Dynamic digital consent
First Claim
Patent Images
1. A method of improving the performance of a computer system, the method comprising the steps of:
- reactivating, at a scheduled time, dormant system resources required to execute, on a remote computer system, a plurality of system applications on a default list, the default list identifying a group of default system applications, the resources comprising electricity, processing power, and auxiliary systems;
creating, and no less than a minute later terminating, an audio telecommunication linkage between a device and the remote computer system when the device is located at a first geographic location;
during the telecommunication linkage, a second geographic location is identified via audio transmission, the second geographic location different from the first geographic location;
detecting transporting of the device to the second geographic location after the termination of the telecommunication linkage;
at the second location, transmitting a signal from the device to the remote computer system, the signal comprising an identity of an item of consent data, a transaction identity, a device identity, an indicator that the device is located at the second geographic location, a time period, and the device user;
based on the second location, activating a consent scheme on the device comprising;
retrieving a first list, the first list identifying a group of system applications associated with the identified item of consent data;
deactivating active system resources of system applications absent from the first list;
reactivating dormant system resources required to activate a first collection of dormant system applications of the first list, the first collection of system applications verifying that the device is in fact at the second geographic location and that the second geographic location matches a predetermined value associated with the identified item of consent data;
reactivating dormant system resources required to activate a second collection of dormant system applications of the first list, the second collection of system applications verifying that the time period matches a predetermined value associated with the identified item of consent data;
reactivating dormant system resources required to activate a third collection of dormant system applications of the first list, the third collection of system applications verifying that the device identify matches a predetermined value associated with the identified item of consent data;
based on the second location, activating an authorization scheme comprising;
retrieving a second list, the second list identifying a group of default system applications associated with both the transaction and the identified item of consent data;
deactivating active system resources of system applications absent from the second list;
activating dormant system resources of system applications present on the second list; and
utilizing data generated by the active system applications and the signal to generate and return an approval value;
when all of the second geographic location, time period, and device identity match their respective predetermined values, the remote computer system changes the operation of the device to optimize the preparation of the identified item of consent data, the change in operation comprising;
altering the luminosity of a screen on the device, altering the size of text characters displayed on the screen of the device, and terminating communication between the device and any computer system other than the remote computer system;
creating the identified item of consent data and uploading the item of consent data from the device to the remote computer system; and
when, over the course of a 30-day period, a default application is deactivated by the authorization scheme or consent scheme more times than a non-default application is activated by the authorization scheme or consent scheme, replacing the default application with the non-default application in the default list.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and apparatus for a system to harden digital consents. The system uses an evaluation of geographic locations, transaction times, and device identities to control the upload of consent data. Evaluations occur using numerous techniques including MAC address evaluation, IP address evaluation, meta-data evaluation, and physical location of restricted equipment such as ATMs and kiosks. Reliability of consent data entered into the system may be enhanced by strictly evaluating geographic locations, transaction times, and/or device identities.
221 Citations
14 Claims
-
1. A method of improving the performance of a computer system, the method comprising the steps of:
-
reactivating, at a scheduled time, dormant system resources required to execute, on a remote computer system, a plurality of system applications on a default list, the default list identifying a group of default system applications, the resources comprising electricity, processing power, and auxiliary systems; creating, and no less than a minute later terminating, an audio telecommunication linkage between a device and the remote computer system when the device is located at a first geographic location; during the telecommunication linkage, a second geographic location is identified via audio transmission, the second geographic location different from the first geographic location; detecting transporting of the device to the second geographic location after the termination of the telecommunication linkage; at the second location, transmitting a signal from the device to the remote computer system, the signal comprising an identity of an item of consent data, a transaction identity, a device identity, an indicator that the device is located at the second geographic location, a time period, and the device user; based on the second location, activating a consent scheme on the device comprising; retrieving a first list, the first list identifying a group of system applications associated with the identified item of consent data; deactivating active system resources of system applications absent from the first list; reactivating dormant system resources required to activate a first collection of dormant system applications of the first list, the first collection of system applications verifying that the device is in fact at the second geographic location and that the second geographic location matches a predetermined value associated with the identified item of consent data; reactivating dormant system resources required to activate a second collection of dormant system applications of the first list, the second collection of system applications verifying that the time period matches a predetermined value associated with the identified item of consent data; reactivating dormant system resources required to activate a third collection of dormant system applications of the first list, the third collection of system applications verifying that the device identify matches a predetermined value associated with the identified item of consent data; based on the second location, activating an authorization scheme comprising; retrieving a second list, the second list identifying a group of default system applications associated with both the transaction and the identified item of consent data; deactivating active system resources of system applications absent from the second list; activating dormant system resources of system applications present on the second list; and utilizing data generated by the active system applications and the signal to generate and return an approval value; when all of the second geographic location, time period, and device identity match their respective predetermined values, the remote computer system changes the operation of the device to optimize the preparation of the identified item of consent data, the change in operation comprising;
altering the luminosity of a screen on the device, altering the size of text characters displayed on the screen of the device, and terminating communication between the device and any computer system other than the remote computer system;creating the identified item of consent data and uploading the item of consent data from the device to the remote computer system; and when, over the course of a 30-day period, a default application is deactivated by the authorization scheme or consent scheme more times than a non-default application is activated by the authorization scheme or consent scheme, replacing the default application with the non-default application in the default list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification