This disclosure relates in general to securing data, and more particularly, to systems and methods of securing personally identifiable information.
Financial institutions (e.g., banks, lenders) generally require an applicant seeking credit to provide personally identifiable information (e.g., first and last name, social security number, residential address, and birth date) to the financial institution during the application process. The financial institution then requests financial information from one or more credit bureaus (e.g., EquiFax, TransUnion, & Experian) based on the personally identifiable information provided by the applicant. Although credit bureaus and financial institutions take measures to secure the sensitive data that they store (e.g., financial and personally identifiable information), credit bureaus and financial institutions remain regular targets for hackers and are therefore constantly at risk for data breach. In addition to external risk factors, credit bureaus and financial institutions may also take preventative measures to reduce the risk of internal data leaks or data spills. Irrespective of whether a breach is internal or external, the release of a person's sensitive information may be harmful. For example, a data breach victim may experience identity theft which may have both short and long term personal and financial consequences.
According to one embodiment, a system for securing sensitive data includes one or more databases, at least one processor, and a memory configured to store instructions. The one or more databases are configured to store a plurality of financial profiles and personally identifiable information corresponding to each user of the system. The instructions are operable when executed by the processor to receive a token from a financial institution and determine that the token corresponds to a first user of the system. The instructions are further operable when executed to communicate a credit application associated with the first user to the financial institution, wherein the credit application is generated based on a financial profile corresponding to the first user. The instructions are further operable when executed to automatically communicate, to the financial institution, personally identifiable information corresponding to the first user in response to determining that the first user accepted a credit offer of the financial institution.
Certain embodiments may provide one or more technical advantages. For example, an embodiment of the present disclosure provides increased protection of sensitive information relative to conventional systems and methods of applying for credit. Specifically, one or more embodiments of the present disclosure contemplate limiting the computing resources that receive sensitive information. As another example, an embodiment of the present disclosure provides for more limited and secure access to sensitive information relative to conventional systems and methods of applying for credit. In yet another example, an embodiment of the present disclosure provides a more efficient (conserving both time and computing resources) credit application process relative to conventional credit application processes. Other technical advantages will be readily apparent to one skilled in the art from the following figures, descriptions, and claims. Moreover, while specific advantages have been enumerated above, various embodiments may include all, some, or none of the enumerated advantages.
For a more complete understanding of the present disclosure and its advantages, reference is now made to the following description, taken in conjunction with the accompanying drawings, in which:
Data breach is a serious concern for both organizations storing sensitive data (e.g., financial and/or personally identifiable information associated with a person) and persons associated with said confidential data. The release of confidential data is associated with a number of consequences, the most notable being identity theft. As an example, identity theft may result in financial fraud, leaving a data breach victim liable for debts incurred by a perpetrator. As another example, identity theft may result in personal fraud, which may in a particular instance, associate the data breach victim with non-financial crimes committed by the perpetrator. In addition to consequences endured by the person associated with the sensitive information, the organization storing such sensitive information may also experience repercussions as a result of a data breach. For example, the breached organization may be liable for the dissemination of a victim's sensitive information. As another example, the breached organization may provide damage control incentives and/or offerings to victims as a result of a data breach. In yet another example, the breached organization may come under criticism of the public and/or governmental/regulatory bodies. Because the dissemination of sensitive information has major consequences, security of such information is a major concern.
The conventional way of applying for credit (e.g., loans, credit cards) requires providing personally identifiable information to a credit lender or other financial institution which in turn seeks financial information about the applicant from a credit bureau based on the personally identifiable information provided by the applicant. As such, sensitive information about the applicant is known (and in some cases, stored) by both the credit bureau and the financial institution to which the applicant is requesting credit. This is the case even in situations where the financial institutions deny the applicant's request for credit. In such situation, applicant may proceed to request credit from one or more other financial institutions that will receive and request sensitive information associated with applicant. As a result, a number of financial institutions may gain access to sensitive information of the applicant. Because sensitive information is more secure in fewer hands than in more, such a process puts sensitive data at risk.
This disclosure recognizes that the above description of applying for credit may be overly simplistic in that many other parties may receive an applicant's sensitive data during the credit application and lending process. As an example, an applicant may not apply for credit directly with a financial institution and instead apply for credit via a third party lead generator (e.g., Mint.com), who in turn may send the applicant's sensitive data to one or more financial institutions that may or may not grant applicant's request for credit. Although the example used above refers to a third party lead generator, this disclosure recognizes that other middlemen may receive an applicant's sensitive data. In some cases, middlemen include data and content providers and/or affiliate marketing companies.
This disclosure recognizes a unique and unconventional method of securing sensitive data. Unlike the conventional method of applying for credit, this disclosure describes a method that disassociates an applicant's personally identifiable information from the applicant's financial information, which improves the security of the applicant's sensitive information. In such method, an applicant's personally identifiable information is released at an appropriate time in the application process (e.g., after an applicant has been approved for credit). As such, an applicant's personally identifiable information is not distributed and/or stored by parties with whom the applicant does not establish an ongoing financial relationship. Additionally, the method described herein secures financial information by limiting access to the applicant's financial information using duration-defined tokens (e.g., tokens being single time use only). By implementing one or more of steps disclosed herein, the security of the credit application and lending process is improved relative to the conventional application and lending process.
Network 110 may refer to any interconnecting system capable of transmitting audio, video, signals, data, messages, or any combination of the preceding. Network 110 may include all or a portion of a public switched telephone network, a public or private data network, a local area network (LAN), an ad hoc network, a personal area network (PAN), a metropolitan area network (MAN), a wide area network (WAN), a local, regional, or global communication or computer network such as the Internet, an enterprise intranet, or any other suitable communication link, including combinations thereof. One or more portions of one or more of these networks may be wired or wireless. Examples of wireless networks 110 may include a wireless PAN (WPAN) (e.g., a BLUETOOTH WPAN), a WI-FI network, a WI-MAX network, a cellular telephone network (e.g., a Global System for Mobile Communications (GSM) network), or other suitable wireless network or a combination of two or more of these.
Network environment 100 may include one or more users 120. As depicted in
User 120 may be associated with one or more user devices 130. As depicted in
Network environment 140 may include one or more financial institutions 140. As depicted in
As described above, network environment 100 may also include one or more credit bureaus 150, one or more creditors 160, and one or more market intermediaries 180. As depicted in
As in conventional methods of credit application and lending processes, creditors 160 will report financial information related to users 120 to credit bureau 150, and credit bureau 150 will aggregate the received information and associate portions of the received information with one or more users 120. Unlike conventional methods of credit application and lending processes, this disclosure recognizes that credit bureaus 150 communicate some or all of the aggregated data to CLASP 170, which in turn uses the aggregated data to update financial profiles of users 120. Although credit bureaus 150 conventionally have access to personally identifiable information (PII) of users 120, this disclosure recognizes that credit bureaus 150 may only have access to financial information about anonymized users. In such embodiments, credit bureaus 150 may seek PII of users 120 from CLASP 170 using one or more secure methods described herein. For example, credit bureau 150 may request a token 250 from CLASP 170 associated with an anonymized user 120, and in response, CLASP 170 may send (or alternatively, provide access to) the requested PII.
As used herein, “creditor” describes an entity to whom user 120 owes money and a “potential creditor” describes an entity to whom user 120 may owe money. As an example, creditors may include landlords, utility companies, credit card companies, etc.
As will be described below in reference to
Turning now to
Upon receiving updates 210, credit bureau 150 may determine which updates 210 are applicable to which debtor. For example, credit bureau 150 may receive update 210a (not illustrated) and determine, based on the content of the update, that update 210a applies to user 120a. After determining that one or more updates 210 are applicable to a specific debtor, credit bureau 150 may aggregate data about the debtor. The aggregated data may include historical financial information about debtor and updates 210. In some embodiments, credit bureau 150 may generate one or more credit scores and/or one or more credit reports. As an example, Equifax may generate an Equifax credit score and a credit report based on financial information regarding user 120a. As another example, Experian may generate an Experian credit score and/or credit report based on financial information regarding user 120b.
Because credit bureaus 150 are conventionally the sole holders of this type of information, financial institutions 140 seek information about past, current, and potential debtors from credit bureaus 150. As described above, the information sought by financial institutions 140 may comprise sensitive information about a debtor, and relaying such information may jeopardize the security of the sensitive information. Accordingly, this disclosure recognizes users 120 controlling access to their respective financial and personally identifiable data, thereby increasing the security of such sensitive information. Users 120 may control access to their sensitive information using CLASP 170.
As illustrated in
Financial profile manager 172 is further configured to aggregate the data received about a particular user 120 and update the financial profile 220 corresponding to the particular user 120. Because the financial profile 220 generated by financial profile manager 172 may include financial data collected from one or more credit bureaus 150, the generated financial profile 220 may be a more accurate representation of a debtor's financial situation than the credit score and/or report generated by a single credit bureau 150. In some other embodiments, credit bureaus 150 are not the sole source of financial information of users 120. As an example, CLASP 170 may generate its own financial data regarding users 120 based on proprietary algorithms. As another example, CLASP 170 may use financial information provided by other credit sources (e.g., creditors 160). In some embodiments, financial profile manager 172 is further configured to send one or more financial profiles to credit application engine 174.
In some embodiments, access to a financial profile 220 is limited to the account holder (e.g., a user 120 having proper account credentials) and/or administrators of CLASP 170. As an example, access to financial profile 220a (not illustrated) which is associated with user 120a may be limited to user 120a and an administrator of CLASP 170.
CLASP 170 also includes credit application engine 174 in some embodiments. In some embodiments, credit application engine 174 is configured to perform one or more of the following actions: receive one or more application requests 230, identify a user 120 associated with a particular application request 230, receive a financial profile 220 associated with the user 120 corresponding to a particular application request 230, generate a credit application 240 that anonymizes the credit applicant, encrypt the generated credit application, and send the encrypted credit application 240 to one or more financial institutions 140 and/or other potential creditors. In some other embodiments, credit application engine 174 maintains a persistent credit application 240 for user 120 instead of generating credit application 240 based on request 230. In such an embodiment, credit application engine 174 continuously updates credit application 240 based on data received from credit bureaus 150.
As used herein, an “application request” 230 refers to a request 230 from a user 120 to generate a credit application. In some embodiments, credit application engine 174 receives one or more application requests 230 from one or more users 120. As depicted in
In some embodiments, credit application engine 174 identifies user 120 based on the CLASP account used to generate such application request 230. For example, credit application engine 174 may determine that user 120a submitted application request 230a because application request 230a was sent from the CLASP account associated with user 120a. As another example, credit application engine 174 may identify user 120 based on information provided in request 230 (e.g., name, social security number, assigned user id, unique cryptographic number).
Upon identifying a user 120 associated with an application request 230, credit application engine 174 may receive the financial profile 220 associated with user 120. In some embodiments, credit application engine 174 receives financial profile 220 as a result of back and forth communications with financial profile manager 220 (e.g., credit application engine 174 requests financial profile 220 associated with user 120, financial profile manager 172 queries a database for the financial profile 220 associated with user 120 in response to receiving the request, financial profile manager 172 copies the financial profile 220 associated with user 120 and sends the copy of financial profile 220 to credit application engine 174). In other embodiments, credit application engine 174 may retrieve financial profile 220 associated with user 120 without requiring assistance of financial profile manager 172 (e.g., credit application engine 174 queries a database for the financial profile 220 associated with user 120 and copies the financial profile 220 associated with user 120). This disclosure recognizes that “receiving the financial profile 220” may include receiving either the original financial profile 220 and/or a copy of financial profile 220.
As described above, credit application engine 174 may further be configured to generate one or more credit applications 240. The generated credit applications 240 may include some or all of the information provided in application request 230 and/or the received financial profile 220. Credit application engine 174 is also configured to anonymize credit applications 240 such that the generated application 240 does not include any personally identifiable information 270 but does include one or more credit metrics. Generally, the generated credit application 240 includes only the information necessary for a financial institution (or other potential creditor) to make a determination as to whether a credit application 240 is approved or denied. As an example, credit application engine 174 may generate credit application 240a to include all information necessary for a bank to determine whether to lend funds to user 120a even though generated credit application 240a does not include data identifying user 120a personally. As another example, credit application engine 174 may generate credit application 240b to include all information necessary for a landlord to make a determination as to whether a potential tenant (e.g., user 120b) is financially suitable to lease a rental property.
In some embodiments, credit application engine 174 generates application 240 for review and/or input by user 120. As an example, user 120 may edit application 240 as necessary and ultimately approve sending of such application 240. As another example, user 120 may indicate to credit application engine 174 one or more financial institutions and/or other potential creditors to whom the generated application 240 should be sent.
Credit application engine 174 is also configured to encrypt the generated application 240 in some embodiments. This disclosure recognizes that encrypting the generated application 240 may limit access to the information included in generated application 240. In some embodiments, generated application 240 is encrypted using one or more tokens/keys 250 generated by token generation engine 250. For example, token generation engine 250 may generate a private token 250 and a corresponding public token 250 and send the private token 250 to credit application engine 174 to be used in the encryption of generated application 240. Additionally, token generation engine 176 may send the corresponding public token 250 to one or more recipients of generated application 240 (e.g., financial institutions 140 and/or other potential creditors 160). Recipients of generated application 240 may then use the corresponding public token 250 to decrypt generated application 240 to reveal the contents of generated application 240. Although this disclosure describes a particular method of encrypting and decrypting generated applications 240, this disclosure contemplates any suitable method of encrypting generated application 240 to limit access to the information included in generated application 240 to only authorized recipients.
After encrypting application 240, credit application engine 174 may send application 240 to one or more intended recipients (e.g., financial institutions 140 and/or other potential creditors 160). The sending of encrypted application 240 is indicated in
In some embodiments, credit application engine 174 may request token generation engine 176 to generate one or more tokens 250 in connection with credit application 240. Tokens 250 may be requested by credit application engine 174 automatically in response to generating application 240. Tokens 250 may also be requested by credit application engine 174 in response to user input.
As described above, CLASP 170 includes token generation engine 176 in some embodiments. Generally, token generation engine 176 is configured to generate one or more tokens 250 associated with credit applications 240. Tokens 250 generated by token generation engine may be limited in use and/or in duration. For example, tokens 250 may be one-time use keys that only allow the key to be used one time. As another example, tokens 250 may be keys that are only available for a specific time period (e.g., one hour, one day, one week). As detailed above, token generation engine 176 may generate a pair of tokens 250, a private token and a corresponding public token, for each credit application 240. Taking the example illustrated in
In some embodiments, token generation engine 176 generates more than two tokens 250 per credit application 240. For example, token generation engine 176 may generate two public keys corresponding to a single private key for distribution to two separate financial institutions 140 that user 120 seeks mortgage rates from. As depicted in
As explained above, recipients of credit applications 240 generated by credit application engine 174 may use tokens 250 generated by token generation engine 176 to access the content of credit applications 240. Upon decrypting and analyzing the contents of credit applications 240, the recipients (e.g., financial institutions 140 and/or other potential creditors) may make approval determinations regarding credit applications 240 based on financial data included in credit applications 240. At this application determination stage, recipients are not provided any personally identifiable information. As such, recipient (e.g., financial institution 140 of
As indicated at Step 3 (S3) in
Upon receiving credit decision 260, user 120 may determine to reveal personally identifiable information to financial institution 140. As an example, user 120 may reveal personally identifiable information to financial institution 140 when user 120 wishes to accept a credit offer presented by financial institution 140. As another example, user 120 may reveal personally identifiable information to financial institution 140 when user 120 wishes to move forward with loan processing based on terms provided in credit decision 260. As indicated in
As described above, CLASP 170 may include PII release engine 178 in some embodiments. Generally, PII release engine 178 is configured to manage personally identifiable information 270 for each user 120. In some embodiments, PII release engine 178 includes a database (not illustrated) storing personally identifiable information for each user 120. In other embodiments, PII release engine 178 is communicably coupled to a database (not illustrated) storing personally identifiable information for each user 120. The stored personally identifiable information may include one or more of names, social security numbers, passport numbers, bank account numbers, driver's license numbers, ethnicity, gender, credit/debit card numbers, and/or any other similar information.
In some embodiments, PII release engine 178 encrypts PII before storing in one or more databases associated with CLASP 170. In other embodiments, PII release engine 178 encrypts PII during communication/transmission within CLASP 170 and/or to entities outside CLASP 170 (e.g., network entities depicted in
PII release engine 178 may further be configured to receive a request to provide personally identifiable information about user 120 to a particular entity. Such request may be generated by one or more engines of CLASP 170. For example, credit application engine 174 may generate such request in response to receiving a notification from user 120 that user 120 accepts a credit offer associated with credit application 240. In some embodiments, the request may include one or more of an identifier associated with user 120 (e.g., name, user id) and an identifier associated with the intended recipient of personally identifiable information 270 (e.g., name of financial institution 140, contact details for credit administrator associated with financial institution 140).
In response to receiving such request, PII release engine 178 may identify, in the database, personally identifiable information 270 corresponding to a particular user 120, make a copy the identified personally identifiable information 270, send the copy of the personally identifiable information 270 to the intended recipient (e.g., financial institution 140). In another embodiment, another engine of CLASP 170 is responsible for sending personally identifiable information 270 to the intended recipient. For example, PII release engine 178 may identify, in the database, personally identifiable information 270 corresponding to a particular user 120, make a copy the identified personally identifiable information 270, and send such copy to credit application engine 240 for relay to an intended recipient (e.g., financial institution 140). In yet another embodiment, one or more engines of CLASP 170 may send personally identifiable information 270 to user 120 who in turn relays personally identifiable information 270 to intended recipients such as financial institution 140. The release of personally identifiable information 270 to an intended recipient is depicted in
This disclosure recognizes that personally identifiable information 270 may be securely communicated to intended recipients. In some embodiments, personally identifiable information 270 may be securely communicated in the same way that credit application 240 is communicated. For example, PII release engine 178 (or another engine of CLASP 170) may encrypt personally identifiable information 270 and token generation engine 250 may provide a corresponding token 250 (configured to decrypt personally identifiable information 270) to recipient of personally identifiable information 270.
Although
This disclosure also recognizes a more expedited process in which CLASP 170 sends persistent credit application 240 associated with user 120 to financial institution 140 in response to receiving token 250 from financial institution 140 (rather than sending minimum, anonymized information). Financial institution 140 may then analyze persistent credit application 240 to provide credit offerings to user 120. In some embodiments, user 120 selection of one of the presented credit offerings authorizes CLASP 170 to send persistent credit application 240 to the financial institution 140 associated with the credit offering.
Although the above examples describe user 120 interacting directly with financial institution or another potential creditor, this disclosure recognizes that user 120 may also interact with a third party such as a market intermediary (e.g., Lending Tree, Nerd Wallet) 180. In such case, user 120 may identify one or more financial offerings via a website associated with a market intermediary 180 by performing a web search using a search engine. Upon selecting an offer identified through a website of market intermediary 180, user 120 may be forwarded to a webpage (or other interface) associated with CLASP 170, wherein user 120 is prompted to login to, or register with, CLASP 170. In some embodiments, user 120 provides his/her PII to CLASP 170 and CLASP 170 stores the provided PII for user 120 as described above. CLASP 170 may be further configured to query credit sources (e.g., credit bureaus 150, financial institutions 140, creditors 160), based on PII provided by user 120 to CLASP 170, in order to obtain financial information regarding user 120. As discussed above, one or more engines of CLASP 170 may generate additional data (e.g., financial profiles, persistent credit applications) based on the PII received from user 120 and/or the final information received from credit sources. In some embodiments, CLASP 170 is further configured to perform other desirable operations such as ranking users 120170 by credit score.
In some instances, CLASP 170 notifies user 120 when his/her respective persistent credit application becomes available and sends, to user 120, a one-time use token 250 corresponding to his/her respective persistent credit application 240. User 120 may provide the received token 250 directly to the third party at his/her discretion. Upon receiving token 250 from the third party, CLASP 170 may recognize user 120 associated with token 250 and send data about user 120's request for credit to the third party. As an example, CLASP 170 may send minimum, anonymized information about user 120's request for credit (e.g., credit score, annual income) to the third party in response to receiving token 250 from the third party. Third party may then use the information received from CLASP 170 to identify one or more credit offerings relevant to user 120. In some embodiments, the credit offerings identified by the third party includes one or more offerings from one or more financial institutions 140. In some embodiments, CLASP 170 provides additional tokens 250 to the third party for forwarding to the financial institutions 140 associated with offerings selected by the third party and/or user 120. For example, upon third party identification of two good offers (e.g., a first offering associated with financial institution 140a and a second offering associated with financial institution 140b), CLASP 170 may send two additional tokens 250 to the third party that are in turn sent to financial institution 140a and financial institution 140b. Financial institutions 140a-b may then use the tokens to request minimum, anonymized data, and/or credit applications 240 from CLASP 170 in order to provide formal offerings to user 120. In some embodiments, financial institution 140a-b may determine, based on credit application 240, whether to approve user 120's request for credit and provide an offer 260 to user 120. If financial institution 140b approves the request for credit and if user 120 accepts offer 206, CLASP 170 may release personally identifiable information 270 associated with user 120 to financial institution 140b so financial institution 140b can complete the lending and credit provisioning process. As discussed above, PII may be accessed by way of tokens 250. For example, CLASP 170 may send a token 250 to financial institution 140 in response to determining that user 120 accepted an offer of financial institution 140. Financial institution 140 may then present such token 250 to CLASP 170 in order to access PII of user 120. As another example, user 120 may request CLASP to send token 250 to user (or financial institution 140) upon selecting an offer of financial institution 140. If token 250 is sent to user 120, user 120 may provide token 250 to financial institution 140 such that financial institution 140 may present such token 250 to CLASP 170 to gain access to PII of user 120.
