Coordinating discrete systems

ABSTRACT

A provider of a first network-based service provides a list of user data for users of the first network-based service to a provider of a second network-based service. The users associated with the list of user data access results of the one or more identity monitoring services from the first network-based service, the second network-based service, a third-party identity monitoring service, or any suitable combination thereof. Additional services are offered to one or more users associated with the list of user data. A user accepting the offer pays a fee to the offering provider for the additional service. Based on the user being associated with the list of user data provided by the provider of the first network-based service and the user paying the fee for the additional service, a portion of the fee is transferred to the provider of the first network-based service.

TECHNICAL FIELD

The subject matter disclosed herein generally relates to coordinatingdiscrete systems. Specifically, in some example embodiments, the presentdisclosure addresses systems and methods for coordinating multipleservice provider systems via a network.

BRIEF DESCRIPTION OF THE DRAWINGS

Some embodiments are illustrated by way of example and not limitation inthe figures of the accompanying drawings.

FIG. 1 is a network diagram illustrating a network environment suitablefor coordinating discrete systems, according to some exampleembodiments.

FIG. 2 is an architectural diagram illustrating components of a securityservice server in communication with other systems, according to someexample embodiments.

FIG. 3 is a block diagram illustrating a user interface for reportingidentity monitoring results and offering additional services, accordingto some example embodiments.

FIG. 4 is a block diagram illustrating a user interface for reportingidentity monitoring results and offering additional services, accordingto some example embodiments.

FIG. 5 is a block diagram illustrating a database schema suitable forsupporting coordinating discrete systems, according to some exampleembodiments.

FIG. 6 is a flowchart illustrating operations of a computing device inperforming a method of coordinating discrete systems, according to someexample embodiments.

FIG. 7 is a flowchart illustrating operations of a computing device inperforming a method of coordinating discrete systems, according to someexample embodiments.

FIG. 8 is a swim-lane diagram illustrating communications betweencomputer systems in performing a method of coordinating discretesystems, according to some example embodiments.

FIG. 9 is a block diagram illustrating an example of a softwarearchitecture that may be installed on a machine, according to someexample embodiments.

FIG. 10 is a diagrammatic representation of a machine in the form of acomputer system within which a set of instructions may be executed forcausing the machine to perform any one or more of the methodologiesdiscussed herein, according to an example embodiment.

DETAILED DESCRIPTION

Example methods and systems are directed to coordinating discretesystems. Examples merely typify possible variations. Unless explicitlystated otherwise, components and functions are optional and may becombined or subdivided, and operations may vary in sequence or becombined or subdivided. In the following description, for purposes ofexplanation, numerous specific details are set forth to provide athorough understanding of example embodiments. It will be evident to oneskilled in the art, however, that the present subject matter may bepracticed without these specific details.

A provider of a first network-based service (e.g., a social mediaservice, a financial service, a retail service, or any suitablecombination thereof) provides a list of user data for users of the firstnetwork-based service to a provider of a second network-based service(e.g., a security brokering service). The provider of the secondnetwork-based service provides the list of user data to a third-partyidentity monitoring service, which provides one or more identitymonitoring services related to the list of user data. The usersassociated with the list of user data access results of the one or moreidentity monitoring services from the first network-based service, thesecond network-based service, the third-party identity monitoringservice, or any suitable combination thereof. In some exampleembodiments, the one or more identity monitoring services are providedwithout charge to the users, the provider of the first network-basedservice, or both.

Additional services (e.g., additional security services) are offered toone or more users associated with the list of user data by the providerof the second network-based service, the provider of the third-partyidentity monitoring service, or both. Example security services includedark web scanning, identity protection, and credit monitoring. A useraccepting the offer pays a fee (e.g., a one-time fee, a recurring fee,or both) to the offering provider for the additional service. Based onthe user being associated with the list of user data provided by theprovider of the first network-based service and the user paying the feefor the additional service, a portion of the fee is transferred to theprovider of the first network-based service.

FIG. 1 is a network diagram illustrating a network environment 100suitable for coordinating discrete systems, according to some exampleembodiments. The network environment 100 includes a service providerserver 110, a database server 120, a security service server 130, afinancial server 140, a broker server 150, a clearing house server 155,and devices 160A and 1601, all communicatively coupled to each other viaa network 190. The devices 160A and 160B may be collectively referred toas “devices 160,” or generically referred to as a “device 160.” Theservice provider server 110, database server 120, security serviceserver 130, financial server 140, broker server 150, and clearing houseserver 155 are network-based systems. The devices 160 may interact withthe servers 110-155 using a web client 170A or an app client 170B. Theservers 110-155 and the devices 160 may each be implemented in acomputer system, in whole or in part, as described below with respect toFIGS. 9-10 .

The service provider server 110 provides a service (e.g., a social mediaservice) to users via the network 190. As part of providing thisservice, the service provider server 110 collects user account data foreach user. As used herein, user account data refers to any data of theuser account. Example user account data includes, but is not limited to,name (e.g., first name, last name, middle name, or username), password,address (e.g., email address, physical address, or phone number), orphysical characteristics (e.g., age, height, weight, or gender). Thougha social media service is used by way of example, other types ofnetwork-based services that collect user account data may be provided inplace of the social media service of the service provider server 110.

Database services are provided by the database server 120 to one or moreof the service provider server 110, the security service server 130, thefinancial server 140, and the broker server 150. In some exampleembodiments, distinct database servers are used by each of the servers110, 130, 140, 150, and 155. The database services provided by thedatabase server 120 include data storage and retrieval.

The security service server 130 provides one or more security services(e.g., dark web scanning, monitoring services, privacy protectionservices, health claims monitoring, or any suitable combinationthereof). Dark web scanning determines if user account data is availableon the dark web, indicating that a user account has been compromised.Monitoring services include credit monitoring, credit lock, and socialsecurity number scanning. Privacy protection services scan socialnetworks to detect fraudulent and takeover activity, identifyinappropriate content, and reduce personal information exposure. Healthclaims monitoring provides an alert to a user whenever a medical claimis made against their identity.

Financial services are provided by the financial server 140 via thenetwork 190 to the users of the devices 160: the service providersassociated with the service provider server 110, the database server120, the security service server 130, the broker server 150; or anysuitable combination thereof. In some example embodiments, the securityservice server 130 provides security services to the users of thedevices 160 and the financial server 140 transfers fees for securityservices from user accounts to an account of the security serviceprovider, an account to the broker, or any suitable combination thereof.The financial server 140 may also transfer a portion of the fee from anaccount of the security service provider or an account of the broker toan account of the service provider.

The broker server 150 provides broker services to the service provider,security service provider, end users, or any suitable combinationthereof. The service provider may provide account data to the broker(e.g., by transmitting the account data from the service provider server110 to the broker server 150 via the network 190). The broker selectsfrom among multiple security service providers and, after selecting one,sends the account data to the security service server 130 associatedwith the selected security service provider. Fees for the securityservice may be shared among the broker, the security service provider,and the service provider that originated the account data.

The clearing house server 155 collects data regarding transactions viathe network 190. Many different insurance companies use unique protocolsfor requesting and providing authorization, receiving payment, andproviding services. Thus, medical service providers face high overheadin interacting with multiple insurance companies. To alleviate this, aclearing house provides a single interface to users and handles thecomplexity of dealing with the multiple insurance companies.Intentionally or as a side effect of performing this intermediaryfunction, the clearing house acquires information about the medicalservices being provided to medical consumers across multiple medicalservice providers and insurance companies.

Also shown in FIG. 1 is a user 180. The user 180 may be a human user(e.g. a human being), a machine user (e.g., a computer configured by asoftware program to interact with the devices 160 and one or more of theservers 110-155), or any suitable combination thereof (e.g., a humanassisted by a machine or a machine supervised by a human). The user 180is not part of the network environment 100, but is associated with thedevices 160 and may be a user of the devices 160 (e.g., an owner of thedevices 160A or 160B). For example, the device 160 may be a desktopcomputer, a vehicle computer, a tablet computer, a navigational device,a portable media device, or a smart phone belonging to the user 180.

Any of the machines, databases, or devices shown in FIG. 1 may beimplemented in a general-purpose computer modified (e.g., configured orprogrammed) by software to be a special-purpose computer to perform thefunctions described herein for that machine, database, or device. Forexample, a computer system able to implement any one or more of themethodologies described herein is discussed below with respect to FIGS.9-10 . As used herein, a “database” is a data storage resource and maystore data structured as a text file, a table, a spreadsheet, arelational database (e.g., an object-relational database), a triplestore, a hierarchical data store, or any suitable combination thereof.Moreover, any two or more of the machines, databases, or devicesillustrated in FIG. 1 may be combined into a single machine, database,or device, and the functions described herein for any single machine,database, or device may be subdivided among multiple machines,databases, or devices.

The network 190 may be any network that enables communication between oramong machines, databases, and devices (e.g., the security serviceserver 130 and the devices 160). Accordingly, the network 190 may be awired network, a wireless network (e.g., a mobile or cellular network),or any suitable combination thereof. The network 190 may include one ormore portions that constitute a private network, a public network (e.g.,the Internet), or any suitable combination thereof.

FIG. 2 is an architectural diagram 200 illustrating components of asecurity service server 130 in communication with other systems,according to some example embodiments. The security service server 130includes a communication module 210, an authentication module 220, adark web module 230, an alert module 240, a user interface module 250,and a storage module 260, all configured to communicate with each other(e.g., via a bus, shared memory, a switch, or APIs). Any one or more ofthe modules described herein may be implemented using hardware (e.g., aprocessor of a machine) or a combination of hardware and software. Forexample, any module described herein may configure a processor toperform the operations described herein for that module. Moreover, anytwo or more of these modules may be combined into a single module, andthe functions described herein for a single module may be subdividedamong multiple modules. Furthermore, according to various exampleembodiments, modules described herein as being implemented within asingle machine, database, or device may be distributed across multiplemachines, databases, or devices.

The communication module 210 is configured to send and receive data. Forexample, the communication module 210 may receive, over the network 190,a request for a user interface for providing security information to adevice 160. The communication module 210 may provide the request to theuser interface module 250, transmit a user interface provided by theuser interface module 250 to the device 160, and receive user selectionsof options in the user interface for processing by the authenticationmodule 220, the dark web module 230, or the alert module 240; storage bythe storage module 260; or any suitable combination thereof.

The authentication module 220 is configured to authenticate a user. Forexample, a question that only the user is expected to know the answer tomay be presented to the user and the user authenticated only if theresponse is correct. In some example embodiments, multiple suchquestions are presented and the responses evaluated. The user may bepermitted to proceed to view security status information, lock access todata, unlock access to data, subscribe to additional security services,or any suitable combination thereof, only after authentication issuccessful.

The dark web module 230 is configured to search the dark web for useraccount data and report, via the user interface module 250, the resultsof the search. For example, the dark web may be searched for a user'susername, password, real name, or other identifying information. Resultsof the search may be received and used to update a user interfaceprovided by the user interface module 250, used to cause an alert to begenerated by the alert module 240, stored for later reference by thestorage module 260, or any suitable combination thereof.

The alert module 240 is configured to generate alerts. The generatedalerts may be provided to users (e.g., to report data access statuschanges, such as credit status changes, to report data breaches, toreport suspected identity theft, or any suitable combination thereof) orto administrators (e.g., to report error conditions in communicationswith one or more database servers). Each alert may be in the form ofe-mail, text message, automated voice message, or another suitablemethod of notification.

The user interface module 250 serves a web site, via a hypertexttransfer protocol (HTTP) connection, to the device 160A. The securityservice server 130 is in communication, via a representational statetransfer (REST) application programming interface (API), with one ormore of the servers 110, 120, and 140. The user interface may includeinformation regarding a user's current security status, provide optionsto add or cancel security services, or any suitable combination thereof.For example, one or more of the user interfaces 300 and 400, describedbelow with respect to FIGS. 3-4 , may be presented by the user interfacemodule 250, and selections may be received via an application interfaceor a web interface. Additionally or alternatively, the user interfacemodule 250 may provide a user interface to authenticate the user. Thestorage module 260 is configured to store data regarding users,entities, data access status, or any suitable combination thereof.

In some example embodiments, the database server 120 or the securityservice server 130 uses Structured Query Language (SQL) to accessstandard relational database and NoSQL to access databases other thanstandard relational databases. Dynamo NoSQL is a particular type ofNoSQL based on key-value pairs. For example, a database may storeusernames, passwords, authentication questions, user profiles, a user'sname, social security number, birthdate, address, previous addresses,phone number, bank account numbers, or any suitable combination thereof.

FIG. 3 is a block diagram illustrating a user interface 300 forreporting identity monitoring results and offering additional services,according to some example embodiments. As can be seen in FIG. 3 , theuser interface 300 includes a name 310, a status area 320, and buttons330 and 340. In some example embodiments, the user interface 300 isprovided by the security service server 130 for users identified in alist of user data provided by the service provider server 110. Inalternative example embodiments, the broker server 150 requests data forpopulating the user interface 300 from the security service server 130and provides the user interface 300 to the user device.

The user interface 300 may be displayed in response to a user requestinga security status. The name 310 indicates a name of the user. The statusarea 320 shows the status of a security service for the user. In theexample of FIG. 3 , the status area 320 shows that the dark web scan forthe user was clean. The buttons 330 and 340 are each operable to causethe security service server 130 to sign up the user for an additionalsecurity service for the user. By way of example, the button 330 isoperable to sign up the user for identity protection and the button 340is operable to sign up the user for credit monitoring.

FIG. 4 is a block diagram illustrating a user interface 400 forreporting identity monitoring results and offering additional services,according to some example embodiments. As can be seen in FIG. 4 , theuser interface 400 includes the name 310, a status area 420, and thebuttons 330 and 340. The name 310, the button 330, and the button 340are described above with respect to FIG. 3 .

The user interface 400 may be displayed in response to a user requestinga security status. The user interface 400 is provided by the securityservice server 130 for users identified in a list of user data providedby the service provider server 110. The status area 420 shows the statusof a security service for the user. In the example of FIG. 4 , thestatus area 420 shows that the dark web scan for the user determinedthat an email address associated with the user was discovered insecurity breach data on the dark web.

FIG. 5 is a block diagram illustrating a database schema 500 suitablefor supporting coordinating discrete systems, according to some exampleembodiments. The database schema 500 includes a user table 510 and astatus table 540. The user table 510 is defined by a table definition520, including a user identifier field, a name field, and a partnerfield, and includes rows 530A, 530B, and 530C. The status table 540 isdefined by a table definition 550, including a user identifier field andfour service status fields, and includes rows 560A, 560B, and 560C.

Each of the rows 530A-530C stores information for a user. The useridentifier field stores a unique identifier for the user. The name fieldstores a name of the user. The partner field stores an identifier of thepartner service provider that provided user data for the user and towhich a portion of fees collected from the user is remitted. In variousexample embodiments, additional or different fields are stored in theuser table 510. For example, an address field, a birthdate field, aphone number field, or any suitable combination thereof may be stored.

Each of the rows 560A-560C stores the data access status of a user withan entity. The row 560A shows that the user with identifier 1234, “AdamSmith” of the user table 510, has activated services one and two whileservices three and four are inactive. According to the row 560B, theuser with identifier 2345, “John Jay,” has services one and three activeand services two and four inactive. The user with identifier 3456,“James Wilson,” as shown in the row 560C, has services one and fouractive and the remaining services inactive.

Data from the user table 510 may be used in performing securityservices. For example, user data such as name, username, password, phonenumber, street address, and the like may be stored in the user table 510and used for a dark web scan. Data from the status table 540 may be usedin determining which security services to perform and to provide resultsfor (e.g., in the user interface 300 or 400). For example, “service 1”may correspond to a dark web scan, “service 2” to an identity monitoringservice, “service 3” to a medical services monitoring service, and“service 4” to a credit monitoring service.

FIG. 6 is a flowchart illustrating operations of a computing device inperforming a method 600 of coordinating discrete systems, according tosome example embodiments. By way of example and not limitation,operations in the method 600 are described as being performed by thesecurity service server 130 and the broker server 150, using modulesdescribed above with respect to FIG. 2 .

In operation 610, the security service server 130 accesses a set ofaccount identifiers for a set of accounts serviced by a serviceprovider. For example, the service provider server 110 may use anapplication programming interface (API) of the security service server130 to provide, to the security service server 130, a set of accountdata for accounts of the service provided by the service provider server110. The account data may include user name, name, email address, socialsecurity number, another identifier, or any suitable combinationthereof. As another example, the set of account identifiers may bestored, by the service provider server 110, in a database of thedatabase server 120 and accessed by the security service server 130 at alater time. As yet another example, the set of account identifiers maybe provided by the service provider server lit) to the broker server 150and from the broker server 150 to the security service server 130.

The security service server 130, in operation 620, provides a firstsecurity service for the set of account identifiers. For example, thedark web module 230 may be used to search the dark web for instances ofthe account identifiers in data repositories containing compromisedaccount data. In some example embodiments, the first security service isprovided periodically for each account identifier in the set of accountidentifiers. For example, a dark web scan may be performed daily orweekly.

In operation 630, the security service server 130 receives authorizationto provide a second security service for a first account identifier ofthe set of account identifiers. For example, an input may be receivedvia the user interface 300 indicating that a user requests identityprotection or credit monitoring services. The user interface 300 may bepresented by the security service server 130 or the broker server 150.

Based on the authorization received in operation 630, the securityservice server 130, in operation 640, provides the second securityservice for the first account identifier. For example, a creditmonitoring service may be provided in conjunction with one or morecredit reporting agencies. The credit monitoring service may be providedfor a fee to the user that authorized the second security service (e.g.,via credit card payment).

In operation 650, the security service server 130 or the broker server150, based on the authorization received in operation 630, credits anaccount of the service provider that provided the set of accountidentifiers in operation 610. For example, 10% of the fee received fromthe user may be transferred from an account of the security serviceprovider associated with the security service server 130 to an accountof the service associated with the service provider server 110. Thetransfer may be accomplished using services provided by the financialserver 140. An additional funds transfer may be made between an accountof the recipient of the user's funds (e.g., the broker or the securityservice provider) to an account of the other party (e.g., the securityservice provider or the broker). In this way, the fee for the securityservice is shared among the broker, the security service provider, andthe service provider that originated the user data.

FIG. 7 is a flowchart illustrating operations of a computing device inperforming a method 700 of coordinating discrete systems, according tosome example embodiments. By way of example and not limitation,operations in the method 700 are described as being performed by thesecurity service server 130 and the broker server 150, using modulesdescribed above with respect to FIG. 2 .

In operation 710, the authentication module 220 of the security serviceserver 130 or the broker server 150 requests an authentication promptfor an individual from a server (e.g., the clearing house server 155).For example, a server of a credit monitoring service or a medicalclearing house may be requested provide the authentication prompt. Theauthentication prompt may comprise one or more true facts about theindividual and one or more false statements about the individual.Example facts and statements include details regarding a transaction(e.g., date, address, amount, or any suitable combination thereof),physical details regarding the individual (e.g., age, height, weight,gender, or any suitable combination thereof), or contact informationabout the individual (e.g., residential address, telephone number, emailaddress, work address, employer name, or any suitable combinationthereof).

The user interface module 250 of the broker server 150 or the securityservice server 130, in operation 720, causes presentation on a clientdevice (e.g., the device 160A) of a user interface comprising theauthentication prompt. For example, the user may be requested toidentify which of the facts and statements are true and which are false.

In operation 730, the user interface module 250 receives, from theclient device, an authentication response to the authentication prompt.In some example embodiments, the authentication response identifies oneor more of the facts or statements as being true or false. In otherexample embodiments, the authentication prompt and response compriseanother form of two-factor authentication, such as a text message andresponse, an email message and response, or a communication via an apprunning on a mobile device of the individual.

The security service server 130 or the broker server 150, in operation740, transmits the authentication response to the server (e.g., theclearing house server 155). Thus, by performance of the operations710-740, the server is enabled to determine if the user providing theauthentication response in operation 730 is the individual for which theauthentication prompt was generated in operation 710.

