Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules
First Claim
Patent Images
1. A computing system comprising:
- one or more storage devices configured to store electronic software instructions; and
one or more computer processors in communication with the one or more storage devices, the one or more computer processors configured to execute the stored electronic software instructions to cause the computing system to automatically;
access, over a network, user information stored in the one or more storage devices, the user information including master data values associated with respective data fields;
access a first remote database of a plurality of remote databases over the network;
determine first remote data associated with a user stored in the first remote database;
compare the first remote data to the user information by comparing the master data values in the user information to corresponding remote data values of remote data fields;
identify a particular master data value in a particular data field that do not include a corresponding remote data value in an associated remote data field;
identify a subset of the plurality of remote databases that each do not include the corresponding remote data value, said identifying comprising, for each of the plurality of remote databases;
accessing a remote database using security protocols and/or communication protocols, over the network;
determining that the corresponding remote data value is not included in a remote data field in the remote database corresponding to the remote data value; and
in response to determining that the remote data value is not included in the remote data field, including the remote database in the subset of remote databases;
generate a user interface for transmission to a remote user computing device, the user interface including;
an indication of the subset of remote databases; and
an interactive user interface control usable to select one or more of the subset of remote databases; and
in response to receiving the indication of a selected one or more of the subset of remote databases from the remote user computing device, for each of the one or more selected remote databases;
determine the security protocols and/or communication protocols; and
using the determined security protocols and/or communication protocols, initiate an update for the one or more selected remote databases.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing system is configured to access a plurality of remote databases in order to identify data inconsistencies between the remote databases and provide user interfaces to a user in order to initiate communication via one or more APIs to certain remote databases indicating updates that reconcile said data inconsistencies.
1364 Citations
20 Claims
-
1. A computing system comprising:
-
one or more storage devices configured to store electronic software instructions; and one or more computer processors in communication with the one or more storage devices, the one or more computer processors configured to execute the stored electronic software instructions to cause the computing system to automatically; access, over a network, user information stored in the one or more storage devices, the user information including master data values associated with respective data fields; access a first remote database of a plurality of remote databases over the network; determine first remote data associated with a user stored in the first remote database; compare the first remote data to the user information by comparing the master data values in the user information to corresponding remote data values of remote data fields; identify a particular master data value in a particular data field that do not include a corresponding remote data value in an associated remote data field; identify a subset of the plurality of remote databases that each do not include the corresponding remote data value, said identifying comprising, for each of the plurality of remote databases; accessing a remote database using security protocols and/or communication protocols, over the network; determining that the corresponding remote data value is not included in a remote data field in the remote database corresponding to the remote data value; and in response to determining that the remote data value is not included in the remote data field, including the remote database in the subset of remote databases; generate a user interface for transmission to a remote user computing device, the user interface including; an indication of the subset of remote databases; and an interactive user interface control usable to select one or more of the subset of remote databases; and in response to receiving the indication of a selected one or more of the subset of remote databases from the remote user computing device, for each of the one or more selected remote databases; determine the security protocols and/or communication protocols; and using the determined security protocols and/or communication protocols, initiate an update for the one or more selected remote databases. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
accessing, over a network, user information stored in one or more storage devices, the user information including master data values associated with respective data fields; accessing a first remote database of a plurality of remote databases over the network; determining first remote data associated with a user stored in the first remote database; comparing the first remote data to the user information by comparing the master data values in the user information to corresponding remote data values of remote data fields; identifying a particular master data value in a particular data field that does not include a corresponding remote data value in an associated remote data field; identifying a subset of the plurality of remote databases that each do not include the corresponding remote data value, said identifying comprising, for each of the plurality of remote databases; accessing a remote database using security protocols and/or communication protocols, over the network; determining that the corresponding remote data value is not included in the remote data field in the remote database corresponding to the remote data value; in response to determining that the remote data value is not included in the remote data field, including the remote database in the subset of remote databases; determining security protocols and/or communication protocols; applying one or more rules to the subset of the plurality of remote databases to identify one or more remote databases to receive an update; and using the determined security protocols and/or communication protocols, initiating the update for the remote database to the identified one or more remote databases to receive an update based on the one or more rules. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable medium storing instructions configured to cause one or more computer processors to perform operations comprising:
-
accessing, over a network, user information stored in the one or more storage devices, the user information including master data values associated with respective data fields; accessing a first remote database of a plurality of remote databases over the network; determining first remote data associated with a user stored in the first remote database; identifying a particular master data value of the master data values that is not included in one or more remote data fields of the first remote data, wherein identifying the particular master data value includes; determining the one or more remote data fields of the first remote data associated with the user stored in the first remote database; comparing the at least one master data value with remote data values of the first remote data in the determined one or more remote data fields; determining that the determined one or more remote data fields of the first remote data do not include the at least one master data value; determining that the particular master data value of the at least one master data value is not included in the determined one or more remote data fields of the first remote data; identifying a subset of the plurality of remote databases that each do not include the particular master data value in a remote data field, wherein identifying the subset of the plurality of remote databases comprises, for each of the plurality of remote databases; accessing a remote database of the plurality of remote databases using security protocols and/or communication protocols over the network; identifying one or more remote data fields of the remote database; determining that the identified one or more remote data fields does not include the particular master data value; and in response to determining that the identified one or more remote data fields does not include the particular master data value, adding the remote database to the subset of remote databases; and for one or more of the remote databases; determining security protocols and/or communication protocols; identifying one or more remote databases that are accessible to be updated; and using the determined security protocols and/or communication protocols, initiating an update for the one or more remote databases that are accessible to be updated. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification