×

Dynamic digital consent

  • US 10,733,273 B2
  • Filed: 09/16/2019
  • Issued: 08/04/2020
  • Est. Priority Date: 07/30/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method of improving the performance of a computer system, the method comprising the steps of:

  • capturing a transaction identifier submitted by a user device;

    detecting that the user device is located at a first geographic location;

    creating, and no less than a minute later terminating, an audio telecommunication linkage with the user device;

    determining that after terminating the audio telecommunication linkage, the user device is at a second geographic location;

    in response to determining that the user device is at the second geographic location, executing an authorization scheme comprising;

    retrieving a list of system applications associated with the transaction identifier;

    deactivating active system resources of system applications absent from the list;

    activating dormant system resources required to run the system applications on the list; and

    executing the system applications and verifying the user device is authorized to submit consent data for the transaction identifier;

    in response to successfully verifying the user device, changing operation of the user device for optimized review of disclosure information associated with the transaction identifier, the change in operation comprising;

    altering the luminosity of a screen on the user device;

    altering the size of text characters displayed on the screen of the user device; and

    terminating communication between the user device and any other system not executing the authorization scheme;

    pushing the disclosure information to the user device;

    detecting a viewing of the disclosure information on the user device;

    after the viewing, capturing affirmation to the disclosure information;

    formulating consent data by embedding meta-data generated by the user device into the affirmation entered by the user;

    based on the consent data, confirming that the second geographic location and an identity of the user device are suitable for the transaction identifier; and

    after confirming that the second geographic location and the identity of the user device are suitable;

    accepting the consent data;

    executing a transaction corresponding to the transaction identifier; and

    reversing the change in operation imposed on the user device such that the user device is restored to an operating state that existed prior to the change in operation;

    wherein, when, over the course of a 30-day period, a system application in the list is deactivated by the authorization scheme more times than a non-default system application is activated by the authorization scheme, replacing the default application with the non-default application in the list of system applications.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×