Database platform for realtime updating of user data from third party sources
First Claim
1. A computerized method, performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprising:
- receiving authentication information from a user computing device, the authentication information including at least a name and address of a user;
transmitting, to a secured third party risk system, a request for execution of a risk scoring algorithm to determine a current risk score of the user based at least on risk data of the user to the secured third-party risk system;
receiving, from the secured third-party risk system, the current risk score of the user;
accessing an item database including information associated with a plurality of items and, for each item, an associated criteria for matching the item with users;
querying the item database with at least the current risk score of the user;
receiving, in response to said querying the item database, information indicating;
a first one or more items matched to the user based on the current risk score; and
a second one or more items not matched to the user based on the current risk score;
generating interactive user interface data configured to display an interactive user interface on the user computing device, the user interface depicting information regarding at least one of the first one or more items;
determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user;
in response to determining that at least one of the second one or more items would be matched to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user;
in response to receiving an indication of selection of the option in the interactive user interface on the user computing device, initiating communication between the user computing device and an account discovery system, wherein the account discovery system is configured toreceive, via network communication with the user computing device,selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device; and
credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), data items associated with the user stored in one or more databases associated with the selected third-party entity;
transmit at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party entity;
access a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity; and
identify a new account of the user through analysis of the plurality of data items;
transmitting, to the secured third-party risk system, a second request for execution of the risk scoring algorithm to determine an updated risk score of the user based at least on risk data of the user, including information regarding the new account of the user, at the secured third-party risk system;
receiving, from the secured third-party risk system, the updated risk score of the user;
querying the item database with at least the updated risk score of the user;
receiving, in response to said querying the item database, information indicating that at least one of the second one or more items matched to the user based on the updated risk score; and
updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user computing device.
15 Assignments
0 Petitions
Accused Products
Abstract
A data processing system communicates with a secure third-party database to obtain information about a user that is usable to determine one or more items associated with the user. The system then coordinates gathering and identification of additional data relevant to the user from other third-party data sources, to potentially update the user'"'"'s information stored with the secure third-party database. The updated information may then be accessed at the secure third-party database to determine items associated with the user, which may include additional items in view of the additional data.
3133 Citations
18 Claims
-
1. A computerized method, performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprising:
-
receiving authentication information from a user computing device, the authentication information including at least a name and address of a user; transmitting, to a secured third party risk system, a request for execution of a risk scoring algorithm to determine a current risk score of the user based at least on risk data of the user to the secured third-party risk system; receiving, from the secured third-party risk system, the current risk score of the user; accessing an item database including information associated with a plurality of items and, for each item, an associated criteria for matching the item with users; querying the item database with at least the current risk score of the user; receiving, in response to said querying the item database, information indicating; a first one or more items matched to the user based on the current risk score; and a second one or more items not matched to the user based on the current risk score; generating interactive user interface data configured to display an interactive user interface on the user computing device, the user interface depicting information regarding at least one of the first one or more items; determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user; in response to determining that at least one of the second one or more items would be matched to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user; in response to receiving an indication of selection of the option in the interactive user interface on the user computing device, initiating communication between the user computing device and an account discovery system, wherein the account discovery system is configured to receive, via network communication with the user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device; and credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), data items associated with the user stored in one or more databases associated with the selected third-party entity; transmit at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party entity; access a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity; and identify a new account of the user through analysis of the plurality of data items; transmitting, to the secured third-party risk system, a second request for execution of the risk scoring algorithm to determine an updated risk score of the user based at least on risk data of the user, including information regarding the new account of the user, at the secured third-party risk system; receiving, from the secured third-party risk system, the updated risk score of the user; querying the item database with at least the updated risk score of the user; receiving, in response to said querying the item database, information indicating that at least one of the second one or more items matched to the user based on the updated risk score; and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computing system comprising:
a hardware computer processor configured to perform operations comprising; receiving authentication information from a user computing device, the authentication information including at least a name and address of a user; transmitting, to a secured third-party risk system, a request for execution of a risk scoring algorithm to determine a current risk score of the user based at least on risk data of the user at the secured third-party risk system; receiving, from the secured third-party risk system, the current risk score of the user; accessing an item database including information associated with a plurality of items and, for each item, an associated criteria for matching the item with users; querying the item database with at least the current risk score of the user; receiving, in response to said querying the item database, information indicating; a first one or more items matched to the user based on the current risk score; and a second one or more items not matched to the user based on the current risk score; generating interactive user interface data configured to display an interactive user interface on the user computing device, the user interface depicting information regarding at least one of the first one or more items; determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user; in response to determining that at least one of the second one or more items would be matched to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user; in response to receiving an indication of selection of the option in the interactive user interface on the user computing device, initiating communication between the user computing device and an account discovery system, wherein the account discovery system is configured to receive, via network communication with the user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device; and credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), data items associated with the user stored in one or more databases associated with the selected third-party entity; transmit at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party entity; access a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity; and identify a new account of the user through analysis of the plurality of data items; transmitting, to the secured third-party risk system, a second request for execution of the risk scoring algorithm to determine an updated risk score of the user based at least on risk data of the user, including information regarding the new account of the user, at the secured third-party risk system; receiving, from the secured third-party risk system, the updated risk score of the user; querying the item database with at least the updated risk score of the user; receiving, in response to said querying the item database, information indicating that at least one of the second one or more items matched to the user based on the updated risk score; and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user computing device. - View Dependent Claims (17)
-
18. A non-transitory computer readable medium having processor-executable instructions stored thereon, the processor-executable instructions executable by a hardware computer processor to perform operations comprising:
-
receiving authentication information from a user computing device, the authentication information including at least a name and address of a user; transmitting, to a secured third-party risk system, a request for execution of a risk scoring algorithm to determine a current risk score of the user based at least on risk data of the user at the secured third-party risk system; receiving, from the secured third-party risk system, the current risk score of the user; accessing an item database including information associated with a plurality of items and, for each item, an associated criteria for matching the item with users; querying the item database with at least the current risk score of the user; receiving, in response to said querying the item database, information indicating; a first one or more items matched to the user based on the current risk score; and a second one or more items not matched to the user based on the current risk score; generating interactive user interface data configured to display an interactive user interface on the user computing device, the user interface depicting information regarding at least one of the first one or more items; determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user; in response to determining that at least one of the second one or more items would be matched to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user; in response to receiving an indication of selection of the option in the interactive user interface on the user computing device, initiating communication between the user computing device and an account discovery system, wherein the account discovery system is configured to receive, via network communication with the user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device; and credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), data items associated with the user stored in one or more databases associated with the selected third-party entity; transmit at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party entity; access a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity; and identify a new account of the user through analysis of the plurality of data items; transmitting, to the secured third-party risk system, a second request for execution of the risk scoring algorithm to determine an updated risk score of the user based at least on risk data of the user, including information regarding the new account of the user, at the secured third-party risk system; receiving, from the secured third-party risk system, the updated risk score of the user; querying the item database with at least the updated risk score of the user; receiving, in response to said querying the item database, information indicating that at least one of the second one or more items matched to the user based on the updated risk score; and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user computing device.
-
Specification