WO2018161042A1 - Agnostic handling database management - Google Patents
Agnostic handling database management Download PDFInfo
- Publication number
- WO2018161042A1 WO2018161042A1 PCT/US2018/020773 US2018020773W WO2018161042A1 WO 2018161042 A1 WO2018161042 A1 WO 2018161042A1 US 2018020773 W US2018020773 W US 2018020773W WO 2018161042 A1 WO2018161042 A1 WO 2018161042A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- network
- networks
- criteria
- server
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Definitions
- This application relates to the field of information management and database management.
- Systems and methods here include database management, using a server system with a processor and memory, the server in communication with a plurality of networks, the server system for receiving, from the plurality of networks, data regarding network criteria, receiving, from a user, a set of selections of criteria for at least one of the networks, determining a match of a network, from the plurality of networks using an algorithm and the network criteria, based on the user set of selections of the criteria, and sending, to the user, the determined network match.
- FIG. 1 is a prior art method of networking.
- FIG. 2 is an example platform network diagram consistent with one or more aspects of the innovations herein.
- FIG. 3 is an example method consistent with one or more aspects of the innovations herein.
- FIG. 4 is an example method consistent with one or more aspects of the innovations herein.
- FIGS. 5-9 are example screenshots consistent with one or more aspects of the innovations herein.
- FIG. 10 is a diagram of example computer components used to practice certain embodiments disclosed herein.
- the user information may be synthesized into a numerical score (MagScore) using algorithms that rate the user on various criteria.
- This system allows for user anonymity in the process has not been attempted before in the technology area.
- Such a system may be a server system with processors and memory as described herein, in communication with any of various networks.
- the system servers providing a platform to communicate with and connect users with any one of the various networks using criteria and resource efficiencies.
- the network sets the user criteria it is seeking on the back end of the platform and the system delivers the network information on the subset of users the network is seeking.
- Networks may economize research services in this way and cut out data mining operations. This ease of use will save network resources and costs and, additionally, markedly improve internal efficiencies.
- the MagScore provides the network with a ranking to aid in quickly sort users and networks with different profiles.
- FIG. 1 is a prior art method 100 of networking.
- a user may decide they need a network 102. In order to get the best possible terms, they may wish to consider multiple prospective networks. If they have a relationship with an existing network (network #1), they may call or otherwise contact the network 104 to set up an appointment, meet in person with a representative of network #1 106, and prepare necessary documents for network #1 108.
- network #1 an existing network
- they may call or otherwise contact the network 104 to set up an appointment, meet in person with a representative of network #1 106, and prepare necessary documents for network #1 108.
- Network #1 may review this information and give the user an initial rate sheet response on a proprietary form 110.
- the user may search for contact information of additional networks 112.
- the user may cold call another network (network #2) 114 to get information. This may prompt a follow up call from network #2 wherein network #2 gets more data from the user 116 and sets up an appointment.
- the user may meet in person with a representative of network #2 118, and prepare necessary documents for network #2 120.
- the user may repeat this process for other networks (e.g., network #3 122-128 and network #4 130-136).
- networks e.g., network #3 122-128 and network #4 130-136.
- Four networks are used in this example, but a user may attempt to explore services from as many networks as they choose.
- the user may receive initial rate sheet responses on proprietary forms from network #2 140, network #3 144, and network #4 148.
- the networks may request additional information, and the user may provide the additional information to network #1 138, network #2 142, network #3 146, and/or network #4 150. After all of this, the user may attempt to choose a network to work with 152, based on the rate sheets and any other information the networks have provided. The user may choose a network and complete the application 154.
- this method 100 of securing a network service requires a significant investment of time and effort on the part of the user.
- FIG. 2 is an example platform system 200, architecture diagram, showing an example method 250 consistent with one or more aspects of the innovations herein.
- the system may include a network 250 such as the Internet and/or a private network.
- the network 250 may enable communication between one or more servers 210, user computers 220, and/or network computers 230.
- User computers 220 may be computers used by users and/or centers of influence for the user and may include any type of computer configured for network interaction (e.g., desktop 220A, tablet 220B, mobile device 220C, etc.).
- Network computers 230 may be computers used by traditional and/or non-traditional networks and may include any type of computer configured for network interaction (e.g., desktop 230A, tablet 230B, mobile device 230C, etc.).
- Example method explains how the computers 210, 220, 230 may interact with one another.
- User computer 220 may send request information to server 210, and server 210 may receive the request information and format it into a request without user identifying information 252.
- Server 210 may use a scoring algorithm to rank the user 254. The rank may be sent to network computers 230 and, based on the rank and the networks' interest in a user of that rank, one or more networks may send responses to server 210 for the user's evaluation 265.
- Server 210 may send a chart to user computer 220 comparing network responses 258. If the user is interested in one or more of the responding networks, the user may indicate that the identifying information may be shared 260.
- server 210 may notify network computer 230 of the network chosen by the user that the user is interested in working with the network 262.
- the network may be given the user's identifying information.
- the network may contact the user (or the user may contact the network), and the user and the network may complete the service transaction in compliance with any regulatory, privacy, and/or specific policies and controls 264.
- the user and network may complete separate surveys 266, 268 and submit them to server 210 via user computer 220 and network computer 230, respectively. Each survey may provide data on rating of other party, other metrics, and/or other data. Metrics and data may be used to assist networks in future strategies. 270.
- server 210 may send this data to network computer 230.
- FIG. 3 is an example method 300 consistent with one or more aspects of the innovations herein.
- This method 300 is a high-level overview.
- a user may wish to obtain a network service 302.
- the user may access the system 200 via user computer 220 and obtain a form from server 210 (e.g., via a website provided by server 210 through network 250).
- This single form may be used to reach multiple networks and receive responses in a standardized format 304.
- the platform server system may respond to the form, and the user may gather and submit information only a single time and choose a network 306.
- Such a platform system response may include a match, made using algorithms, to efficiently align both resources and requests. Once the choice is made, the user and network may work together to complete the service 308.
- FIG. 4 is an example method 410 consistent with one or more aspects of the innovations herein. It will be discussed throughout the disclosure as it relates to the overall system architecture and data flow.
- This method 410 is a detailed example of how a network service may be arranged.
- user computer 220 and platform computer 230 may separately interact with server 210 via network 250.
- a first portion of user computer 220 and server 210 interactions is shown in 412-426.
- the user (or a center of influence on the user's behalf) may interact with server 210 via a website 412. Through a website interface, the user may select network service criteria 414.
- This network service criteria may provide enough information to server 210 to allow server 210 to have a clear snapshot of the user without generating a formal request.
- the user may provide some minimal level of information to serve as a method of identification 416.
- the information provided may be less than what is required for formal request creation. Thus, the user cannot be identified by prospective networks.
- FIG. 5 is an example screenshot of an interface 500 that may be provided on user computer 220 (e.g., via server 210 and network 250) for user entry of the aforementioned information.
- fields 510 may allow the user to select a variety of network services and/or user criteria (e.g., network service type) and enter non-identifying user information. The user may fill out the fields 510 and submit the information 520.
- server 210 may receive the information from user computer 220 and analyze the network services and user criteria to create a score 418. For example, the network services and user criteria may be scored with a ranking from 1 to 10, for example.
- the data, including the service and user criteria, score, and/or a unique ID for the transaction, may be stored (e.g., written to a table) 420.
- Server 210 may send a confirmation to user computer 220 (e.g., in the form of an email or other communication) 422.
- the confirmation may include the ID and a login link to allow the user to follow up on the process. Note that the user need not provide any detailed information or other confidential information to server 210 at this point 424.
- the user may log in 426 using the confirmation information.
- networks may make offers, and the networks may view such offers after login.
- the network may interact with server 210.
- the network may use network computer 230 to sign up with the service 428, for example by selecting information based on a list.
- the network may provide contact and/or account registration information such as name, email, phone number, password, etc. 430.
- server 210 may verify that the email domain provided matches the domain of the parent network associated with the specific network, for example, or otherwise verify the network's identity 432.
- Server 210 may send a confirmation to network computer 230 (e.g., in the form of an email or other communication) 434.
- the confirmation may include the ID and a login link to allow the network to search for networking opportunities.
- the network may log in using the confirmation information and may set default search criteria (e.g., parameters and/or distance from network branch location) 436.
- the network may use network computer 230 to search for and sort network service requests stored by the server 210 (e.g., looking for service requests meeting network's criteria and/or having a score that is desirable to the network) 438. Note that the network may not see any detailed information or other confidential information of potential user at this point 440.
- Server 210 may update services for which offers have been made to reflect a "done" status in the results.
- a monthly subscription model may be used for payment to the system 442.
- the system may also propose, reject, watch, refer, syndicate, chat (with anonymous questions) all the action items the networks would need 444.
- the service offer may be made and written to the chart 446.
- tokens may be used to anonymize the users from the perspective of the networks.
- the platform may only send tokenized
- anonymized, tokenized information may be shared with the networks but other detailed information may be withheld.
- FIG. 6 is an example screenshot of an interface 600 that may be provided on network computer 230 (e.g., via server 210 and network 250) for network searching and search result display.
- fields 610 may allow the network to select a variety of network service and/or user criteria for a search (e.g., network service type, distance from network branch, etc.).
- the network may fill out the search fields 610 and submit the search 620.
- Search results 630 may be displayed, including network service that are done 632 and/or network service that are available for proposals 634.
- Interface 600 may also allow the network to view proposal history 640 and/or to update network information (e.g., phone number and/or password) 650.
- network information e.g., phone number and/or password
- the network may prepare a network service offer based on the chart rating for a network service request created by a user, and server 210 may notify the user of the new request (e.g., via email and/or an update in the user's online interface) 444.
- FIG. 7 is another example screenshot of an interface 700 that may be provided on network computer 230 (e.g., via server 210 and network 250) for network service offer preparation.
- fields 710 may allow the network to select a variety of network service criteria for the offer (e.g., network service offer amount, costs, etc.).
- the network may fill out the fields 710 and submit the proposal 720.
- Information about the network service request (e.g., network service request score, network service type, etc.) may be displayed as well 730.
- server 210 may automatically generate an offer of its own in some cases 446. In this event, server 210 may determine whether the user accepts the automatically generated offer (e.g., via user computer 220). If so, processing of this offer may begin. If not, server 210 may allow offers from P2P, balance sheet, and/or non-traditional networks in some cases 446.
- the method 410 may proceed via interactions between user computer 220 and server 210 and interactions between network computer 230 and server 210 as shown in 450-460.
- Server 210 may provide a chart to user via user computer 220 presenting the one or more offers (e.g., by comparing them in a sortable table) without identifying the networks 450.
- the user may select one or more networks to work with 452.
- the selections may be communicated to server 210, which may provide network name and address information to user computer 220 for display to the user in response 454.
- the network identity, but not the network contact information (e.g., email address, phone number, etc.) may be provided at this time.
- the user may permit server 210 to provide identifying and contact information (e.g., name, phone number, etc.) to each chosen network for the first time 456.
- identifying and contact information e.g., name, phone number, etc.
- the user only provides name and phone number at the end of the process after a service offer has been made based solely on non-identifying information such as the score ranking.
- FIG. 8 is an example screenshot of an interface 800 that may be provided on user computer 220 (e.g., via server 210 and network 250) for network services offer evaluation and selection.
- a table of proposals 810 may be presented, showing proposals details and allowing the user to select one or more offers to pursue.
- server 210 may send information to user computer 220 (e.g., in the form of an email or some other message) providing identifying and contact information (e.g., name, phone number, email address, etc.) of network and suggesting that the user may contact the network 458.
- identifying and contact information e.g., name, phone number, email address, etc.
- FIG. 9 is an example screenshot of an interface 900 that may be provided on user computer 220 (e.g., via server 210 and network 250) for contacting the network.
- user computer 220 e.g., via server 210 and network 250
- the interface 900 may include contact information for the network 910, service offer information 920, and/or contact fields 930.
- the user may fill in the fields to send their contact information to the network.
- the user may also use the network's contact information to contact the network directly.
- server 210 may send information to network computer 230 (e.g., in the form of an email or some other message) providing identifying and contact information (e.g., name, phone number, email address, etc.) of user and notifying the network that they have been selected by the user 460.
- identifying and contact information e.g., name, phone number, email address, etc.
- user and network may communicate with one another without the assistance of server 210 to complete the service creation process 462. This may allow the process to be completed confidentially and privately and allow the parties to comply with any internal privacy policies, underwriting requirements, and FDIC rules.
- Server 210 may follow up with network to confirm service funding information for data metric analysis and market trends 464.
- Server 210 may also follow up with user to obtain an evaluation of the experience of working with the network 466 to aid future users who may choose to work with this network. Obtaining the network ranking from the user may provide more power to the user in the process of obtaining the network service.
- the system server 210 may also support sending to user and network with customized recommendations based on various information such as but not limited to class, geography, and type.
- FIG. 10 shows an example computing hardware system 1000 that may be used in practicing certain example embodiments described herein.
- the computing device could be any kind of computing device, but not limited to a laptop, a smartphone, tablet computer, watch, glasses, or any other kind of computing device.
- the example shows a processor (“CPU") 1010 that could be any number of computer processors in communication by a bus 1012 with a user interface 1014.
- the user interface 1014 could include any kind of display devices 1018 such as a screen, touchscreen, microphone, etc.
- the user interface also includes an input mechanism such as a touchscreen, keys, buttons, mouse, pointer, camera sensors, or other input devices.
- FIG. 10 shows an example computing hardware system 1000 that may be used in practicing certain example embodiments described herein.
- the computing device could be any kind of computing device, but not limited to a laptop, a smartphone, tablet computer, watch, glasses, or any other kind of computing device.
- the example shows a processor (“CPU") 1010 that could be any number of computer processors in
- the example computing device 1000 also shows a network interface 1020 which may be used to interface with any wireless or wired network in order to transmit and receive data.
- a network interface may provide the hardware and software for the computing device to interface with a cellular network, a WiFi network, a BlueTooth Low Energy, or other wireless system, and thereby the Internet.
- the example computing device 1000 also shows any number of peripheral devices 1024 which could include any number of other additional features such as but not limited to an antennae 1026 for communicating wirelessly such as over cellular, WiFi, NFC, Bluetooth, infrared, or any combination of these or other wireless communications.
- the computing device 1000 example also includes a memory 1022 which includes any number of operations executable by the processor 1010. The memory in FIG.
- 10 includes an operating system 1032, a network communication 1034, instructions for other tasks 1038 and applications 1038 such as send/receive message data 1040 and/or SMS text message applications 1042. Also included in the example is for data storage 1058. Such data storage may include data tables 1060, transaction logs 1062, user data 1064 and/or encryption data 1070.
- a network as described here could be a financial institution and a user could be a borrower.
- the system could be arranged to facilitate loans to borrowers from a plurality of banking or financial institutions without sharing detailed borrower information up front.
- the innovations herein may be implemented via one or more components, systems, servers, appliances, other subcomponents, or distributed between such elements.
- such systems may include an/or involve, inter alia, components such as software modules, general-purpose CPU, RAM, etc. found in general-purpose computers.
- a server may include or involve components such as CPU, RAM, etc., such as those found in general-purpose computers.
- innovations herein may be achieved via implementations with disparate or entirely different software, hardware and/or firmware components, beyond that set forth above.
- components e.g., software, processing components, etc.
- aspects of the innovations herein may be implemented consistent with numerous general purpose or special purpose computing systems or configurations.
- Various exemplary computing systems, environments, and/or configurations that may be suitable for use with the innovations herein may include, but are not limited to: software or other components within or embodied on personal computers, servers or server computing devices such as
- routing/connectivity components hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, consumer electronic devices, network PCs, other existing computer platforms, distributed computing environments that include one or more of the above systems or devices, etc.
- aspects of the innovations herein may be achieved via or performed by logic and/or logic instructions including program modules, executed in association with such components or circuitry, for example.
- program modules may include routines, programs, objects, components, data structures, etc. that performs particular tasks or implement particular instructions herein.
- the inventions may also be practiced in the context of distributed software, computer, or circuit settings where circuitry is connected via communication buses, circuitry or links. In distributed settings, control/instructions may occur from both local and remote computer storage media including memory storage devices.
- Computer readable media can be any available media that is resident on, associable with, or can be accessed by such circuits and/or computing components.
- Computer readable media may comprise computer storage media and communication media.
- Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
- Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and can accessed by computing component.
- Communication media may comprise computer readable instructions, data structures, program modules and/or other components. Further, communication media may include wired media such as a wired network or direct-wired connection, however no media of any such type herein includes transitory media. Combinations of the any of the above are also included within the scope of computer readable media.
- the terms component, module, device, etc. may refer to any type of logical or functional software elements, circuits, blocks and/or processes that may be implemented in a variety of ways.
- the functions of various circuits and/or blocks can be combined with one another into any other number of modules.
- Each module may even be implemented as a software program stored on a tangible memory (e.g., random access memory, read only memory, CD-ROM memory, hard disk drive, etc.) to be read by a central processing unit to implement the functions of the innovations herein.
- the modules can comprise programming instructions transmitted to a general purpose computer or to processing/graphics hardware via a transmission carrier wave.
- the modules can be implemented as hardware logic circuitry implementing the functions encompassed by the innovations herein.
- the modules can be implemented using special purpose instructions (SIMD instructions), field programmable logic arrays or any mix thereof which provides the desired level performance and cost.
- SIMD instructions special purpose instructions
- network systems and methods disclosed herein may be embodied in various forms including, for example, a data processor, such as a computer that also includes a database, digital electronic circuitry, firmware, software, or in combinations of them. Further, while some of the disclosed network systems and methods disclosed herein may be embodied in various forms including, for example, a data processor, such as a computer that also includes a database, digital electronic circuitry, firmware, software, or in combinations of them. Further, while some of the disclosed
- aspects of the method and system described herein, such as the logic may also be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices (“PLDs”), such as field programmable gate arrays (“FPGAs”), programmable array logic (“PAL”) devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits.
- PLDs programmable logic devices
- FPGAs field programmable gate arrays
- PAL programmable array logic
- electrically programmable logic and memory devices and standard cell-based devices as well as application specific integrated circuits.
- Some other possibilities for implementing aspects include: memory devices, microcontrollers with memory (such as EEPROM), embedded microprocessors, firmware, software, etc.
- aspects may be embodied in microprocessors having software-based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types.
- the underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor
- MOSFET complementary metal-oxide semiconductor
- CMOS complementary metal-oxide semiconductor
- ECL emitter-coupled logic
- polymer technologies e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures
- mixed analog and digital and so on.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
Systems and methods here include database management, using a server system with a processor and memory, the server in communication with a plurality of networks, the server system for receiving, from the plurality of networks, data regarding network criteria, receiving, from a user, a set of selections of criteria for at least one of the networks, determining a match of a network, from the plurality of networks suing an algorithm and the network criteria, based on the user set of selections of the criteria, and sending, to the user, the determined network match.
Description
AGNOSTIC HANDLING DATABASE MANAGEMENT
CROSS REFERENCE TO RELATED APPLICADTION
[0001] This International patent application relates to and claims priority to US Provisional Patent Application Serial No. 62/466,082 filed 02 March 2017 entitled "Systems and Methods of Processing Data and Agnostically-Handling Information Related to Electronic Loan Transaction and/or Database Management" which is hereby incorporated by reference herein in its entirety.
TECHNICAL FIELD
[0002] This application relates to the field of information management and database management.
BACKGROUND
[0003] Users have had trouble interacting with networks without revealing personalized information. Anonymous networking is useful for protecting identities and operating
repercussions.
SUMMARY
[0004] Systems and methods here include database management, using a server system with a processor and memory, the server in communication with a plurality of networks, the server system for receiving, from the plurality of networks, data regarding network criteria, receiving, from a user, a set of selections of criteria for at least one of the networks, determining a match of a network, from the plurality of networks using an algorithm and the network criteria, based on the user set of selections of the criteria, and sending, to the user, the determined network match.
BRIEF DESCRIPTION OF THE DRAWINGS
[0005] FIG. 1 is a prior art method of networking.
[0006] FIG. 2 is an example platform network diagram consistent with one or more aspects of the innovations herein.
[0007] FIG. 3 is an example method consistent with one or more aspects of the innovations herein.
[0008] FIG. 4 is an example method consistent with one or more aspects of the innovations herein.
[0009] FIGS. 5-9 are example screenshots consistent with one or more aspects of the innovations herein.
[0010] FIG. 10 is a diagram of example computer components used to practice certain embodiments disclosed herein.
DETAILED DESCRIPTION
[0011] Reference will now be made in detail to embodiments, examples of which are illustrated in the accompanying drawings. In the following detailed description, numerous specific details are set forth in order to provide a sufficient understanding of the subject matter presented herein. But it will be apparent to one of ordinary skill in the art that the subject matter may be practiced without these specific details. Moreover, the particular embodiments described herein are provided by way of example and should not be used to limit the scope of the invention to these particular embodiments. In other instances, well-known data structures, timing protocols, software operations, procedures, and components have not been described in detail so as not to unnecessarily obscure aspects of the embodiments of the invention.
[0012] Overview
[0013] Users who operate with networks often have to provide detailed personal information in order to receive the benefits or work with network and service operators. To even select a network, a user must take time to research networks in different and proprietary network styles and formats. Then, the user must make sense of these different formats in an attempt to compare all relevant networks. This takes an inordinate amount of time and resources, and the process ends up making the user reveal substantially more information to multiple networks than is economical.
[0014] From the network perspective, there are incredibly high search costs associated with finding users and the lack of public information on networks and their owners. Systems and methods here enable a user to anonymously submit a request with all the essential information a network needs, receive multiple offers from networks, and compare them in an easy-to-read, single format, or MagChart, at any of various computer resources such as a smartphone, tablet, or laptop computer. Such information could be streamed to such a computer resources, be
available through a browser interface, or through an installed proprietary application running on the computer.
[0015] The user information may be synthesized into a numerical score (MagScore) using algorithms that rate the user on various criteria. This system allows for user anonymity in the process has not been attempted before in the technology area. Such a system may be a server system with processors and memory as described herein, in communication with any of various networks. The system servers providing a platform to communicate with and connect users with any one of the various networks using criteria and resource efficiencies.
[0016] For their part, the network sets the user criteria it is seeking on the back end of the platform and the system delivers the network information on the subset of users the network is seeking. Networks may economize research services in this way and cut out data mining operations. This ease of use will save network resources and costs and, additionally, markedly improve internal efficiencies. The MagScore provides the network with a ranking to aid in quickly sort users and networks with different profiles.
[0017] Only when the system affirmatively chooses to proceed with a given network, is a user information passed to that single network. From that point on, if the user and network exchange more data, the platform system here is not involved. Thus, the platform system never collects underlying data. Thus, all network controls and regulations remain intact without possibility of breach or compromise. The system creates an agnostic networking platform for connecting in an efficient and confidential manner.
[0018] FIG. 1 is a prior art method 100 of networking. First, a user may decide they need a network 102. In order to get the best possible terms, they may wish to consider multiple prospective networks. If they have a relationship with an existing network (network #1), they may call or otherwise contact the network 104 to set up an appointment, meet in person with a representative of network #1 106, and prepare necessary documents for network #1 108.
Network #1 may review this information and give the user an initial rate sheet response on a proprietary form 110.
[0019] To compare rates, the user may search for contact information of additional networks 112. The user may cold call another network (network #2) 114 to get information. This may prompt a follow up call from network #2 wherein network #2 gets more data from the user 116 and sets up an appointment. The user may meet in person with a representative of network #2
118, and prepare necessary documents for network #2 120. The user may repeat this process for other networks (e.g., network #3 122-128 and network #4 130-136). Four networks are used in this example, but a user may attempt to explore services from as many networks as they choose.
[0020] The user may receive initial rate sheet responses on proprietary forms from network #2 140, network #3 144, and network #4 148. The networks may request additional information, and the user may provide the additional information to network #1 138, network #2 142, network #3 146, and/or network #4 150. After all of this, the user may attempt to choose a network to work with 152, based on the rate sheets and any other information the networks have provided. The user may choose a network and complete the application 154. Clearly, this method 100 of securing a network service requires a significant investment of time and effort on the part of the user.
[0021] Platform Examples
[0022] FIG. 2 is an example platform system 200, architecture diagram, showing an example method 250 consistent with one or more aspects of the innovations herein. The system may include a network 250 such as the Internet and/or a private network. The network 250 may enable communication between one or more servers 210, user computers 220, and/or network computers 230. User computers 220 may be computers used by users and/or centers of influence for the user and may include any type of computer configured for network interaction (e.g., desktop 220A, tablet 220B, mobile device 220C, etc.). Network computers 230 may be computers used by traditional and/or non-traditional networks and may include any type of computer configured for network interaction (e.g., desktop 230A, tablet 230B, mobile device 230C, etc.).
[0023] Example method explains how the computers 210, 220, 230 may interact with one another. User computer 220 may send request information to server 210, and server 210 may receive the request information and format it into a request without user identifying information 252. Server 210 may use a scoring algorithm to rank the user 254. The rank may be sent to network computers 230 and, based on the rank and the networks' interest in a user of that rank, one or more networks may send responses to server 210 for the user's evaluation 265. Server 210 may send a chart to user computer 220 comparing network responses 258. If the user is interested in one or more of the responding networks, the user may indicate that the identifying information may be shared 260. This indication may be received by server 210, and server 210
may notify network computer 230 of the network chosen by the user that the user is interested in working with the network 262. At this time, the network may be given the user's identifying information. Using the identifying information, the network may contact the user (or the user may contact the network), and the user and the network may complete the service transaction in compliance with any regulatory, privacy, and/or specific policies and controls 264. The user and network may complete separate surveys 266, 268 and submit them to server 210 via user computer 220 and network computer 230, respectively. Each survey may provide data on rating of other party, other metrics, and/or other data. Metrics and data may be used to assist networks in future strategies. 270. For example, server 210 may send this data to network computer 230.
[0024] Method Examples
[0025] FIG. 3 is an example method 300 consistent with one or more aspects of the innovations herein. This method 300 is a high-level overview. A user may wish to obtain a network service 302. The user may access the system 200 via user computer 220 and obtain a form from server 210 (e.g., via a website provided by server 210 through network 250). This single form may be used to reach multiple networks and receive responses in a standardized format 304. Thus, by utilizing one form, the user may be able to solicit information from any network associated with the system 200. As described in greater detail below, the platform server system may respond to the form, and the user may gather and submit information only a single time and choose a network 306. Such a platform system response may include a match, made using algorithms, to efficiently align both resources and requests. Once the choice is made, the user and network may work together to complete the service 308.
[0026] FIG. 4 is an example method 410 consistent with one or more aspects of the innovations herein. It will be discussed throughout the disclosure as it relates to the overall system architecture and data flow. This method 410 is a detailed example of how a network service may be arranged. As described above with respect to FIG. 2, user computer 220 and platform computer 230 may separately interact with server 210 via network 250. A first portion of user computer 220 and server 210 interactions is shown in 412-426. Using user computer 220, the user (or a center of influence on the user's behalf) may interact with server 210 via a website 412. Through a website interface, the user may select network service criteria 414. This network service criteria may provide enough information to server 210 to allow server 210 to have a clear snapshot of the user without generating a formal request. The user may provide some minimal
level of information to serve as a method of identification 416. The information provided may be less than what is required for formal request creation. Thus, the user cannot be identified by prospective networks.
[0027] Interface Examples
[0028] FIG. 5 is an example screenshot of an interface 500 that may be provided on user computer 220 (e.g., via server 210 and network 250) for user entry of the aforementioned information. For example, fields 510 may allow the user to select a variety of network services and/or user criteria (e.g., network service type) and enter non-identifying user information. The user may fill out the fields 510 and submit the information 520.
[0029] Returning to FIG. 4, server 210 may receive the information from user computer 220 and analyze the network services and user criteria to create a score 418. For example, the network services and user criteria may be scored with a ranking from 1 to 10, for example. The data, including the service and user criteria, score, and/or a unique ID for the transaction, may be stored (e.g., written to a table) 420. Server 210 may send a confirmation to user computer 220 (e.g., in the form of an email or other communication) 422. The confirmation may include the ID and a login link to allow the user to follow up on the process. Note that the user need not provide any detailed information or other confidential information to server 210 at this point 424. The user may log in 426 using the confirmation information. As described below, networks may make offers, and the networks may view such offers after login.
[0030] A first portion of network computer 230 and server 210 interactions, which may be made via network 250, is shown in 428-448. At least a subset of these interactions 428-448 may be performed in parallel with the first set of user computer 220 / server 210 interactions 412-426. Using network computer 230, the network may interact with server 210. The network may use network computer 230 to sign up with the service 428, for example by selecting information based on a list. The network may provide contact and/or account registration information such as name, email, phone number, password, etc. 430. Upon receiving this information, server 210 may verify that the email domain provided matches the domain of the parent network associated with the specific network, for example, or otherwise verify the network's identity 432. Server 210 may send a confirmation to network computer 230 (e.g., in the form of an email or other communication) 434. The confirmation may include the ID and a login link to allow the network to search for networking opportunities. The network may log in using the confirmation
information and may set default search criteria (e.g., parameters and/or distance from network branch location) 436. The network may use network computer 230 to search for and sort network service requests stored by the server 210 (e.g., looking for service requests meeting network's criteria and/or having a score that is desirable to the network) 438. Note that the network may not see any detailed information or other confidential information of potential user at this point 440. Server 210 may update services for which offers have been made to reflect a "done" status in the results. In some example embodiments, a monthly subscription model may be used for payment to the system 442. The system may also propose, reject, watch, refer, syndicate, chat (with anonymous questions) all the action items the networks would need 444. The service offer may be made and written to the chart 446.
[0031] In some example embodiments, tokens may be used to anonymize the users from the perspective of the networks. In such examples, the platform may only send tokenized
information which it stores in a relational database with actual detailed information for the users. Thus, anonymized, tokenized information may be shared with the networks but other detailed information may be withheld.
[0032] FIG. 6 is an example screenshot of an interface 600 that may be provided on network computer 230 (e.g., via server 210 and network 250) for network searching and search result display. For example, fields 610 may allow the network to select a variety of network service and/or user criteria for a search (e.g., network service type, distance from network branch, etc.). The network may fill out the search fields 610 and submit the search 620. Search results 630 may be displayed, including network service that are done 632 and/or network service that are available for proposals 634. Interface 600 may also allow the network to view proposal history 640 and/or to update network information (e.g., phone number and/or password) 650.
[0033] Returning to FIG. 4, the network may prepare a network service offer based on the chart rating for a network service request created by a user, and server 210 may notify the user of the new request (e.g., via email and/or an update in the user's online interface) 444.
[0034] FIG. 7 is another example screenshot of an interface 700 that may be provided on network computer 230 (e.g., via server 210 and network 250) for network service offer preparation. For example, fields 710 may allow the network to select a variety of network service criteria for the offer (e.g., network service offer amount, costs, etc.). The network may fill out the
fields 710 and submit the proposal 720. Information about the network service request (e.g., network service request score, network service type, etc.) may be displayed as well 730.
[0035] Returning to FIG. 4, if a request receives no offers from networks, server 210 may automatically generate an offer of its own in some cases 446. In this event, server 210 may determine whether the user accepts the automatically generated offer (e.g., via user computer 220). If so, processing of this offer may begin. If not, server 210 may allow offers from P2P, balance sheet, and/or non-traditional networks in some cases 446.
[0036] If a request receives one or more offers, the method 410 may proceed via interactions between user computer 220 and server 210 and interactions between network computer 230 and server 210 as shown in 450-460. Server 210 may provide a chart to user via user computer 220 presenting the one or more offers (e.g., by comparing them in a sortable table) without identifying the networks 450. Using user computer 220, the user may select one or more networks to work with 452. The selections may be communicated to server 210, which may provide network name and address information to user computer 220 for display to the user in response 454. The network identity, but not the network contact information (e.g., email address, phone number, etc.) may be provided at this time. The user may permit server 210 to provide identifying and contact information (e.g., name, phone number, etc.) to each chosen network for the first time 456. Thus, the user only provides name and phone number at the end of the process after a service offer has been made based solely on non-identifying information such as the score ranking.
[0037] FIG. 8 is an example screenshot of an interface 800 that may be provided on user computer 220 (e.g., via server 210 and network 250) for network services offer evaluation and selection. A table of proposals 810 may be presented, showing proposals details and allowing the user to select one or more offers to pursue.
[0038] Returning to FIG. 4, server 210 may send information to user computer 220 (e.g., in the form of an email or some other message) providing identifying and contact information (e.g., name, phone number, email address, etc.) of network and suggesting that the user may contact the network 458.
[0039] FIG. 9 is an example screenshot of an interface 900 that may be provided on user computer 220 (e.g., via server 210 and network 250) for contacting the network. When a user selects a proposal, they may be shown this interface 900. The interface 900 may include contact
information for the network 910, service offer information 920, and/or contact fields 930. The user may fill in the fields to send their contact information to the network. The user may also use the network's contact information to contact the network directly.
[0040] Returning to FIG. 4, server 210 may send information to network computer 230 (e.g., in the form of an email or some other message) providing identifying and contact information (e.g., name, phone number, email address, etc.) of user and notifying the network that they have been selected by the user 460.
[0041] At this point, user and network may communicate with one another without the assistance of server 210 to complete the service creation process 462. This may allow the process to be completed confidentially and privately and allow the parties to comply with any internal privacy policies, underwriting requirements, and FDIC rules. Server 210 may follow up with network to confirm service funding information for data metric analysis and market trends 464. Server 210 may also follow up with user to obtain an evaluation of the experience of working with the network 466 to aid future users who may choose to work with this network. Obtaining the network ranking from the user may provide more power to the user in the process of obtaining the network service. The system server 210 may also support sending to user and network with customized recommendations based on various information such as but not limited to class, geography, and type.
[0042] Example Computing Hardware
[0043] FIG. 10 shows an example computing hardware system 1000 that may be used in practicing certain example embodiments described herein. In FIG. 10, the computing device could be any kind of computing device, but not limited to a laptop, a smartphone, tablet computer, watch, glasses, or any other kind of computing device. The example shows a processor ("CPU") 1010 that could be any number of computer processors in communication by a bus 1012 with a user interface 1014. The user interface 1014 could include any kind of display devices 1018 such as a screen, touchscreen, microphone, etc. The user interface also includes an input mechanism such as a touchscreen, keys, buttons, mouse, pointer, camera sensors, or other input devices. The example of FIG. 10 also shows a network interface 1020 which may be used to interface with any wireless or wired network in order to transmit and receive data. Such a network interface may provide the hardware and software for the computing device to interface with a cellular network, a WiFi network, a BlueTooth Low Energy, or other wireless system, and
thereby the Internet. The example computing device 1000 also shows any number of peripheral devices 1024 which could include any number of other additional features such as but not limited to an antennae 1026 for communicating wirelessly such as over cellular, WiFi, NFC, Bluetooth, infrared, or any combination of these or other wireless communications. The computing device 1000 example also includes a memory 1022 which includes any number of operations executable by the processor 1010. The memory in FIG. 10 includes an operating system 1032, a network communication 1034, instructions for other tasks 1038 and applications 1038 such as send/receive message data 1040 and/or SMS text message applications 1042. Also included in the example is for data storage 1058. Such data storage may include data tables 1060, transaction logs 1062, user data 1064 and/or encryption data 1070.
[0044] Conclusion
[0045] The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated.
[0046] It should be noted that a network as described here could be a financial institution and a user could be a borrower. The system could be arranged to facilitate loans to borrowers from a plurality of banking or financial institutions without sharing detailed borrower information up front.
[0047] The innovations herein may be implemented via one or more components, systems, servers, appliances, other subcomponents, or distributed between such elements. When implemented as a system, such systems may include an/or involve, inter alia, components such as software modules, general-purpose CPU, RAM, etc. found in general-purpose computers. In implementations where the innovations reside on a server, such a server may include or involve components such as CPU, RAM, etc., such as those found in general-purpose computers.
[0048] Additionally, the innovations herein may be achieved via implementations with disparate or entirely different software, hardware and/or firmware components, beyond that set forth above. With regard to such other components (e.g., software, processing components, etc.)
and/or computer-readable media associated with or embodying the present inventions, for example, aspects of the innovations herein may be implemented consistent with numerous general purpose or special purpose computing systems or configurations. Various exemplary computing systems, environments, and/or configurations that may be suitable for use with the innovations herein may include, but are not limited to: software or other components within or embodied on personal computers, servers or server computing devices such as
routing/connectivity components, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, consumer electronic devices, network PCs, other existing computer platforms, distributed computing environments that include one or more of the above systems or devices, etc.
[0049] In some instances, aspects of the innovations herein may be achieved via or performed by logic and/or logic instructions including program modules, executed in association with such components or circuitry, for example. In general, program modules may include routines, programs, objects, components, data structures, etc. that performs particular tasks or implement particular instructions herein. The inventions may also be practiced in the context of distributed software, computer, or circuit settings where circuitry is connected via communication buses, circuitry or links. In distributed settings, control/instructions may occur from both local and remote computer storage media including memory storage devices.
[0050] Innovative software, circuitry and components herein may also include and/or utilize one or more type of computer readable media. Computer readable media can be any available media that is resident on, associable with, or can be accessed by such circuits and/or computing components. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and can accessed by computing component. Communication media may comprise computer readable instructions, data structures, program modules and/or other components. Further, communication media may
include wired media such as a wired network or direct-wired connection, however no media of any such type herein includes transitory media. Combinations of the any of the above are also included within the scope of computer readable media.
[0051] In the present description, the terms component, module, device, etc. may refer to any type of logical or functional software elements, circuits, blocks and/or processes that may be implemented in a variety of ways. For example, the functions of various circuits and/or blocks can be combined with one another into any other number of modules. Each module may even be implemented as a software program stored on a tangible memory (e.g., random access memory, read only memory, CD-ROM memory, hard disk drive, etc.) to be read by a central processing unit to implement the functions of the innovations herein. Or, the modules can comprise programming instructions transmitted to a general purpose computer or to processing/graphics hardware via a transmission carrier wave. Also, the modules can be implemented as hardware logic circuitry implementing the functions encompassed by the innovations herein. Finally, the modules can be implemented using special purpose instructions (SIMD instructions), field programmable logic arrays or any mix thereof which provides the desired level performance and cost.
[0052] As disclosed herein, features consistent with the present inventions may be
implemented via computer-hardware, software and/or firmware. For example, the network systems and methods disclosed herein may be embodied in various forms including, for example, a data processor, such as a computer that also includes a database, digital electronic circuitry, firmware, software, or in combinations of them. Further, while some of the disclosed
implementations describe specific hardware components, systems and methods consistent with the innovations herein may be implemented with any combination of hardware, software and/or firmware. Moreover, the above-noted features and other aspects and principles of the innovations herein may be implemented in various environments. Such environments and related applications may be specially constructed for performing the various routines, processes and/or operations according to the invention or they may include a general-purpose computer or computing platform selectively activated or reconfigured by code to provide the necessary functionality. The processes disclosed herein are not inherently related to any particular computer, network, architecture, environment, or other apparatus, and may be implemented by a suitable
combination of hardware, software, and/or firmware. For example, various general-purpose
machines may be used with programs written in accordance with teachings of the invention, or it may be more convenient to construct a specialized apparatus or system to perform the required methods and techniques.
[0053] Aspects of the method and system described herein, such as the logic, may also be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices ("PLDs"), such as field programmable gate arrays ("FPGAs"), programmable array logic ("PAL") devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits. Some other possibilities for implementing aspects include: memory devices, microcontrollers with memory (such as EEPROM), embedded microprocessors, firmware, software, etc. Furthermore, aspects may be embodied in microprocessors having software-based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types. The underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor
("MOSFET") technologies like complementary metal-oxide semiconductor ("CMOS"), bipolar technologies like emitter-coupled logic ("ECL"), polymer technologies (e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures), mixed analog and digital, and so on.
[0054] It should also be noted that the various logic and/or functions disclosed herein may be enabled using any number of combinations of hardware, firmware, and/or as data and/or instructions embodied in various machine-readable or computer-readable media, in terms of their behavioral, register transfer, logic component, and/or other characteristics. Computer-readable media in which such formatted data and/or instructions may be embodied include, but are not limited to, non-volatile storage media in various forms (e.g., optical, magnetic or semiconductor storage media) though again does not include transitory media. Unless the context clearly requires otherwise, throughout the description, the words "comprise," "comprising," and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of "including, but not limited to." Words using the singular or plural number also include the plural or singular number respectively. Additionally, the words "herein,"
"hereunder," "above," "below," and words of similar import refer to this application as a whole and not to any particular portions of this application. When the word "or" is used in reference to
a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list.
[0055] Although certain presently preferred implementations of the invention have been specifically described herein, it will be apparent to those skilled in the art to which the invention pertains that variations and modifications of the various implementations shown and described herein may be made without departing from the spirit and scope of the invention. Accordingly, it is intended that the invention be limited only to the extent required by the applicable rules of law.
Claims
1. A method of database management, comprising:
by a server system with a processor and memory, the server in communication with a plurality of networks,
receiving, from the plurality of networks, data regarding network criteria;
receiving, from a user, a set of selections of criteria for at least one of the networks;
determining a match of a network, from the plurality of networks suing an algorithm and the network criteria, based on the user set of selections of the criteria; and
sending, to the user, the determined network match;
sending, to the network, information regarding the user.
2. The method of claim 1 wherein the algorithm includes user of a score, the score having been determined for the user.
3. The method of claim 2 wherein the score for the user includes a risk element.
4. The method of claim 1 wherein the set of selections of criteria for at least one of the networks is submitted to the server system using a form.
5. The method of claim 1 wherein the user set of selections of criteria includes a login without detailed information.
6. The method of claim 5 wherein the information regarding the user set to the matched network is a token for the user.
7. The method of claim 1 wherein the platform provides an interface for the users to submit the set of selections of criteria for at least one of the networks.
8. The method of claim 1 wherein, by the platform, sending a chart to the user with a plurality of network services.
9. The method of claim 8 wherein the chart is compiled using a sortable table and the network services are anonymized to the user.
10. A non-transitory computer-readable medium having computer-executable instructions thereon for a method of database management, the method comprising:
by a server system with a processor and memory, the server in communication with a plurality of networks,
receiving, from the plurality of networks, data regarding network criteria;
receiving, from a user, a set of selections of criteria for at least one of the networks;
determining a match of a network, from the plurality of networks suing an algorithm and the network criteria, based on the user set of selections of the criteria; and
sending, to the user, the determined network match;
sending, to the network, information regarding the user.
11. The non-transitory computer-readable medium of claim 10 wherein the algorithm includes user of a score, the score having been determined for the user.
12. The non-transitory computer-readable medium of claim 11 wherein the score for the user includes a risk element.
13. The method of non-transitory computer-readable medium 10 wherein the set of selections of criteria for at least one of the networks is submitted to the server system using a form.
14. The non-transitory computer-readable medium of claim 10 wherein the user set of selections of criteria includes a login without detailed information.
15. The non-transitory computer-readable medium of claim 14 wherein the information regarding the user set to the matched network is a token for the user.
16. The non-transitory computer-readable medium of claim 10 wherein the platform provides an interface for the users to submit the set of selections of criteria for at least one of the networks.
17. A system of database management, comprising:
by a server system with a processor and memory, the server in communication with a plurality of networks, the server configured to,
receive, from the plurality of networks, data regarding network criteria;
receive, from a user, a set of selections of criteria for at least one of the networks; determine a match of a network, from the plurality of networks suing an algorithm and the network criteria, based on the user set of selections of the criteria; and
send, to the user, the determined network match;
send, to the network, information regarding the user.
18. The system of claim 17 wherein the algorithm includes user of a score, the score having been determined for the user.
19. The system of claim 18 wherein the score for the user includes a risk element.
20. The system of claim 71 wherein the set of selections of criteria for at least one of the networks is submitted to the server system using a form.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201762466082P | 2017-03-02 | 2017-03-02 | |
US62/466,082 | 2017-03-02 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018161042A1 true WO2018161042A1 (en) | 2018-09-07 |
Family
ID=63371113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2018/020773 WO2018161042A1 (en) | 2017-03-02 | 2018-03-02 | Agnostic handling database management |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2018161042A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090144191A1 (en) * | 1998-05-08 | 2009-06-04 | Douglas Lebda | Method and computer network for co-ordinating a loan over the internet |
US20090254487A1 (en) * | 2000-10-02 | 2009-10-08 | International Projects Consultancy Services, Inc. | Automated loan processing system and method |
US7894448B1 (en) * | 2006-05-24 | 2011-02-22 | Hewlett-Packard Development Company, L.P. | Proving that a user profile satisfies selection criteria for targeted data delivery |
US20140115715A1 (en) * | 2012-10-23 | 2014-04-24 | Babak PASDAR | System and method for controlling, obfuscating and anonymizing data and services when using provider services |
-
2018
- 2018-03-02 WO PCT/US2018/020773 patent/WO2018161042A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090144191A1 (en) * | 1998-05-08 | 2009-06-04 | Douglas Lebda | Method and computer network for co-ordinating a loan over the internet |
US20090254487A1 (en) * | 2000-10-02 | 2009-10-08 | International Projects Consultancy Services, Inc. | Automated loan processing system and method |
US7894448B1 (en) * | 2006-05-24 | 2011-02-22 | Hewlett-Packard Development Company, L.P. | Proving that a user profile satisfies selection criteria for targeted data delivery |
US20140115715A1 (en) * | 2012-10-23 | 2014-04-24 | Babak PASDAR | System and method for controlling, obfuscating and anonymizing data and services when using provider services |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210233120A1 (en) | Authorization and termination of the binding of social account interactions to a master agnostic identity | |
US10204335B1 (en) | Proximity-based mobile device payments | |
EP2783319B1 (en) | Providing verification of user identification information | |
US7991725B2 (en) | Intelligent reputation attribution platform | |
US9697517B1 (en) | Token generation in providing a secure credit card payment service without storing credit card data on merchant servers | |
US20130238461A1 (en) | Methods and systems for matching consumers with providers | |
AU2022215318B2 (en) | Intermediated access to entity information profiles | |
US20210103939A1 (en) | Computerised system and method for matching a user to a caregiver or a caregiving facility | |
US20170243013A1 (en) | Multi-modal online transactional processing system | |
US20180349886A1 (en) | Notification based provisioning of card accounts | |
US20200258171A1 (en) | System and Method for Interfacing Acquiring Entities and Realtors | |
WO2017078906A1 (en) | Systems and processes for anonymously and confidentially introducing one or more potential purchasers of an unlisted real property to the owner of that property | |
US20210117477A1 (en) | System and method for generating a recommendation | |
US11403422B2 (en) | Systems and methods for the secured entry and storage of sensitive data | |
US9665889B1 (en) | Systems, methods and articles for providing personalized web content based on portable personas | |
US9548996B2 (en) | Hybrid engine for generating a recommended security tier | |
US11531969B1 (en) | Location-based user dataset management | |
US20140304097A1 (en) | Method & System for the automated population of data fields, with personal information, in enrollment/registration forms of service providers | |
WO2024019838A1 (en) | A product shopping system and method having a charitable donation platform | |
WO2018161042A1 (en) | Agnostic handling database management | |
US20220253960A1 (en) | System and Method for Interfacing Entities Engaged in Property Exchange Activities | |
WO2020051128A1 (en) | A system and method for the creation, management, and delivery of personal cookie-like packets of information to be utilized as reverse cookies within network-based environments | |
US12272199B2 (en) | Realty virtual assistant | |
US12165183B2 (en) | Server device, non-transitory computer readable medium, and method for managing multiple transactional workflows | |
US11880859B1 (en) | Counteroffer for market offer code failed validation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18761648 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18761648 Country of ref document: EP Kind code of ref document: A1 |