thomas E. | Integrated customer web station for web based call management |
US6980670B1 (en) * | 1998-02-09 | 2005-12-27 | Indivos Corporation | Biometric tokenless electronic rewards system and method |
US6307956B1 (en) * | 1998-04-07 | 2001-10-23 | Gerald R. Black | Writing implement for identity verification system |
US20020025062A1 (en) * | 1998-04-07 | 2002-02-28 | Black Gerald R. | Method for identity verification |
US6990588B1 (en) * | 1998-05-21 | 2006-01-24 | Yutaka Yasukura | Authentication card system |
US6701378B1 (en) * | 1998-05-29 | 2004-03-02 | Research In Motion Limited | System and method for pushing information from a host system to a mobile data communication device |
US7349557B2 (en) * | 1998-06-19 | 2008-03-25 | Solidus Networks, Inc. | Electronic transaction verification system |
US20020026575A1 (en) * | 1998-11-09 | 2002-02-28 | Wheeler Lynn Henry | Account-based digital signature (ABDS) system |
US20050180618A1 (en) * | 1999-02-10 | 2005-08-18 | Black Gerald R. | Method for identity verification |
US20030023695A1 (en) * | 1999-02-26 | 2003-01-30 | Atabok Japan, Inc. | Modifying an electronic mail system to produce a secure delivery system |
US20120131657A1 (en) * | 1999-03-19 | 2012-05-24 | Gold Standard Technology Llc | Apparatus and Method for Authenticated Multi-User Personal Information Database |
US6985887B1 (en) * | 1999-03-19 | 2006-01-10 | Suncrest Llc | Apparatus and method for authenticated multi-user personal information database |
US20050216824A1 (en) * | 1999-06-01 | 2005-09-29 | Hill Ferguson | Method and apparatus for configuring and establishing a secure credential-based network link between a client and a service over a data-packet-network |
US9449180B2 (en) * | 1999-09-20 | 2016-09-20 | Security First Corp. | Secure data parser method and system |
US20080319915A1 (en) * | 1999-11-30 | 2008-12-25 | Russell David C | Biometric identification device and methods for secure transactions |
US20010049785A1 (en) * | 2000-01-26 | 2001-12-06 | Kawan Joseph C. | System and method for user authentication |
US20020007453A1 (en) * | 2000-05-23 | 2002-01-17 | Nemovicher C. Kerry | Secured electronic mail system and method |
US6836554B1 (en) * | 2000-06-16 | 2004-12-28 | International Business Machines Corporation | System and method for distorting a biometric for transactions with enhanced security and privacy |
US20040019570A1 (en) * | 2000-06-16 | 2004-01-29 | International Business Machines Corporation | Business system and method using a distorted biometrics |
US20030101136A1 (en) * | 2000-08-04 | 2003-05-29 | First Data Corporation | Managing Account Database in ABDS System |
US20030014372A1 (en) * | 2000-08-04 | 2003-01-16 | Wheeler Lynn Henry | Trusted authentication digital signature (tads) system |
US20030097570A1 (en) * | 2000-08-04 | 2003-05-22 | First Data Corporation | Managing Database for Identifying to Recipients Security Features of Devices Generating Digital Signatures |
US20050075973A1 (en) * | 2000-08-22 | 2005-04-07 | Siamack Yousofi | Validation of transactions |
US20020035542A1 (en) * | 2000-09-15 | 2002-03-21 | Tumey David M. | Transaction authentication system utilizing a key with integrated biometric sensor |
US20020073213A1 (en) * | 2000-10-13 | 2002-06-13 | Tsuyoshi Mekata | Apparatus for outputting individual authentication information |
US20040059952A1 (en) * | 2000-12-14 | 2004-03-25 | Peter Newport | Authentication system |
US20070198432A1 (en) * | 2001-01-19 | 2007-08-23 | Pitroda Satyan G | Transactional services |
US8781923B2 (en) * | 2001-01-19 | 2014-07-15 | C-Sam, Inc. | Aggregating a user's transactions across a plurality of service institutions |
US20020112177A1 (en) * | 2001-02-12 | 2002-08-15 | Voltmer William H. | Anonymous biometric authentication |
US20050010786A1 (en) * | 2001-03-30 | 2005-01-13 | Michener John R. | Trusted authorization device |
US20030056092A1 (en) * | 2001-04-18 | 2003-03-20 | Edgett Jeff Steven | Method and system for associating a plurality of transaction data records generated in a service access system |
US20030056096A1 (en) * | 2001-04-18 | 2003-03-20 | Albert Roy David | Method and system for securely authenticating network access credentials for users |
US20030065919A1 (en) * | 2001-04-18 | 2003-04-03 | Albert Roy David | Method and system for identifying a replay attack by an access device to a computer system |
US20020184103A1 (en) * | 2001-05-31 | 2002-12-05 | Safwan Shah | Active transaction generation, processing, and routing system |
US20030023874A1 (en) * | 2001-07-16 | 2003-01-30 | Rudy Prokupets | System for integrating security and access for facilities and information systems |
US20030026462A1 (en) * | 2001-08-02 | 2003-02-06 | Chung Kevin Kwong-Tai | Registration apparatus and method, as for voting |
US20030048173A1 (en) * | 2001-09-06 | 2003-03-13 | Satoshi Shigematsu | Authentication method, authentication system, and authentication token |
US7367049B1 (en) * | 2001-09-21 | 2008-04-29 | Pay By Touch Checking Resources, Inc. | System and method for enrolling in a biometric system |
US8200980B1 (en) * | 2001-09-21 | 2012-06-12 | Open Invention Network, Llc | System and method for enrolling in a biometric system |
US7082415B1 (en) * | 2001-09-21 | 2006-07-25 | Biopay, Llc | System and method for biometrically-initiated refund transactions |
US20030061503A1 (en) * | 2001-09-27 | 2003-03-27 | Eyal Katz | Authentication for remote connections |
US20030065626A1 (en) * | 2001-09-28 | 2003-04-03 | Allen Karl H. | User verification for conducting health-related transactions |
US20040243832A1 (en) * | 2001-10-17 | 2004-12-02 | Saar Wilf | Verification of a person identifier received online |
US20030097597A1 (en) * | 2001-11-16 | 2003-05-22 | Lewis John Ervin | System and method for password protecting a distribution list |