In operation 750, based on the authentication being successful, thesecurity service server 130 or the broker server 150 receives, from theserver (e.g., the clearing house server 155), a confirmation of theidentity of the individual. If the broker server 150 is intermediatingthe communications with the security service server 130, the brokerserver 150 receives the confirmation from the server and sends theconfirmation to the security service server 130. In response toreceiving the confirmation, the security service server 130 performsoperations 620-650 for the individual (operation 760). The method 700 isperformed for each individual associated with an account of the set ofaccounts of operation 610. Thus, by use of the method 700, the firstsecurity service of operation 620 is performed only for individuals thatauthenticate themselves with the security service server 130.

FIG. 8 is a swim-lane diagram 800 illustrating communications betweencomputer systems in performing a method of coordinating discretesystems, according to some example embodiments. The swim-lane diagram800 shows communications 805, 810, 815, 820, 825, 830, 835, 840, 845,850, 855, and 860 among the service provider server 110, the securityservice server 130, the client device 160A, and the financial server140. In some example embodiments, the communications 805-860 areperformed sequentially.

The service provider server 110, in communication 805, provides a set ofaccount identifiers (e.g., usernames, passwords, social securitynumbers, or any suitable combination thereof) to the security serviceserver 130. For each account identifier, the security service server 130sends a prompt for authorization (communication 810) to the clientdevice associated with the account identifier (e.g., the client device160A). In some example embodiments, the set of account identifiersincludes, for each account identifier, an identifier for a client device(e.g., a phone number to which text messages can be sent). In theseexample embodiments, communication 810 is sent to the identified clientdevice. In other example embodiments, users are provided a means toaccess the security service server 130 to receive the prompt forauthorization. For example, the service provider server 110 may providea uniform resource locator (URL) to its users and, by accessing the URL,the prompt for authorization is received and presented.

In some example embodiments, the service provider server 110periodically sends communication 805. The first communication 805 mayinclude a complete set of account identifiers while later communications805 may include only updates to the set of account identifiers. Thus,the security service server 130 is kept up-to-date as to the current setof account identifiers, without consuming excess bandwidth resending thesame data.

The client device 160A presents the prompt for authorization to a userand receives the authorization from the user. Thereafter, the clientdevice 160, in communication 815, sends the authorization for a firstsecurity service to the security service server 130. For example, theuser may consent to having the security service server 130 perform adark web search for the account identifiers of the user.

In response to receiving the authorization for the first service, thesecurity service server 130 performs (or causes another server toperform) the authorized first service. The results of the first serviceare transmitted, in communication 820, to the client device 160A forpresentation to the user. For example, the user interface 300 or 400 maybe presented to display the results of a dark web search (in status area320 or 420). In some example embodiments, a fee for the first service iswaived.

In communication 825, the security service server 130 sends a prompt forauthorization for a second security service to the client device 160A.For example, the buttons 330 or 340 of FIGS. 3-4 may be presented. Asanother example, a text message may be sent to a mobile device of theuser, requesting a particular response for authorization.

The client device 160A transmits, in communication 830, an authorizationfor the second security service to the security service server 130. Forexample, the user may click on or press the button 330 to request anidentity protection service, causing a web browser of the client device160A to transmit a request (using hypertext transport protocol (HTTP))to the security service server 130.

Before preforming the second service, the security service server 130requests a transfer of funds from the client device 160A and, incommunication 835, the client device 160A requests the funds transfervia the financial server 140. For example, the financial server 140 maytransfer funds from a credit card account, checking account, bitcoinwallet, PayPal™ account, or other account of the user to an account ofthe security service provider.

The financial server 140 performs the requested funds transfer andnotifies, in communications 840 and 845, the client device 160A and thesecurity service server 130. After the funds are transferred, thesecurity service server 130 performs the second security service andcommunicates the second service results to the client device 160A.

In some example embodiments, the security service server 130 initiatesthe request for funds transfer instead of the client device 160A. Inthese example embodiments, the security service server 130 may provide auser interface to the client device 160A that allows a user to enterinformation for the financial account from which the funds will betransferred. The financial information is communicated from the clientdevice 160A to the security service server 130, which transmits therequest for funds transfer to the financial server 140. The financialinformation for the user may be stored by the security service server130 and re-used when an additional service is authorized by the user.

In response to receiving the funds from the user and based on theaccount identifiers having been received from the service providerserver 110, the security service server 130, in communication 850,requests the financial server 140 to transfer funds from the account ofthe security service provider to an account of the service provider. Theamount of the transfer may be a percentage of the amount transferredfrom the user account to the account of the security service provider.

After performing the requested transfer of funds, the financial server140 provides, in communications 855 and 860, transfer notifications tothe security service server 130 and the service provider server 110. Inthis way, the service provider receives remuneration from the securityservice provider when users of the service provider pay for additionalservices of the security service provider. Additionally, the users ofthe service provider are enabled to receive a first security servicewithout charge. As a result, security of the users of the serviceprovider is enhanced without charge to either the service provider orthe users.

In some example embodiments, the service provider is charged a fee bythe security service for the first security service. In these exampleembodiments, transfer of the fee may be delayed and the portions of userfees that would be transferred to the account of the service providercredited against the balance of the fee. As a result, the fee may becompletely offset by sufficient use of the second security service.

The swim-lane diagram 800 does not show the broker server 150, butintermediation by the broker server 150 in the communications betweenthe service provider server 110 and the security service server 130,between the security service server 130 and the client device 160A, orboth, is contemplated. Thus, communication 805 may be replaced by afirst communication from the service provider server 110 to the brokerserver 150, containing the set of account identifiers, and a secondcommunication from the broker server 150 to the security service server130, also containing the account identifiers. In some exampleembodiments, the broker server 150 transforms the data from a firstformat to a second format. When multiple security services are availableto the broker, each security service may use a different format and thebroker server 150 may transform the data in accordance with thepredetermined data format of the receiving security service server 130.

Intermediation by the broker server 150 may also result in the splittingof communications 810, 815, 820, 825, 830, and 860 into twocommunications. Furthermore, the request for funds transfer 850 mayoriginate from the broker server 150 instead of the security serviceserver 130, resulting in a funds transfer from the broker to the serviceprovider. An additional funds transfer request may be made, to transferfunds from the broker to the security service. Thus, the broker receivesa fee for the second service from the user, transfers a first portion tothe security service provider, transfers a second portion to the serviceprovider, and retains the remainder.

According to various example embodiments, one or more of themethodologies described herein may facilitate efficient provision of afirst security service to a set of accounts as an additional service tousers of a first service provider (e.g., a social media service).Additionally, one or more of the methodologies described herein mayfacilitate revenue sharing between the security service provider and thefirst service provider.

When these effects are considered in aggregate, one or more of themethodologies described herein may obviate a need for certain efforts orresources that otherwise would be involved in providing, receiving, orbilling for multiple security services. Efforts expended by a user inreceiving security services may be reduced by one or more of themethodologies described herein. Computing resources used by one or moremachines, databases, or devices (e.g., within the network environment100) may similarly be reduced. Examples of such computing resourcesinclude processor cycles, network traffic, memory usage, data storagecapacity, power consumption, and cooling capacity.

Modules, Components, and Logic

Certain embodiments are described herein as including logic or a numberof components, modules, or mechanisms. Modules may constitute eithersoftware modules (e.g., code embodied on a non-transitorymachine-readable medium) or hardware-implemented modules. Ahardware-implemented module is a tangible unit capable of performingcertain operations and may be configured or arranged in a certainmanner. In example embodiments, one or more computer systems (e.g., astandalone, client, or server computer system) or one or more processorsmay be configured by software (e.g., an application or applicationportion) as a hardware-implemented module that operates to performcertain operations as described herein.

In various embodiments, a hardware-implemented module may be implementedmechanically or electronically. For example, a hardware-implementedmodule may comprise dedicated circuitry or logic that is permanentlyconfigured (e.g., as a special-purpose processor, such as a fieldprogrammable gate array (FPGA) or an application-specific integratedcircuit (ASIC)) to perform certain operations. A hardware-implementedmodule may also comprise programmable logic or circuitry (e.g., asencompassed within a general-purpose processor or other programmableprocessor) that is temporarily configured by software to perform certainoperations. It will be appreciated that the decision to implement ahardware-implemented module mechanically, in dedicated and permanentlyconfigured circuitry, or in temporarily configured circuitry (e.g.,configured by software) may be driven by cost and time considerations.

Accordingly, the term “hardware-implemented module” should be understoodto encompass a tangible entity, be that an entity that is physicallyconstructed, permanently configured (e.g., hardwired), or temporarily ortransitorily configured (e.g., programmed) to operate in a certainmanner and/or to perform certain operations described herein.Considering embodiments in which hardware-implemented modules aretemporarily configured (e.g., programmed), each of thehardware-implemented modules need not be configured or instantiated atany one instance in time. For example, where the hardware-implementedmodules comprise a general-purpose processor configured using software,the general-purpose processor may be configured as respective differenthardware-implemented modules at different times. Software mayaccordingly configure a processor, for example, to constitute aparticular hardware-implemented module at one instance of time and toconstitute a different hardware-implemented module at a differentinstance of time.

Hardware-implemented modules can provide information to, and receiveinformation from, other hardware-implemented modules. Accordingly, thedescribed hardware-implemented modules may be regarded as beingcommunicatively coupled. Where multiple of such hardware-implementedmodules exist contemporaneously, communications may be achieved throughsignal transmission (e.g., over appropriate circuits and buses thatconnect the hardware-implemented modules). In embodiments in whichmultiple hardware-implemented modules are configured or instantiated atdifferent times, communications between such hardware-implementedmodules may be achieved, for example, through the storage and retrievalof information in memory structures to which the multiplehardware-implemented modules have access. For example, onehardware-implemented module may perform an operation, and store theoutput of that operation in a memory device to which it iscommunicatively coupled. A further hardware-implemented module may then,at a later time, access the memory device to retrieve and process thestored output. Hardware-implemented modules may also initiatecommunications with input or output devices, and can operate on aresource (e.g., a collection of information).

The various operations of example methods described herein may beperformed, at least partially, by one or more processors that aretemporarily configured (e.g., by software) or permanently configured toperform the relevant operations. Whether temporarily or permanentlyconfigured, such processors may constitute processor-implemented modulesthat operate to perform one or more operations or functions. The modulesreferred to herein may, in some example embodiments, compriseprocessor-implemented modules.

Similarly, the methods described herein may be at least partiallyprocessor-implemented. For example, at least some of the operations of amethod may be performed by one or more processors orprocessor-implemented modules. The performance of certain of theoperations may be distributed among the one or more processors, not onlyresiding within a single machine, but also deployed across a number ofmachines. In some example embodiments, the processor or processors maybe located in a single location (e.g., within a home environment, anoffice environment, or a server farm), while in other embodiments theprocessors may be distributed across a number of locations.

The one or more processors may also operate to support performance ofthe relevant operations in a “cloud computing” environment or as a“software as a service” (SaaS). For example, at least some of theoperations may be performed by a group of computers (as examples ofmachines including processors), these operations being accessible via anetwork (e.g., the Internet) and via one or more appropriate interfaces(e.g., application programming interfaces (APIs)).

Electronic Apparatus and System

Example embodiments may be implemented in digital electronic circuitry,in computer hardware, firmware, or software, or in combinations of them.Example embodiments may be implemented using a computer program product,e.g., a computer program tangibly embodied in an information carrier,e.g., in a machine-readable medium for execution by, or to control theoperation of, data processing apparatus, e.g., a programmable processor,a computer, or multiple computers.

A computer program can be written in any form of programming language,including compiled or interpreted languages, and it can be deployed inany form, including as a standalone program or as a module, subroutine,or other unit suitable for use in a computing environment. A computerprogram can be deployed to be executed on one computer or on multiplecomputers at one site or distributed across multiple sites andinterconnected by a communication network.

In example embodiments, operations may be performed by one or moreprogrammable processors executing a computer program to performfunctions by operating on input data and generating output. Methodoperations can also be performed by, and apparatus of exampleembodiments may be implemented as, special-purpose logic circuitry,e.g., a field programmable gate array (FPGA) or an application-specificintegrated circuit (ASIC).

The computing system can include clients and servers. A client andserver are generally remote from each other and typically interactthrough a communication network. The relationship of client and serverarises by virtue of computer programs running on the respectivecomputers and having a client-server relationship to each other. Inembodiments deploying a programmable computing system, it will beappreciated that both hardware and software architectures meritconsideration. Specifically, it will be appreciated that the choice ofwhether to implement certain functionality in permanently configuredhardware (e.g., an ASIC), in temporarily configured hardware (e.g., acombination of software and a programmable processor), or in acombination of permanently and temporarily configured hardware may be adesign choice. Below are set out hardware (e.g., machine) and softwarearchitectures that may be deployed, in various example embodiments.

Software Architecture

FIG. 9 is a block diagram 900 illustrating a software architecture 902,which may be installed on any one or more of the devices describedabove. FIG. 9 is merely a non-limiting example of a softwarearchitecture, and it will be appreciated that many other architecturesmay be implemented to facilitate the functionality described herein. Thesoftware architecture 902 may be implemented by hardware such as amachine 1000 of FIG. 10 that includes processors 1010, memory 1030, andI/O components 1050. In this example, the software architecture 902 maybe conceptualized as a stack of layers where each layer may provide aparticular functionality. For example, the software architecture 902includes layers such as an operating system 904, libraries 906,frameworks 908, and applications 910. Operationally, the applications910 invoke application programming interface (API) calls 912 through thesoftware stack and receive messages 914 in response to the API calls912, according to some implementations.

In various implementations, the operating system 904 manages hardwareresources and provides common services. The operating system 904includes, for example, a kernel 920, services 922, and drivers 924. Thekernel 920 acts as an abstraction layer between the hardware and theother software layers in some implementations. For example, the kernel920 provides memory management, processor management (e.g., scheduling),component management, networking, and security settings, among otherfunctionality. The services 922 may provide other common services forthe other software layers. The drivers 924 may be responsible forcontrolling or interfacing with the underlying hardware. For instance,the drivers 924 may include display drivers, camera drivers, Bluetooth®drivers, flash memory drivers, serial communication drivers (e.g.,Universal Serial Bus (US3) drivers), Wi-Fi® drivers, audio drivers,power management drivers, and so forth.

In some implementations, the libraries 906 provide a low-level commoninfrastructure that may be utilized by the applications 910. Thelibraries 906 may include system libraries 930 (e.g., C standardlibrary) that may provide functions such as memory allocation functions,string manipulation functions, mathematic functions, and the like. Inaddition, the libraries 906 may include API libraries 932 such as medialibraries (e.g., libraries to support presentation and manipulation ofvarious media formats such as Moving Picture Experts Group-4 (MPEG4),Advanced Video Coding (H.264 or AVC), Moving Picture Experts GroupLayer-3 (MP3), Advanced Audio Coding (AAC), Adaptive Multi-Rate (AMR)audio codec, Joint Photographic Experts Group (JPEG or JPG), or PortableNetwork Graphics (PNG)), graphics libraries (e.g., an OpenGL frameworkused to render in two dimensions (2D) and three dimensions (3D) in agraphic context on a display), database libraries (e.g., SQLite toprovide various relational database functions), web libraries (e.g.,WebKit to provide web browsing functionality), and the like. Thelibraries 906 may also include a wide variety of other libraries 934 toprovide many other APIs to the applications 910.

The frameworks 908 provide a high-level common infrastructure that maybe utilized by the applications 910, according to some implementations.For example, the frameworks 908 provide various graphic user interface(GUI) functions, high-level resource management, high-level locationservices, and so forth. The frameworks 908 may provide a broad spectrumof other APIs that may be utilized by the applications 910, some ofwhich may be specific to a particular operating system or platform.

In an example embodiment, the applications 910 include a homeapplication 950, a contacts application 952, a browser application 954,a book reader application 956, a location application 958, a mediaapplication 960, a messaging application 962, a game application 964,and a broad assortment of other applications such as a third-partyapplication 966. According to some embodiments, the applications 910 areprograms that execute functions defined in the programs. Variousprogramming languages may be employed to create one or more of theapplications 910, structured in a variety of manners, such asobject-orientated programming languages (e.g., Objective-C, Java, orC++) or procedural programming languages (e.g., C or assembly language).In a specific example, the third-party application 966 (e.g., anapplication developed using the Android™ or iOS™ software developmentkit (SDK) by an entity other than the vendor of the particular platform)may be mobile software running on a mobile operating system such asiOS™, Android™, Windows® Phone, or other mobile operating systems. Inthis example, the third-party application 966 may invoke the API calls912 provided by the mobile operating system (e.g., the operating system904) to facilitate functionality described herein.

Example Machine Architecture and Machine-Readable Medium

FIG. 10 is a block diagram illustrating components of a machine 1000,according to some example embodiments, able to read instructions from amachine-readable medium (e.g., a machine-readable storage medium) andperform any one or more of the methodologies discussed herein.Specifically, FIG. 10 shows a diagrammatic representation of the machine1000 in the example form of a computer system, within which instructions1016 (e.g., software, a program, an application, an applet, an app, orother executable code) for causing the machine 1000 to perform any oneor more of the methodologies discussed herein may be executed. Inalternative embodiments, the machine 1000 operates as a standalonedevice or may be coupled (e.g., networked) to other machines. In anetworked deployment, the machine 1000 may operate in the capacity of aserver machine or a client machine in a server-client networkenvironment, or as a peer machine in a peer-to-peer (or distributed)network environment. The machine 1000 may comprise, but not be limitedto, a server computer, a client computer, a personal computer (PC), atablet computer, a laptop computer, a netbook, a set-top box (STB), apersonal digital assistant (PDA), an entertainment media system, acellular telephone, a smart phone, a mobile device, a wearable device(e.g., a smart watch), a smart home device (e.g., a smart appliance),other smart devices, a web appliance, a network router, a networkswitch, a network bridge, or any machine capable of executing theinstructions 1016, sequentially or otherwise, that specify actions to betaken by the machine 1000. Further, while only a single machine 1000 isillustrated, the term “machine” shall also be taken to include acollection of machines 1000 that individually or jointly execute theinstructions 1016 to perform any one or more of the methodologiesdiscussed herein.

The machine 1000 may include processors 1010, memory 1030, and I/Ocomponents 1050, which may be configured to communicate with each othervia a bus 1002. In an example embodiment, the processors 1010 (e.g., aCentral Processing Unit (CPU), a Reduced Instruction Set Computing(RISC) processor, a Complex Instruction Set Computing (CISC) processor,a Graphics Processing Unit (GPU), a Digital Signal Processor (DSP), anApplication-Specific Integrated Circuit (ASIC), a Radio-FrequencyIntegrated Circuit (RFIC), another processor, or any suitablecombination thereof) may include, for example, a processor 1012 and aprocessor 1014 that may execute the instructions 1016. The term“processor” is intended to include multi-core processors that maycomprise two or more independent processors (also referred to as“cores”) that may execute instructions contemporaneously. Although FIG.10 shows multiple processors, the machine 1000 may include a singleprocessor with a single core, a single processor with multiple cores(e.g., a multi-core processor), multiple processors with a single core,multiple processors with multiple cores, or any combination thereof.

The memory 1030 may include a main memory 1032, a static memory 1034,and a storage unit 1036 accessible to the processors 1010 via the bus1002. The storage unit 1036 may include a machine-readable medium 1038on which are stored the instructions 1016 embodying any one or more ofthe methodologies or functions described herein. The instructions 1016may also reside, completely or at least partially, within the mainmemory 1032, within the static memory 1034, within at least one of theprocessors 1010 (e.g., within the processor's cache memory), or anysuitable combination thereof, during execution thereof by the machine1000. Accordingly, in various implementations, the main memory 1032, thestatic memory 1034, and the processors 1010 are consideredmachine-readable media 1038.

As used herein, the term “memory” refers to a machine-readable medium1038 able to store data temporarily or permanently and may be taken toinclude, but not be limited to, random-access memory (RAM), read-onlymemory (ROM), buffer memory, flash memory, and cache memory. While themachine-readable medium 1038 is shown in an example embodiment to be asingle medium, the term “machine-readable medium” should be taken toinclude a single medium or multiple media (e.g., a centralized ordistributed database, or associated caches and servers) able to storethe instructions 1016. The term “machine-readable medium” shall also betaken to include any medium, or combination of multiple media, that iscapable of storing instructions (e.g., instructions 1016) for executionby a machine (e.g., machine 1000), such that the instructions, whenexecuted by one or more processors of the machine (e.g., processors1010), cause the machine to perform any one or more of the methodologiesdescribed herein. Accordingly, a “machine-readable medium” refers to asingle storage apparatus or device, as well as “cloud-based” storagesystems or storage networks that include multiple storage apparatus ordevices. The term “machine-readable medium” shall accordingly be takento include, but not be limited to, one or more data repositories in theform of a solid-state memory (e.g., flash memory), an optical medium, amagnetic medium, other non-volatile memory (e.g., Erasable ProgrammableRead-Only Memory (EPROM)), or any suitable combination thereof. The term“machine-readable medium” specifically excludes non-statutory signalsper se.

The I/O components 1050 include a wide variety of components to receiveinput, provide output, produce output, transmit information, exchangeinformation, capture measurements, and so on. In general, it will beappreciated that the I/O components 1050 may include many othercomponents that are not shown in FIG. 10 . The I/O components 1050 aregrouped according to functionality merely for simplifying the followingdiscussion and the grouping is in no way limiting. In various exampleembodiments, the I/O components 1050 include output components 1052 andinput components 1054. The output components 1052 include visualcomponents (e.g., a display such as a plasma display panel (PDP), alight emitting diode (LED) display, a liquid crystal display (LCD), aprojector, or a cathode ray tube (CRT)), acoustic components (e.g.,speakers), haptic components (e.g., a vibratory motor), other signalgenerators, and so forth. The input components 1054 include alphanumericinput components (e.g., a keyboard, a touch screen configured to receivealphanumeric input, a photo-optical keyboard, or other alphanumericinput components), point-based input components (e.g., a mouse, atouchpad, a trackball, a joystick, a motion sensor, or other pointinginstruments), tactile input components (e.g., a physical button, a touchscreen that provides location and force of touches or touch gestures, orother tactile input components), audio input components (e.g., amicrophone), and the like.

In some further example embodiments, the I/O components 1050 includebiometric components 1056, motion components 1058, environmentalcomponents 1060, or position components 1062, among a wide array ofother components. For example, the biometric components 1056 includecomponents to detect expressions (e.g., hand expressions, facialexpressions, vocal expressions, body gestures, or eye tracking), measurebiosignals (e.g., blood pressure, heart rate, body temperature,perspiration, or brain waves), identify a person (e.g., voiceidentification, retinal identification, facial identification,fingerprint identification, or electroencephalogram-basedidentification), and the like. The motion components 1058 includeacceleration sensor components (e.g., accelerometer), gravitation sensorcomponents, rotation sensor components (e.g., gyroscope), and so forth.The environmental components 1060 include, for example, illuminationsensor components (e.g., photometer), temperature sensor components(e.g., one or more thermometers that detect ambient temperature),humidity sensor components, pressure sensor components (e.g.,barometer), acoustic sensor components (e.g., one or more microphonesthat detect background noise), proximity sensor components (e.g.,infrared sensors that detect nearby objects), gas sensors (e.g., machineolfaction detection sensors, gas detection sensors to detectconcentrations of hazardous gases for safety or to measure pollutants inthe atmosphere), or other components that may provide indications,measurements, or signals corresponding to a surrounding physicalenvironment. The position components 1062 include location sensorcomponents (e.g., a Global Positioning System (GPS) receiver component),altitude sensor components (e.g., altimeters or barometers that detectair pressure from which altitude may be derived), orientation sensorcomponents (e.g., magnetometers), and the like.

Communication may be implemented using a wide variety of technologies.The I/O components 1050 may include communication components 1064operable to couple the machine 1000 to a network 1080 or devices 1070via a coupling 1082 and a coupling 1072, respectively. For example, thecommunication components 1064 include a network interface component oranother suitable device to interface with the network 1080. In furtherexamples, the communication components 1064 include wired communicationcomponents, wireless communication components, cellular communicationcomponents, Near Field Communication (NFC) components, Bluetooth®components (e.g., Bluetooth® Low Energy), Wi-Fi® components, and othercommunication components to provide communication via other modalities.The devices 1070 may be another machine or any of a wide variety ofperipheral devices (e.g., a peripheral device coupled via a USB).

Moreover, in some implementations, the communication components 1064detect identifiers or include components operable to detect identifiers.For example, the communication components 1064 include Radio FrequencyIdentification (RFID) tag reader components, NFC smart tag detectioncomponents, optical reader components (e.g., an optical sensor to detectone-dimensional bar codes such as Universal Product Code (UPC) bar code,multi-dimensional bar codes such as Quick Response (QR) code, Azteccode, Data Matrix. Dataglyph, MaxiCode, PDF417, Ultra Code, UniformCommercial Code Reduced Space Symbology (UCC RSS)-2D bar code, and otheroptical codes), acoustic detection components (e.g., microphones toidentify tagged audio signals), or any suitable combination thereof. Inaddition, a variety of information can be derived via the communicationcomponents 1064, such as location via Internet Protocol (IP)geolocation, location via Wi-Fi® signal triangulation, location viadetecting an NFC beacon signal that may indicate a particular location,and so forth.

Transmission Medium

In various example embodiments, one or more portions of the network 1080may be an ad hoc network, an intranet, an extranet, a virtual privatenetwork (VPN), a local area network (LAN), a wireless LAN (WLAN), a widearea network (WAN), a wireless WAN (WWAN), a metropolitan area network(MAN), the Internet, a portion of the Internet, a portion of the PublicSwitched Telephone Network (PSTN), a plain old telephone service (POTS)network, a cellular telephone network, a wireless network, a Wi-Fi®network, another type of network, or a combination of two or more suchnetworks. For example, the network 1080 or a portion of the network 1080may include a wireless or cellular network and the coupling 1082 may bea Code Division Multiple Access (CDMA) connection, a Global System forMobile communications (GSM) connection, or another type of cellular orwireless coupling. In this example, the coupling 1082 may implement anyof a variety of types of data transfer technology, such as SingleCarrier Radio Transmission Technology (1×RTT), Evolution-Data Optimized(EVDO) technology, General Packet Radio Service (GPRS) technology.Enhanced Data rates for GSM Evolution (EDGE) technology, thirdGeneration Partnership Project (3GPP) including 3G, fourth generationwireless (4G) networks, Universal Mobile Telecommunications System(UMTS), High Speed Packet Access (HSPA), Worldwide Interoperability forMicrowave Access (WiMAX), Long Term Evolution (LTE) standard, othersdefined by various standard-setting organizations, other long rangeprotocols, or other data transfer technology.

In example embodiments, the instructions 1016 are transmitted orreceived over the network 1080 using a transmission medium via a networkinterface device (e.g., a network interface component included in thecommunication components 1064) and utilizing any one of a number ofwell-known transfer protocols (e.g., Hypertext Transfer Protocol(HTTP)). Similarly, in other example embodiments, the instructions 1016are transmitted or received using a transmission medium via the coupling1072 (e.g., a peer-to-peer coupling) to the devices 1070. The term“transmission medium” shall be taken to include any intangible mediumthat is capable of storing, encoding, or carrying the instructions 1016for execution by the machine 1000, and includes digital or analogcommunications signals or other intangible media to facilitatecommunication of such software.

Furthermore, the machine-readable medium 1038 is non-transitory (inother words, not having any transitory signals) in that it does notembody a propagating signal. However, labeling the machine-readablemedium 1038 as “non-transitory”should not be construed to mean that themedium is incapable of movement; the medium should be considered asbeing transportable from one physical location to another. Additionally,since the machine-readable medium 1038 is tangible, the medium may beconsidered to be a machine-readable device.

Language

Throughout this specification, plural instances may implementcomponents, operations, or structures described as a single instance.Although individual operations of one or more methods are illustratedand described as separate operations, one or more of the individualoperations may be performed concurrently, and nothing requires that theoperations be performed in the order illustrated. Structures andfunctionality presented as separate components in example configurationsmay be implemented as a combined structure or component. Similarly,structures and functionality presented as a single component may beimplemented as separate components. These and other variations,modifications, additions, and improvements fall within the scope of thesubject matter herein.

Although an overview of the inventive subject matter has been describedwith reference to specific example embodiments, various modificationsand changes may be made to these embodiments without departing from thebroader scope of embodiments of the present disclosure. Such embodimentsof the inventive subject matter may be referred to herein, individuallyor collectively, by the term “invention” merely for convenience andwithout intending to voluntarily limit the scope of this application toany single disclosure or inventive concept if more than one is, in fact,disclosed.

The embodiments illustrated herein are described in sufficient detail toenable those skilled in the art to practice the teachings disclosed.Other embodiments may be used and derived therefrom, such thatstructural and logical substitutions and changes may be made withoutdeparting from the scope of this disclosure. The Detailed Description,therefore, is not to be taken in a limiting sense, and the scope ofvarious embodiments is defined only by the appended claims, along withthe full range of equivalents to which such claims are entitled.

As used herein, the term “or” may be construed in either an inclusive orexclusive sense. Moreover, plural instances may be provided forresources, operations, or structures described herein as a singleinstance. Additionally, boundaries between various resources,operations, modules, engines, and data stores are somewhat arbitrary,and particular operations are illustrated in a context of specificillustrative configurations. Other allocations of functionality areenvisioned and may fall within a scope of various embodiments of thepresent disclosure. In general, structures and functionality presentedas separate resources in the example configurations may be implementedas a combined structure or resource. Similarly, structures andfunctionality presented as a single resource may be implemented asseparate resources. These and other variations, modifications,additions, and improvements fall within a scope of embodiments of thepresent disclosure as represented by the appended claims. Thespecification and drawings are, accordingly, to be regarded in anillustrative rather than a restrictive sense.

What is claimed is:
 1. A method comprising: accessing, by a second service provider system from a first service provider system, via a network, a set of account identifiers for a set of accounts served by the first service provider system, the set of account identifiers comprising a first account identifier; providing, by the second service provider system, a first security service for the set of account identifiers; receiving, from a client device associated with the first account identifier, authorization to provide a second security service for the first account identifier; based on the authorization to provide the second security service for the first account identifier: providing, by the second service provider system, the second security service for the first account identifier; and based on the accessing of the first account identifier from the first service provider system, crediting an account corresponding to the first service provider system.
 2. The method of claim 1, further comprising: receiving, from the client device, information for a financial account associated with the first account identifier; and debiting, from the financial account, a fee associated with the second security service.
 3. The method of claim 1, wherein the first security service for the set of account identifiers is a dark web search for each account identifier in the set of account identifiers.
 4. The method of claim 1, wherein the second security service for the first account identifier is an identity security service.
 5. The method of claim 1, wherein the second security service for the first account identifier is a privacy security service.
 6. The method of claim 1, wherein the first account identifier is an email address.
 7. The method of claim 1, wherein the first account identifier is a password.
 8. The method of claim 1, further comprising: periodically receiving, by the second service provider system, from the first service provider system and via the network, updates to the set of account identifiers.
 9. The method of claim 1, wherein the providing of the first security service for the set of account identifiers comprises periodically providing the first security service.
 10. The method of claim 1, wherein the providing of the first security service for the set of account identifiers comprises waiving a fee for the first security service.
 11. The method of claim 1, wherein the first service provider system is a social media service provider system.
 12. The method of claim 1, wherein the crediting of the account comprises transmitting a transfer request, via the network, to a banking server.
 13. A system comprising: a memory that stores instructions; and one or more processors configured by the instructions to perform operations comprising: accessing, via a network and from a service provider system, a set of account identifiers for a set of accounts served by the service provider system, the set of account identifiers comprising a first account identifier; providing a first security service for the set of account identifiers; receiving, from a client device associated with the first account identifier, authorization to provide a second security service for the first account identifier; based on the authorization to provide the second security service for the first account identifier: providing the second security service for the first account identifier; and based on the accessing of the first account identifier from the first service provider system, crediting an account corresponding to the first service provider system.
 14. The system of claim 13, wherein the operations further comprise: receiving, from the client device, information for a financial account associated with the first account identifier; and debiting, from the financial account, a fee associated with the second security service.
 15. The system of claim 13, wherein the first security service for the set of account identifiers is a dark web search for each account identifier in the set of account identifiers.
 16. The system of claim 13, wherein the second security service for the first account identifier is an identity security service.
 17. The system of claim 13, wherein the second security service for the first account identifier is a privacy security service.
 18. A non-transitory machine-readable medium that stores instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising: accessing, via a network and from a service provider system, a set of account identifiers for a set of accounts served by the service provider system, the set of account identifiers comprising a first account identifier; providing a first security service for the set of account identifiers; receiving, from a client device associated with the first account identifier, authorization to provide a second security service for the first account identifier; based on the authorization to provide the second security service for the first account identifier: providing the second security service for the first account identifier; and based on the accessing of the first account identifier from the first service provider system, crediting an account corresponding to the first service provider system.
 19. The machine-readable medium of claim 18, wherein the operations further comprise: receiving, from the client device, information for a financial account associated with the first account identifier; and debiting, from the financial account, a fee associated with the second security service.
 20. The machine-readable medium of claim 18, wherein the first security service for the set of account identifiers is a dark web search for each account identifier in the set of account identifiers. 