Financial institution 140 may then present the identified credit offerings to user 120 and, upon selection of an offering by user 120, CLASP 170 may provide personally identifiable information (PII) 270 to financial institution 140a so that financial institution 140a can complete the lending and credit provisioning process. As described above, credit application 240 and/or personally identifiable information 270 may be securely communicated to financial institution using additional tokens 250 that may be generated by token generation engine 250.
Although this disclosure describes and depicts utilizing tokens 250 in a particular manner in order to secure sensitive information about user 120 (e.g., gaining access to a persistent credit application 240 in response to presenting token 250 to CLASP 170), one of ordinary skill will recognize other manners of doing so. For example, an interested party (e.g., market intermediary 180, financial institution 140) may receive a secondary token in response to providing CLASP 170 with the token 250 received from user 120 (i.e., primary token). The interested party may then provide secondary token 250 to CLASP 170 in order to obtain access to the persistent credit application 240 corresponding to user 120. For the avoidance of doubt, secondary token 250 may be generated by token generation engine 176. This manner may be preferred as it further secures sensitive information about user 120.
This disclosure also recognizes various benefits of allowing persons/entities to purchase tokens 250. As described above, tokens 250 may facilitate access to sensitive data. Accordingly, some persons/entities may wish to purchase tokens 250 to proactively gain access to sensitive data. As used herein, the person/entity that purchases one or more tokens 250 is referred to as a “token holder.” In some embodiments, token holders may be users 120. In other embodiments, third parties such as financial institutions 140, market intermediaries (e.g., market intermediaries 180 of
In addition to using tokens 250 to purchase access to information, tokens 250 may also be used to trade for other products/services within the financial community. As an example, tokens 250 may be used to purchase one or more bundles of consumer debt. This disclosure also recognizes that token holders may, in some cases, realize tax benefits to holding tokens 250. Such tax benefit may be maintained unless and until tokens are redeemed for fiat currency.
This disclosure also recognizes the benefits of using blockchain technology to secure transactions involving tokens 250. For example, all credit profile and credit application generation transactions, as well as all token transactions related to a consumer's credit requests, may be recorded permanently in CLASP's proprietary blockchain master distributed ledger. Thus, CLASP 170 may be a business-ready blockchain platform which adds a fundamental class of functionality to blockchain in the form of programmable personal identity, credit history, credit applications, and financial contract artifacts—all managed by CLASP 170. CLASP 170 may enable credit requesters (e.g., users 120) and lenders (e.g., financial institutions 140) to perform computation across information related to these artifacts for the purpose of securely sharing personally identifiable information (PII) in the context of applying for credit and the granting credit, in a cryptographically secure manner. CLASP 170 may facilitate the execution of identity sharing and credit access use cases that is not possible on existing blockchains. In some embodiments, CLASP 170 includes a decentralized, private, network of peer-to-peer computer nodes comprising of members of CLASP 170 (e.g., users 120). Members of CLASP 170 (e.g., users 120) may store a decentralized ledger and support the computation required to enable the secure sharing and validation of transactions related to leveraging personally identifiable information to apply for credit, the verification of credit history, and the granting of credit.
In addition to controlling the generation of tokens 250, CLASP 170 may also control availability of tokens 250. As an example, CLASP 170 may limit the number of tokens 250 available at any one moment to 200,000. Additionally, CLASP 170 may determine monetary value (if any) associated with tokens 250. In some embodiments, value of tokens 250 is established when tokens are generated/released. In other cases monetary value might be established via trading of tokens on the top ten cryptocurrency exchanges.
At step 310, CLASP receives a token 250 from a third party. In some embodiments, the third party is a financial institution 140. Token 250 may correspond to a user of CLASP 170. For example, token 250 may be the same token generated by CLASP 170 (e.g., token generation engine 250) and provided to a particular user 120 upon request. User 120 may, in turn, provide token 250 to a third party in order for third party to access information about user 120 (e.g., minimum, anonymized information). As such, token 250 may comprise an identifier of a user of CLASP 170. For example, token 250 may include an identifier corresponding to user 120a. In some embodiments, the method 300 continues to a step 315.
At step 315, CLASP 170 determines whether token 250 is associated with a user of CLASP 170. In some embodiments, CLASP 170 performs this step by analyzing token 250 for an identifier, and if token 250 includes an identifier, comparing such identifier to identifiers of user 120. If at step 315 CLASP determines that token 250 is associated with a user 120 of CLASP 170, the method proceeds to a step 320. In contrast, if at step 315 CLASP 170 determines that token 250 is not associated with a user 120 of CLASP 170, the method proceeds to end step 350.
As step 320, CLASP 170 identifies a user associated with token 250. As an example, CLASP 170 may determine, based on the identifier of token 250, that token 250 corresponds to user 120a. As another example, CLASP 170 may determine, based on the identifier of token 250, that token 250 corresponds to user 120b. This disclosure recognizes that each token may, at most, correspond to one user 120 of CLASP 170. After identifying a user 120 of CLASP 170 associated with token 170, the method 300 proceeds to a step 325.
At step 325, CLASP 170 communicates a first portion of information corresponding to user 120 to the third party. As depicted in
At step 330, CLASP 170 determines whether user 120 selected a credit offering and/or promotion offered by the third party. As depicted in
At step 335, CLASP 170 communicates a credit application 240 to a third party. As illustrated in
At step 340, CLASP 170 determines whether user 120 accepts a credit offer associated with the third party. As illustrated, CLASP 170 determines whether user 120 accepts a credit offer of financial institution 140. If user 120 rejects credit offers of financial institution 140, the method 300 proceeds to end step 350. Alternatively, if user 120 accepts at least one credit offer of financial institution 140 at step 340, the method 300 may proceed to step 345 at which point CLASP 170 communicates personally identifiable information 270 to the financial institution 140. After communicating personally identifiable information 270 to financial institution, the method 300 may proceed to end step 350.
One or more computer systems 400, including user device 130, may perform one or more steps of one or more methods described or illustrated herein. As described above, user device 130 or another computer system 400 may perform all or some of the steps of the methods described herein (e.g., method 300 of
This disclosure contemplates any suitable number of computer systems 400. This disclosure contemplates computer system 400 taking any suitable physical form. As an example and not by way of limitation, computer system 400 may be an embedded computer system, a system-on-chip (SOC), a single-board computer system (SBC) (such as, for example, a computer-on-module (COM) or system-on-module (SOM)), a desktop computer system, a laptop or notebook computer system, an interactive kiosk, a mainframe, a mesh of computer systems, a mobile telephone, a personal digital assistant (PDA), a server, a tablet computer system, or a combination of two or more of these. Where appropriate, computer system 400 may include one or more computer systems 400; be unitary or distributed; span multiple locations; span multiple machines; span multiple data centers; or reside in a cloud, which may include one or more cloud components in one or more networks. Where appropriate, one or more computer systems 400 may perform without substantial spatial or temporal limitation one or more steps of one or more methods described or illustrated herein. As an example and not by way of limitation, one or more computer systems 400 may perform in real time or in batch mode one or more steps of one or more methods described or illustrated herein. One or more computer systems 400 may perform at different times or at different locations one or more steps of one or more methods described or illustrated herein, where appropriate.
Computer system 400 may include a processor 410, memory 420, storage 430, an input/output (I/O) interface 440, a communication interface 450, and a bus 460 in some embodiments, such as depicted in
Processor 410 includes hardware, software, or both for executing instructions, such as those making up a computer program, in particular embodiments. For example, processor 410 may execute CLASP 170 to secure sensitive data. As an example and not by way of limitation, to execute instructions, processor 410 may retrieve (or fetch) the instructions from an internal register, an internal cache, memory 420, or storage 430; decode and execute them; and then write one or more results to an internal register, an internal cache, memory 420, or storage 430. In particular embodiments, processor 410 may include one or more internal caches for data, instructions, or addresses. This disclosure contemplates processor 410 including any suitable number of any suitable internal caches, where appropriate. As an example and not by way of limitation, processor 410 may include one or more instruction caches, one or more data caches, and one or more translation lookaside buffers (TLBs). Instructions in the instruction caches may be copies of instructions in memory 420 or storage 430, and the instruction caches may speed up retrieval of those instructions by processor 410. Data in the data caches may be copies of data in memory 420 or storage 430 for instructions executing at processor 410 to operate on; the results of previous instructions executed at processor 410 for access by subsequent instructions executing at processor 410 or for writing to memory 420 or storage 430; or other suitable data. The data caches may speed up read or write operations by processor 410. The TLBs may speed up virtual-address translation for processor 410. In particular embodiments, processor 410 may include one or more internal registers for data, instructions, or addresses. This disclosure contemplates processor 410 including any suitable number of any suitable internal registers, where appropriate. Where appropriate, processor 410 may include one or more arithmetic logic units (ALUs); be a multi-core processor; or include one or more processors. Although this disclosure describes and illustrates a particular processor, this disclosure contemplates any suitable processor.
Memory 420 may include main memory for storing instructions for processor 410 to execute or data for processor 410 to operate on. As an example and not by way of limitation, computer system 400 may load instructions from storage 430 or another source (such as, for example, another computer system 400) to memory 420. Processor 410 may then load the instructions from memory 420 to an internal register or internal cache. To execute the instructions, processor 410 may retrieve the instructions from the internal register or internal cache and decode them. During or after execution of the instructions, processor 410 may write one or more results (which may be intermediate or final results) to the internal register or internal cache. Processor 410 may then write one or more of those results to memory 420. In particular embodiments, processor 410 executes only instructions in one or more internal registers or internal caches or in memory 420 (as opposed to storage 430 or elsewhere) and operates only on data in one or more internal registers or internal caches or in memory 420 (as opposed to storage 430 or elsewhere). One or more memory buses (which may each include an address bus and a data bus) may couple processor 410 to memory 420. Bus 460 may include one or more memory buses, as described below. In particular embodiments, one or more memory management units (MMUs) reside between processor 410 and memory 420 and facilitate accesses to memory 420 requested by processor 410. In particular embodiments, memory 420 includes random access memory (RAM). This RAM may be volatile memory. Where appropriate, this RAM may be dynamic RAM (DRAM) or static RAM (SRAM). Moreover, where appropriate, this RAM may be single-ported or multi-ported RAM. This disclosure contemplates any suitable RAM. Memory 420 may include one or more memories 180, where appropriate. Although this disclosure describes and illustrates particular memory, this disclosure contemplates any suitable memory.
Storage 430 may include mass storage for data or instructions. As an example and not by way of limitation, storage 430 may include a hard disk drive (HDD), a floppy disk drive, flash memory, an optical disc, a magneto-optical disc, magnetic tape, or a Universal Serial Bus (USB) drive or a combination of two or more of these. Storage 430 may include removable or non-removable (or fixed) media, where appropriate. Storage 430 may be internal or external to computer system 400, where appropriate. In particular embodiments, storage 430 is non-volatile, solid-state memory. In particular embodiments, storage 430 includes read-only memory (ROM). Where appropriate, this ROM may be mask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically erasable PROM (EEPROM), electrically alterable ROM (EAROM), or flash memory or a combination of two or more of these. This disclosure contemplates mass storage 430 taking any suitable physical form. Storage 430 may include one or more storage control units facilitating communication between processor 410 and storage 430, where appropriate. Where appropriate, storage 430 may include one or more storages 140. Although this disclosure describes and illustrates particular storage, this disclosure contemplates any suitable storage.
I/O interface 440 may include hardware, software, or both, providing one or more interfaces for communication between computer system 400 and one or more I/O devices. Computer system 400 may include one or more of these I/O devices, where appropriate. One or more of these I/O devices may enable communication between a person and computer system 400. As an example and not by way of limitation, an I/O device may include a keyboard, keypad, microphone, monitor, mouse, printer, scanner, speaker, still camera, stylus, tablet, touch screen, trackball, video camera, another suitable I/O device or a combination of two or more of these. An I/O device may include one or more sensors. This disclosure contemplates any suitable I/O devices and any suitable I/O interfaces 185 for them. Where appropriate, I/O interface 440 may include one or more device or software drivers enabling processor 410 to drive one or more of these I/O devices. I/O interface 440 may include one or more I/O interfaces 185, where appropriate. Although this disclosure describes and illustrates a particular I/O interface, this disclosure contemplates any suitable I/O interface.
Communication interface 450 may include hardware, software, or both providing one or more interfaces for communication (such as, for example, packet-based communication) between computer system 400 and one or more other computer systems 400 or one or more networks (e.g., network 110). As an example and not by way of limitation, communication interface 450 may include a network interface controller (NIC) or network adapter for communicating with an Ethernet or other wire-based network or a wireless NIC (WNIC) or wireless adapter for communicating with a wireless network, such as a WI-FI network. This disclosure contemplates any suitable network and any suitable communication interface 450 for it. As an example and not by way of limitation, computer system 400 may communicate with an ad hoc network, a personal area network (PAN), a local area network (LAN), a wide area network (WAN), a metropolitan area network (MAN), or one or more portions of the Internet or a combination of two or more of these. One or more portions of one or more of these networks may be wired or wireless. As an example, computer system 400 may communicate with a wireless PAN (WPAN) (such as, for example, a BLUETOOTH WPAN), a WI-FI network, a WI-MAX network, a cellular telephone network (such as, for example, a Global System for Mobile Communications (GSM) network), or other suitable wireless network or a combination of two or more of these. Computer system 400 may include any suitable communication interface 450 for any of these networks, where appropriate. Communication interface 450 may include one or more communication interfaces 190, where appropriate. Although this disclosure describes and illustrates a particular communication interface, this disclosure contemplates any suitable communication interface.
Bus 460 may include hardware, software, or both coupling components of computer system 400 to each other. As an example and not by way of limitation, bus 460 may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a front-side bus (FSB), a HYPERTRANSPORT (HT) interconnect, an Industry Standard Architecture (ISA) bus, an INFINIBAND interconnect, a low-pin-count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCIe) bus, a serial advanced technology attachment (SATA) bus, a Video Electronics Standards Association local (VLB) bus, or another suitable bus or a combination of two or more of these. Bus 460 may include one or more buses 460, where appropriate. Although this disclosure describes and illustrates a particular bus, this disclosure contemplates any suitable bus or interconnect.
The components of computer system 400 may be integrated or separated. In some embodiments, components of computer system 400 may each be housed within a single chassis. The operations of computer system 400 may be performed by more, fewer, or other components. Additionally, operations of computer system 400 may be performed using any suitable logic that may comprise software, hardware, other logic, or any suitable combination of the preceding.
Herein, a computer-readable non-transitory storage medium or media may include one or more semiconductor-based or other integrated circuits (ICs) (such, as for example, field-programmable gate arrays (FPGAs) or application-specific ICs (ASICs)), hard disk drives (HDDs), hybrid hard drives (HHDs), optical discs, optical disc drives (ODDs), magneto-optical discs, magneto-optical drives, floppy diskettes, floppy disk drives (FDDs), magnetic tapes, solid-state drives (SSDs), RAM-drives, SECURE DIGITAL cards or drives, any other suitable computer-readable non-transitory storage media, or any suitable combination of two or more of these, where appropriate. A computer-readable non-transitory storage medium may be volatile, non-volatile, or a combination of volatile and non-volatile, where appropriate.
Turning now to
Method 500 may begin at a step 502 and proceed to a step 504. At step 504 (also indicated as “B”), user 120 may perform a world wide web search for credit on user device 130. As an example, user 120 may search for credit on Google.com, Bing.com, Safari.com, etc. As indicated at step 506, user 120 may be presented with one or more hits to the credit search of step 504. For example, user 120 may be presented with hits linking to market intermediaries (e.g., Lead Point, Lending Tree, Nerd Wallet), financial institutions 140, and/or other responsive sites. At step 508, user 120 is presented with offers of market intermediaries and/or financial institutions (noted in
Upon redirect, user 120 may provide personally identifiable information (PII) to CLASP 170 (as indicated at step 520). After providing this information, the method 500 may proceed to a step 522. At step 522, CLASP 170 receives credit information about user 170 based on the personally identifiable information provided by user 120 at step 520. In some embodiments, credit information is received due to a request sent from CLASP 170 credit sources 524. The credit information received at step 522 may be collected from credit bureaus (e.g., credit bureau 150), creditors (e.g., creditors 160), and/or any other suitable credit verification sources. After retrieving this information, the method 500 may proceed to a step 526. At step 526, CLASP ranks user 120. In some embodiments, the ranking (e.g., super prime, prime, sub-prime, etc.) of user 120 may be based on a credit score. Such credit score may be generated by CLASP 170 based on the information received at step 522. In some embodiments, the ranking assigned to user 120 reflects a status of user 120 relative to all users of CLASP 170. After ranking user 120, the method 500 proceeds to step 528. At step 528, CLASP 170 create an anonymized financial profile 220 and/or an anonymized credit application 240 associated with user 120. After creating the financial profile 220 and/or the credit application 240 associated with user 120, method 500 may proceed to step 530 wherein CLASP 170 notifies user 120 that his/her financial profile 220 and/or credit application 240 has been generated.
The method 500 may then proceed to a step 532 in which user 120 requests a token (depicted as PRIME #1) from CLASP 170 and, at step 534, CLASP 170 may send user 120 a token (PRIME #1) corresponding to the request. Upon receiving PRIME #1, the method 500 may proceed to a step 536 at which user 120 sends PRIME #1 to financial institution 140a.
As illustrated, financial institution 140a receives PRIME #1 at step 538.
Upon receiving access to credit application 240, financial institution 140a reviews credit application 240 to determine whether to approve the credit request of user 120 (see step 548). Following determination step 548, financial institution 140a either denies the credit application (see step 550) or approves the credit application (see step 556). If the credit application is denied, the method may proceed to step 552 wherein the credit decision is communicated to user 120. In some embodiments, financial institution 140a communicates the credit decision to user 120. In other embodiments, CLASP 170 communicates the credit decision to user 120. Following communication of the credit decision, the method 500 may proceed to step 554 in which user 120 may choose to return to step 504 and/or 508. Alternatively, user 120 may decide not to continue a credit request and, in that case, the method 500 may proceed to end step 578.
If the credit application is instead approved, the method 500 may proceed to a step 558 in which a credit offer of financial institution 140a is communicated to user 120. In some embodiments, financial institution 140a communicates the credit offer to user 120. In other embodiments, CLASP 170 communicates the credit offer to user 120. After communicating the credit offer, the method 500 may proceed to a determination step 560. At determination step 560, user 120 determines whether to accept or reject the credit offer. If at step 560, user 120 determines to reject the credit offer, the method 500 may proceed to step 504, 508, and/or end step 578 (as indicated by options “A, B, C”). Alternatively, user 120 may decide to accept credit offer (see step 562). In such case, the method 500 may proceed to step 564 in which user 120 requests and receives an additional token 250 (referred to in
The method 600 may begin in a step 602 and continue as described above in reference to steps 502, 504, 506, 508, 510, and 512 of method 500. If at step 612, user 120 selects a credit offer associated with a financial institution (depicted as “lender”), web browser of user device 130 may be directed to a webpage associated with financial institution. Thereafter, the method 600 may proceed to step 616 which may include one or more of the steps of method 500. Alternatively, if at step 612 user 120 selects an offer associated with a market intermediary, web browser of user device 130 may be directed to a webpage associated with a market intermediary. Thereafter, the webpage of the market intermediary may redirect user 120 to CLASP 170 (see step 618). The method 600 may then proceed as described above in reference to steps 520, 522, 526, and 528 of method 500. After CLASP 170 has created one or more of financial profile 220 and/or credit application 240 associated with user 120, user 120 may request PRIME #1 from CLASP 170 (see step 630) and user 120 may receive PRIME #1 from CLASP 170 (see step 632). Upon receiving PRIME #1, user 120 may send PRIME #1 to the market intermediary (see step 634). The method 600 may then proceed to a step 636 in which the market intermediary receives PRIME #1 from user 120. After receiving PRIME #1 from user 120, the method 600 may proceed in either token flow “A” or token flow “B:” the “A” flow whereby CLASP 170 authenticates PRIME #1; and the “B” flow whereby market intermediary 180 authenticates PRIME #1. These flows are illustrated in
Herein, “or” is inclusive and not exclusive, unless expressly indicated otherwise or indicated otherwise by context. Therefore, herein, “A or B” means “A, B, or both,” unless expressly indicated otherwise or indicated otherwise by context. Moreover, “and” is both joint and several, unless expressly indicated otherwise or indicated otherwise by context. Therefore, herein, “A and B” means “A and B, jointly or severally,” unless expressly indicated otherwise or indicated otherwise by context.
The scope of this disclosure encompasses all changes, substitutions, variations, alterations, and modifications to the embodiments described or illustrated herein that a person having ordinary skill in the art would comprehend. The scope of this disclosure is not limited to the embodiments described or illustrated herein. Moreover, although this disclosure describes and illustrates respective embodiments herein as including particular components, elements, functions, operations, or steps, any of these embodiments may include any combination or permutation of any of the components, elements, functions, operations, or steps described or illustrated anywhere herein that a person having ordinary skill in the art would comprehend. Furthermore, reference in the appended claims to an apparatus or system or a component of an apparatus or system being adapted to, arranged to, capable of, configured to, enabled to, operable to, or operative to perform a particular function encompasses that apparatus, system, component, whether or not it or that particular function is activated, turned on, or unlocked, as long as that apparatus, system, or component is so adapted, arranged, capable, configured, enabled, operable, or operative.
This application claims priority to U.S. Provisional Patent Application Ser. No. 62/619,386, entitled Systems and Methods of Securing Sensitive Data, and filed on Jan. 19, 2018, which is hereby incorporated by reference.