×

Computer-implemented methods, systems and articles of manufacture for processing sensitive electronic tax return data

  • US 10,664,924 B1
  • Filed: 04/30/2015
  • Issued: 05/26/2020
  • Est. Priority Date: 04/30/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method comprising:

  • reading, by a first process executed by at least one processor, first runtime data of an electronic tax return from a shared data store;

    scanning, by the first process executed by the at least one processor, the first runtime data for one or more sensitive data tags;

    detecting, by the first process executed by the at least one processor, the one or more sensitive data tags as an outcome of the scanning;

    identifying within the first runtime data, by the first process executed by the at least one processor, a first subset of the first runtime data tagged by the detected one or more sensitive data tags, wherein the first subset of the first runtime data is sensitive data based on the tags;

    identifying within the first runtime data, by the first process executed by the at least one processor, a second subset of the first runtime data that is untagged by the detected one or more sensitive data tags, wherein the untagged second subset of the first runtime data is non-sensitive data based on being untagged;

    selecting, by the first process executed by the at least one processor, a first subset of logic computations to be performed on the sensitive data;

    selecting, by the first process executed by the at least one processor, a second subset of logic computations to be performed on the non-sensitive data;

    identifying, by the first process executed by the at least one processor, a first remote computing source;

    receiving, by the first process executed by the at least one processor, one or more security attributes of the first remote computing source;

    comparing, by the first process executed by the at least one processor, the one or more security attributes of the first remote computing source against one or more pre-determined minimum security criteria to identify first matches between the one or more security attributes of the first remote computing source and the one or more pre-determined minimum security criteria;

    in response to identifying the first matches, indicating, by the first process executed by the at least one processor, that the first remote computing source has security attributes satisfying the pre-determined minimum security criteria;

    identifying, by the first process executed by the at least one processor, a second remote computing source;

    receiving, by the first process executed by the at least one processor, one or more security attributes of the second remote computing source;

    comparing, by the first process executed by the at least one processor, the one or more security attributes of the second remote computing source against the one or more pre-determined minimum security criteria to identify second matches between the one or more security attributes of the second remote computing source and the one or more pre-determined minimum security criteria;

    in response to identifying the second matches, indicating, by the first process executed by the at least one processor, that the second remote computing source has security attributes satisfying the pre-determined minimum security criteria;

    identifying, by the first process executed by the at least one processor, a third remote computing source;

    transmitting, by the first process executed by the at least one processor through a first network and to the first remote computing resource, a first portion of the first subset of logic computations in response to the indicating that that the first remote computing source has security attributes satisfying the pre-determined minimum security criteria, wherein the first remote computing resource executes the first subset of logic computations involving sensitive data;

    transmitting, by the first process executed by the at least one processor through a second network and to the second remote computing resource, a second portion of the first subset of logic computations in response to the indicating that the second remote computing source has security attributes satisfying the pre-determined minimum security criteria, wherein the second remote computing resource executes the second portion of the first subset of logic computations involving sensitive data to distribute execution of logic computations involving sensitive data among different remote computing resources to enhance security of the sensitive data;

    transmitting, by the first process executed by the at least one processor through a third network and to the third remote computing resource, the second subset of logic computations that involve non-sensitive data, wherein the third remote computing resource executes the second subset of logic computations;

    receiving, by the first process executed by the at least one processor, first results of executing the first portion of the first subset of logic computations involving sensitive data from the first remote computing resource, receiving second results of executing the second portion of the first subset of logic computations involving sensitive data from the first remote computing resource, receiving third results of executing the second portion of the first subset of logic computations from the third remote computing resource;

    storing, by the first process executed by the at least one processor, the first results, the second results, and the third results to the shared data store to update the first runtime data to generate second runtime data;

    reading, by the first process executed by the at least one processor, the second runtime data from the shared data store;

    generating, by the first process executed by the at least one processor, a first non-binding suggestion including interview screen content that is dependent upon at least a portion of the first results, the second results, and the third results in the second runtime data;

    generating, by a second process executed by the at least one processor, an interview screen including at least a portion of the interview screen content in the first non-binding suggestion, the interview screen being presented through a display in communication with the at least one processor, and the second process executing independently of the first process;

    receiving, by the second process executed by the at least one processor, user input in response to the interview screen; and

    updating, by the second process executed by the at least one processor, the second runtime data to generate third runtime data based at least in part upon the user input.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×