US7793334B2 (en) * | 2001-11-16 | 2010-09-07 | At&T Mobility Ii Llc | System and method for password protecting a distribution list |
US20030103653A1 (en) * | 2001-12-04 | 2003-06-05 | Yossi Avni | System for and method of web signature recognition system based on object map |
US20030115142A1 (en) * | 2001-12-12 | 2003-06-19 | Intel Corporation | Identity authentication portfolio system |
US20110302273A1 (en) * | 2002-04-22 | 2011-12-08 | International Business Machines Corporation | Efficient browser-based identity management providing personal control and anonymity |
US7210164B1 (en) * | 2002-05-30 | 2007-04-24 | Jandrell Louis H M | Method to remotely geolocate and activate or deactivate valuable equipment |
US20060143462A1 (en) * | 2002-07-02 | 2006-06-29 | Michael Jacobs | Storage and authentication of data transactions |
US20040059924A1 (en) * | 2002-07-03 | 2004-03-25 | Aurora Wireless Technologies, Ltd. | Biometric private key infrastructure |
US20140149747A1 (en) * | 2002-07-19 | 2014-05-29 | Charles R. Bowers | Method and apparatus for managing confidential information |
US20040147265A1 (en) * | 2002-07-23 | 2004-07-29 | Mark Kelley | System and method for an adaptive user communications device |
US20040097217A1 (en) * | 2002-08-06 | 2004-05-20 | Mcclain Fred | System and method for providing authentication and authorization utilizing a personal wireless communication device |
US20060206709A1 (en) * | 2002-08-08 | 2006-09-14 | Fujitsu Limited | Authentication services using mobile device |
US20040054911A1 (en) * | 2002-08-30 | 2004-03-18 | Sandeep Chennakeshu | Mobile terminal having virus resistant security module architecture |
US20080320151A1 (en) * | 2002-10-30 | 2008-12-25 | Riverbed Technology, Inc. | Transaction accelerator for client-server communications systems |
US20040133778A1 (en) * | 2003-01-07 | 2004-07-08 | Masih Madani | Virtual pad |
US20040177073A1 (en) * | 2003-01-17 | 2004-09-09 | Harry Snyder | Executable application access management system |
US7565545B2 (en) * | 2003-02-19 | 2009-07-21 | International Business Machines Corporation | Method, system and program product for auditing electronic transactions based on biometric readings |
US20060294387A1 (en) * | 2003-05-15 | 2006-12-28 | Mccracken Douglas W | Method of controlling access |
US20040243856A1 (en) * | 2003-05-29 | 2004-12-02 | Will Shatford | Four factor authentication system and method |
US20050114713A1 (en) * | 2003-11-25 | 2005-05-26 | Shawn Beckman | Automated subscription and purchasing service for a data computing device |
US20050160052A1 (en) * | 2003-11-25 | 2005-07-21 | Schneider John K. | Biometric authorization method and system |
US20070289011A1 (en) * | 2003-12-23 | 2007-12-13 | Symbian Software Limited | Method for Secure Operation a Computing Device |
US20110289092A1 (en) * | 2004-02-27 | 2011-11-24 | Ebay Inc. | Method and system to monitor a diverse heterogeneous application environment |
US20080172382A1 (en) * | 2004-03-16 | 2008-07-17 | Michael Hugh Prettejohn | Security Component for Use With an Internet Browser Application and Method and Apparatus Associated Therewith |
US20050228887A1 (en) * | 2004-04-07 | 2005-10-13 | Ynjiun Wang | Routing device and method for use with a HTTP enabled computer peripheral |
US20050234833A1 (en) * | 2004-04-16 | 2005-10-20 | First Data Corporation | Methods and systems for online transaction processing |
US20060090073A1 (en) * | 2004-04-27 | 2006-04-27 | Shira Steinberg | System and method of using human friendly representations of mathematical values and activity analysis to confirm authenticity |
US20060020793A1 (en) * | 2004-05-19 | 2006-01-26 | Computer Associates Think, Inc. | Method and system for authentication in a computer network |
US20050268345A1 (en) * | 2004-05-29 | 2005-12-01 | Harrison Robert B | Method and apparatus for providing temporary access to a network device |
US20060005024A1 (en) * | 2004-06-16 | 2006-01-05 | Pccw-Hkt Datacom Services Limited | Dual-path pre-approval authentication method |
US20060010487A1 (en) * | 2004-07-09 | 2006-01-12 | Fierer Robert G | System and method of verifying personal identities |
US20070253553A1 (en) * | 2004-07-12 | 2007-11-01 | Abdul Rahman Syed Ibrahim A H | System, Method of Generation and Use of Bilaterally Generated Variable Instant Passwords. |
US8923838B1 (en) * | 2004-08-19 | 2014-12-30 | Nuance Communications, Inc. | System, method and computer program product for activating a cellular phone account |
US20060074986A1 (en) * | 2004-08-20 | 2006-04-06 | Viisage Technology, Inc. | Method and system to authenticate an object |
US20080046988A1 (en) * | 2004-10-20 | 2008-02-21 | Salt Group Pty Ltd | Authentication Method |
US20060095780A1 (en) * | 2004-10-28 | 2006-05-04 | Hillis W D | System and method to facilitate importation of user profile data over a network |
US20070260544A1 (en) * | 2004-11-10 | 2007-11-08 | John Wankmueller | Method and system for performing a transaction using a dynamic authorization code |
US20070011261A1 (en) * | 2004-12-03 | 2007-01-11 | Madams Peter H C | Apparatus for executing an application function using a mail link and methods therefor |
US20060123092A1 (en) * | 2004-12-03 | 2006-06-08 | Madams Peter H | Architecture for general purpose trusted personal access system and methods therefor |
US20060282528A1 (en) * | 2004-12-03 | 2006-12-14 | Madams Peter H C | Apparatus for executing an application function using a smart card and methods therefor |
US20090037978A1 (en) * | 2004-12-22 | 2009-02-05 | Merkatum Corporation | Self-adaptive multimodal biometric authentication method and system for performance thereof |
US20090294523A1 (en) * | 2005-01-03 | 2009-12-03 | Marano Robert F | Method, System and Device for Identification from Multiple Data Inputs |
US20080172341A1 (en) * | 2005-01-21 | 2008-07-17 | Innovative Inventions, Inc. | Methods For Authentication |
US20060165060A1 (en) * | 2005-01-21 | 2006-07-27 | Robin Dua | Method and apparatus for managing credentials through a wireless network |
US11403630B2 (en) * | 2005-01-21 | 2022-08-02 | Samsung Electronics Co., Ltd. | Method, apparatus, and system for performing wireless transactions with biometric authentication |
US20140088987A1 (en) * | 2005-02-25 | 2014-03-27 | Virtual Radiologic Corporation | Teleradiology image processing system |
US7427033B1 (en) * | 2005-02-26 | 2008-09-23 | James Roskind | Time-varying security code for enabling authorizations and other uses of financial accounts |
US20060194592A1 (en) * | 2005-02-28 | 2006-08-31 | Research In Motion Limited | Method and system for enhanced security using location-based wireless authentication |
US20090189736A1 (en) * | 2005-03-23 | 2009-07-30 | Ihc Corporation | Authentication System |
US20070050840A1 (en) * | 2005-07-29 | 2007-03-01 | Michael Grandcolas | Methods and systems for secure user authentication |
US20070061590A1 (en) * | 2005-09-13 | 2007-03-15 | Boye Dag E | Secure biometric authentication system |
US20070118745A1 (en) * | 2005-11-16 | 2007-05-24 | Broadcom Corporation | Multi-factor authentication using a smartcard |
US20070266439A1 (en) * | 2005-11-30 | 2007-11-15 | Harold Kraft | Privacy management and transaction system |
US20070245158A1 (en) * | 2005-11-30 | 2007-10-18 | Giobbi John J | Single step transaction authentication using proximity and biometric input |
US9002750B1 (en) * | 2005-12-09 | 2015-04-07 | Citicorp Credit Services, Inc. (Usa) | Methods and systems for secure user authentication |
US20070198436A1 (en) * | 2006-02-21 | 2007-08-23 | Weiss Kenneth P | Method and apparatus for secure access payment and identification |
US20070291995A1 (en) * | 2006-06-09 | 2007-12-20 | Rivera Paul G | System, Method, and Apparatus for Preventing Identity Fraud Associated With Payment and Identity Cards |
US20100049659A1 (en) * | 2006-07-05 | 2010-02-25 | Jean Cassone | Method, device, server and system for identity authentication using biometrics |
US20130212655A1 (en) * | 2006-10-02 | 2013-08-15 | Hector T. Hoyos | Efficient prevention fraud |
US20090292641A1 (en) * | 2007-02-21 | 2009-11-26 | Weiss Kenneth P | Universal secure registry |
US20080275748A1 (en) * | 2007-05-04 | 2008-11-06 | Michael Sasha John | Systems and methods for facilitating electronic transactions and deterring fraud |
US20100180328A1 (en) * | 2007-06-26 | 2010-07-15 | Marks & Clerk, Llp | Authentication system and method |
US20090049301A1 (en) * | 2007-08-08 | 2009-02-19 | Memory Experts International Inc. | Method of Providing Assured Transactions by Watermarked File Display Verification |
US20090055910A1 (en) * | 2007-08-20 | 2009-02-26 | Lee Mark C | System and methods for weak authentication data reinforcement |
US20110099112A1 (en) * | 2007-08-31 | 2011-04-28 | Mages Kenneth G | Apparatus and method for conducting securing financial transactions |
US20090070691A1 (en) * | 2007-09-12 | 2009-03-12 | Devicefidelity, Inc. | Presenting web pages through mobile host devices |
US20090069050A1 (en) * | 2007-09-12 | 2009-03-12 | Devicefidelity, Inc. | Updating mobile devices with additional elements |
US20090106556A1 (en) * | 2007-10-19 | 2009-04-23 | Memory Experts International Inc. | Method of providing assured transactions using secure transaction appliance and watermark verification |
US20090119214A1 (en) * | 2007-10-22 | 2009-05-07 | Oberthur Technologies | Method and device for exchanging values between personal protable electronic entities |
US20090138405A1 (en) * | 2007-11-26 | 2009-05-28 | Biometry.Com Ag | System and method for performing secure online transactions |
US8793305B2 (en) * | 2007-12-13 | 2014-07-29 | Seven Networks, Inc. | Content delivery to a mobile device from a content service |
US20090171850A1 (en) * | 2007-12-26 | 2009-07-02 | Microsoft Corporation | Transaction authentication platform using video |
US20090264070A1 (en) * | 2008-04-22 | 2009-10-22 | Soon Hock Lim | Data Communications Between Short-Range Enabled Wireless Devices Over Networks and Proximity Marketing to Such Devices |
US9009797B1 (en) * | 2008-06-13 | 2015-04-14 | West Corporation | MRCP resource access control mechanism for mobile devices |
US20150039315A1 (en) * | 2008-06-23 | 2015-02-05 | The John Nicholas Gross and Kristin Gross Trust U/A/D April 13, 2010 | System & Method for Controlling Access to Resources with a Spoken CAPTCHA Test |
US9449319B1 (en) * | 2008-06-30 | 2016-09-20 | Amazon Technologies, Inc. | Conducting transactions with dynamic passwords |
US20100115583A1 (en) * | 2008-11-03 | 2010-05-06 | International Business Machines Corporation | Method for fault-tolerant user information authentication |
US20110207434A1 (en) * | 2008-11-06 | 2011-08-25 | Rozhkov Alexander Gennadievich | Transaction Verification Method, Automatic Transaction Verification System and Transaction Verification Unit (Variants) |
US20110086616A1 (en) * | 2008-12-03 | 2011-04-14 | Entersect Technologies (Pty) Ltd | Secure Transaction Authentication |
US20100180327A1 (en) * | 2009-01-15 | 2010-07-15 | Sheets John F | Secure remote authentication through an untrusted network |
US20150326559A1 (en) * | 2009-02-03 | 2015-11-12 | Inbay Technologies Inc. | Method and system for authorizing secure electronic transactions using a security device |
US20150326565A1 (en) * | 2009-02-03 | 2015-11-12 | Inbay Technologies Inc. | Method and system for authorizing secure electronic transactions using a security device having a quick response code scanner |
US20100229245A1 (en) * | 2009-03-05 | 2010-09-09 | Tara Chand Singhal | System of security that prevents abuse of identity data in global commerce via mobile wireless authorizations |
US20110006880A1 (en) * | 2009-07-09 | 2011-01-13 | Medtronic Minimed, Inc. | Fingerprint-linked control of a portable medical device |
US9454526B1 (en) * | 2009-10-16 | 2016-09-27 | Iqor Holdings Inc., Iqor US Inc. | Apparatuses, methods and systems for a chart of accounts simplifier |
US20120124651A1 (en) * | 2009-11-02 | 2012-05-17 | Authentify, Inc. | Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iphones |
US20110270751A1 (en) * | 2009-12-14 | 2011-11-03 | Andrew Csinger | Electronic commerce system and system and method for establishing a trusted session |
US20160036805A1 (en) * | 2010-01-27 | 2016-02-04 | Keypasco Ab | Network authentication method and device for implementing the same |
US20110185181A1 (en) * | 2010-01-27 | 2011-07-28 | Keypasco Ab | Network authentication method and device for implementing the same |
US20120072353A1 (en) * | 2010-02-11 | 2012-03-22 | Christopher Boone | Enhanced system and method for multipath contactless transactions |
US20110219230A1 (en) * | 2010-03-03 | 2011-09-08 | Jon Oberheide | System and method of notifying mobile devices to complete transactions |
US20110224509A1 (en) * | 2010-03-12 | 2011-09-15 | Fish Gila | Secured personal data handling and management system |
US20110221568A1 (en) * | 2010-03-15 | 2011-09-15 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US20110238517A1 (en) * | 2010-03-23 | 2011-09-29 | Harsha Ramalingam | User Profile and Geolocation for Efficient Transactions |
US20110246817A1 (en) * | 2010-03-31 | 2011-10-06 | Security First Corp. | Systems and methods for securing data in motion |
US20110265149A1 (en) * | 2010-04-26 | 2011-10-27 | Hawk And Seal, Inc. | Secure and efficient login and transaction authentication using iphonestm and other smart mobile communication devices |
US20160055322A1 (en) * | 2010-05-06 | 2016-02-25 | John K. Thomas | Verification system for secure transmission in a distributed processing network |
US20130130623A1 (en) * | 2010-05-20 | 2013-05-23 | Natural Security | Portable communication equipment, system and method for communicating between a local terminal and a plurality of portable equipment |
US8918854B1 (en) * | 2010-07-15 | 2014-12-23 | Proxense, Llc | Proximity-based system for automatic application initialization |
US20130124292A1 (en) * | 2010-07-29 | 2013-05-16 | Nirmal Juthani | System and method for generating a strong multi factor personalized server key from a simple user password |
US20120079581A1 (en) * | 2010-09-24 | 2012-03-29 | Patterson Barbara E | Method and System Using Universal ID and Biometrics |
US20120110341A1 (en) * | 2010-11-02 | 2012-05-03 | Homayoon Beigi | Mobile Device Transaction Using Multi-Factor Authentication |
US20150347734A1 (en) * | 2010-11-02 | 2015-12-03 | Homayoon Beigi | Access Control Through Multifactor Authentication with Multimodal Biometrics |
US20160277412A1 (en) * | 2010-11-17 | 2016-09-22 | Invysta Technology Group | Methodology for identifying local/mobile client computing devices using a network based database containing records of hashed distinctive hardware, software, and user provided biometric makers for authorization of electronic transactions and right of entry to secure locations |
US20140162598A1 (en) * | 2010-11-17 | 2014-06-12 | Antony-Euclid C. Villa-Real | Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true- personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions |
US20150205944A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating among users based on platform configurations |
US20150205957A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating between a legitimate user and a cyber-attacker |
US20150205955A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating among users based on responses to injected interferences |
US20150213251A1 (en) * | 2010-11-29 | 2015-07-30 | Biocatch Ltd. | Method, device, and system of protecting a log-in process of a computerized service |
US20150213246A1 (en) * | 2010-11-29 | 2015-07-30 | Biocatch Ltd. | Method, device, and system of generating fraud-alerts for cyber-attacks |
US20150205958A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating among users based on user classification |
US8713674B1 (en) * | 2010-12-17 | 2014-04-29 | Zscaler, Inc. | Systems and methods for excluding undesirable network transactions |
US20140201538A1 (en) * | 2011-01-27 | 2014-07-17 | Security First Corp. | Systems and methods for securing data |
US20130013931A1 (en) * | 2011-03-07 | 2013-01-10 | Security First Corp. | Secure file sharing method and system |
US20140075525A1 (en) * | 2011-03-30 | 2014-03-13 | Banque Accord | Strong authentication by presentation of the number |
US8838988B2 (en) * | 2011-04-12 | 2014-09-16 | International Business Machines Corporation | Verification of transactional integrity |
US20120272056A1 (en) * | 2011-04-19 | 2012-10-25 | Hawk And Seal, Inc. | Key management using quasi out of band authentication architecture |
US20160050199A1 (en) * | 2011-04-19 | 2016-02-18 | Authentify, Inc. | Key management using quasi out of band authentication architecture |
US20150210287A1 (en) * | 2011-04-22 | 2015-07-30 | Angel A. Penilla | Vehicles and vehicle systems for providing access to vehicle controls, functions, environment and applications to guests/passengers via mobile devices |
US20150203125A1 (en) * | 2011-04-22 | 2015-07-23 | Angel A. Penilla | Valet mode for restricted operation of a vehicle and cloud access of a history of use made during valet mode use |
US20140310174A1 (en) * | 2011-05-13 | 2014-10-16 | Thomas W. Heeter | Methods for conducting electronic payment transactions with scannable codes |
US20130007874A1 (en) * | 2011-06-28 | 2013-01-03 | Bank Of America Corporation | System and method for authenticating a user |
US20130036370A1 (en) * | 2011-08-03 | 2013-02-07 | Avaya Inc. | Exclusion of selected data from access by collaborators |
US20130055346A1 (en) * | 2011-08-25 | 2013-02-28 | Alcatel-Lucent Usa Inc. | Event Driven Multi-Factor Authentications For Internet Transactions |
US20130061333A1 (en) * | 2011-09-07 | 2013-03-07 | Elwha LLC, a limited liability company of the State of Delaware | Computational systems and methods for verifying personal information during transactions |
US20140357187A1 (en) * | 2011-09-08 | 2014-12-04 | Yubico Inc. | Devices and Methods for Identification, Authentication and Signing Purposes |
US20150249663A1 (en) * | 2011-09-23 | 2015-09-03 | Jerome Svigals | Security for the Internet Of Things |
US20160065592A1 (en) * | 2011-09-23 | 2016-03-03 | Jerome Svigals | Internet Of Things Security |
US20140040989A1 (en) * | 2011-09-24 | 2014-02-06 | Marc E. Davis | Multi-device behavioral fingerprinting |
US8577810B1 (en) * | 2011-09-29 | 2013-11-05 | Intuit Inc. | Secure mobile payment authorization |
US20140237578A1 (en) * | 2011-09-30 | 2014-08-21 | Ioculi, Inc. | Location based augmented reality system for exchange of items based on location sensing methods and devices related thereto |
US20130091172A1 (en) * | 2011-10-10 | 2013-04-11 | George Peter Kelesis | Journaling system with segregated data access |
US20130185210A1 (en) * | 2011-10-21 | 2013-07-18 | The Board of Trustees of the Leland Stanford, Junior, University | Method and System for Making Digital Payments |
US20150381602A1 (en) * | 2011-10-25 | 2015-12-31 | Salesforce.Com, Inc. | Automated authorization response techniques |
US20150381633A1 (en) * | 2011-10-25 | 2015-12-31 | Salesforce.Com, Inc. | Automated authorization response techniques |
US20150382195A1 (en) * | 2011-10-25 | 2015-12-31 | Salesforce.Com, Inc. | Preemptive authorization automation |
US20130145360A1 (en) * | 2011-11-16 | 2013-06-06 | Flextronics Ap, Llc | Vehicle application store for console |
US9465368B1 (en) * | 2011-12-08 | 2016-10-11 | Navroop Pal Singh Mitter | Authentication system and method thereof |
US8902045B1 (en) * | 2011-12-23 | 2014-12-02 | Emc Corporation | Controlling access to a computerized resource based on authentication using pulse data |
US9119539B1 (en) * | 2011-12-23 | 2015-09-01 | Emc Corporation | Performing an authentication operation during user access to a computerized resource |
US20130179681A1 (en) * | 2012-01-10 | 2013-07-11 | Jpmorgan Chase Bank, N.A. | System And Method For Device Registration And Authentication |
US20130198834A1 (en) * | 2012-01-18 | 2013-08-01 | OneID Inc. | Methods and systems for device disablement |
US20140306833A1 (en) * | 2012-03-14 | 2014-10-16 | Flextronics Ap, Llc | Providing Home Automation Information via Communication with a Vehicle |
US9516035B1 (en) * | 2012-03-20 | 2016-12-06 | United Services Automobile Association | Behavioral profiling method and system to authenticate a user |
US20120240198A1 (en) * | 2012-03-21 | 2012-09-20 | Arctran Security Systems Ltd | Computerized authorization system and method |
US20130251216A1 (en) * | 2012-03-23 | 2013-09-26 | Microsoft Corporation | Personal Identification Combining Proximity Sensing with Biometrics |
US20130268589A1 (en) * | 2012-04-04 | 2013-10-10 | Richard Torgersrud | Secure social network |
US10075334B1 (en) * | 2012-04-11 | 2018-09-11 | Google Llc | Systems and methods for commissioning a smart hub device |
US20140337243A1 (en) * | 2012-04-17 | 2014-11-13 | Zighra Inc. | Context-dependent authentication system, method and device |
US20150073987A1 (en) * | 2012-04-17 | 2015-03-12 | Zighra Inc. | Fraud detection system, method, and device |
US20130282844A1 (en) * | 2012-04-23 | 2013-10-24 | Contact Solutions LLC | Apparatus and methods for multi-mode asynchronous communication |
US20130282637A1 (en) * | 2012-04-24 | 2013-10-24 | Behaviometrics Ab | System and method for distinguishing human swipe input sequence behavior |
US20140047560A1 (en) * | 2012-04-27 | 2014-02-13 | Intralinks, Inc. | Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment |
US20140143831A1 (en) * | 2012-04-27 | 2014-05-22 | Intralinks, Inc. | Computerized method and system for managing amendment voting in a networked secure collaborative exchange environment |
US20130318580A1 (en) * | 2012-05-22 | 2013-11-28 | Verizon Patent And Licensing Inc. | Security based on usage activity associated with user device |
US20130333006A1 (en) * | 2012-06-07 | 2013-12-12 | Authentify, Inc. | Enterprise triggered 2chk association |
US20130332353A1 (en) * | 2012-06-08 | 2013-12-12 | American Express Travel Related Services Company, Inc. | System and method for using flexible circuitry in payment accessories |
US20140020089A1 (en) * | 2012-07-13 | 2014-01-16 | II Remo Peter Perini | Access Control System using Stimulus Evoked Cognitive Response |
US20140033273A1 (en) * | 2012-07-30 | 2014-01-30 | George Steven Rathbun | Automating calls between separate and distinct applications for invoking an identity verification function |
US8917826B2 (en) * | 2012-07-31 | 2014-12-23 | International Business Machines Corporation | Detecting man-in-the-middle attacks in electronic transactions using prompts |
US20140074696A1 (en) * | 2012-09-07 | 2014-03-13 | Lawrence F. Glaser | Credit card form factor secure mobile computer and methods |
US20140183269A1 (en) * | 2012-09-07 | 2014-07-03 | Lawrence F. Glaser | Communication device |
US20140074658A1 (en) * | 2012-09-11 | 2014-03-13 | First Data Corporation | Systems and methods for facilitating item searching and linking transactions functionality in mobile commerce |
US9111085B1 (en) * | 2012-09-21 | 2015-08-18 | Girling Kelly Design Group, LLC | Computer-implemented system and method for electronic personal identity verification |
US20150347713A1 (en) * | 2012-12-03 | 2015-12-03 | Empire Technology Development Llc | Interactive adherence drug dispensing and communications platform |
US20160189147A1 (en) * | 2012-12-07 | 2016-06-30 | Microsec Szamitastechnikai Fejleszto Zrt | Method And System For Authenticating A User |
US20140165184A1 (en) * | 2012-12-12 | 2014-06-12 | Daniel H. Lange | Electro-Biometric Authentication |
US20150332274A1 (en) * | 2012-12-20 | 2015-11-19 | Unicredit S.P.A. | Biometric recognition method with speed and security feature suitable for pos/atm applications |
US10078743B1 (en) * | 2013-01-31 | 2018-09-18 | Narus, Inc. | Cross identification of users in cyber space and physical world |
US20140244744A1 (en) * | 2013-02-26 | 2014-08-28 | Philip Scott Lyren | Exchanging personal information to determine a common interest |
US20140250128A1 (en) * | 2013-03-01 | 2014-09-04 | Ebay | System and method of selecting events or locations based on content |
US9509688B1 (en) * | 2013-03-13 | 2016-11-29 | EMC IP Holding Company LLC | Providing malicious identity profiles from failed authentication attempts involving biometrics |
US20140279514A1 (en) * | 2013-03-14 | 2014-09-18 | Nuance Communications, Inc. | Pro-active identity verification for authentication of transaction initiated via non-voice channel |
US20140282978A1 (en) * | 2013-03-15 | 2014-09-18 | Sergio Demian LERNER | Method and apparatus for secure interaction with a computer service provider |
US20140283113A1 (en) * | 2013-03-15 | 2014-09-18 | Eyelock, Inc. | Efficient prevention of fraud |
US20150033305A1 (en) * | 2013-03-15 | 2015-01-29 | Advanced Elemental Technologies, Inc. | Methods and systems for secure and reliable identity-based computing |
US20140289867A1 (en) * | 2013-03-20 | 2014-09-25 | Dror Bukai | Automatic Learning Multi-Modal Fraud Prevention (LMFP) System |
US20140289833A1 (en) * | 2013-03-22 | 2014-09-25 | Marc Briceno | Advanced authentication techniques and applications |
US10176310B2 (en) * | 2013-03-22 | 2019-01-08 | Nok Nok Labs, Inc. | System and method for privacy-enhanced data synchronization |
US20140289790A1 (en) * | 2013-03-22 | 2014-09-25 | Brendon Wilson | System and method for adaptive application of authentication policies |
US20140309789A1 (en) * | 2013-04-15 | 2014-10-16 | Flextronics Ap, Llc | Vehicle Location-Based Home Automation Triggers |
US20140310075A1 (en) * | 2013-04-15 | 2014-10-16 | Flextronics Ap, Llc | Automatic Payment of Fees Based on Vehicle Location and User Detection |
US20140310786A1 (en) * | 2013-04-16 | 2014-10-16 | Imageware Systems, Inc. | Integrated interactive messaging and biometric enrollment, verification, and identification system |
US20140333415A1 (en) * | 2013-05-08 | 2014-11-13 | Jpmorgan Chase Bank, N.A. | Systems And Methods For High Fidelity Multi-Modal Out-Of-Band Biometric Authentication With Human Cross-Checking |
US20140337930A1 (en) * | 2013-05-13 | 2014-11-13 | Hoyos Labs Corp. | System and method for authorizing access to access-controlled environments |
US20140357295A1 (en) * | 2013-06-03 | 2014-12-04 | The Morey Corporation | Geospatial asset tracking systems, methods and apparatus for acquiring, manipulating and presenting telematic metadata |
US20140363058A1 (en) * | 2013-06-07 | 2014-12-11 | EyeD, LLC | Systems And Methods For Uniquely Identifying An Individual |
US20150033299A1 (en) * | 2013-07-23 | 2015-01-29 | Kaspersky Lab Zao | System and methods for ensuring confidentiality of information used during authentication and authorization operations |
US20160191514A1 (en) * | 2013-07-28 | 2016-06-30 | Eli Talmor | Secure transaction and access using insecure device |
US8646060B1 (en) * | 2013-07-30 | 2014-02-04 | Mourad Ben Ayed | Method for adaptive authentication using a mobile device |
US20150172257A1 (en) * | 2013-08-15 | 2015-06-18 | Teleperformance SA | Securely and efficiently transferring sensitive information via a telephone |
US20150058931A1 (en) * | 2013-08-23 | 2015-02-26 | Morphotrust Usa, Llc | System and Method for Identity Management |
US20150059003A1 (en) * | 2013-08-23 | 2015-02-26 | Morphotrust Usa, Llc | System and Method for Identity Management |
US20160226862A1 (en) * | 2013-09-17 | 2016-08-04 | Sctechone Co., Ltd. | Wireless authentication system and wireless authentication method for one time password of mobile communication terminal having near field communication function |
US20150106949A1 (en) * | 2013-10-10 | 2015-04-16 | Elwha Llc | Devices, methods, and systems for managing representations of entities through use of privacy indicators |
US20150106288A1 (en) * | 2013-10-10 | 2015-04-16 | Elwha Llc | Devices, methods, and systems for managing representations of entities through use of privacy beacons |
US20150106195A1 (en) * | 2013-10-10 | 2015-04-16 | Elwha Llc | Methods, systems, and devices for handling inserted data into captured images |
US20160253675A1 (en) * | 2013-10-25 | 2016-09-01 | Christophe REMILLET | A method and a system for performing 3d-based identity verification of individuals with mobile devices |
US20160269181A1 (en) * | 2013-10-28 | 2016-09-15 | Singou Technology Ltd. | Method and Device for Information System Access Authentication |
US9887983B2 (en) * | 2013-10-29 | 2018-02-06 | Nok Nok Labs, Inc. | Apparatus and method for implementing composite authenticators |
US20150135300A1 (en) * | 2013-11-14 | 2015-05-14 | Intralinks, Inc. | Litigation support in cloud-hosted file sharing and collaboration |
US20160314462A1 (en) * | 2013-12-20 | 2016-10-27 | Secuve Co.,Ltd. | System and method for authentication using quick response code |
US9639689B1 (en) * | 2013-12-23 | 2017-05-02 | EMC IP Holding Company LLC | User authentication |
US10686781B1 (en) * | 2013-12-24 | 2020-06-16 | Affirm Inc. | System and method for passwordless logins |
US20150188891A1 (en) * | 2013-12-30 | 2015-07-02 | Vasco Data Security, Inc. | Authentication apparatus with a bluetooth interface |
