System for predictive use of resources

ABSTRACT

Systems, computer program products, and methods are described herein for predictive use of resources across a dispersed Internet protocol capable network connecting devices electrically attached to the network. The present invention is configured to determine a resource utilization profile associated with a first user; receive an indication from the first user to improve the resource utilization profile; initiate a first user interface, wherein the first user interface comprises one or more target resource utilization profiles associated with one or more users; receive a first user selection of a target resource utilization profile associated with the resource utilization profile that the first user wishes to change; determine one or more access paths associated with the at least one target resource utilization profile; and display on the first user computing device the one or more access paths to enable the first user to achieve the at least one target utilization profile.

BACKGROUND

Resource management is the efficient and effective development of anorganization's resources. Most organizations strive to achieve maximumutilization of the resources weighted by important metrics and subjectto predefined constraints at the smallest level of operation. Access toresources within an Internet protocol (IP) based dispersed networktypically involves establishing specific access protocols to provideauthorization. However, allocation of these resources based onconstraints, protocols, and metrics may pose the challenge to anyorganization. There is a need for a system to establish one or morealternative paths to acquire resources.

SUMMARY

The following presents a simplified summary of one or more embodimentsof the present invention, in order to provide a basic understanding ofsuch embodiments. This summary is not an extensive overview of allcontemplated embodiments, and is intended to neither identify key orcritical elements of all embodiments nor delineate the scope of any orall embodiments. Its sole purpose is to present some concepts of one ormore embodiments of the present invention in a simplified form as aprelude to the more detailed description that is presented later.

In one aspect, a system for predictive use of resources across adispersed Internet protocol capable network connecting deviceselectrically attached to the network is presented. The systemcomprising: at least one memory; at least one processing deviceoperatively coupled to the memory device, wherein the processing deviceis configured to execute computer-readable program code to: determine aresource utilization profile associated with a first user, wherein theresource utilization profile comprises usage statistics associated withone or more resources allocated to the user across the dispersednetwork; receive, from a first user computing device, an indication fromthe first user to improve the resource utilization profile associatedwith the user; initiate, a first user interface for display on the firstcomputing device, wherein the first user interface comprises one or moretarget resource utilization profiles associated with one or more users;receive, via the first user interface, a first user selection of atleast one of the one or more target resource utilization profilesassociated with the resource utilization profile that the first userwishes to change; determine one or more access paths associated with theat least one target resource utilization profile to enable the firstuser to achieve the at least one target utilization profile; andtransmit, a second user interface for display on the first usercomputing device, wherein the second user interface comprises the one ormore access paths associated with the at least one target resourceutilization profile to enable the first user to achieve the at least onetarget utilization profile.

In some embodiments, the module is further configured to: receive, viathe second user interface, a first user selection of at least one of theone or more access paths to achieve the at least one target utilizationprofile; and determine one or more actions associated with the at leastone of the one or more access paths to be executed by the first user toenable the first user to achieve the at least one target utilizationprofile.

In some embodiments, the module is further configured to: initiate athird user interface for display on the first user computing device,wherein the third user interface comprises the one or more actionsassociated with the at least one of the one or more access paths; andreceive, via the third user interface, a user input indicating anexecution of at least one of the one or more actions by the first userassociated with the at least one of the one or more access paths toachieve the at least one target utilization profile.

In some embodiments, the module is further configured to: continuouslymonitor the first user computing device to determine the execution of atleast one of the one or more actions by the first user associated withthe at least one of the one or more access paths to achieve the at leastone target utilization profile.

In some embodiments, the module is further configured to: dynamicallygenerate a graphical representation of the resource utilization profileof the first user reflecting a utilization of one or more resources ofthe first user in real-time; and transmit control signals configured tocause the first user computing device to display the graphicalrepresentation of the resource utilization profile.

In some embodiments, the module is further configured to: determine aprogress level associated with the first user's progress towardsachieving the at least one target utilization profile; and continuouslyupdate the progress level based on at least continuously monitoring thefirst user computing device to determine the execution of at least oneof the one or more actions by the first user associated with the atleast one of the one or more access paths.

In some embodiments, the module is further configured to: determine afirst user profile associated with the first user; compare the firstuser profile associated with the first user with the one or more userprofiles associated with the one or more users to determine a match;determine the one or more target resource utilization profilesassociated with one or more users based on at least determining a matchbetween the first user profile and the one or more user profilesassociated with the one or more users.

In another aspect, a computerized method for predictive use of resourcesacross a dispersed Internet protocol capable network connecting deviceselectrically attached to the network is presented. The method comprises:determining, via a computing device processor, a resource utilizationprofile associated with a first user, wherein the resource utilizationprofile comprises usage statistics associated with one or more resourcesallocated to the user across the dispersed network; receiving, from afirst user computing device, an indication from the first user toimprove the resource utilization profile associated with the user;initiating, a first user interface for display on the first computingdevice, wherein the first user interface comprises one or more targetresource utilization profiles associated with one or more users;receiving, via the first user interface, a first user selection of atleast one of the one or more target resource utilization profilesassociated with the resource utilization profile that the first userwishes to change; determining, via a computing device processor, one ormore access paths associated with the at least one target resourceutilization profile to enable the first user to achieve the at least onetarget utilization profile; and transmitting, a second user interfacefor display on the first user computing device, wherein the second userinterface comprises the one or more access paths associated with the atleast one target resource utilization profile to enable the first userto achieve the at least one target utilization profile.

In yet another aspect, a computer program product for predictive use ofresources across a dispersed Internet protocol capable networkconnecting devices electrically attached to the network is presented.The computer program product comprising a non-transitorycomputer-readable medium comprising code causing a first apparatus to:determine a resource utilization profile associated with a first user,wherein the resource utilization profile comprises usage statisticsassociated with one or more resources allocated to the user across thedispersed network; receive, from a first user computing device, anindication from the first user to improve the resource utilizationprofile associated with the user; initiate, a first user interface fordisplay on the first computing device, wherein the first user interfacecomprises one or more target resource utilization profiles associatedwith one or more users; receive, via the first user interface, a firstuser selection of at least one of the one or more target resourceutilization profiles associated with the resource utilization profilethat the first user wishes to change; determine one or more access pathsassociated with the at least one target resource utilization profile toenable the first user to achieve the at least one target utilizationprofile; and transmit, a second user interface for display on the firstuser computing device, wherein the second user interface comprises theone or more access paths associated with the at least one targetresource utilization profile to enable the first user to achieve the atleast one target utilization profile.

BRIEF DESCRIPTION OF THE DRAWINGS

Having thus described embodiments of the invention in general terms,reference will now be made to the accompanying drawings, where:

FIG. 1 presents an exemplary block diagram of the system environment forimplementing the process flows described herein in accordance withembodiments of the present invention;

FIG. 2 illustrates a flow diagram for creation of alternative path toresource acquisition, in accordance with an embodiment of the invention;

FIG. 3 illustrates a flow diagram for predictive acquisition and use ofresources, in accordance with an embodiment of the invention;

FIG. 4 illustrates a flow diagram for a system for predictive use ofresources across a dispersed Internet protocol capable networkconnecting devices electrically attached to the network, in accordancewith an embodiment of an invention; and

FIG. 5 illustrates a flow-diagram for predictive usage of resourcesacross a dispersed Internet protocol capable network connecting deviceselectrically attached to the network, in accordance with an embodimentof the invention.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

Embodiments of the present invention will now be described more fullyhereinafter with reference to the accompanying drawings, in which some,but not all, embodiments of the invention are shown. Indeed, theinvention may be embodied in many different forms and should not beconstrued as limited to the embodiments set forth herein; rather, theseembodiments are provided so that this disclosure will satisfy applicablelegal requirements. Like numbers refer to elements throughout. Forclarity, non-essential elements may have been omitted from some of thedrawing.

It will be appreciated that certain features of the invention, whichare, for clarity, described in the context of separate embodiments, mayalso be provided in combination in a single embodiment. Conversely,various features of the invention, which are, for brevity, described inthe context of a single embodiment, may also be provided separately orin any suitable sub-combination or as suitable in any other describedembodiment of the invention. Certain features described in the contextof various embodiments are not to be considered essential features ofthose embodiments, unless the embodiment is inoperative without thoseelements.

As used herein, the term “resource” will generally refer to objects,products, devices, goods, commodities, services, and the like, and/orthe ability and opportunity to access and use the same. Some exampleimplementations herein contemplate property held by a user, includingproperty that is stored and/or maintained by a third party entity. Insome example implementations, a resource may be associated with one ormore accounts or may be property that is not associated with a specificaccount. Examples of resources associated with accounts may be accountsthat have cash or cash equivalents, commodities, and/or accounts thatare funded with or contain property, such as safety deposit boxescontaining jewelry, art or other valuables, a trust account that isfunded with property, or the like. Examples of resources that may notnecessarily be associated with accounts may be particularized goods,such as distinct pieces of furniture, equipment, or other valuables, orthe like. Similarly, “funds” or “available balance” refer to types ofresources. For example, the term “fund” may be used to refer to one ormore sets of monetary resources available to a user, and may also bereferred to as an available balance, a collected balance, good funds,and usable funds.

In the context of example implementations described herein, a“transaction” or “resource distribution” refers to any transfer ofresources and/or an obligation to return resources to and/or from auser. A transaction may refer to a purchase of goods or services, areturn of goods or services, a payment transaction, a credittransaction, or other interaction involving a user's account. In thecontext of a financial institution, a transaction may refer to one ormore of: a sale of goods and/or services, initiating an automated tellermachine (ATM) or online banking session, an account balance inquiry, arewards transfer, an account money transfer or withdrawal, opening abank application on a user's computer or mobile device, a user accessingtheir e-wallet, or any other interaction involving the user and/or theuser's device that is detectable by the financial institution. Atransaction may include one or more of the following: renting, selling,and/or leasing goods and/or services (e.g., groceries, stamps, tickets,DVDs, vending machine items, and the like); making payments to creditors(e.g., paying monthly bills; paying federal, state, and/or local taxes;and the like); sending remittances; loading money onto stored valuecards (SVCs) and/or prepaid cards; donating to charities; and/or thelike.

In accordance with embodiments of the invention, the terms “financialinstitution” and “financial entity” include any organization thatprocesses financial transactions including, but not limited to, banks,credit unions, savings and loan associations, investment companies,stock brokerages, asset management firms, insurance companies and thelike.

Many of the embodiments and example implementations thereof describedherein are directed toward solving the myriad technical problemsassociated with effectively monitoring and managing resource usage anddeployment when resources may be accessed and deployed in multiple wayacross multiple platforms in a dispersed network. Such technicaldifficulties can be compounded when resources may be deployed, accessed,and accumulated automatically and/or outside of the direct control of auser in every instance wherein a resource or portion thereof isdeployed, accessed, and/or accumulated. With the aim of allowing a useran effective and efficient tool to monitor and access resources andconduct communications regarding the same, many example embodiments ofthe invention disclosed herein contemplate resource access communicationdevice and/or module that is capable of serving as an interface betweena user on the one hand and a user's computing device, one or morethird-party systems associated with the user and/or resources associatedwith the user, and, in some instances, one or more secondarycommunication devices on the other hand.

Many of the example embodiments and implementations described hereincontemplate interactions engaged in by a resource user with a computingdevice (e.g., a mobile device) and/or one or more resource accesscommunication devices and/or secondary communication devices. A “user”,as referenced herein, may refer to an entity or individual that has theability and/or authorization to access and use one or more resources orportions of a resource. Furthermore, as used herein, the term “usercomputing device” or “mobile device” may refer to mobile phones,personal computing devices, tablet computers, wearable devices, and/orany portable electronic device capable of receiving and/or storing datatherein.

A “user interface” is any device or software that allows a user to inputinformation, such as commands or data, into a device, or that allows thedevice to output information to the user. For example, the userinterface include a graphical user interface (GUI) or an interface toinput computer-executable instructions that direct a processing deviceto carry out specific functions. The user interface typically employscertain input and output devices to input data received from a usersecond user or output data to a user. These input and output devices mayinclude a display, mouse, keyboard, button, touchpad, touch screen,microphone, speaker, LED, light, joystick, switch, buzzer, bell, and/orother user input/output device for communicating with one or more users.

In some example implementations, a resource access communication deviceis capable of interacting with a user in the sense that it can detectand parse audible statements from a user (including but not limited tospoken commands, spoken questions, and other user speech) and/or writtencontent from a user (including but not limited to text input by a userand/or other written commands or statements), and responding to the userin the form of performing transactions, transmitting credentials,establishing communication channels, prompting the user to perform oneor more actions, scheduling meetings with personnel associated with oneor more resources, and the like.

Many example implementations are particularly directed to a user'sinteraction with resources associated with the user and stored orotherwise associated with a third party financial institution. In somesuch implementations, a resource access communication device, as eithera stand-alone device or one integrated into a user computing device, iscapable of interacting with a banking application to facilitate theefficient and effective access, monitoring, deployment, and accumulationof resources by the user. For example, a resource access communicationdevice that is capable of detecting and processing voice commands may beused by a user to translate statements made by the user, into operativetransactions, such as the satisfaction of obligations, transfers ofresources, subscription to certain products and/or services, respondingto offers, and the like. Similarly, a resource access communicationdevice that is capable of detecting and processing written statementsfrom a user, such as text messages or other written messages maylikewise be used to effectuate transactions and operations associatedwith resources and otherwise respond to user input

Some example implementations contemplate resource access communicationdevices that are able to detect, parse, and respond to predeterminedcommand words or phrases, colloquial and/or non-specific language,and/or other natural language in a manner that allows a user toeffectively monitor and manage their resource usage. For example, such aresource access communication device may be capable of recognizing astatements such as “check my transaction history”, “pay all outstandingobligations”, or other similar declarative commands, and, in response tosuch commands, perform the requested operation, such as providing a copyof the user's transaction history (or a portion thereof, as requested),or such as initiating transactions to pay any bills or other obligationsthat have not yet been paid. In another example, a resource accesscommunication device may be able to respond to questions such as “has mypaycheck been deposited”, “am I on track to retire”, “tell me about thistransaction I don't recognize” by requesting and receiving theappropriate data set and/or message information, and conveying it to theuser. In another example, a resource access communication device may beconfigured to perform operations based on other input received from theuser and/or information received from one or more third parties or othersources. In one such example, a user may articulate that certain itemsshould be added to a grocery or other shopping list, that one or moregoods or services are necessary for a home or vehicle, or the like. Inresponse to the user input, the resource access communication device maylocate and/or compile offers associated with the goods, services, and/orother products associated with the statements made by the user, andconvey those offers and/or other information to the user.

While some example implementations contemplate a resource accesscommunication device and/or module that is integrated into a user'smobile device, some example implementations contemplate one or morestand-alone resource access communication devices and/or one or moresecondary communications devices. Some users may derive particularizedbenefits by having secondary communication devices deployed inadvantageous positions around a home, workspace, or other locations,wherein such secondary communication devices are capable ofcommunicating user input to a resource access communication device andrelaying information back to the user. For example, a user may opt toposition one secondary communication device in a kitchen, and reciteitems that may be needed for the completion of a particular recipe or agrocery list. The secondary communication device can in turn relay theinformation to a resource access communication device for furtherprocessing, and relay back to the user any response from the resourceaccess communication device. Similarly, a user may opt to position asecondary communication device near where the user often processes mailor other correspondence, such that the user can provide instructions topay bills or otherwise interact with service providers, entitiesassociated with offers received by the user, and other entitiesassociated with correspondence received by the user. Those skilled inthe art will appreciate that a user may opt to position such secondarycommunication devices in any location where it may be advantageous to beable to issue speaking and/or written commands or statements to provideinformation about potential resource uses, initiate transactions, and/orotherwise monitor the status and use of resources.

FIG. 1 presents an exemplary block diagram of the system environment 100for implementing the process flows described herein in accordance withembodiments of the present invention. As illustrated, the systemenvironment 100 includes a network 101, a system 102, a user inputsystem 122, a network system 142, and other network devices 152. Alsoshown in FIG. 1 is a user of the user input system 122. The user inputsystem 122 may be a mobile device or other non-mobile computing device.The user may be a person who uses the user input system 122 to execute auser application 132. The user application 132 may be an application tocommunicate with the system 102 and/or the network system 142, perform atransaction, input information onto a user interface presented on theuser input system 122, or the like. The user application 132, thenetwork system 142, and/or the system application 112 may incorporateone or more parts of any process flow described herein.

As shown in FIG. 1, the system 102, the user input system 122, and thenetwork system 142, are each operatively and selectively connected tothe network 101, which may include one or more separate networks. Insome embodiments, the network 101 additionally includes other networkdevices 152 that are operatively and selectively connected to thenetwork 101. In addition, the network 101 may include atelecommunication network, local area network (LAN), a wide area network(WAN), and/or a global area network (GAN), such as the Internet. It willalso be understood that the network 101 may be secure and/or unsecureand may also include wireless and/or wired and/or opticalinterconnection technology.

The user input system 122 may include any computerized apparatus thatcan be configured to perform any one or more of the functions of theuser input system 122 described and/or contemplated herein. For example,the user may use the user input system 122 to transmit and/or receiveinformation or commands to and from the system 102. In this regard, thesystem 102 may be configured to establish a communication link with theuser input system 122, whereby the communication link establishes a datachannel (wired or wireless) to facilitate the transfer of data betweenthe user input system 122 and the system 102. In doing so, the system102 may be configured to access one or more devices of the user inputsystem 122, such as, a GPS device, an image capturing component (e.g.,camera), a microphone, a speaker, or the like based on one or morepredetermined triggers, whereby the system 102 activates the one or moredevices of the user input system 122. In doing so, an otherwise offlinedevice of the user input system 122 is connected to the network 101 andcapable of transmitting and receiving information from the system 102.In some embodiments, for example, the user input system 102 may includea personal computer system (e.g. a non-mobile or non-portable computingsystem, or the like), a mobile computing device, a personal digitalassistant, a mobile phone, a tablet computing device, a network device,and/or the like. As illustrated in FIG. 1, in accordance with someembodiments of the present invention, the user input system 122 includesa communication device 124, a processing device 126, a memory device 128having a structured database/datastore 134 and computer readableinstructions 130 that may be configured to cause the user application132 stored therein to execute processes described with respect to theprocess flows described herein. Specifically, the user application 132executes the process flows described herein.

As used herein, the data store 134 may be one or more distinct and/orremote databases. In some embodiments, the data store 134 is not locatedwithin the system and is instead located remotely from the system. Insome embodiments, the structured database 138 stores information or datadescribed herein.

It will be understood that the data store 134 may include any one ormore storage devices, including, but not limited to, datastores,databases, and/or any of the other storage devices typically associatedwith a computer system. It will also be understood that the data store134 may store information in any known way, such as, for example, byusing one or more computer codes and/or languages, alphanumericcharacter strings, data sets, figures, tables, charts, links, documents,and/or the like. Further, in some embodiments, the data store 134 mayinclude information associated with one or more applications, such as,for example, the user application 132. It will also be understood that,in some embodiments, the data store 134 provides a substantiallyreal-time representation of the information stored therein, so that, forexample, when the processing device 126 accesses the data store 134, theinformation stored therein is current or substantially current.

Each processor described herein, including the processing device 126,generally includes circuitry for implementing the audio, visual, and/orlogic functions of the user input system 122. For example, theprocessing device may include a digital signal processor device, amicroprocessor device, and various analog-to-digital converters,digital-to-analog converters, and other support circuits. Control andsignal processing functions of the system in which the processor residesmay be allocated between these devices according to their respectivecapabilities. The processing device may also include functionality tooperate one or more software programs based at least partially oncomputer-executable program code portions thereof, which may be stored,for example, in a memory device, such as in the user application 122 ofthe memory device 128 of the user input system 122.

Each memory device described herein, including the memory device 128 forstoring the user application 122 and other information, may include anycomputer-readable medium. For example, memory may include volatilememory, such as volatile random access memory (RAM) having a cache areafor the temporary storage of information. Memory may also includenon-volatile memory, which may be embedded and/or may be removable. Thenon-volatile memory may additionally or alternatively include an EEPROM,flash memory, and/or the like. The memory may store any one or more ofpieces of information and data used by the system in which it resides toimplement the functions of that system. In this regard, the system maydynamically utilize the volatile memory over the non-volatile memory bystoring multiple pieces of information in the volatile memory, therebyreducing the load on the system and increasing the processing speed.

As shown in FIG. 1, the memory device 128 includes the user application132. In some embodiments, the user application 132 includes an interfacefor communicating with, navigating, controlling, configuring, and/orusing the user input system 122. In some embodiments, the userapplication 132 includes computer readable instructions/program codeportions 130 for instructing the processing device 126 to perform one ormore of the functions of the user application 132 described and/orcontemplated herein. In some embodiments, the user application 132 mayinclude and/or use one or more network and/or system communicationprotocols.

FIG. 1 also illustrates a system 102, in accordance with an embodimentof the present invention. The system 102 may refer to the “apparatus”described herein. The system 102 may include any computerized apparatusthat can be configured to perform any one or more of the functions ofthe system 102 described and/or contemplated herein. In accordance withsome embodiments, for example, the system 102 may include a computernetwork, an engine, a platform, a server, a database system, a front endsystem, a back end system, a personal computer system, and/or the like.Therefore, the system 102 may be a server managed by the business. Thesystem 102 may be located at the facility associated with the businessor remotely from the facility associated with the business. In someembodiments, such as the one illustrated in FIG. 1, the system 102includes a communication device 104, a processing device 106, a memorydevice 108 having a structured database/datastore 114 and computerreadable instructions 110 that may be configured to cause the systemapplication 112 stored therein to execute processes described withrespect to the process flows described herein. Specifically, the systemapplication 112 executes the process flows described herein. In someembodiments, the system 100 includes a resource monitoring engine thatis configured to access historical resource utilization database tomonitor users' historical resource utilization. For example, in thoseembodiments of the invention in which the resource being re-allocated isfunds in a checking account/DDA, the historical resource utilizationdatabase may be a financial transaction database, which stores recordsof user's financial transactions (i.e., debits/withdrawals, purchases,credits, transfers and the like). In addition, resource monitoringengine is configured to access scheduled resource utilization databaseto assess/monitor user's future planned/scheduled resource utilization.For example, in those embodiments in which the resource beingre-allocated is funds in a checking/DDA account, the scheduled resourceutilization database may be a scheduled transaction database, whichstores records of users' planned future financial transactions (e.g.,known recurring payments/transactions, scheduled bill pay transactionsand the like), including proximate or definitive date(s) and amount(s).In some other embodiments, the system 100 additionally includes aresource re-allocation engine that is configured to determine are-allocation volume or amount based on at least one of the users'historical resource utilization and/or future planned/scheduled resourceutilization and, in response to determining the volume/amount,automatically re-allocate the resources. It should be noted that thedetermination of the re-allocation amount is a logical determinationthat may be based on other information and/or factors available to theresource re-allocation engine.

It will be understood that the system application 112 may be configuredto implement any one or more portions of the various user interfacesand/or process flow described herein. The system application 112 mayinteract with the user application 132. It will also be understood that,in some embodiments, the memory includes other applications. It willalso be understood that, in some embodiments, the system application 112is configured to communicate with the data store 114, the user inputsystem 122, or the like.

It will be further understood that, in some embodiments, the systemapplication 112 includes computer readable instructions/program codeportions 110 for instructing the processing device 106 to perform anyone or more of the functions of the system application 112 describedand/or contemplated herein. In some embodiments, the system application112 may include and/or use one or more network and/or systemcommunication protocols.

In addition to the system application 112, the memory device 108 alsoincludes the structured database/datastore 114. As used herein, the datastore 114 may be one or more distinct and/or remote databases. In someembodiments, the data store 114 is not located within the system and isinstead located remotely from the system. In some embodiments, the datastore 114 stores information or data described herein.

It will be understood that the data store 114 may include any one ormore storage devices, including, but not limited to, datastores,databases, and/or any of the other storage devices typically associatedwith a computer system. It will also be understood that the data store114 may store information in any known way, such as, for example, byusing one or more computer codes and/or languages, alphanumericcharacter strings, data sets, figures, tables, charts, links, documents,and/or the like. Further, in some embodiments, the data store 114 mayinclude information associated with one or more applications, such as,for example, the system application 112. It will also be understoodthat, in some embodiments, the data store 114 provides a substantiallyreal-time representation of the information stored therein, so that, forexample, when the processing device 106 accesses the data store 114, theinformation stored therein is current or substantially current.

FIG. 1 also illustrates a network system 142, in accordance with anembodiment of the present invention. The network system 142 includes acommunication device 144 operatively coupled with an image capturingdevice 146 and a processing device 147, which are also communicablycoupled with a memory device 148. The processing device 147 isconfigured to control the communication device 144 such that the networksystem 142 communicates across the network 101 with one or more othersystems, such as the user input system 122 and/or the system 102. Theprocessing device 147 is also configured to access the memory device 148in order to read the computer readable instructions 150, which in someembodiments includes a device application 152. The memory device 148also includes a datastore 154 or database for storing pieces of datathat can be accessed by the processing device 147.

It will be understood that the device application 152 may be configuredto implement any one or more portions of the various user interfacesand/or process flow described herein. The device application 152 mayinteract with the user application 132 and/or the system application112, and vice versa. It will also be understood that, in someembodiments, the memory includes other applications. It will also beunderstood that, in some embodiments, the device application 152 isconfigured to communicate with the structured database 154, the userinput system 122, or the like.

It will be further understood that, in some embodiments, the systemapplication 112 includes computer readable instructions/program codeportions 110 for instructing the processing device 106 to perform anyone or more of the functions of the system application 112 describedand/or contemplated herein. In some embodiments, the system application112 may include and/or use one or more network and/or systemcommunication protocols.

In addition to the system application 112, the memory device 108 alsoincludes the structured database/datastore 114. As used herein, the datastore 114 may be one or more distinct and/or remote databases. In someembodiments, the data store 114 is not located within the system and isinstead located remotely from the system. In some embodiments, the datastore 114 stores information or data described herein.

It will be understood that the data store 114 may include any one ormore storage devices, including, but not limited to, datastores,databases, and/or any of the other storage devices typically associatedwith a computer system. It will also be understood that the data store114 may store information in any known way, such as, for example, byusing one or more computer codes and/or languages, alphanumericcharacter strings, data sets, figures, tables, charts, links, documents,and/or the like. Further, in some embodiments, the data store 114 mayinclude information associated with one or more applications, such as,for example, the system application 112. It will also be understoodthat, in some embodiments, the data store 114 provides a substantiallyreal-time representation of the information stored therein, so that, forexample, when the processing device 106 accesses the data store 114, theinformation stored therein is current or substantially current.

It will be understood that the embodiment of the system environmentillustrated in FIG. 1 is exemplary and that other embodiments may vary.As another example, in some embodiments, the system 102 includes more,less, or different components. As another example, in some embodiments,some or all of the portions of the system environment 100 may becombined into a single portion. Likewise, in some embodiments, some orall of the portions of the system 102 may be separated into two or moredistinct portions.

In addition, the various portions of the system environment 100 may bemaintained for and/or by the same or separate parties. It will also beunderstood that the system 102 may include and/or implement anyembodiment of the present invention described and/or contemplatedherein. For example, in some embodiments, the system 102 is configuredto implement any one or more of the embodiments of the process flowsdescribed and/or contemplated herein in connection any process flowdescribed herein. Additionally, the system 102, the network system 142,and/or the user input system 122 may be configured to initiatepresentation of any of the user interfaces described herein.

Millennials starting out after college typically do not have any creditbuilt up for availing financial loans to purchase large items such asvehicles or homes. Many times, parents or other individuals may have toco-sign on a lease or mortgage for such millennials. The present systemprovides the functional benefit of providing an alternative creditbuilding mechanism for a user who is a millennial. The systemdemystifies credit by allowing the user to receive badges for completingvarious training courses provided by the system. Further, the system mayreview that the user went to school, has a job offer, and/or the likethat may be a predictive factor of creditworthiness. Finally, the systemmay allow the user to begin-back off of his parents' credit. The systemmay generate a creditworthiness confidence score for the user which canact as a credit score allowing the user to be eligible to purchasefinancial products such as a mortgage loan without co-signers. In thisway, the present system may be configured to provide an alternative pathfor the user to acquire certain resources (e.g., mortgage loan).

FIG. 2 illustrates a flow diagram for creation of alternative path toresource acquisition 200, in accordance with an embodiment of theinvention. The present invention provides the functional benefit ofestablishing access protocols for access to a resource across adispersed Internet protocol capable network connecting deviceselectrically attached to the network. As shown in block 202, the systemmay be configured to receive, from a user computing device, anindication from a user to access a resource. In this regard, the systemmay be configured to initiate a control path connection on a networklayer between one or more computing devices attached to a dispersednetwork and at least one distributed server. In one aspect, the usercomputing device is associated with the one or more computing devices.

As described herein, a resource may generally refer to objects, devices,products, goods, commodities, services, and the like, and/or the abilityand opportunity to access and use the same. Some example implementationsherein contemplate property held by a user, including property that isstored and/or maintained by a third party entity, financial productsprovided by an entity and/or a third party, or the like. Next, as shownin block 204, the system may be configured to transmit control signalsconfigured to cause a display device of the user computing device todisplay a first user interface on the user computing device. In someembodiments, the first user interface includes an option for the user toestablish an authorization profile. In one aspect, an authorizationprofile refers to profiles created for specific users by associatingrules (e.g., network authorization policies) such that whenever theserules match the configured attributes, the corresponding authorizationprofile enables the user to gain access to a resource. For example, withrespect to resource management within a dispersed network, theauthorization profile includes one or more authorization rules. Theseauthorization rules typically include one or more elements such as name,attribute, and permission. When these rules match the pre-configuredattributes of the dispersed network, the user with the correspondingauthorization profile is granted access (e.g., read, write, and/orexecute privileges) to the dispersed network (e.g., financialinstitution network services). In another aspect, an authorizationprofile refers to a profile developed based on information associatedwith a user's history of payment punctuality, the total amount ofavailable credit, the total amount and type of existing monetarycommitment the user has, the number of open and active financialaccounts, and/or the longevity of the user's relationships with entities(e.g., financial institutions, creditors, and/or the like). In thisregard, entities may use the authorization profile indicating acreditworthiness of the user to help determine whether the user mayqualify for credit and what interest rate they might pay. In some cases,the authorization profile of the user may indicate an exposure levelassociated with the user as a potential customer of the entity.

Next, as shown in block 206, the system may be configured to receive,via the first user interface, a user acknowledgment to establish theauthorization profile. Prior to establishing an authorization profile,the system may be configured to determine whether the user hasauthorization to access the resource. In this regard, when the userrequests authorization to access the resource, the system may beconfigured to determine whether the user has the authorization to accessthe resource. In determining that the user does not have theauthorization to access the resource, the system may be configured toinitiate a data path connection with the user computing deviceassociated with the user to indicate that the user does not have theauthorization to access the resource. In this regard, the system may beconfigured to transmit control signals configured to cause the displaydevice of the user computing device to display the first user interfaceon the user computing device indicating that the user is not authorizedto access the resource.

In response to receiving the indication that the user wishes toestablish an authorization profile, the system may be configured todetermine one or more access paths associated with an authorizationmodel to enable the user to establish the authorization profile, asshown in block 208. In some embodiments, the user may already beassociated with an authorization level. In one aspect, determining thatthe user is not authorized to access the resource includes determiningthat the authentication level of the user is lower than a predeterminedthreshold authorization level required to access the resource. Next, asshown in block 210, the system may be configured to transmit controlsignals configured to cause a display device of the user computingdevice to display a second user interface on the user computing device.In this regard, the second user interface includes the one or moreaccess paths associated with the authorization model to enable the userto establish the authorization profile.

In some embodiments, the one or more access paths include one or moretraining courses provided by the system for the user to complete to aidin the establishing on the authorization profile. In this regard, eachtraining course may include one or more actions that need to be executedby the user. In one aspect, each time the user completes the executionof an action, the system may be configured to provide the user withcertificates of completion that corresponds to an increase in theauthentication level associated with the user's authorization profile.In some embodiments, the system may be configured to receive, via thesecond user interface, a user selection of at least one of the one ormore access paths to establish the authorization profile. In response,the system may be configured to determine one or more actions associatedwith the at least one of the one or more access paths to be executed bythe user to establish the authorization profile.

In response to determining the one or more actions, the system may beconfigured to then transmit control signals configured to cause thedisplay device of the user computing device to display a third userinterface on the user computing device that includes the one or moreactions associated with the at least one of the one or more accesspaths. In response to receiving the one or more actions, the user maythen select, via the third user interface, at least one of the one ormore actions that the user wishes to execute to establish theauthorization profile. Once the system receives the user selection ofactions that the user wishes to execute, the system may be configured tocontinuously monitor the actions executed by the user and determine ascore associated with each of the at least one of the one or moreactions executed by the user. After determining that the user hasexecuted an action, the system may be configured to transmit anacknowledgement to the user computing device indicating the execution ofthe action. In some embodiments, the system may be configured toinitiate data mining techniques to access information associated with auser profile of the user to extract one or more characteristic traitsassociated with the user. For example, the one or more traits mayinclude, but is not limited to, history of recurring payments such asutility bills, phone bills, and/or the like.

In one aspect, the user profile indicates a lifestyle of the user. Insome embodiments, the one or more traits user profile may be determinedbased on at least one or more past transactions of the user (financialor otherwise), a geographic location of the user, an amount of incomingfunds, an amount of outgoing funds, asset values, future expenses forpast services consumed, asset types, spending history, saving history orthe like. In one aspect, the user profile includes at least informationidentifying the user. In some embodiments, the system may be configuredto establish predefined user profiles including, but not limited totravel profiles, homebody, luxury spender, thrifty saver, risk taker, orthe like. The profiles may be pre-programed by the entity and/orprogrammable by the user. In some embodiments, the system may beconfigured to enable the user to customize the determined user profile.In this regard, the system may be configured to enable the user toselect a predetermined user profile and customize the user profileaccording to the characteristics of the user by providing additionalinformation. In some embodiments, the one or more characteristic traitsinclude but are not limited to determining an employment status,education level, one or more financial events of the user, and/or thelike. In one aspect, a financial event may be a charge, a transaction,and exchange, or the like that may cause the user to lose or gain moneyand/or assets.

In some embodiments, in response to determining a score associated withone or more actions executed by the user, and data mining one or morecharacteristic traits of the user based on the user profile, the systemmay be configured to determine an authorization level associated withthe authorization profile. In this way, the system may be configured tocontinuously monitor the user computing device to determine theauthentication level. When the authentication level associated with theauthentication profile is greater than a predetermined thresholdrequired to access the resource, the system may be configured totransmit control signals configured to cause the display device of theuser computing device to display an acknowledgement on the usercomputing device indicating an approval of the user request to accessthe resource.

By way of example, the authorization profile may be an interpretation ofthe information in the user's credit file (e.g., credit score). In thisregard, the credit score in conjunction with other criteria such asamount of incoming funds, employment information, and amount ofoutstanding existing monetary commitment may be used to determine anauthorization profile. If the user has not had the opportunity todevelop an authorization profile or does not have adequate informationto generate a credit score, the user may not be able to acquireapprovals for certain financial institution products. Examples offinancial products include, but are not limited to loans, investmentaccounts, checking accounts, savings accounts, trust management,accounting services, and/or the like. In such situations, the presentinvention may provide the functional benefit of enabling the userdevelop an authorization profile similar to a credit score or anequivalent. As discussed herein, the system may be configured to enablethe user to establish an authentication profile by having the usercomplete a set of training courses, each comprising a series of tasks.By continuously monitoring the user computing device, the system may beconfigured to determine whether the user has completed the execution ofthe tasks. In some embodiments, the user may be presented withdynamically generated for the completion of each task and/or trainingcourse. In this regard, the certificates may be an electronic documentthat includes but is not limited to, information associated with thecertificate, information associated with the user's identity, and/or adigital signature of the entity that has verified that the user hasexecuted the one or more tasks and/or training course. The user maypresent the certificate to the system as an indication that the user hascompleted the execution of the one or more tasks and/or the trainingcourses.

In some embodiments, in response to determining that the authorizationlevel is greater than a predetermined threshold authorization levelrequired to access the resource, the system may be configured totransmit control signals configured to cause the one or more computingdevices connected to the dispersed network to initiate execution of oneor more queries to enable the user to access the resource. In thisregard, the system may be configured to modify an IP address associatedwith the user computing device and an IP address associated with theresource (e.g., network device), to enable a data flow between one ormore ports associated with the user computing device and the resource.In some embodiments, if the user computing system and the resource areassociated with disparate networks, the system may reconfigure an IPaddress associated with an IP gateway, a node that allows communicationbetween networks, to establish dataflow between the disparate networksand/or the user computing device and the resource.

In some embodiments, the system may be configured for predictiveacquisition of resources across a dispersed Internet protocol capablenetwork connecting devices electrically attached to the network. In thisregard, the system may be configured to monitor the usage of at leastone or more one or more resources accessible by the user, via the usercomputing device, and enable the user to optimize the use of theresources by determining the resource usage trends associated with theuse of resources by the user. In one example, the user may indicate thathe/she has made a change in his/her purchase habits. For example, theuser could stop drinking Brand-name coffee. The day the user makes thedecision to stop drinking Brand-name coffee, the user may select that asthe start date. While the system may not know specific SKU level orproduct level data about the change, the system may monitor the user'stransaction history to identify any trends moving forward from theinitiation date. The system may dynamically generate a graphicalrepresentation (GUI) of the changes from the initiation date.Furthermore, the system may automatically direct the savings from thechange into an alternative financial institution account for the user.

FIG. 3 illustrates a flow diagram for predictive acquisition and use ofresources 300, in accordance with an embodiment of the invention. Asshown in block 302, the system may be configured to receive, from afirst user computing device, an indication from a user to initiate achange associated with a resource utilization profile of the user. Inone aspect, the change initiated by the user may be specific to aparticular resource, or a specific set of resources. In another aspect,the change initiated by the user may include restricting the user of aparticular resource or a specific set of resources. In yet anotheraspect, the change initiated by the user may include one or moreconditions associated with the use of the one or more resourcesassociated with the user. In this regard, the one or more conditions maybe predetermined by the system. In some embodiments, the one or moreconditions may be determined by the user.

In response to receiving the indication from the user to initiate achange, the system may be configured to initiate a first user interfacefor display on the first user computing device, as shown in block 304.In this regard, the first user computing device may be associated withthe one or more computing devices attached to the dispersed network. Inone aspect, the first user interface includes one or more resourcesassociated with the resource utilization profile of the user. In oneexample, a change initiated by the user may refer to a change in thepurchasing habit of the user. In this regard, the user may make thedecision to alter his/her purchasing habit to buy Brand-name coffee on aregular basis.

In response, the system may be configured to receive, via the first userinterface, a user selection of at least one of the one or more resourcesassociated with the resource utilization profile that the user wishes tochange, as shown in block 306. In one example, the system may beconfigured to determine one or more recurring transactions indicating apurchasing habit of the user. In response, the system may be configuredto initiate the presentation at least one of the one or more determinedpurchasing habits as a recommendation to the user as a contender thechange. In some embodiments, the user selection of a resource mayestablish an initial state and/or initial time associated with theindicated change.

In some embodiments, the change initiated by the user may requirereallocation of resources associated with the resource utilizationprofile of the user. In this regard, the system may be configured toautomatically reallocate within the dispersed network, at least one ofthe one or more resource associated with the user to cater to the changeinitiation by the user. In one aspect, the system may be configured toreceive user authorization for the reallocation of the at least one ofthe one or more resources prior to reallocating the resources.

Next, as shown in block 308, the system may be configured tocontinuously monitor the one or more resources associated with theresource utilization profile across the dispersed network for apredetermined amount of time since the initiation of the change by theuser. In this regard, the system may be configured to monitor the use ofeach of the one or more resources associated with the resourceutilization profile of the user. In some embodiments, the system may beconfigured to monitor whether the use of each of the one or moreresources associated with the utilization profile of the user is withinthe rails of the one or more conditions. In embodiments where the use ofthe one or more resources are not within the rails of the one or moreconditions, the system may be configured to generate an alert indicatingthat at least one of the one or more conditions have been violated. Forexample, the system may be configured to monitor transaction informationassociated with each transaction executed by the user since theinitiation of the change.

Next, as shown in block 310, the system may be configured to determine autilization trend associated with the resource utilization profile ofthe user. In some embodiments, the system may be configured to determinea pattern associated with the utilization of the one or more resourcesby the user based on at least continuously monitoring the one or moreresources. In one example, the utilization trend may be based on theuser profile. In this way, the utilization trend may provide an accurateindication of the user reflecting the already established user profile,which includes but is not limited to travel profiles, homebody, luxuryspender, thrifty saver, risk taker, or the like.

Next, as shown in block 312, the system may be configured to dynamicallygenerate a graphical representation of the utilization trend. In thisregard, the graphical representation is configurable in real-time andprovides a visual representation of the utilization trend of the user.In response to generating the graphical representation, the system maythen be configured to transmit control signals configured to cause thefirst user computing device to display the graphical representation ofthe utilization trend to the user, as shown in block 314. In thisregard, the system may configure a display device associated with thefirst user computing device to display the graphical representation ofthe utilization trend, thereby providing information to the user in realtime. In embodiments where at least one of the one or more conditionshave been violated, the system may be configured to transmit controlsignals configured to cause the display device associated with the firstuser computing device to display an alert. In one aspect, the alert maybe an audible tone, a visual indicator (e.g., blinking LED), a textmessage, a pop-up message, and/or the like.

In some embodiments, the system may be configured to determine a pastutilization trend associated with the utilization profile of the userbased on at least continuously monitoring the one or more resourcesacross the dispersed network for a predetermined amount of time prior tothe initiation of the change by the user. The system may then beconfigured to compare the past utilization trend with the utilizationtrend associated with the utilization profile of the user for thepredetermined amount of time since the initiation of the change by theuser. In one example, the past utilization trend may indicate that theuser has purchased food from restaurants at least three times during theweek. If the change initiated by the user involves reducing the numberof instances of purchasing food from restaurants during the week, thesystem may be configured to track, in real-time, the utilization trendof the user for a predetermined amount of time since the initiation ofthe change. In response, the system may be configured to determine autilization savings associated with the one or more resources.Continuing from the previous example, the system may determine monetarysavings accumulated by the user due to the change.

In some embodiments, the utilization savings is continuously updatedbased on at least continuously monitoring the one or more resourcesassociated with the utilization profile associated with the user acrossthe dispersed network. In embodiments where the utilization savingsinclude monetary savings, the system may be configured to deposit theutilization savings into a financial institution account of the user.

In one aspect, the system may be configured to determine a change in theutilization of the one or more resources associated with the utilizationprofile based on at least the change in the utilization of at least oneof the one or more resources initiated by the user. For example, thesystem may be configured to continuously monitor the transactioninformation associated with the user by extracting SKU level or productlevel information from the transaction receipt to accurately determineutilization savings. In this regard, the system may be configured todetermine that by changing the purchasing habit of eating out threetimes a week, the user has incurred savings in travel expenses to go toand from the restaurants.

In some embodiments, the graphical representation of the utilizationtrend may also include the utilization savings, which may becontinuously updated concurrently with the utilization trend. In thisregard, the system may be configured to reconfigure the graphicalrepresentation by generating an integrated interface capable ofdisplaying both the utilization trend and the utilization savings,although the data sources for the utilization trend and utilizationsavings is different. In one aspect, the alert generated to indicatethat the user of the one or more resource are not within the rails ofthe one or more conditions may also be integrated into the graphicalrepresentation generated to display the utilization trend andutilization savings.

In some embodiments, the system may be configured to determine one ormore alternative resources similar to the one or more resources selectedby the user to initiate the change. In some embodiments, the one or morealternative resources are available for the user to use instead of theone or more resources selected by the user to change. By using the oneor more alternative resources, the user may continue using resourcessimilar to the one or more resources associated with the changeinitiated by the user. In response, the system may be configured topresent the one or more alternative resources to the user forutilization during the predetermined period of time during which theresource utilization profile is being monitored.

In some other embodiments, the system may be configured to determinethat the user has utilized the one or more resources associated with thechange initiated by the user based on at least continuously monitoringthe resource utilization profile of the user for the predeterminedperiod of time. In doing so, the system may determine that the user hasdeviated from the initiated change. In response, the system may beconfigured to implement one or more assessments to reprove the user fordeviating from the initiated change in an attempt to persuade the userto maintain the initiated change.

In some embodiments, the system of the present invention may beconfigured for predictive use of resources across a dispersed Internetprotocol capable network connecting devices electrically attached to thenetwork. In this regard, the present invention provides the functionalbenefit of allowing a user to visualize a current financial positionrelative to other individuals similarly situated to the user. Further,the present invention allows the user to view categories of individualswho have been associated with the financial institution longer than theuser to see their financial positions and possible paths for the user toattain similar financial positions. In this regard, the presentinvention allows a user to select a path or savings to reach a categoryand/or financial position and the decisions the users already in thosefinancial positions made to get to that level. Also, the presentinvention presents one or more advantages and/or rewards associated withthe financial positions of the other users to incentive the user to alsoachieve same or similar financial positions.

FIG. 4 illustrates a flow diagram for a system for predictive use ofresources across a dispersed Internet protocol capable networkconnecting devices electrically attached to the network 400, inaccordance with an embodiment of an invention. As shown in block 402,the system may be configured to determine a resource utilization profileassociated with a first user. In some embodiments, the resourceutilization profile include usage statistics associated with one or moreresources associated with the resource utilization profile allocated tothe user across the dispersed network. In some embodiments, determiningresource utilization may include determining utilization of theresources that are associated with financial assets, which are allocatedby automatically transferring the assets (i.e., monetary funds or thelike) from one type of financial account to another type of financialaccount. Specifically, the allocation and/or re-allocation of resourcesmay comprise automatic transfer of funds from a low yield account, suchas checking account/Demand Deposit Account (DDA) to a prospectivelyhigher yield account, such as an investment account or the like or viceversa (i.e., from the prospectively high yield account to the loweryield account).

