Dynamic digital consent
First Claim
Patent Images
1. A method of improving the performance of a computer system, the method comprising the steps of:
- capturing a transaction identifier submitted by a user device;
detecting that the user device is located at a first geographic location;
creating, and no less than a minute later terminating, an audio telecommunication linkage with the user device;
determining that after terminating the audio telecommunication linkage, the user device is at a second geographic location;
in response to determining that the user device is at the second geographic location, executing an authorization scheme comprising;
retrieving a list of system applications associated with the transaction identifier;
deactivating active system resources of system applications absent from the list;
activating dormant system resources required to run the system applications on the list; and
executing the system applications and verifying the user device is authorized to submit consent data for the transaction identifier;
in response to successfully verifying the user device, changing operation of the user device for optimized review of disclosure information associated with the transaction identifier, the change in operation comprising;
altering the luminosity of a screen on the user device;
altering the size of text characters displayed on the screen of the user device; and
terminating communication between the user device and any other system not executing the authorization scheme;
pushing the disclosure information to the user device;
detecting a viewing of the disclosure information on the user device;
after the viewing, capturing affirmation to the disclosure information;
formulating consent data by embedding meta-data generated by the user device into the affirmation entered by the user;
based on the consent data, confirming that the second geographic location and an identity of the user device are suitable for the transaction identifier; and
after confirming that the second geographic location and the identity of the user device are suitable;
accepting the consent data;
executing a transaction corresponding to the transaction identifier; and
reversing the change in operation imposed on the user device such that the user device is restored to an operating state that existed prior to the change in operation;
wherein, when, over the course of a 30-day period, a system application in the list is deactivated by the authorization scheme more times than a non-default system application is activated by the authorization scheme, replacing the default application with the non-default application in the list of system applications.
0 Assignments
0 Petitions
Accused Products
Abstract
Method and apparatus for a system to harden digital consents. The system uses an evaluation of geographic locations, transaction times, and device identities to control the upload of consent data. Evaluations occur using numerous techniques including MAC address evaluation, IP address evaluation, meta-data evaluation, and physical location of restricted equipment such as ATMs and kiosks. Reliability of consent data entered into the system may be enhanced by strictly evaluating geographic locations, transaction times, and/or device identities.
22 Citations
13 Claims
-
1. A method of improving the performance of a computer system, the method comprising the steps of:
-
capturing a transaction identifier submitted by a user device; detecting that the user device is located at a first geographic location; creating, and no less than a minute later terminating, an audio telecommunication linkage with the user device; determining that after terminating the audio telecommunication linkage, the user device is at a second geographic location; in response to determining that the user device is at the second geographic location, executing an authorization scheme comprising; retrieving a list of system applications associated with the transaction identifier; deactivating active system resources of system applications absent from the list; activating dormant system resources required to run the system applications on the list; and executing the system applications and verifying the user device is authorized to submit consent data for the transaction identifier; in response to successfully verifying the user device, changing operation of the user device for optimized review of disclosure information associated with the transaction identifier, the change in operation comprising; altering the luminosity of a screen on the user device; altering the size of text characters displayed on the screen of the user device; and terminating communication between the user device and any other system not executing the authorization scheme; pushing the disclosure information to the user device; detecting a viewing of the disclosure information on the user device; after the viewing, capturing affirmation to the disclosure information; formulating consent data by embedding meta-data generated by the user device into the affirmation entered by the user; based on the consent data, confirming that the second geographic location and an identity of the user device are suitable for the transaction identifier; and after confirming that the second geographic location and the identity of the user device are suitable; accepting the consent data; executing a transaction corresponding to the transaction identifier; and reversing the change in operation imposed on the user device such that the user device is restored to an operating state that existed prior to the change in operation; wherein, when, over the course of a 30-day period, a system application in the list is deactivated by the authorization scheme more times than a non-default system application is activated by the authorization scheme, replacing the default application with the non-default application in the list of system applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
wherein acceptable geographic locations are within a threshold distance of the second geographic location.
-
-
5. The method of claim 1 wherein the affirmation comprises at least one of:
- a digital document, an electronic signature, a scanned copy of a paper document, a scanned copy of a hand signature, a text bearing digital file, an audio recording of a conversation, a video recording of a conversation, and any combination thereof, and comprises meta-data and an SHA Hash.
-
6. The method of claim 1 further comprising verifying the user device by identifying its MAC address in a list of approved MAC addresses, a list of disapproved MAC addresses, and any combination thereof.
-
7. The method of claim 1 wherein:
-
the user device is logged onto a remote computer system via an ISP server over the internet; and determining that the user device is within a pre-determined distance of a second geographic location by identifying MAC addresses IP addresses associated with the ISP server.
-
-
8. The method of claim 1 wherein:
-
the user device is logged onto a remote computer system via an integrated component of the remote computer system; and confirming the second geographic location comprises identifying a known physical location of the integrated component.
-
-
9. The method of claim 1 further comprising:
-
determining that the second geographic location and the identity of the user device are unsuitable for accepting the consent data; and transmitting a message to the user device indicating unsuitability of the second geographic location and providing a third geographic location to input the consent data.
-
-
10. The method of claim 1 further comprising, subsequent to executing the authorization scheme, deactivating active applications and activating deactivated applications to assume an optimal initial resource resting state for processing a future transaction identifier.
-
11. The method of claim 1, further comprising:
-
maintaining a default list of the system applications to be executed prior to the capturing the transaction identifier; adding to the default list system applications more frequently used to generate the consent data; and removing from the list system applications less frequently used to generate the consent data.
-
-
12. The method of claim 1, wherein:
-
the list of system applications comprises a priority list of applications; executing a system application on the priority list prior to accepting the consent data; and executing a system application not on the priority list after accepting the consent data.
-
-
13. The method of claim 12, wherein the priority list is determined based on:
- frequency of a system application'"'"'s use in prior consent inputs, time required to complete activation of the system application, magnitude of resource investments required for activation of the system application, anticipation of requests requiring that particular system application, compatibility problems with other system applications due to sequence of activations, and any combination thereof.
Specification