US20150189505A1 (en) * | 2013-12-31 | 2015-07-02 | Vasco Data Security, Inc. | Method and apparatus for securing a mobile application |
US20160337334A1 (en) * | 2014-01-16 | 2016-11-17 | Artz MURR | Device, system and method of mobile identity verification |
US20160335426A1 (en) * | 2014-01-21 | 2016-11-17 | Circurre Pty Ltd | Personal identification system and method |
US20170242961A1 (en) * | 2014-01-24 | 2017-08-24 | Indiscine, Llc | Systems and methods for personal omic transactions |
US20150227938A1 (en) * | 2014-02-11 | 2015-08-13 | Mastercard International Incorporated | Transaction authorisations method and system |
US20150237045A1 (en) * | 2014-02-18 | 2015-08-20 | Werner Blessing | Method and system for enhanced biometric authentication |
US20150341370A1 (en) * | 2014-02-25 | 2015-11-26 | Sal Khan | Systems and methods relating to the authenticity and verification of photographic identity documents |
US20150261948A1 (en) * | 2014-03-12 | 2015-09-17 | Cognitas Technologies, Inc. | Two-factor authentication methods and systems |
US20150269946A1 (en) * | 2014-03-21 | 2015-09-24 | Wells Fargo Bank, N.A. | Fraud detection database |
US20150271777A1 (en) * | 2014-03-22 | 2015-09-24 | Telmate, Llc | Mobile device-based community corrections supervision system |
US20150278820A1 (en) * | 2014-03-25 | 2015-10-01 | Mark Stephen Meadows | Systems and methods for executing cryptographically secure transactions using voice and natural language processing |
US20150286813A1 (en) * | 2014-04-04 | 2015-10-08 | Qualcomm Incorporated | Method and apparatus that facilitates a wearable identity manager |
US20150310188A1 (en) * | 2014-04-23 | 2015-10-29 | Intralinks, Inc. | Systems and methods of secure data exchange |
US20170046560A1 (en) * | 2014-04-23 | 2017-02-16 | Signpass Ltd. | Methods and systems for signature analysis and authentication |
US9654469B1 (en) * | 2014-05-02 | 2017-05-16 | Nok Nok Labs, Inc. | Web-based user authentication techniques and applications |
US9577999B1 (en) * | 2014-05-02 | 2017-02-21 | Nok Nok Labs, Inc. | Enhanced security for registration of authentication devices |
US20170048218A1 (en) * | 2014-05-02 | 2017-02-16 | Nok Nok Labs, Inc. | Enhanced security for registration of authentication devices |
US20150319158A1 (en) * | 2014-05-05 | 2015-11-05 | Phillip Kumnick | System and method for token domain control |
US20160109954A1 (en) * | 2014-05-16 | 2016-04-21 | Visa International Service Association | Gesture Recognition Cloud Command Platform, System, Method, and Apparatus |
US9032498B1 (en) * | 2014-05-25 | 2015-05-12 | Mourad Ben Ayed | Method for changing authentication for a legacy access interface |
US20170103194A1 (en) * | 2014-05-30 | 2017-04-13 | Pcms Holdings, Inc. | Systems and methods for active authentication |
US20150356316A1 (en) * | 2014-06-04 | 2015-12-10 | Idscan Biometrics Limited | System, method and program for managing a repository of authenticated personal data |
US9064376B1 (en) * | 2014-06-06 | 2015-06-23 | Aviel David Rubin | Utilization of multiple devices to secure online transactions |
US20150363986A1 (en) * | 2014-06-11 | 2015-12-17 | Hoyos Labs Corp. | System and method for facilitating user access to vehicles based on biometric information |
US20160028715A1 (en) * | 2014-06-23 | 2016-01-28 | The Toronto-Dominion Bank | Systems and methods for authenticating user identities in networked computer systems |
US20150379488A1 (en) * | 2014-06-27 | 2015-12-31 | Clear Path Financial | Automated proactive electronic resource allocation processing system |
US20150381664A1 (en) * | 2014-06-27 | 2015-12-31 | American Express Travel Related Services Company, Inc. | System and Method for Connectivity Contextual Services Local Online Experience |
US9300661B1 (en) * | 2014-06-30 | 2016-03-29 | Emc Corporation | Method, apparatus, and computer program product for determining whether to suspend authentication by an authentication device |
US20160006716A1 (en) * | 2014-07-01 | 2016-01-07 | Barabajagal, LLC | System and method for secure digital content delivery |
US20160036798A1 (en) * | 2014-08-04 | 2016-02-04 | Mobile Search Security LLC | Secure mobile contact system (smcs) |
US20160050318A1 (en) * | 2014-08-18 | 2016-02-18 | Alibaba Group Holding Limited | Information exchange method and apparatus |
US9635011B1 (en) * | 2014-08-27 | 2017-04-25 | Jonetix Corporation | Encryption and decryption techniques using shuffle function |
US20160063235A1 (en) * | 2014-08-28 | 2016-03-03 | Kevin Alan Tussy | Facial Recognition Authentication System Including Path Parameters |
US20160072800A1 (en) * | 2014-09-03 | 2016-03-10 | Nantomics, Llc | Synthetic genomic variant-based secure transaction devices, systems and methods |
US20160071390A1 (en) * | 2014-09-05 | 2016-03-10 | Vision Service Plan | System for monitoring individuals as they age in place |
US20160087952A1 (en) * | 2014-09-23 | 2016-03-24 | Qualcomm Incorporated | Scalable authentication process selection based upon sensor inputs |
US20170318007A1 (en) * | 2014-10-30 | 2017-11-02 | Touch Networks Australia Pty Ltd | Identification system and method |
US20170012951A1 (en) * | 2014-10-31 | 2017-01-12 | Vasco Data Security, Inc. | Multi-user strong authentication token |
US20170337545A1 (en) * | 2014-11-07 | 2017-11-23 | Tendyron Corporation | Data interaction method and system |
US20160357954A1 (en) * | 2014-11-21 | 2016-12-08 | Evidian | Method for controlling access to a production system of a computer system not connected to an information system of said computer system |
US20160164880A1 (en) * | 2014-12-03 | 2016-06-09 | Bitdefender IPR Management Ltd. | Systems And Methods Of Transaction Authorization Using Server-Triggered Switching To An Integrity-Attested Virtual Machine |
US20160165036A1 (en) * | 2014-12-07 | 2016-06-09 | Chon Hock LEOW | System and method of secure personal identification |