Next, as shown in block 404, the system may be configured to receivefrom a first user computing device, an indication from the first user toimprove the resource utilization profile associated with the user. Inresponse, the system may be configured to initiate, a first userinterface for display on the first computing device, wherein the firstuser interface comprises one or more target utilization profilesassociated with one or more users, as shown in block 406. In someembodiments, the target utilization profiles may be determined based ona user profile associated with the first user and the one or more otherusers. In this regard, the system may be configured to determine a firstuser profile associated with the first user. As described herein, theuser profile indicates a lifestyle of the user. In some embodiments, theone or more traits user profile may be determined based on at least oneor more past transactions of the user (financial or otherwise), ageographic location of the user, an amount of incoming funds level, anamount of outgoing funds, asset values, future expenses for pastservices consumed, asset types, spending habits, saving habits or thelike. In one aspect, the user profile includes at least informationidentifying the user. In some embodiments, the system may be configuredto establish predefined user profiles including, but not limited totravel profiles, homebody, luxury spender, thrifty saver, risk taker, orthe like. The profiles may be pre-programed by the entity and/orprogrammable by the user.

In response to determining the first user profile associated with thefirst user, the system may be configured to compare the first userprofile with one or more user profiles associated with the one or moreother users to determine a match. In one aspect, the system may beconfigured to determine a percentage score associated with the match. Inresponse to determining the percentage score, the system may beconfigured to determine the one or more target resource utilizationprofiles associated with one or more users. In one aspect, the one ormore target profiles may be determined based on at least comparing thepercentage score associated with the match with a predeterminedthreshold score. If the percentage score is greater than thepredetermined threshold, the one or more user profiles associated withthe one or more users is chosen to be presented to the user.

Next, as shown in block 408, the system may be configured to receive,via the first user interface, a first user selection of at least one ofthe one or more target resource utilization profiles associated with theutilization profile that the first user wishes to change. In thisregard, the user may select which target resource utilization profilethe user would like to emulate in an attempt to improve his/her resourceutilization profile. In some embodiments, the user may want to improvehis/her resource utilization profile according to the resourceutilization profile of a specific user. In some other embodiments, theuser may want to improve his/her utilization profile according to one ormore resource utilization profiles of one or more users in a commontier. In such situations, the system may be configured to enable theuser to provide the information associated with target resourceutilization profiles associated with the utilization profile that thefirst user wishes to change.

Next, as shown in block 410, the system may be configured to determineone or more access paths associated with the at least one targetresource utilization profile to enable the first user to achieve the atleast one target utilization profile. In some embodiments, the one ormore access paths indicate one or more ways in which the user mayachieve the target utilization profile. In this regard, the each accesspath may include one or more actions that requires execution by theuser. By executing each of the one or more actions, the user may advancevia the associated access path to eventually achieve the target resourceutilization profile. For example, the one or more actions may includeallocation and/or reallocation of one or more resources associated withthe resource utilization profile of the user, changing utilization trendassociated with the resource utilization profile of the user,establishing one or more rails and/or conditions in the utilization ofat least one of the one or more resources associated with the resourceutilization profile of the user, and/or the like.

Next, as shown in block 412, the system may be configured to transmit, asecond user interface for display on the first user computing device,wherein the second user interface comprises the one or more access pathsassociated with the at least one target resource utilization profile toenable the first user to achieve the at least one target utilizationprofile. In some embodiments, the system may be configured to receive,via the second user interface, a first user selection of at least one ofthe one or more access paths to achieve the at least one targetutilization profile. In response, the system may be configured todetermine one or more actions associated with the at least one of theone or more access paths to be executed by the first user to enable thefirst user to achieve the at least one target utilization profile. Insome embodiments, the system may be configured to initiate a third userinterface for display on the first user computing device, wherein thethird user interface comprises the one or more actions associated withthe at least one of the one or more access paths. In response, thesystem may be configured to receive, via the third user interface, auser input indicating an execution of at least one of the one or moreactions by the first user associated with the at least one of the one ormore access paths to achieve the at least one target utilizationprofile. In this regard, the system may be configured to continuouslymonitor the first user computing device to determine the execution of atleast one of the one or more actions by the first user associated withthe at least one of the one or more access paths to achieve the at leastone target utilization profile.

In some embodiments, the system may be configured to dynamicallygenerate a graphical representation (e.g., GUI) of the resourceutilization profile of the first user reflecting a utilization of one ormore resources of the first user in real-time. Once the graphicalrepresentation is generated, the system may be configured to transmitcontrol signals configured to cause the first user computing device todisplay the graphical representation of the resource utilizationprofile. In some embodiments, the system may be configured to determinea progress level associated with the first user's progress towardsachieving the at least one target utilization profile. This may beachieved by configuring the system to continuously monitor the user'sutilization of the one or more resources allocated and/or re-allocatedto him/her. In one aspect, the system may be configured to continuouslyupdate the progress level based on at least continuously monitoring thefirst user computing device to determine the execution of at least oneof the one or more actions by the first user associated with the atleast one of the one or more access paths.

In some embodiments, the system may be configured to dynamicallyoptimize the reallocation of the one or more resources for the userbased on at least one or more factors. In one aspect, the one or morefactors may include, but are not limited to market forces, changes inthe user profile associated with the user (e.g., new job, educationlevel, geographic location, of the like), financial opportunities, orthe like. In some other embodiments, the system may be configured toestablish one or more check points to evaluate the resource allocationof the user. In doing so, the system may determine one or morealternative target utilization profiles relative to the user's financialposition at a particular time (e.g., the one or more check-points).

In some embodiments, the present invention provides a functional benefitfor predictive usage of resources across a dispersed Internet protocolcapable network connecting devices electrically attached to the network.For example, the system may be configured to gather information aboutthe user's typical purchase habits, such as grocery list, gas purchases,and other regular expenses. In this regard, the system may be configuredto monitor the user's utilization of resources and performs predictiveallocation of the resources for upcoming events, such as theidentification of a holiday, a vacation, or the like that may requireadditional resource allocation for food or travel for that time period.

FIG. 5 illustrates a flow-diagram for predictive usage of resourcesacross a dispersed Internet protocol capable network connecting deviceselectrically attached to the network 500, in accordance with anembodiment of the invention. As shown in block 502, the system may beconfigured to determine resource utilization profile associated with theuser. As discussed herein, the resource utilization profile includesinformation associated with one or more resources allocated to the useracross the dispersed network. Further, as shown in block 504, the systemmay be configured to continuously monitor the resource utilizationprofile of the user to track the use of the one or more resourcesallocated to the user over a predetermined period of time. In someembodiments, a resource may be tracked by implementing a resourcespecific tracking algorithm on the computing device of the user in sucha way that when the user accesses and/or utilizes the resource, thetracking algorithm stored thereon is activated. In doing so, thetracking algorithm may be configured to establish a communication linkwith the system and create a data channel capable of transmittingtracking data indicating the use of the resource to the system foradditional processing.

Next, as shown in block 506, the system may be configured to determineone or more elevated usage instances based on at least continuouslymonitoring the resource utilization profile of the user. In someembodiments, the system may be configured to predict that at least oneof the one or more elevated usage instances is scheduled to occur. Asused herein, an “elevated usage instance” may refer to scenarios wherethe utilization capacity of resources may be lesser than the costinvolved in the utilization of the resource. In one example, an elevatedusage instance may occur if the transaction cost is greater than thecredit limit associated with a credit card the user uses to executesimilar transactions. In this regard, the system may be configured todetermine a predetermined number of instances in the past when theelevated usage instances have occurred. In doing so, the system may beconfigured to analyze the instances and determine a pattern associatedwith the resource utilization profile of the user based on at leasttracking the use of the one or more resources allocated to the user overa predetermine period of time. In response, the system may then beconfigured to predict that at least one of the one or more elevatedusage instances is scheduled to occur based on at least determining thepattern associated with the utilization profile of the user. In someembodiments, the system may be configured to retrieve informationassociated with the utilization of the one or more resources during theoccurrence of at least one of the one or more previous elevated usageinstances. In one aspect, the information includes one or more traitsassociated with the user and/or the one or more resources. In response,the system may be configured to continuously compare the informationassociated with the utilization of the one or more resources during theoccurrence of at least one of the one or more previous elevated usageinstances with information associated with a current utilization of theone or more resources.

Next, as shown in block 508, the system may be configured to predict,via the resource prediction application, that at least one of the one ormore elevated usage instances is scheduled to occur. In this regard, thesystem may be configured to calculate a score indicating a probabilitythat the information associated with the utilization of the one or moreresources during the occurrence of at least one of the one or moreprevious elevated usage instances approaches the information associatedwith the current utilization of the one or more resources. Based on thecalculated score, the system may then be configured to predict that atleast one of the one or more elevated usage instances is scheduled tooccur. For example, the system may be configured to determine one ormore specific transactions executed by the user in the days and/or weeksleading to a vacation planned during a predetermine time period (e.g.,summer season) of the year. When the user begins using specific creditcards (resources) to execute similar transactions (e.g., purchasingflight tickets), the system may calculate a score indicating theprobability that the user may go on vacation, thereby predicting anelevated usage instance.

Next, as shown in block 510, the system may be configured to determineone or more resources across the dispersed network for the user forprocessing during the at least one of the one or more elevated usageinstances. In response to determining the one or more resources toprocess the elevated usage instances, the system may be configured toreallocate the one or more determined resources to the user, as shown inblock 512. In some embodiments, the system may be configured toautomatically reallocate the one or more determined resources to theuser for processing during the at least one of the one or more elevatedusage instances. In some other embodiments, the system may be configuredto initiate a presentation of a first user interface for display on auser computing device, wherein the first interface comprises one or moredetermined resources to the user for processing during the at least oneof the one or more elevated usage instances. In response, the system maybe configured to receive, via the first user interface, a user selectionof at least one of the one or more determined resources. Based on atleast receiving the user selection of at least one of the one or moredetermined resources, the system may be configured to reallocate the oneor more determined resources to the user.

In some embodiments, the system may be configured to recommend the useof one or more additional resources for use during the one or moreelevated usage instances. For example, the system may determine that theuser travels during previous elevated usage instances and in response,recommend a financial instrument (e.g, a credit card) for use during anyelevated usage instance scheduled to occur. In some other embodiments,the system may be configured to schedule the reallocation of resourcebased on information associated with the elevated usage instance. Forexample, the system may determine that the elevated usage instance issupporting a dependent through his/her undergraduate education. In suchcases, the system may be configured to determine that the resources needto be reallocated only for a period of four years and automaticallycease reallocation of resources after the four year period has passed.

Although many embodiments of the present invention have just beendescribed above, the present invention may be embodied in many differentforms and should not be construed as limited to the embodiments setforth herein; rather, these embodiments are provided so that thisdisclosure will satisfy applicable legal requirements. Also, it will beunderstood that, where possible, any of the advantages, features,functions, devices, and/or operational aspects of any of the embodimentsof the present invention described and/or contemplated herein may beincluded in any of the other embodiments of the present inventiondescribed and/or contemplated herein, and/or vice versa. In addition,where possible, any terms expressed in the singular form herein aremeant to also include the plural form and/or vice versa, unlessexplicitly stated otherwise. Accordingly, the terms “a” and/or “an”shall mean “one or more,” even though the phrase “one or more” is alsoused herein. Like numbers refer to like elements throughout.

As will be appreciated by one of ordinary skill in the art in view ofthis disclosure, the present invention may include and/or be embodied asan apparatus (including, for example, a system, machine, device,computer program product, and/or the like), as a method (including, forexample, a business method, computer-implemented process, and/or thelike), or as any combination of the foregoing. Accordingly, embodimentsof the present invention may take the form of an entirely businessmethod embodiment, an entirely software embodiment (including firmware,resident software, micro-code, stored procedures in a database, or thelike), an entirely hardware embodiment, or an embodiment combiningbusiness method, software, and hardware aspects that may generally bereferred to herein as a “system.” Furthermore, embodiments of thepresent invention may take the form of a computer program product thatincludes a computer-readable storage medium having one or morecomputer-executable program code portions stored therein. As usedherein, a processor, which may include one or more processors, may be“configured to” perform a certain function in a variety of ways,including, for example, by having one or more general-purpose circuitsperform the function by executing one or more computer-executableprogram code portions embodied in a computer-readable medium, and/or byhaving one or more application-specific circuits perform the function.

It will be understood that any suitable computer-readable medium may beutilized. The computer-readable medium may include, but is not limitedto, a non-transitory computer-readable medium, such as a tangibleelectronic, magnetic, optical, electromagnetic, infrared, and/orsemiconductor system, device, and/or other apparatus. For example, insome embodiments, the non-transitory computer-readable medium includes atangible medium such as a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), a compact discread-only memory (CD-ROM), and/or some other tangible optical and/ormagnetic storage device. In other embodiments of the present invention,however, the computer-readable medium may be transitory, such as, forexample, a propagation signal including computer-executable program codeportions embodied therein.

One or more computer-executable program code portions for carrying outoperations of the present invention may include object-oriented,scripted, and/or unscripted programming languages, such as, for example,Java, Perl, Smalltalk, C++, SAS, SQL, Python, Objective C, JavaScript,and/or the like. In some embodiments, the one or morecomputer-executable program code portions for carrying out operations ofembodiments of the present invention are written in conventionalprocedural programming languages, such as the “C” programming languagesand/or similar programming languages. The computer program code mayalternatively or additionally be written in one or more multi-paradigmprogramming languages, such as, for example, F#.

Some embodiments of the present invention are described herein withreference to flowchart illustrations and/or block diagrams of apparatusand/or methods. It will be understood that each block included in theflowchart illustrations and/or block diagrams, and/or combinations ofblocks included in the flowchart illustrations and/or block diagrams,may be implemented by one or more computer-executable program codeportions. These one or more computer-executable program code portionsmay be provided to a processor of a general purpose computer, specialpurpose computer, and/or some other programmable data processingapparatus in order to produce a particular machine, such that the one ormore computer-executable program code portions, which execute via theprocessor of the computer and/or other programmable data processingapparatus, create mechanisms for implementing the steps and/or functionsrepresented by the flowchart(s) and/or block diagram block(s).

The one or more computer-executable program code portions may be storedin a transitory and/or non-transitory computer-readable medium (e.g. amemory) that can direct, instruct, and/or cause a computer and/or otherprogrammable data processing apparatus to function in a particularmanner, such that the computer-executable program code portions storedin the computer-readable medium produce an article of manufactureincluding instruction mechanisms which implement the steps and/orfunctions specified in the flowchart(s) and/or block diagram block(s).

The one or more computer-executable program code portions may also beloaded onto a computer and/or other programmable data processingapparatus to cause a series of operational steps to be performed on thecomputer and/or other programmable apparatus. In some embodiments, thisproduces a computer-implemented process such that the one or morecomputer-executable program code portions which execute on the computerand/or other programmable apparatus provide operational steps toimplement the steps specified in the flowchart(s) and/or the functionsspecified in the block diagram block(s). Alternatively,computer-implemented steps may be combined with, and/or replaced with,operator- and/or human-implemented steps in order to carry out anembodiment of the present invention.

While certain exemplary embodiments have been described and shown in theaccompanying drawings, it is to be understood that such embodiments aremerely illustrative of and not restrictive on the broad invention, andthat this invention not be limited to the specific constructions andarrangements shown and described, since various other changes,combinations, omissions, modifications and substitutions, in addition tothose set forth in the above paragraphs, are possible. Those skilled inthe art will appreciate that various adaptations, modifications, andcombinations of the just described embodiments can be configured withoutdeparting from the scope and spirit of the invention. Therefore, it isto be understood that, within the scope of the appended claims, theinvention may be practiced other than as specifically described herein.

INCORPORATION BY REFERENCE

To supplement the present disclosure, this application furtherincorporates entirely by reference the following commonly assignedpatent applications:

U.S. Patent Docket Number Application Ser. No. Title Filed On7196US1.014033.2815 15/176,267 SYSTEM FOR Jun. 8, 2016 CREATION OFALTERNATIVE PATH TO RESOURCE ACQUISITION 7197US1.014033.2816 15/176,276SYSTEM FOR Jun. 8, 2016 PREDICTIVE ACQUISITION AND USE OF RESOURCES7200US1.014033.2819 15/,176,478 SYSTEM FOR Jun. 8, 2016 PREDICTIVE USAGEOF RESOURCES

What is claimed is:
 1. A system for predictive use of resources across adispersed Internet protocol capable network connecting deviceselectrically attached to the network, the system comprising: at leastone memory storing a resource prediction application; at least oneprocessing device operatively coupled to the at least one memory,wherein the processing device is configured to execute computer-readableprogram code to: determine a resource utilization profile associatedwith a first user, wherein the resource utilization profile comprisesusage statistics associated with one or more resources allocated to theuser across the dispersed network; continuously monitor the resourceutilization profile of the user to track the use of the one or moreresources allocated to the user over a predetermined period of time;determine one or more elevated usage instances based on at leastcontinuously monitoring the resource utilization profile of the user;predict, via the resource prediction application, that at least one ofthe one or more elevated usage instances is scheduled to occur;determine a first set of one or more additional resources across thedispersed network for the user for processing during the at least one ofthe one or more elevated usage instances; receive, from a first usercomputing device, an indication from the first user to improve theresource utilization profile associated with the user; initiate, a firstuser interface for display on the first computing device, wherein thefirst user interface comprises one or more target resource utilizationprofiles associated with one or more users; receive, via the first userinterface, a first user selection of at least one of the one or moretarget resource utilization profiles associated with the resourceutilization profile that the first user wishes to change; determine oneor more access paths associated with the at least one target resourceutilization profile to enable the first user to achieve the at least onetarget utilization profile; transmit, a second user interface fordisplay on the first user computing device, wherein the second userinterface comprises the one or more access paths associated with the atleast one target resource utilization profile to enable the first userto achieve the at least one target utilization profile; receive, via thesecond user interface, a first user selection of at least one of the oneor more access paths to achieve the at least one target utilizationprofile; determine a second set of one or more additional resourcesacross the dispersed network to be allocated to the user based on atleast the first user selection of the at least one of the one or moreaccess paths, wherein the second set of one or more additional resourcesare associated with a predetermined threshold authorization levelrequired to access the one or more additional resources; determine anauthorization level associated with an authorization profile of theuser; determine that the authorization level associated with theauthorization profile of the user is greater than the predeterminedthreshold authorization level required to access the first set of one ormore additional resources and the second set of one or more additionalresources; and reallocate the first set of one or more additionalresources and the second set of one or more additional resources basedon at least determining that the authorization level associated with theauthorization profile of the user is greater than the predeterminedthreshold level required to access the one or more additional resources.2. The system of claim 1, wherein the at least one processing device isfurther configured to: receive, via the second user interface, the firstuser selection of at least one of the one or more access paths toachieve the at least one target utilization profile; and determine oneor more actions associated with the at least one of the one or moreaccess paths to be executed by the first user to enable the first userto achieve the at least one target utilization profile.
 3. The system ofclaim 2, wherein the at least one processing device is furtherconfigured to: initiate a third user interface for display on the firstuser computing device, wherein the third user interface comprises theone or more actions associated with the at least one of the one or moreaccess paths; and receive, via the third user interface, a user inputindicating an execution of at least one of the one or more actions bythe first user associated with the at least one of the one or moreaccess paths to achieve the at least one target utilization profile. 4.The system of claim 3, wherein the at least one processing device isfurther configured to: continuously monitor the first user computingdevice to determine the execution of at least one of the one or moreactions by the first user associated with the at least one of the one ormore access paths to achieve the at least one target utilizationprofile.
 5. The system of claim 1, wherein the at least one processingdevice is further configured to: dynamically generate a graphicalrepresentation of the resource utilization profile of the first userreflecting a utilization of one or more resources of the first user inreal-time; and transmit control signals configured to cause the firstuser computing device to display the graphical representation of theresource utilization profile.
 6. The system of claim 5, wherein the atleast one processing device is further configured to: determine aprogress level associated with the first user's progress towardsachieving the at least one target utilization profile; and continuouslyupdate the progress level based on at least continuously monitoring thefirst user computing device to determine the execution of at least oneof the one or more actions by the first user associated with the atleast one of the one or more access paths.
 7. The system of claim 1,wherein the at least one processing device is further configured to:determine a first user profile associated with the first user; comparethe first user profile associated with the first user with the one ormore user profiles associated with the one or more users to determine amatch; and determine the one or more target resource utilizationprofiles associated with one or more users based on at least determininga match between the first user profile and the one or more user profilesassociated with the one or more users.
 8. A computerized method forpredictive use of resources across a dispersed Internet protocol capablenetwork connecting devices electrically attached to the network, themethod comprising: determining, via a computing device processor, aresource utilization profile associated with a first user, wherein theresource utilization profile comprises usage statistics associated withone or more resources allocated to the user across the dispersednetwork; continuously monitoring the resource utilization profile of theuser to track the use of the one or more resources allocated to the userover a predetermined period of time; determining one or more elevatedusage instances based on at least continuously monitoring the resourceutilization profile of the user; predicting, via a resource predictionapplication, that at least one of the one or more elevated usageinstances is scheduled to occur; determining a first set of one or moreadditional resources across the dispersed network for the user forprocessing during the at least one of the one or more elevated usageinstances; receiving, from a first user computing device, an indicationfrom the first user to improve the resource utilization profileassociated with the user; initiating, a first user interface for displayon the first computing device, wherein the first user interfacecomprises one or more target resource utilization profiles associatedwith one or more users; receiving, via the first user interface, a firstuser selection of at least one of the one or more target resourceutilization profiles associated with the resource utilization profilethat the first user wishes to change; determining, via a computingdevice processor, one or more access paths associated with the at leastone target resource utilization profile to enable the first user toachieve the at least one target utilization profile; transmitting, asecond user interface for display on the first user computing device,wherein the second user interface comprises the one or more access pathsassociated with the at least one target resource utilization profile toenable the first user to achieve the at least one target utilizationprofile; receiving, via the second user interface, a first userselection of at least one of the one or more access paths to achieve theat least one target utilization profile; determining second set of oneor more additional resources across the dispersed network to beallocated to the user based on at least the first user selection of theat least one of the one or more access paths, wherein the second set ofone or more additional resources are associated with a predeterminedthreshold authorization level required to access the one or moreadditional resources; determining an authorization level associated withan authorization profile of the user; determining that the authorizationlevel associated with the authorization profile of the user is greaterthan the predetermined threshold authorization level required to accessthe first set of one or more additional resources and the second set ofone or more additional resources; and reallocating the first set of oneor more additional resources and the second set of one or moreadditional resources based on at least determining that theauthorization level associated with the authorization profile of theuser is greater than the predetermined threshold level required toaccess the one or more additional resources.
 9. The method of claim 8,wherein the method further comprises: receiving, via the second userinterface, the first user selection of at least one of the one or moreaccess paths to achieve the at least one target utilization profile; anddetermining one or more actions associated with the at least one of theone or more access paths to be executed by the first user to enable thefirst user to achieve the at least one target utilization profile. 10.The method of claim 9, wherein the method further comprises: initiatinga third user interface for display on the first user computing device,wherein the third user interface comprises the one or more actionsassociated with the at least one of the one or more access paths; andreceiving, via the third user interface, a user input indicating anexecution of at least one of the one or more actions by the first userassociated with the at least one of the one or more access paths toachieve the at least one target utilization profile.
 11. The method ofclaim 10, wherein the method further comprises: continuously monitoringthe first user computing device to determine the execution of at leastone of the one or more actions by the first user associated with the atleast one of the one or more access paths to achieve the at least onetarget utilization profile.
 12. The method of claim 11, wherein themethod further comprises: dynamically generating a graphicalrepresentation of the resource utilization profile of the first userreflecting a utilization of one or more resources of the first user inreal-time; and transmit control signals configured to cause the firstuser computing device to display the graphical representation of theresource utilization profile.
 13. The method of claim 12, wherein themethod further comprises: determining a progress level associated withthe first user's progress towards achieving the at least one targetutilization profile; and continuously update the progress level based onat least continuously monitoring the first user computing device todetermine the execution of at least one of the one or more actions bythe first user associated with the at least one of the one or moreaccess paths.
 14. The method of claim 8, wherein the method furthercomprises: determining a first user profile associated with the firstuser; comparing the first user profile associated with the first userwith the one or more user profiles associated with the one or more usersto determine a match; and determining the one or more target resourceutilization profiles associated with one or more users based on at leastdetermining a match between the first user profile and the one or moreuser profiles associated with the one or more users.
 15. A computerprogram product for predictive use of resources across a dispersedInternet protocol capable network connecting devices electricallyattached to the network, the computer program product comprising anon-transitory computer-readable medium comprising code causing a firstapparatus to: determine a resource utilization profile associated with afirst user, wherein the resource utilization profile comprises usagestatistics associated with one or more resources allocated to the useracross the dispersed network; continuously monitor the resourceutilization profile of the user to track the use of the one or moreresources allocated to the user over a predetermined period of time;determine one or more elevated usage instances based on at leastcontinuously monitoring the resource utilization profile of the user;predict, via the resource prediction application, that at least one ofthe one or more elevated usage instances is scheduled to occur;determine a first set of one or more additional resources across thedispersed network for the user for processing during the at least one ofthe one or more elevated usage instances; receive, from a first usercomputing device, an indication from the first user to improve theresource utilization profile associated with the user; initiate, a firstuser interface for display on the first computing device, wherein thefirst user interface comprises one or more target resource utilizationprofiles associated with one or more users; receive, via the first userinterface, a first user selection of at least one of the one or moretarget resource utilization profiles associated with the resourceutilization profile that the first user wishes to change; determine oneor more access paths associated with the at least one target resourceutilization profile to enable the first user to achieve the at least onetarget utilization profile; transmit, a second user interface fordisplay on the first user computing device, wherein the second userinterface comprises the one or more access paths associated with the atleast one target resource utilization profile to enable the first userto achieve the at least one target utilization profile; receive, via thesecond user interface, a first user selection of at least one of the oneor more access paths to achieve the at least one target utilizationprofile; determine a second set of one or more additional resourcesacross the dispersed network to be allocated to the user based on atleast the first user selection of the at least one of the one or moreaccess paths, wherein the second set of one or more additional resourcesare associated with a predetermined threshold authorization levelrequired to access the one or more additional resources; determine anauthorization level associated with an authorization profile of theuser; determine that the authorization level associated with theauthorization profile of the user is greater than the predeterminedthreshold authorization level required to access the first set of one ormore additional resources and the second set of one or more additionalresources; and reallocate the first set of one or more additionalresources and the second set of one or more additional resources basedon at least determining that the authorization level associated with theauthorization profile of the user is greater than the predeterminedthreshold level required to access the one or more additional resources.16. The computer program product of claim 15, wherein the firstapparatus is further configured to: receive, via the second userinterface, the first user selection of at least one of the one or moreaccess paths to achieve the at least one target utilization profile; anddetermine one or more actions associated with the at least one of theone or more access paths to be executed by the first user to enable thefirst user to achieve the at least one target utilization profile. 17.The computer program product of claim 16, wherein the first apparatus isfurther configured to: initiate a third user interface for display onthe first user computing device, wherein the third user interfacecomprises the one or more actions associated with the at least one ofthe one or more access paths; and receive, via the third user interface,a user input indicating an execution of at least one of the one or moreactions by the first user associated with the at least one of the one ormore access paths to achieve the at least one target utilizationprofile.
 18. The computer program product of claim 17, wherein the firstapparatus is further configured to: continuously monitor the first usercomputing device to determine the execution of at least one of the oneor more actions by the first user associated with the at least one ofthe one or more access paths to achieve the at least one targetutilization profile.
 19. The computer program product of claim 18,wherein the first apparatus is further configured to: dynamicallygenerate a graphical representation of the resource utilization profileof the first user reflecting a utilization of one or more resources ofthe first user in real-time; and transmit control signals configured tocause the first user computing device to display the graphicalrepresentation of the resource utilization profile.
 20. The computerprogram product of claim 19, wherein the first apparatus is furtherconfigured to: determine a progress level associated with the firstuser's progress towards achieving the at least one target utilizationprofile; and continuously update the progress level based on at leastcontinuously monitoring the first user computing device to determine theexecution of at least one of the one or more actions by the first userassociated with the at least one of the one or more access paths.