×

Dynamic digital consent

  • US 10,417,401 B2
  • Filed: 07/30/2017
  • Issued: 09/17/2019
  • Est. Priority Date: 07/30/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method of improving the performance of a computer system, the method comprising the steps of:

  • reactivating, at a scheduled time, dormant system resources required to execute, on a remote computer system, a plurality of system applications on a default list, the default list identifying a group of default system applications, the resources comprising electricity, processing power, and auxiliary systems;

    creating, and no less than a minute later terminating, an audio telecommunication linkage between a device and the remote computer system when the device is located at a first geographic location;

    during the telecommunication linkage, a second geographic location is identified via audio transmission, the second geographic location different from the first geographic location;

    detecting transporting of the device to the second geographic location after the termination of the telecommunication linkage;

    at the second location, transmitting a signal from the device to the remote computer system, the signal comprising an identity of an item of consent data, a transaction identity, a device identity, an indicator that the device is located at the second geographic location, a time period, and the device user;

    based on the second location, activating a consent scheme on the device comprising;

    retrieving a first list, the first list identifying a group of system applications associated with the identified item of consent data;

    deactivating active system resources of system applications absent from the first list;

    reactivating dormant system resources required to activate a first collection of dormant system applications of the first list, the first collection of system applications verifying that the device is in fact at the second geographic location and that the second geographic location matches a predetermined value associated with the identified item of consent data;

    reactivating dormant system resources required to activate a second collection of dormant system applications of the first list, the second collection of system applications verifying that the time period matches a predetermined value associated with the identified item of consent data;

    reactivating dormant system resources required to activate a third collection of dormant system applications of the first list, the third collection of system applications verifying that the device identify matches a predetermined value associated with the identified item of consent data;

    based on the second location, activating an authorization scheme comprising;

    retrieving a second list, the second list identifying a group of default system applications associated with both the transaction and the identified item of consent data;

    deactivating active system resources of system applications absent from the second list;

    activating dormant system resources of system applications present on the second list; and

    utilizing data generated by the active system applications and the signal to generate and return an approval value;

    when all of the second geographic location, time period, and device identity match their respective predetermined values, the remote computer system changes the operation of the device to optimize the preparation of the identified item of consent data, the change in operation comprising;

    altering the luminosity of a screen on the device, altering the size of text characters displayed on the screen of the device, and terminating communication between the device and any computer system other than the remote computer system;

    creating the identified item of consent data and uploading the item of consent data from the device to the remote computer system; and

    when, over the course of a 30-day period, a default application is deactivated by the authorization scheme or consent scheme more times than a non-default application is activated by the authorization scheme or consent scheme, replacing the default application with the non-default application in the default list.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×