US20160164958A1 (en) * | 2014-12-08 | 2016-06-09 | Ebay Inc | Delivering personalized content to authenticated user devices |
US20160162900A1 (en) * | 2014-12-09 | 2016-06-09 | Zighra Inc. | Fraud detection system, method, and device |
US20160164866A1 (en) * | 2014-12-09 | 2016-06-09 | Duo Security, Inc. | System and method for applying digital fingerprints in multi-factor authentication |
US20160171361A1 (en) * | 2014-12-10 | 2016-06-16 | Paypal, Inc. | Anti-skimming payment card |
US20160182503A1 (en) * | 2014-12-18 | 2016-06-23 | Sri International | Continuous authentication of mobile device users |
US20160191511A1 (en) * | 2014-12-24 | 2016-06-30 | Paypal Inc. | Wearable device authentication |
US10592882B1 (en) * | 2014-12-31 | 2020-03-17 | Groupon, Inc. | Prescient and adaptive point-of-sale systems |
US20160232339A1 (en) * | 2015-02-06 | 2016-08-11 | Qualcomm Incorporated | Apparatuses and methods for secure display on secondary display device |
US9148424B1 (en) * | 2015-03-13 | 2015-09-29 | Snapchat, Inc. | Systems and methods for IP-based intrusion detection |
US20170063550A1 (en) * | 2015-04-23 | 2017-03-02 | Keith J Brodie | Secure Digital Signature Apparatus and Methods |
US9906519B1 (en) * | 2015-04-28 | 2018-02-27 | Wells Fargo Bank, N.A. | Contextual and time sensitive out of band transactional signing |
US20160378417A1 (en) * | 2015-06-23 | 2016-12-29 | Airwatch, Llc | Collaboration Systems With Managed Screen Sharing |
US20170041296A1 (en) * | 2015-08-05 | 2017-02-09 | Intralinks, Inc. | Systems and methods of secure data exchange |
US11316844B2 (en) * | 2015-08-24 | 2022-04-26 | Paypal, Inc. | Optimizing tokens for identity platforms |
US20210027295A1 (en) * | 2015-08-24 | 2021-01-28 | Jpmorgan Chase Bank, N.A. | System and method for implementing cardless authentication |
US20170063840A1 (en) * | 2015-08-24 | 2017-03-02 | Paypal, Inc. | Optimizing tokens for identity platforms |
US20170076280A1 (en) * | 2015-09-11 | 2017-03-16 | Bank Of America Corporation | Controlling Access to Data |
US20170091757A1 (en) * | 2015-09-30 | 2017-03-30 | Bank Of America Corporation | Tokenization provisioning and allocating system |
US20170103408A1 (en) * | 2015-10-09 | 2017-04-13 | VTU de Colombia S.A. | Coupon registration and validation system |
US20170132643A1 (en) * | 2015-11-06 | 2017-05-11 | Mastercard International Incorporated | Systems and methods for mapping online data to data of interest |
US20170148009A1 (en) * | 2015-11-20 | 2017-05-25 | Afirma Consulting & Technologies, S.L. | Dynamic multilayer security for internet mobile-related transactions |
US9954867B1 (en) * | 2015-12-15 | 2018-04-24 | Amazon Technologies, Inc. | Verification of credential reset |
Non-Patent Citations (4)
Title |
---|
Liu et al "A Survey of Payment Card Industry Data Security Standard," IEEE Communications Surveys & Tutorials, Vol. 12, No. 3, Third Quarter 2010, Pages 287-303 (Year: 2010) * |
Ronchi et al "Security, Privacy and Efficiency of Internet Banking Transactions," IEEE, Pages 216-222 (Year: 2011) * |
Su et al "A Service Level Agreement for the Resource Transaction Risk based on Cloud Bank Model," 2012 International Conference on Cloud Computing and Service Computing, IEEE Computer Society, Pages 198-203 (Year: 2012) * |
Zhang et al "A Method of Predicting Users' Behaviors Based on Inter-transaction Association Rules," 2009 Sixth Web Information Systems and Applications Conference, IEEE Computer Society, Pages 147-150 (Year: 2009) * |
Also Published As
Publication number | Publication date |
---|---|
US10817593B1 (en) | 2020-10-27 |
US11755707B1 (en) | 2023-09-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11120158B2 (en) | Secure permissioning of access to user accounts, including secure distribution of aggregated user account data | |
US11593476B2 (en) | Data breach score and method | |
US20230033992A1 (en) | Transaction completion via application interaction | |
US10963878B2 (en) | System and method for financial management | |
CN109155030B (en) | System and method for facilitating network transactions | |
US20230418918A1 (en) | User information gathering and distribution system | |
RU2602394C2 (en) | Payment privacy tokenisation apparatus, methods and systems | |
US9922324B2 (en) | Verified purchasing by email | |
US20200380481A1 (en) | Autonomous bill pay bot with automatic social overdraft protection | |
KR20220035050A (en) | Identity and risk scoring of tokenized assets and associated token transactions backed by government bonds | |
US20160323247A1 (en) | Systems and methods for anonymously obtaining data | |
BR112013021057A2 (en) | universal electronic payment devices, methods and systems | |
US12014367B2 (en) | Predicting and making payments via preferred payment methods | |
US20190259029A1 (en) | Systems and methods for federated identify management | |
US11188887B1 (en) | Systems and methods for payment information access management | |
US20170099294A1 (en) | Multi-Party Secure Information Integration System | |
US20210383382A1 (en) | Systems and methods for customer control of data | |
US20150081496A1 (en) | System and Method for an Integrated Financial Management Tool | |
US20210192612A1 (en) | Peer-to-peer lending platform based on financial health analysis | |
US20200160427A1 (en) | Systems and methods for aggregating, exchanging, and filtering data over a communications network | |
US20190325523A1 (en) | Systems and methods of generating a pooled investment vehicle using shared data | |
US9842370B1 (en) | Online benefit utilization | |
WO2018142272A9 (en) | A method of controlling personal information and allowing interaction with authenticated users | |
US20230230072A1 (en) | Access control tower | |
US20220230168A1 (en) | Systems and methods for transaction privacy shield |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |