Personal information platforms

ABSTRACT

Various systems, mediums, and methods herein describe aspects of personal information platforms accessible with client devices over communication networks in data infrastructures. A system may determine data associated with a user. The system may determine a personal information platform (PIP) based on the data associated with the user, where the PIP is configured to identify a number of data types from the data associated with the user. The system may determine accesses for one or more entities to the number of data types based on one or more services provided by the one or more entities to the user. The system may cause a client device to display an indication of the PIP, where the indication provides the one or more accesses of the one or more entities.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims priority to U.S. patentapplication Ser. No. 14/980,414, filed Dec. 28, 2015, which isincorporated herein by reference in its entirety.

TECHNICAL FIELD

This disclosure generally relates to personal information platformsaccessible with mobile devices over one or more networks of the datainfrastructure.

BACKGROUND

With the advent of modern technology, users are increasinglydistributing their information to a variety of sources. For example,users may conveniently use their mobile devices to provide informationto a number of sources instantly. In some instances, the sources thatreceive the information may be related, possibly to share theinformation amongst a limited number of sources. Yet, in many instances,the sources may be unrelated, where some sources may further distributethe information over one or more other networks, possibly to derive abenefit from distributing the information.

In various respects, many users may face difficulties in tracking and/ormanaging their information, particularly after multiple distributions oftheir information to a variety of sources. For example, the user mayhave difficulty tracking and/or managing which sources have theirinformation, such as their name, address, telephone number, and/or othertypes of information regarding the user. Thus, the user may be leftwithout knowing which sources may have their information, what types ofinformation these sources may have accumulated over longer periods oftime, and/or how the data may be used by these sources, among otherpossible uncertainties.

As demonstrated in the scenarios above, there is much need fortechnological advancements to support the management of information withmobile technology and aspects of the data infrastructure.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A is a block diagram of an exemplary system, according to anembodiment;

FIG. 1B is a block diagram of another exemplary system, according to anembodiment;

FIG. 2A illustrates an exemplary system configured to support a set oftrays, according to an embodiment;

FIG. 2B illustrates an exemplary tray configured to support one or morecomponents, according to an embodiment;

FIG. 3 illustrates a personal information platform (PIP) system,according to an embodiment;

FIG. 4A illustrates an exemplary system with a client device, accordingto an embodiment;

FIG. 4B illustrates an exemplary system with a client device, accordingto another embodiment;

FIG. 4C illustrates a PIP system, according to another embodiment;

FIG. 5A illustrates an exemplary system with a client device, accordingto an another embodiment;

FIG. 5B illustrates an exemplary system with a client device, accordingto an another embodiment;

FIG. 6 illustrates an exemplary method, according to an embodiment;

FIG. 7 illustrates an exemplary system with a client device, accordingto an embodiment;

FIG. 8 illustrates an exemplary wearable computing device, according toan embodiment.

Embodiments of the present disclosure and their advantages may beunderstood by referring to the detailed description provided herein. Itshould be appreciated that reference numerals may be used to illustratevarious elements and/or features provided in the figures. Further, thefigures may illustrate various examples for purposes of illustration andexplanation related to the embodiments of the present disclosure and notfor purposes of any limitation.

DETAILED DESCRIPTION

Considering the various scenarios above, a user may wish to understandvarious details regarding their information. As noted above, users maywish to know how their information may be used by multiple sources,possibly sources unidentified by the user. Yet further, the users mayfurther speculate as to how such uses of the information may or may notaffect the user. As such, there is much need for users being able toresolve such uncertainties. For example, the users may wish to view theaccessibility of their information, the scope the accessibility tovarious sources, and/or the security of their information from suchsources, possibly based on multiple distributions of the information.

As described in various embodiments provided herein, a personalinformation platform (PIP) may be a mechanism to resolve possible issuesand/or uncertainties described above. In particular, the PIP may bedisplayed on a smartphone that enables the user to view which entitieshave access to their information, the scope of the accessibility, and/orthe security of their data, amongst various other aspects of their datadescribed herein. For example, the PIP may take the form of a datapipeline, possibly viewable on the user's smartphone. As such, thesmartphone may display the PIP controlling the user's data that goesinto the data pipeline. Further, the smartphone may display the PIPcontrolling the user's data that comes out of the data pipeline, therebycontrolling the accesses of various entities to the user's data.Notably, the PIP may take the form of various other devices, tools,and/or instruments, among other possibilities.

In practice, for example, the PIP controls which particular entities mayhave access to the user's data coming out of the data pipeline, possiblyentities selected from numerous entities interested in the user's data.For instance, the PIP may determine that a particular entity, such asthe user's credit card company, requires the user's zip code such thatthe user is able to verify purchases at a gas station often visited forpurchasing gas. As such, the PIP may provide the credit card companywith the user's zip code. Yet, the PIP may set a number of rules and/orrestriction on the credit card company such that the zip code may not beused for purposes other than facilitating the user purchase gas. Forexample, the PIP may set rules and/or restrictions preventing thetransfer of the user's data to other entities without the user'spermission.

As illustrated in the scenario above, the PIP may determine the types ofdata required by a given entity to adequately provide services to theuser. In another example, the PIP may receive a request from the creditcard company for the user's age. Yet, the PIP may determine that thecredit card company may adequately provide the services utilized by theuser without having access to the user's age. In particular, theservices provided by the user's credit card may not have a functionalrelationship with the user's age. As such, the PIP may deny the creditcard company's request for the user's age, possibly to help preserve theprivacy of the user.

Yet further, the PIP may control the extent, the degree, and/or thelevel of accesses entities may have to the user's data. As noted, forexample, the PIP may set a number rules and/or restrictions on entitiesthat are given accesses to the user's data. In yet another example, auser may download a mobile application or an “app” with theirsmartphone. The PIP may identify the app requests nine different orseparate accesses to the user's data, possibly reflecting the averagenumber of requests apps may generally request from a given user. Forexample, the app identified by the PIP may request the user's firstname, last name, gender, birthday, email address, home address, phonenumber, password, and/or access to the user's smartphone locations.

In such instances, the PIP may deny seven out of the nine requests, suchas the requests for the user's last name, gender, and/or birthday, amongother aspects of the user's data described above. For example, the PIPmay deny the seven requests based on determining the app may performadequately for the user without the data requested. Further, in someinstances, the PIP may grant two of the nine accesses, such as theuser's first name and the user's smartphone location, possibly based onthe app requiring the two accesses to function properly or as desired bythe user. Notably, the PIP may provide various notifications to theuser's smartphone regarding the app that requests the user's data. Assuch, the user may accept or deny the requests accordingly.

In some embodiments, a number of user inputs may adjust the control ofthe PIP over various accesses to the user's data. For example, the usermay create, modify, and/or remove the rules and/or restrictionsdescribed above on the accesses given to the user's data. Further, insome instances, the user's inputs may configure the PIP to give anentity the data it requires to perform its services properly and/orseamlessly for the user. For example, the user may configure the PIP togive a visual discovery tool the data it requires to identify ideasrelated to the user's interests. Thus, the PIP may search, identify, andprovide the tool with data indicating the user's interests, curiosities,and/or attractions, such as the user's browse data, search histories,and/or click data, among other forms of data identified by the PIP tofacilitate the tool in providing the services for the user.

Notably, the PIP may be built in a number of different formats and/orlanguages configurable by the user. In practice, considering the zipcode scenarios above, the user may configure the PIP to accept requestsfor the user's zip code from entities that have one or morecertifications, guarantees, and/or qualifications, such a trusteecertification. In another example, the user may configure the PIP toaccept requests for the user's smartphone location to entities thatpreviously provided services for the user and/or previously interactedwith the user, among other possibilities.

In some embodiments, a report card may be provided to the user regardingthe user's PIP. For example, the report card may provide the user withone or more views, insights, and/or assessments of the user's PIP. Forexample, the user may periodically receive a notification on the user'ssmartphone, such as on an annually and/or a monthly basis. The reportcard may indicate various entities with access to the user's data, thenumber of ways that the data may be used by the entities, and/or any newdistributions of the user's data to other entities. The report card mayalso provide a number of graphical representations, such as charts,diagrams, and/or tables, possibly illustrating the number of times theentities accessed, used, and/or distributed the user's data. Further,based on the number of times the entities may have used the data, thegraphical representations may illustrate whether the entities requirethe user's data to adequately perform services for the user. In variousrespects, the report card may help the user establish a sense of trustwith the entities that have the user's data, particularly if the user isable to view how the entities access, utilize, and/or distribute theuser's data. As such, based on the level of trust established, thereport card may lead to users being willing to provide the entities withmore of the user's data.

In some embodiments, the user's data may be an asset. For example, theuser's search history data, browse data, click stream, and/or selectiondata, among other forms of data (e.g., “like” indices) may be valuableto various online entities. In additional examples, the user's emailaddress, telephone, and/or mailing address may be valuable to multipleadvertisement entities. In some instances, the user's data may have anintrinsic value to the user and/or an extrinsic value to variousentities. As such, the user's data may be associated with a variety ofvalues, possibly a combination of such values determined in marketablesettings.

In some embodiments, the PIP may enable an arbitrage mechanism with theuser's data, possibly based on one or more values assessed with theuser's data as described above. In various respects, the PIP may includea technological platform that models the value of the user's data orpossibly specific entries in the user's data. For example, the PIP mayassess values and/or monetize the user's data entries based on one ormore arbitrage models. In particular, considering the scenarios abovewhere the PIP takes the form of a data pipeline, the PIP may determinevalues on the user's data going into the pipeline and extract fees fromentities that receive the user's data coming out of the pipeline,possibly in accordance with the values determined on the user's data.Yet further, the PIP may extract fees based on usage, such as the numberof times the entities use the data. Thus, the PIP may further controlthe user's data going into the pipeline and the data coming out of thepipeline based on such arbitrage models of the user's data.

In practice, for example, the user may assess a value to entries of theuser's data, possibly referred to an intrinsic value. For instance, theuser may assess a lower value to the user's demographic data, gender,and/or age. Yet, one or more online entities may also assess a value onsuch entries of the user's data, possibly referred to as an extrinsicvalue. For example, the online entities may value user's demographicdata, gender, and/or age to facilitate their targeted services and/oradvertisements. As such, the extrinsic value to the online entities maybe higher than the intrinsic value of the data to the user. In suchinstances, the PIP may provide the online entities with the user's datain exchange for fees coming from the online entities, possibly based onthe arbitrage models described above computing the variable intrinsicand/or extrinsic values, among other market-driven values. These feesmay then be returned to the user. As noted, the PIP may also placevarious rules and/or restrictions on the user's data to preventunpermitted distribution of the data to one or more other secondentities.

Referring back to the report card provided to the user, the informationin the report card may enable the user to view the user's balance fromvarious fees extracted based on the one or more arbitration modelsdescribed above. Further, the report card may also provide assessmentsof risk, privacy, and/or levels of trust associated with the entitiesthat have the user's data, possibly based on providing the user's datatransferred in exchange for the extracted fees. In some instances, eachportion of the user's data, e.g., demographic data, gender, and/or age,may be represented with a trust metric based on the entities with accessto the data and a value indicator based on the one or more arbitrationmodels.

In various embodiments, the PIP may enable the user to customize and/orbalance the user's controls over their data. For example, moreconservative users may wish to have stronger controls over their data,possibly managing their data without participating in the arbitrationexchanges for data or participating less in the arbitration exchanges.Yet, more experimental users may relax their controls over their data,possibly participating more in the arbitration exchanges to receive morefees from the entities. In another view, the PIP may enable entities tocustomize and/or balance their approaches to obtaining data from users.For example, more conservative entities may not participate in thearbitration exchanges to receive the user's data. In some instances,such entities may already have a substantial amount of the user's data,possibly to adequately provide services to users. Yet, more aggressiveentities may participate regularly in the arbitration exchanges toreceive the user's data. For example, such entities may generally lackdata from users such that their services are may or may not adequatelymeet user requirements.

It should be noted that users are increasingly becoming more wary,cautious, and/or suspicious of entities deriving benefits frompossessing their data. As such, user demands for the personalinformation platform (PIP) may be expected, particularly to resolve suchtrust-related issues. Yet further, an entity providing services for auser may wish to continuously maintain or increase the user's trust inthe entity's practices with handling user's data. As such, the entitiesmay wish to implement the PIP as well. In addition, as users recognizean increasing number of entities supporting PIPs for users, there may bea growing suspicion of entities that opt not to support the PIPs forusers. Thus, it may be expected that more, if not all entities, willwish to participate in the implementation of the PIP for their users.

In various circumstances, the example embodiments described herein mayresolve various challenges with managing personal information withmobile devices over communication networks and data infrastructures. Assuch, the example embodiments described herein may resolve problems thatdid not exist before the availability of the computer networks and/orthe Internet. In particular, such embodiments may address problemsspecific to managing personal information utilizing mobile devices,computer networks, and/or the Internet. Various such embodiments mayprovide solutions that are technical nature and/or rooted managingpersonal information over computer networks and/or the Internet.Further, such embodiments may provide unconventional steps confined toone or more particular useful applications related to a given usercontrolling their personal information among numerous entities.

FIG. 1A is a block diagram of an exemplary system 100, according to anembodiment. The system 100, possibly referred to as the datainfrastructure 100, may be configured to transfer data over one or morecommunication networks 108. In particular, the system 100 may includethe server 102, possibly referred to as the server system 102. Theserver 102 may be configured to perform operations of a serviceprovider, such as PayPal, Inc. of San Jose, Calif., USA. Further, thesystem 100 may also include client device 104 and/or the client device106 operated by their respective users. In practice, the server 102 andthe client devices 104 and/or 106 may be configured to communicate overthe one or more communication networks 108.

The system 100 may operate with more or less than the computing devicesshown in FIG. 1A, where each device may be configured to communicateover one or more communication networks 108, possibly to transfer dataaccordingly. The one or more communication networks 108 may also includea packet-switched network configured to provide digital networkingcommunications, possibly to exchange data of various forms, content,type, and/or structure. The one or more communication networks 108 mayinclude a data network such as a private network, a local area network,and/or a wide area network. In some instances, the one or morecommunication networks 108 may include a communications network such asa telecommunications network and/or a cellular network with one or morebase stations, among other possible networks.

The data/data packets 122 and/or 124 may be transferrable usingcommunication protocols such as packet layer protocols, packet ensembleprotocols, and/or network layer protocols. For example, the data/datapackets 122 and/or 124 may be transferrable using transmission controlprotocols and/or internet protocols (TCP/IP). In various embodiments,each of the data/data packets 122 and 124 may be assembled ordisassembled into larger or smaller packets of varying sizes, such assizes from 1,000 to 1,500 bytes, for example, among other possiblesizes. As such, data/data packets 122 and/or 124 may be transferrableover the one or more networks 108 and to various locations in the datainfrastructure 100.

In some embodiments, the server 102 may take a variety of forms. Theserver 102 may be an enterprise server, possibly configured with one ormore operating systems to facilitate the scalability of the datainfrastructure 100. For example, the server 102 may configured with aUnix-based operating system to integrate with a growing number of otherservers, client devices 104 and/or 106, and one or more networks 108over the system architecture 100. The server 102 may further facilitateworkloads associated with numerous data transfers in view of anincreasing number of personal information platforms implemented forusers.

In some embodiments, the server 102 may include multiple components,such as a hardware processor 112, a non-transitory memory 114, anon-transitory data storage 116, and/or a communication interfacecomponent 118, among other possible components, any of which may becommunicatively linked via a system bus, network, or other connectionmechanism 120. The hardware processor 112 may take the form of amulti-purpose processor, a microprocessor, a special purpose processor,a digital signal processor (DSP) and/or other types of processingcomponents. For example, the processor 112 may include an applicationspecific integrated circuit (ASIC), a programmable system-on-chip (SOC),and/or a field-programmable gate array (FPGA) to process, read, and/orwrite data for an increasing number of personal information platformsfor numerous users. In particular, the processor 112 may include avariable-bit (e.g., 64-bit) processor architecture specificallyconfigured to facilitate the scalability of the increasing number ofPIPs. As such, the one or more processors 112 may execute varyinginstructions sets (e.g., simplified and complex instructions sets) withfewer cycles per instruction than other conventional general-purposeprocessors to improve the performance of the server 102 for purposes ofmass scalability and/or accommodation of growth.

In practice, for example, the hardware processor 112 may be configuredto parse the one or more data packets 122. As such, the hardwareprocessor 112 may identify one or more types of data, possibly includingparticular data entries, transferred with the client device 104. Theprocessor 112 may also create one or more PIPs for a user of the clientdevice 104 based on the one or more types of data or data entriestransferred. As such, the processor 112 may identify various types ofdata associated with the user of the client device 104 based on the datapackets 122 transferred. In some instances, the processor 112 may buildand/or construct one or more PIPs for the user as additional types ofdata or data entries are recognized. As such, the processor 112 mayutilize the PIP to determine which entities may have access to the typesof data recognized, possibly based on the services the entities providefor the user. For example, considering the visual discovery toolscenario described above, the processor 112 may provide a foundation forthe PIP to recognize the tool as an entity to have access to varioustypes of data of the user. In some instances, the tool may be grantedaccess to specific types of data to function and/or operate in one ormore methods, possibly as specified by the user.

The non-transitory memory component 114 and/or the data storage 116 mayinclude one or more volatile, non-volatile, and/or replaceable datastorage components, such as a magnetic, optical, and/or flash storagethat may be integrated in whole or in part with the hardware processor112. Further, the memory component 114 may include a number ofinstructions and/or instruction sets. The processing component 112 maybe coupled to the memory component 114 and configured to read theinstructions to cause the server 102 to perform operations, such asthose described in this disclosure, illustrated by the accompanyingfigures, and/or otherwise contemplated herein. Notably, the data storage116 may be configured to store numerous data entries for one or morePIPs, possibly including entries that may be accessed often by theclient devices 104 and/or 106.

The communication interface component 118 may take a variety of formsand may be configured to allow the server 102 to communicate with one ormore devices, such as the client devices 104 and/or 106. For example,the communication interface component 118 may include a transceiver thatenables the server 102 to communicate with the client devices 104 and/or106 via the one or more communication networks 108. Further, thecommunication interface component 118 may include a wired interface,such as an Ethernet interface, to communicate with the client devices104 and/or 106. Yet further, the communication interface component 118may include a wireless interface, such as a cellular interface, a GlobalSystem for Mobile Communications (GSM) interface, a Code DivisionMultiple Access (CDMA) interface, and/or a Time Division Multiple Access(TDMA) interface, among other possibilities. In addition, thecommunication interface 118 may include a wireless local area networkinterface such as a WI-FI interface configured to communicate with anumber of different protocols. As such, the communication interface 118may include a wireless interface configured to transfer data over shortdistances utilizing short-wavelength radio waves in approximately the2.4 to 2.485 GHz range. In some instances, the communication interface118 may send/receive data or data packets 122 and/or 124 to/from clientdevices 104 and/or 106.

The client devices 104 and 106 may also be configured to perform avariety of operations such as those described in this disclosure,illustrated by the accompanying figures, and/or otherwise contemplatedherein. For example, the client devices 104 and 106 may be configured totransfer data packets 122 and/or 124 with the server 102, respectively,such that the server 102 may manage one or more PIPs for respectiveusers of the client device 104 and/or 106. The server 102 may managemultiple PIPs based on various types of data transferred with the datapackets 122 and/or 124. For example, the server 102 may manage one ormore PIPs based on the data packets 122 and/or 124 including locationdata, such as Global Positioning System (GPS) data and/or GPS coordinatedata, triangulation data, beacon data, WI-FI data, peer data, socialmedia data, sensor data, movement data, temperature data, and/or othertypes of data described or contemplated herein.

In some embodiments, the client devices 104 and 106 may include or takethe form of a smartphone system, a personal computer (PC) such as alaptop device, a tablet computer device, a wearable computer device, ahead-mountable display (HMD) device, a smart watch device, and/or othertypes of computing devices configured to transfer data. The clientdevices 104 and 106 may include various components, including, forexample, input/output (I/O) interfaces 130 and 140, communicationinterfaces 132 and 142, hardware processors 134 and 144, andnon-transitory data storages 136 and 146, respectively, all of which maybe communicatively linked with each other via a system bus, network, orother connection mechanisms 138 and 148, respectively.

The I/O interfaces 130 and 140 may be configured to receive inputs fromand provide outputs to respective users of the client devices 104 and106. For example, the I/O interface 130 may include a display thatprovides a graphical user interface (GUI) configured to receive an inputfrom a user to create, configure, and/or modify one or more personalinformation platforms. Thus, the I/O interfaces 130 and 140 may includedisplays configured to receive inputs and/or other input hardware withtangible surfaces, such as touchscreens with touch sensitive sensorsand/or proximity sensors. The I/O interfaces 130 and 140 may alsoinclude a microphone configured to receive voice commands, a computermouse, a keyboard, and/or other hardware to facilitate input mechanisms.In addition, I/O interfaces 130 and 140 may include output hardware suchas one or more sound speakers, other audio output mechanisms, hapticfeedback systems, and/or other hardware components.

In some embodiments, communication interfaces 132 and 142 may include ortake a variety of forms. For example, communication interfaces 132 and142 may be configured to allow client devices 104 and 106, respectively,to communicate with one or more devices according to a number ofprotocols described and/or contemplated herein. For instance,communication interfaces 132 and 142 may be configured to allow clientdevices 104 and 106, respectively, to communicate with the server 102via the one or more communication networks 108. The hardware processors134 and 144 may include one or more multi-purpose processors,microprocessors, special purpose processors, digital signal processors(DSP), application specific integrated circuits (ASIC), programmablesystem-on-chips (SOC), field-programmable gate arrays (FPGA), and/orother types of processing components.

The non-transitory data storages 136 and 146 may include one or morevolatile or non-volatile data storages, removable or non-removable datastorages, and/or a combination of such data storages that may beintegrated in whole or in part with the hardware processors 134 and 144,respectively. Further, data storages 136 and 146 may includenon-transitory memories that store instructions and/or instructionssets. Yet further, the processors 134 and 144 may be coupled to the datastorages 136 and 146, respectively, and configured to read theinstructions from the non-transitory memories to cause the clientdevices 104 and 106 to perform operations, respectively, such as thosedescribed in this disclosure, illustrated by the accompanying figures,and/or otherwise contemplated herein.

FIG. 1B is a block diagram of another exemplary system, according to anembodiment. As shown, the system 150, possibly referred to as the datainfrastructure 150, may be configured to transfer the data packets 122and/or 124 as described above in relation to data infrastructure 100 inFIG. 1A. For example, the system 150 includes the server 102, shown as apersonal information platform server 102. Further, the system 150includes the client devices 104 and 106, and also the one or morenetworks 108. As illustrated, the data infrastructure 150 may includeone or more communication servers 152, one or more application servers160, and/or one or more database servers 166.

In some embodiments, the one or more communication servers 152 mayinclude a web server 154, an application programming interface (API)server 156, and/or a message server 158. The web server 154 may, beconfigured to communicate with the client devices 104 and/or 106 overthe one or more networks 108. The web server 154 may host numerous webbrowsers, web sites, web-based applications, software applications,virtual machines, and/or other possibilities. The API server 156 may beconfigured to communicate with various applications or mobile apps ofthe client devices 104 and/or 106, including service providerapplications configured to communicate with API-based communicationsand/or protocols over the one or more networks 108. The message server158 may be configured to communicate with the client devices 104 and/or106 over the one or more networks 108 with various transmissions,communication mediums, and/or related applications such as e-mail, localarea network (LAN) messaging, and/or short message service (SMS), amongvarious other possibilities. Notably, any two or more of the servers154, 156, and/or 158 may be combined and the combined server may beconfigured to perform one or more operations of the servers 154, 156,and/or 158 as described and/or contemplated herein.

In some embodiments, the one or more application servers 160 may includethe personal information platform (PIP) server 102, the user controlsserver 162, and/or the user account server 164. The PIP server 102 maymaintain, manage, and/or support numerous personal information platformsfor one or more users as described herein. The user controls server 162may maintain, manage, and/or support various user controls,configurations, and/or settings associated with the respective PIPs forthe one or more users. The user account server 164 may maintain, manage,and/or support numerous user accounts for the one or more users, such asemail accounts, networking accounts, and/or payment provider accounts,among other types of accounts described and/or contemplated herein.

In some embodiments, the one or more database servers 166 may includethe database server 170, the personal information platform database 168,and/or the user account database 172. The database server 170 maycommunicate with the PIP server 102 to facilitate the storage of data,data types, and/or data entries of the PIPs in the personal informationplatform database 168. The database server 170 may also communicate withthe user account server 164 to facilitate the storage of user accountdata in the user account database 172. In some embodiments, the datastored with the PIP database 168 may correspond to the data stored withthe user account database 172. As such, the database server 170 mayinclude one or more search indexes with varying complexities to minimizereplicated data entries stored in the PIP database 168 and the useraccount database 172.

In practice, for example, a user operating the client device 104 maysend a request over the one or more networks 108 to create a personalinformation platform. Referring back to FIG. 1A, the request may beembedded with the data/data packet 122. As such, the request may betransmitted to the one or more communications servers 152 to request aconnection with the PIP server 102. For example, the web server 154,possibly referred to as a domain name server (DNS) in this scenario, maysearch and identify one or more internet protocol (IP) addresses of thePIP server 102, possibly taking the form of 192.168.102.100. As such, aconnection with the client device 104 and the personal informationplatform server 102 may be established to create the personalinformation platform. Notably, the client device 104 may establish suchconnections with the PIP server 102 with or without user inputs,possibly to generate, build, and/or modify the personal informationplatform in real-time, possibly unbeknownst to the user of the clientdevice 104.

In some embodiments, the system 150 may be referred to as a personalinformation platform (PIP) system 150. In particular, the PIP system 150may include the non-transitory memory 114 for storing instructions. ThePIP system 150 may also include the one or more of hardware processors112 coupled to the non-transitory memory 114 and configured to read theinstructions to cause the system 150 to perform operations. The PIPsystem 150 may create one or more PIPs for a user with or without theuser's inputs, where each PIP identifies and/or recognizes one or moretypes of data associated with the user. The system 150 may recognizevarious forms of data natively stored in the client device 104, possiblybased on the connection protocols between the client device 104 and thePIP server 102 described above.

It can be appreciated that the server 102 and the client devices 104and/or 106 in FIGS. 1A and 1B may be deployed in various other ways. Forexample, the operations performed by the server 102 and/or the clientdevices 104 and 106 may be performed by a greater or a fewer number ofdevices. Further, the operations performed by two or more devices, suchas the servers 102, 162, and/or 164, may be combined and performed by asingle device, such as the server 102. Yet further, the operationsperformed by a single device, such as the server 102, may be separatedor distributed among the server 102, the user controls server 162, theuser account server 164, and/or the database server 170, among otherpossible devices. In addition, the client devices 104 and/or 106 may beoperated and/or maintained by different users such that each clientdevice 104 and/or 106 may be associated with one or more PIPs.

Notably, one or more user accounts maintained by the user account server164 may be displayed on the client device 104, possibly through the I/Ointerface 130 described above. As such, a user account may be displayedon a smartphone system to provide the user with access to the account.In some instances, the user may access the one or more accounts throughthe user's personal information platform. As such, the user may utilizethe user's PIP as a portal into the one or more user accounts.

In some embodiments, an account, possibly referred to a user account,may take a number of different forms. For example, an account may be ane-mail account, a networking account, a professional and/or a socialnetworking account, a smartphone account, a music or music playlistaccounts, and/or a video streaming account, among other possibleaccounts. Further, an account may include a compilation of dataassociated with a given user. For example, an account for a particularuser may include data related to the user and/or the user's interests,such as an account associated with the discovery tool described above.Some examples of accounts may include accounts with service providersdescribed above, e-commerce accounts, and/or accounts with funds,balances, fund transfers, transactions, and/or checkouts of the user,among other possibilities.

In some embodiments, a user account may be created for one or moreusers. For example, an account may be a family account created formultiple family members, where each member may have access to theaccount. In some instances, the account may be a corporate account,where employees, staff, worker personnel, and/or contractors, amongother individuals may have access to the corporate account. Yet further,it should be noted that a user, as described herein, may be a number ofindividuals or possibly a robot, a robotic system, a computing device, acomputing system, and/or another form of technology capable oftransferring data associated with the account. The user may be requiredto provide a login, a password, a code, an encryption key,authentication data, and/or other types of data to be permitted toaccess the account.

In some embodiments, a PIP for a given user may represent the userand/or provide an interface to multiple accounts, service providers,and/or applications, among other possibilities. For example, the PIP mayrepresent the user for the user's e-mail accounts, networking and/orsocial networking accounts, and/or smartphone accounts, as well aswebsites, applications, and/or other services. As such, a user could optto use the PIP as a multi-purpose account for performing variousoperations.

FIG. 2A illustrates exemplary system 200 configured to support a set oftrays 204 and 206, according to an embodiment. The system 200 may, forexample, include or take the form of the server 102 described above inrelation to FIGS. 1A and 1B. In particular, the system 200 may also bereferred to as the server 200 and/or the server system 200. As such, thesystem 200 may manage numerous personal information platforms (PIPs) forthe users of client devices, such as the client devices 104 and/or 106.The system 200 may further support, operate, run, and/or manage thepersonal information platforms, possibly in addition to variousapplications, websites, and/or services.

As shown, the system 200 may include a chassis 202 that may supporttrays 204 and 206, possibly also referred to as servers and/or servertrays 204 and/or 206. Notably, the chassis 202 may support multipleother servers and/or trays as well. The chassis 202 may include slots208 and 210, among other possible slots, configured to hold or supporttrays 204 and 206, respectively. For example, the tray 204 may beinserted into the slot 208 and the tray 206 may be inserted into theslot 210. Yet, the slots 208 and 210 may be configured to hold the trays204 and 206 interchangeably such that the slot 208 may be configured tohold the tray 206 and the slot 210 may be configured to hold the tray204.

Further, the chassis 202 may be connected to a power supply 212 viaconnections 214 and 216 to provide power to the slots 208 and 210,respectively. The chassis 202 may also be connected to the communicationnetwork 218 via connections 220 and 222 to provide network connectivityto the slots 208 and 210, respectively. As such, trays 204 and 206 maybe inserted into slots 208 and 210, respectively, and power supply 212may supply power to trays 204 and 206 via connections 214 and 216,respectively. Further, trays 204 and 206 may be inserted into the slots210 and 208, respectively, and power supply 212 may supply power totrays 204 and 206 via connections 216 and 214, respectively.

Yet further, trays 204 and 206 may be inserted into slots 208 and 210,respectively, and communication network 218 may provide networkconnectivity to trays 204 and 206 via connections 220 and 222,respectively. In addition, trays 204 and 206 may be inserted into slots210 and 208, respectively, and communication network 218 may providenetwork connectivity to trays 204 and 206 via connections 222 and 220,respectively. The communication network 218 may, for example, take theform of the one or more communication networks 108, possibly includingone or more of a data network and a cellular network. In someembodiments, the communication network 218 may provide a network port, ahub, a switch, or a router that may be connected to an Ethernet link, anoptical communication link, a telephone link, among other possibilities.

In practice, the tray 204 may be inserted into the slot 208 and the tray206 may be inserted into the slot 210. During operation, the trays 204and 206 may be removed from the slots 208 and 210, respectively.Further, the tray 204 may be inserted into the slot 210 and the tray 206may be inserted into the slot 208, and the system 200 may continueoperating, possibly based on various data buffering mechanisms of thesystem 200. Thus, the capabilities of the trays 204 and 206 mayfacilitate uptime and the availability of the system 200 beyond that oftraditional or conventional servers that may be required to run withoutinterruptions. As such, the server trays 204 and/or 206 facilitatefault-tolerant capabilities of the server system 200 to further extendtimes of operation. In some instances, the server trays 204 and/or 206may include specialized hardware, such as hot-swappable hard drives,that may be replaced in the server trays 204 and/or 206 duringoperation. As such, the server trays 204 and/or 206 may preventinterruptions to further increase uptime.

FIG. 2B illustrates an exemplary tray 204 configured to support one ormore components, according to an embodiment. The tray 204, possibly alsoreferred to as the server tray 204, may take the form of the tray 204described in relation to FIG. 2A. Further, the tray 206 may also takethe form of the tray 204. As shown, the tray 204 may include a tray base230 that may include the bottom surface of the tray 204. The tray base230 may be configured to support multiple components such as the harddrives described above and a main computing board connecting one or morecomponents 232-240. The tray 204 may include a connection 226 that maylink to the connections 214 or 216 to supply power to the tray 204. Thetray 204 may also include a connection 228 that may link to theconnections 220 or 222 to provide network connectivity to the tray 204.The connections 226 and 228 may be positioned on the tray 204 such thatupon inserting the tray 204 into the slot 208, the connections 226 and228 couple directly with the connections 214 and 220, respectively.Further, upon inserting the tray 204 into the slot 210, the connections226 and 228 may couple directly with connections 216 and 222,respectively.

In some embodiments, the tray 204 may include a hardware processorcomponent 232, a non-transitory memory component 234, a non-transitorydata storage component 236, a communication interface component 238,that may, for example, take the form of the processor 112, the memory114, the data storage 116, and the communication interface 118,respectively. Further, the tray 204 may include the data enginecomponent 240 that may manage personal information platforms fornumerous users. As such, the connections 226 and 228 may be configuredto provide power and network connectivity, respectively, to each of thecomponents 232-240. In some embodiments, one or more of the components232-240 may perform operations described herein, illustrated by theaccompanying figures, and/or otherwise contemplated

As shown, the hardware processor component 232 may take the form of amulti-purpose processor, a microprocessor, a special purpose processor,a digital signal processor (DSP). Yet further, the processor component232 may take the form of an application specific integrated circuit(ASIC), a programmable system on chip (PSOC), field-programmable gatearray (FPGA), and/or other types of processing components. Inparticular, the processor component 232 may create, modify, and/or buildPIPs for numerous users. For example, the processor component 232 may beconfigured with a Unix-based operating system. Further, the processorcomponent 232 may support the scalability of PIPs generated with variousother servers, such as those described above in relation to the datainfrastructure 150. In particular, the processor component 232 may beconfigured to facilitate the scalability with multiple such servers ofvarious forms that may, for example, include server trays, blades,and/or cartridges similar to the server trays 204 and/or 206. In someinstances, the processor component 232 may be configured with scalableprocess architectures, including, reduced instruction set architectures.In some instances, the processor component 232 may be backwardscompatible with various legacy systems to generate PIPs such that theprocessor component 232 may receive, read, and/or execute instructionsets with legacy data formats and/or structures. As such, the processorcomponent 232 generally has capabilities beyond that of general-purposeprocessors.

The database engine component 240 may include one or more securedatabases to generate, build, and/or manage PIPs for numerous users. Inparticular, the data base engine component 240 may organize and/orformat the PIPs for optimizing searches and/or retrieving data. Invarious circumstances, the database engine component 240 may performsearches based on numerous queries, search multiple databases inparallel, and produce search results simultaneously and/orconsecutively. Thus, the database engine component 240 may relievevarious bottlenecks encountered with conventional servers managingnumerous data entries.

Any two or more of the components 232-240 described above may becombined. For example, two or more of the hardware processor component232, the non-transitory memory component 234, the non-transitory datastorage component 236, the communication component and/or interface 238,and/or the data engine component 240 may be combined. Further, thecombined component may take the form of one or more processors, DSPs,SOCs, FPGAs, and/or ASICs, among other types of processing devicesand/or components described herein. For example, the combined componentmay take the form an SOC that integrates various other components in asingle chip with digital, analog, and/or mixed-signal functions, allincorporated within the same substrate. As such, the SOC may beconfigured to carry out various operations of the components 232-240.

The components 232-240 described above may provide advantages overconventional or general-purpose components. For example, the components232-240 may enable the system 200 to transfer data over the one or morenetworks 218 to numerous other client devices, such as the clientdevices 104 and/or 106. In particular, the components 232-240 may enablethe system 200 to create, build, and/or modify PIPs for numerous userslocally from a single server tray 204. In some instances, configuring aseparate and/or dedicated hardware processor component 232 to generate,build, and/or manage PIPs may optimize operations beyond thecapabilities of conventional servers and/or general-purpose processors.As such, the average wait time for the client device 104 to display datafrom the PIPs may be minimized accordingly.

It can be appreciated that the system 200, the chassis 202, the trays204 and 206, the slots 208 and 210, the power supply 212, thecommunication network 218, and the components 232-240 may be deployed inother ways. The operations performed by components 232-240 may becombined or separated for a given embodiment and may be performed by agreater number or fewer number of components or devices. Further, one ormore components or devices may be operated and/or maintained by the sameor different entities.

FIG. 3 illustrates a personal information platform (PIP) system 300,according to an embodiment. As shown, the PIP system 300 generates,maintains, and/or supports data 302, possibly including various forms ofdata, types of data, and/or data entries related to a given user.Further, the PIP 304 may take the form of a data pipeline such that thedata 302 enters the data pipeline and the PIP 304 manages or controlsthe data 306-322 that comes out from the data pipeline, among other datacontemplated with the illustration of the multiple ellipses. Notably,the data 306-322 provided by the PIP 304 may be a subset of the data 302that enters the PIP 304. Yet, in some instances, the data 306-322 may bethe same or different from the data 302 that enters the data pipeline,and/or possibly a combination of the same and different data ascontemplated herein.

In some embodiments, the PIP 304 may manage and/or control accesses tovarious fauns of data, possibly considered above as coming from the datapipeline. For example, the PIP 304 may control accesses to various formsof data, types of data, data related to categories, and/or data withvarying levels of sensitivity identified, among other possibilities. Asshown, for example, the PIP 304 may control accesses to the birthdatedata 306, demographic data 308, connections data 310, location data 312,contacts data 314, search and/or search history data 316, zip code data318, transaction or transaction history data 320, and/or balance data322, among other forms of data contemplated with the ellipses provided.Notably, the PIP 304 may manage, and/or control data 302 and/or 306-322with various data schemas. In particular, such data schemas may berepresented in multiple formats, such as JavaScript Object Notation(JSON), Extensible Markup Language (XML), and/or Standard GeneralizedMarkup Language (SGML), among other types of formants and/or databaselanguages. Further, various benefits of such interchangeable dataschemas may be realized. For example, one or more entities 324, 326,and/or 328 and other PIPs may be able to exchange, communicate, and/orunderstand the data 302 and/or 306-322 in one or more common methods asdescribed or contemplated herein.

Further, the PIP 304 may create, control, and/or modify multipleaccesses to data, possibly considered coming from the data pipeline. Forexample, the PIP 304 may control the accesses 330, 332, and/or 334 tothe data coming from the pipeline. In some instances, the PIP 304 maycontrol access 330 to the entity 324 such that the entity 324 has theaccess 330 to the birthdate data 306, the demographic data 308, and/orthe connections data 310, among other data and/or data entriescontemplated above. Further, the PIP 304 may control the access 332 suchthat the entity 326 has the access 332 to the location data 312,contacts data 314, and/or search data 316, among other data and/or dataentries contemplated above. Yet further, the PIP 304 may control theaccess 334 such that the entity 328 has the access 334 to the zip codedata 318, transaction history data 320, and/or balance data 322, amongother data and/or data entries contemplated above.

Without any limitations to the embodiments described herein, consider agiven scenario where the entity 324 is a service provider that manages anetworking account for the user, such as a social networking accountand/or a professional networking account. In this scenario, the PIP 304may determine that the services provided by the entity 324, e.g.,managing the user's networking account, may be adequately performedwithout the user's demographic data 308, possibly indicating the user'snationality, ethnicity, and/or education background. In some instances,the PIP 304 may determine that the demographic data 308 is not utilizedor not often utilized by the entity 324 to perform the services for theuser, possibly the services that the user desires. As such, the PIP 304may modify the access 330 such that the entity 324 does not have theaccess 330 to the demographic data 308, possibly requesting the entity324 to remove the demographic data 308 from its data storages and/ornetworks. Notably, the PIP 304 may collect, scrape, and/or retrievevarious forms of data (e.g., the data 308) from various websites and/orremote web servers running such websites. In some instances, the PIP 304may perform utilization analyses, logic computations, and/or otheroperations associated with the data 308 collected by the entity 324 asdescribed above, possibly to alert the user that certain data 308 ispresent or held with such entities without being used by such entities.Further, in some instances where such entities are managed by the PIP304, the PIP 304 may request that the entities stop using that data 308.

In some instances, the PIP may create, control, and/or remove theaccesses 330, 332, and/or 334 with rules 336 and/or 338. For example,consider another scenario where the entity 326 is a provider of anapplication, possibly referred to as a mobile app. For example,referring back to FIGS. 1A and 1B, the user of the client device 104 maydownload the mobile app with the client device 104. In this scenario,the PIP 304 may identify approximately nine requests from the mobile appto access the user's data 302, as described in scenarios above. Yet, thePIP 304 may further identify that the location data 312 is required bythe mobile app to perform one or more services for the user. As such,the PIP 304 may implement a rule 336 such that the app has the access332 to the location data 312, possibly without access to the contactsdata 314 and/or the search data 316. Yet, in some instances, the app mayhave access to the contacts data 314 and/or the search history data 316,possibly based on the user accepting a request from the entity 326 forsuch data. As such, based on a user input indicating an acceptance tosuch a request, the mobile app may have the access 332 to the contactsdata 314 and/or the search data 316.

Considering the scenarios described above, the entity 328 may be acredit card company. As such, further considering the scenarios above,the PIP 304 may identify that the user visits a certain gas station on aregular basis to purchase gas using a credit card and the zip code data318. As such, the PIP 304 may provide the entity 328 with access 334 tothe zip code data 318. Yet, in some instances, the PIP 304 may implementa rule 338 such that the entity 328 has the access 334 to the zip codedata 318 for purposes of verifying the user's purchases at one or moregas stations. Yet, the PIP 304 may also implement the rule 338 such thatthe entity 328 must ask the user for permission to utilize the zip codedata 318 for purposes other than verifying the user's purchases at oneor more gas stations. Further, the rule 338 may prohibit the entity 328from transferring the zip code data 318.

Notably, the PIP 304 may also control various aspects of the data306-322. For example, the PIP 304 may control accesses to the birthdatedata 306 that may indicate the user's birthday, including the day,month, and/or year of the user's birthday. In particular, the PIP 304may control access 330 such that the entity 324 has the access 330 tothe month and the day of the user's birthday. Yet, the access 330 may becontrolled such that the entity 324 does not have the access 330 to theuser's birth year and/or age, possibly based on user inputs and/orconfigurations. In possibly similar respects, the PIP 304 may alsocontrol various aspects of the connections data 310 that may indicate anumber of connections the user may have with one or more networks. Forexample, the PIP 304 may control the access 330 to a subset of theuser's connections identifiable from the connection data 310, possiblywithout granting the access 330 to other subsets of the user'sconnections identifiable from the connections data 310.

Further, the PIP 304 may also control aspects of the location data 302,possibly retrieved from a client device or a smartphone device of theuser. For example, referring back to FIGS. 1A and 1B, various forms oflocation data may be retrieved based on the connection established withthe client device 104 and the PIP server 102. As such, based on dataexchanges for establishing the connection, the PIP server 102 mayretrieve and control Wi-Fi beaconing data, Enhanced Observed TimeDifference (EOTD) data, global positioning System (GPS) data, AssistedGPS (A-GPS) data, Differential GPS (DGPS) data, Time Difference ofArrival (TDOA) data, Angle of Arrival (AOA) data, triangulation data,among other forms of location data of the client device 104 as describedherein. As such, the PIP 304 may control accesses to various types oflocation data 302 described above.

Yet further, the PIP 304 may control aspects of contacts data 314,possibly indicating data associated with a number of contacts of theuser. For example, the PIP 304 may control accesses to names (e.g.,first, middle, and last), email addresses, home addresses, workaddresses, and/or telephone numbers, among other types of dataassociated with the user's contacts. In addition, the PIP 304 maycontrol aspects of the search and/or search history data 316. Forexample, the PIP 304 may control data indicating websites, applications,browsers, searches, search strings, words, phrases, sentences, and/orother terms searched by the user, possibly over one or more periods oftime including a number of years. Further, the PIP 304 may control clickdata that indicates the user selections associated with the browsing asdescribed above. In particular, the click data may indicate variouslinks that the user selects and/or interacts with in some manner, amongother possibilities that may indicate the user's interests.

In additional examples, the PIP 304 may identify various websites or webservers that may already have the user's data 302. In particular, thePIP 304 may identify websites the user may have visited and/or websitesthat received the user's data 302 based on user inputs. Further, the PIP304 may identify websites that may have collected the user's data 302from other sources or entities, e.g., the entities 324, 326 and/or 328.As such, the PIP 304 may collect, scrape, and/or retrieve the user'sdata 302 from various websites or web servers, possibly to displayidentifications of the websites or web servers to the user. As such, thedata 302 may also include data from other such sources or entities inaddition to data provided by the user. As such, the data 302 may beretrieved from the Internet, private websites, and/or public websites,possibly including data that the user may want to access and/or control.For example, the user may want to control the data 302 based on suchsources or entities described above that may have access to the data302.

In addition, the PIP 304 may also control aspects of the transactionhistory data 320, possibly including bank account data, credit cardnumbers, and/or debit card numbers, among other types of data associatedwith transferring fund amounts from the user's account. Further, the PIP304 may control aspects of the balance data 322, possibly including oneor more balances of one or more of the user's accounts, such as theuser's credit card and/or debit accounts.

It should be noted that the various aspects of FIG. 3 are provided forillustrative purposes and should not be interpreted as limiting. Forexample, the types of data 306-322, the entities 324, 326, and/or 328,the accesses 330, 332, and/or 332, and/or the rules 336 and/or 338 areprovided for purposes of illustration and explanation, without anylimitations to aspects of the disclosures. Thus, it should be noted thatthe data 302 may include various other types and/or forms of data thatmay be associated with the user. For example, the data 302 may indicatethe user's social security number, driver's license number, and/or theuser's account numbers, among other numerical identifiers. Further, thedata 302 may indicate account data, such as one or more accounts withservice providers, such as e-mail accounts, communications accounts,and/or networking accounts described above.

In some embodiments, the PIP system 300 includes a non-transitory memoryincluding instructions and one or more hardware processors. In someexamples, referring back to FIGS. 1A-2B, the PIP system 300 includes thenon-transitory memory 114 that stores the instructions and the one ormore hardware processors 112. For instances, the one or more hardwareprocessors 112 is coupled to the non-transitory memory 114 to read theinstructions. In some instances, the PIP system 300 performs a number ofoperations. The operations include determining data 302 associated witha user. Further, the operations include determining a personalinformation platform 304 based at least on the data 302 associated withthe user, where the personal information platform 304 is configured toidentify a number of data types 306-322 from the data 302 associatedwith the user. Yet further, the operations include determining, based atleast on the personal information platform 304, accesses 330, 332,and/or 334 of one or more entities 324, 326, and/or 328 to the number ofdata types 306-322 based at least on one or more services provided bythe one or more entities 324, 326, and/or 328 to the user. In addition,the operations include causing a client device to display an indicationof the personal information platform 304. For example, referring back toFIGS. 1A-2B, the client 104 may display the indication of the personalinformation platform 304, where the indication displayed provides theone or more accesses 330, 332, and/or 334 of the one or more entities324, 326, and/or 328 to the number of data types 306-322.

In some embodiments, the indication of the personal information platform304 is displayed on a graphical user interface (GUI) of a client device,possibly operated by the user. For example, referring back to FIGS.1A-1B, the indication of the PIP 304 may be displayed on a GUI of theclient device 104, possibly provided by the I/O interface 130. Inparticular, the I/O interface 130 may be configured to receive one ormore user inputs, such as touch inputs from the user. As such, theaccesses 330, 332, and/or 334 of the one or more entities 324, 326,and/or 328 to the number of data types 306-322 may be controlled basedon the one or more user inputs.

In some embodiments, the personal information platform 304 is furtherconfigured to determine one or more data types from the number of datatypes 306-322. For example, the PIP 304 may select the one or more datatypes, such as the location data 312, from the number of data types306-322. In some instances, the one or more data types, such as thelocation data 312, may be required by the one or more entities 324, 326,and/or 328, such as the mobile app provider described above. Yetfurther, the one or more data types 306-322 may be required by the oneor more entities 324, 326, and/or 328 to provide the one or moreservices for the user. As such, the access 332 for the one or moreentities 326 may be determined with a limitation to the one or more datatypes 306-322, including the location data 312. In particular, forexample, the access 332 may be limited to the location data 312 withouthaving access to the contacts data 314 and/or the search data 316,possibly as described above.

As noted, referring back to FIGS. 1A-2B, the PIP system 300 may includethe one or more hardware processors 112 that cause the PIP system 300 toperform further operations. For example, the operations includedetermining a number of rules, such as the rules 336 and/or 338, amongother possible rules. For instances, the rules 336 and/or 338 may beassociated with the accesses 332 and/or 334, respectively, possibly forthe one or more entities 326 and/or 328 to the number of data types312-322. Further, the operations may include determining at least onechange to the accesses 332 and/or 334 based at least on the number ofrules 336 and/or 338, where the change limits the accesses 332 and/or334 to the number of data types 312-322. In particular, one or morechanges may limit the access 332 to the location data 312 and the access334 to the zip code data 318, among other possibilities.

In some embodiments, the operations may include generating a digitalreport card associated with the personal information platform 304 on aperiodic basis, possibly generating the report card on demand based onuser inputs. For example, referring back to FIG. 1B, the PIP server 102may generate the digital report card monthly and/or annually, possiblybased on compiling the user's data 302 from the user controls server 162and/or the user account server 164. In some instances, the operation mayinclude causing the client device 104 to display the digital report cardon the periodic basis. For example, the server 102 may establish aconnection with the client device 104 based on identifying the IPaddress of the client device 104 with the web server 153. As such, theserver 102 may transmit data/data packets 122 to the client device 104that indicates the digital report card. In particular, the client device104 may display the digital report card, possibly displaying the digitalreport card with the I/O interface 130 of the client device 104. In someinstances, the digital report card displayed may indicate one or morechanges to the accesses 330, 332, and/or 334, among other accesses forthe one or more entities 324, 326, and/or 328 to the number of datatypes 306-322.

As noted in the scenarios above, the user's data may be an asset. Thus,there may be various values associated with the user's data 302, such asan intrinsic value of the data 302 to the user, an extrinsic value ofthe data 302 to the one or more entities 324, 326, and/or 328, andpossibly a combination of such values, among other possible valuescontemplated herein. In some embodiments, the operations may includedetermining a value for at least one data type, such as the locationdata 312, from the number of data types 306-322 based on the one or moreentities 324-328 interested in the one data type. For example, a valuefor the location data 312 may be determined based on the one or moreentities 324-328 interested in the location data 312 of the user. Assuch, the indication of the PIP 304 displayed may further indicate thevalue for the one data type, such as the location data 312.

As noted, referring back to FIGS. 1A-2B, the PIP system 300 may includethe one or more hardware processors 112 that cause the PIP system 300 toperform further operations. In some instances, the operation may includegenerating a digital report card associated with the personalinformation platform 300 based on the value for the at least one datatype described above. As such, the operations may include causing theclient device, such as the client device 104, to display the digitalreport card, as described above. Yet, in some instances, the digitalreport card indicates a level of trust associated with a transfer of theone data type from the data 306-322 to the one or more entities 324,326, and/or 328 for the value determined. As noted, for example, the onetype data may include the location data 312. As such, the level of trustmay be associated with the entities 324, 326, and/or 328 using thelocation data 312 to provide services for the user, without using thelocation data 312 for purposes other than providing services for theuser, such as transferring the location data 312 to other (secondary)entities.

FIG. 4A illustrates an exemplary system 400 with a client device 402,according to an embodiment. The system 400, possibly referred to asmartphone system 400, may include the aspects of the systems 100, 150,200, and/or 300 described in relation to FIG. 1A-3. For example, theclient device 402 may include one or more components of the clientdevice 104 described above in relation to FIG. 1A-3. In particular, thesmartphone system 400 may include a speaker/microphone 406, a sidebutton 408, and/or a control button 410, among other possible hardwarecomponents.

As shown, the smartphone system 400 may include a display 404, possiblyalso referred to as the graphical user interface 404. In particular, thegraphical user interface 404 may provide the indication of the personalinformation platform (PIP) 412 associated with a user. As such, the userof the smartphone system 400 may view the PIP 412 and the accounts 414,416, and/or 418, among other accounts of the user, as contemplated withthe ellipses below the account 418. Further, the scroll bar 411 may beused to provide the other accounts of the user. Yet, in some instances,the PIP 412 may be configured such that the user may view all of theuser's accounts from a single display, such as the graphical userinterface 404.

In various embodiments, the PIP 412 may provide a portal to multipleaccounts 414, 416, and/or 418 of the user. For example, the account 414may be a networking account of the user, such as a personal, social,and/or a professional networking account of the user. In particular, theaccount 414 may include birthdate data 422, demographic data 424, and/orthe connections data 426 that may take the form of the data 306, 308,and/or 310, respectively, as described above in relation to FIG. 3.Further, the account 416 may be an email account of the user. Inparticular, the account 416 may include location data 428, contacts data430, and/or search history data 432 that may take the form of the data312, 314, and/or 316, respectively, as described above in relation toFIG. 3. Yet further, the account 418 may be a payment provider accountof the user. In particular, the account 418 may include zip code data434, transaction history data 436, and/or balance data 438 that may takethe form of the data 318, 320, and/or 322, respectively, as described inrelation to FIG. 3. Notably, the accounts 414, 416, and/or 418 may beprovided by the entities 324, 326, and/or 328, possibly serviceproviders of the account 414, 416, and/or 418, respectively. Further,the accounts 414, 416, and/or 418 may be accessed with touch inputsreceived to the GUI 404, as described herein. For example, a touch inputover the alphanumeric characters of the account 414 may link to theaccount 414.

In some embodiments, the smartphone system 400 may also include anon-transitory machine-readable medium. For example, referring back toFIG. 1A, the smartphone system 400 may include the non-transitory datastorage 136. In some instances, the non-transitory machine-readablemedium may have stored thereon machine-readable instructions executableto cause a machine, such as the smartphone system 400, to performoperations. In some instances, the operations include determining one ormore accounts 414, 416, and/or 418 associated with a user. For example,the smartphone system 400 may search, identify, and/or recognize theaccounts 414, 416, and/or 418, possibly based on the accounts 414, 416,and/or 418 being accessed with the smartphone system 400.

Further, the operations include determining the personal informationplatform 412 based at least on the one or more accounts 414, 416, and/or418. For example, the personal information platform 412 may be generatedto include the one or more accounts 414, 416, and/or 418. Yet further,the personal information platform 412 is configured to access data422-426, 428-432, and/or 434-438 from each of the one or more accounts414, 416, and/or 418, respectively. In addition, the operations includedetermining, based at least on the personal information platform 412, anumber of data entries 422-438 provided with the one or more accounts414, 416, and/or 418. Further, the operations include causing the clientdevice 402 to display an indication of the personal information platform412. As such, the indication displays the number of data entries 422-438provided with the one or more accounts 414, 416, and/or 418.

In some embodiments, the indication of the personal information platform412 is displayed on the graphical user interface 404 of the clientdevice 402, possibly configured to receive a number of touch inputs. Asshown, the graphical user interface 404 may receive one or more touchinputs 442. In some instances, the data 422-438 provided with theaccounts 414, 416, and/or 418 may be controlled with the one or moretouch inputs 422. For example, the one or more touch inputs 422 mayremove the location data 428 from the account 416, possibly such thatthe data 428 is no longer accessible through the account 416. Forexample, referring back to FIG. 3, the entity 326, possibly the serviceprovider of the email account 416, may no longer have access to thelocation data 428. In further examples, one or more transfers of thenumber of data entries 422-438 from the one or more accounts 414-418 arecontrolled based on the one or more touch inputs 422 received. Inparticular, the one or more touch inputs 442 may prevent the locationdata 428 from being transferred from the account 416, possibly preventedfrom being transferred to other entities.

FIG. 4B illustrates the exemplary system 400 with the client device 402,according to another embodiment. As described above, the system 400 maybe referred to as the smartphone system 400. As shown, the graphicaluser interface 404 may provide the indication of the personalinformation platform (PIP) 412. Yet further, the data entries 422-438may be provided in a list format, possibly with other data entries ascontemplated with the ellipses. In addition, each data entry is providedwith at least one account from the accounts 414, 416, and/or 418, amongother possible accounts. As such, the user is able to view various dataentries 422-438 and also respective accounts provided with the dataentries. It should be noted that one or more of the data entries may notbe provided to any of the accounts.

Also shown is the scroll bar 411 that may be used to view the other dataentries. Yet, in some instances, the PIP 412 may be configured such thatthe user may view all of the data entries 422-438 and additional entriesin a single display, such as the graphical user interface 404. In thisexample, the data entries may be provided in alphabetical order suchthat the user can scroll through the entries with the scroll bar 411 tosearch for one or more data entries efficiently.

Also shown in FIG. 4B is the image data 446 and the phone number data448. For example, consider the scenarios above where the account 414 isa networking account, the account 416 is an email account, and theaccount 418 is a payment provider account. In various circumstances, thePIP 412 may determine the account 418 may utilize the phone number data448 to provide services for the user, such as sending the user textmessage notifications regarding the user account 418. Further, the PIP412 may determine the account 414 may utilize the image data 446 tocreate the user's profile of the account 416, possibly for networkingpurposes. Yet, the PIP 412 may determine that the account 416 has notutilized the image data 446 for any services provided to the user. Assuch, the PIP 412 may remove the image data 446 from being provided withthe account 416. Yet further, the PIP 412 may remove the image data 446based on one or more user inputs 444 received by the graphical userinterface 404, possibly including touch inputs to the GUI 404.

As noted, the machine-readable instructions may be executable to causethe machine, such as the smartphone system 400, to perform furtheroperations. The operations may include determining a number of requestsfrom one or more entities. For example, referring back to FIG. 3, theone or more entities may include the one or more entities 324, 326,and/or 328, and/or other entities that request data from users. In someinstances, the one or more entities may request for access to the numberof data entries 422-438 and/or 446-448 associated with the user.Further, the operations may include determining, based at least on thepersonal information platform 412, whether the number of data entries422-438 is required by the one or more entities.

For example, as noted, it may be determined whether the one or moreentities 324, 326, and/or 328 require the data. Further, it may bedetermined whether the entries 422-438 and/or 446-448 are required toprovide services associated with the user. In some embodiments, theoperations may include determining one or more accesses for the one ormore entities 324, 326, and/or 328. For example, the one or moreaccesses 330, 332, and/or 334 may be provided to the one or moreentities 324, 326, and/or 328, as described above. As such, the numberof data entries 422-438 and/or 446-448 may be accessed based at least onwhether the number of data entries 422-438 and/or 446-448 is required toprovide the services associated with the user.

Notably, the control button 410 may include a fingerprint sensor toauthenticate the user inputs 442 and/or 444. For example, thefingerprint sensor may detect a fingerprint from one or more authorizedusers to authenticate the user's inputs 442 and/or 444. For example, oneor more of the user's fingerprint inputs (e.g., thumb and indexfingerprint inputs) may be provided to the control button 410 toauthenticate the user inputs 442 and/or 444.

In some embodiments, referring back to FIG. 1B, the system 150 mayactivate an application, such as a mobile app on the client device 104,possibly a PIP app to view one or more PIPs of the user. For example,the PIP server 102 may establish a connection with the client device 104over the one or more networks 108, possibly based on one or more callsexchanged with the API server 156. As such, the PIP app may be activatedto display the GUI 404 shown in FIGS. 4A-4B. Further, the app may beactivated to alert the user with the one or more notifications and/orsuggestions, such as to modify and/or remove accesses. For example, onenotification may suggest that the image data 446 may be restrictedand/or removed from being provided with the account 416.

FIG. 4C illustrates a personal information platform (PIP) system 460,according to another embodiment. As shown, the PIP system 460 manages,maintains, and/or supports data 422-438 and/or 446-448. Further, the PIP412 may also take the form of a data pipeline such as the PIP 304described above in relation to FIG. 3. As such, the PIP 412 manages orcontrols the data 422-438 and/or 446-448 that comes into the datapipeline and the data 422, 426-438, and 446 shown in this example comingout of the data pipeline, among other data contemplated withillustration of the ellipses.

Also shown are the user inputs 448 and/or 450. In particular, considerthe user inputs 448 and/or 450 to the graphical user interface 404described above in relation to FIGS. 4A-4B. In some instances, the userinputs 442 and/or 444 may be inputs to the data pipeline of the PIP 412,possibly also affecting the data 422, 426-438, and 446 coming out of thedata pipeline. For example, the PIP 412 may remove the demographic data424 from being provided with the account 414. As shown, the image data446 may be provided with the account 414. Yet further, the PIP 412 mayremove the image data 446 from being provided with the account 416 basedon the user input 444. As such, the PIP 412 may add, remove, and/orchange the data 422-438 and/or 446-448 provided with the accounts 414,416, and/or 418.

In some embodiments, a feedback loop 462 may also be provided. Forexample, one or more additions, changes, and/or modifications to thedata 422-438 and/or 446-448 may be generated from the accounts 414, 416,and/or 418. In another scenario, a user may update their profile in theaccount 414, possibly uploading additional images to the profile. Asshown, for example, the image data 446 may be provided in the feedbackloop 426 to the data 422-438 and/or 446-448 going into the pipeline ofthe PIP 412.

As noted, the machine-readable instructions may be executable to causethe machine, such as the smartphone system 400, to perform furtheroperations. The operations may include determining one or more rulesassociated with the number of data entries 422-438 and/or 446-448provided with the one or more accounts 414, 416, and/or 418. Forexample, referring back to FIG. 3, the one or more rules 336 and/or 338may be determined with the number of data entries 422-438 and/or446-448. Further, the operations may include determining one or moretransfers of the number of data entries 422-438 and/or 446-448 from theone or more accounts 414, 416, and/or 418 based at least on the one ormore of rules.

FIG. 5A illustrates the exemplary system 500 with the client device 502,according to another embodiment. The system 500, possibly referred to asmartphone system 500, may include aspects of the system 400 describedabove in relation to FIGS. 4A-4B. For example, the smartphone system 500may include the client device 502, a graphical user interface 504, aspeaker/microphone 506, a side button 508, a control button 510, and/ora scroll bar 511 that may take the form of the client device 402, agraphical user interface 404, a speaker/microphone 406, a side button408, a control button 410, and/or a scroll bar 411, respectively.

Further, the GUI 504 may provide the accounts 514, 516, and/or 518 thattake the form of the accounts 414, 416, and/or 418 described above. Yetfurther, the GUI 504 may provide birthdate data 522, demographic data524, and/or the connections data 526 that takes the form of birthdatedata 422, demographic data 424, and/or the connections data 426,respectively. Further, the GUI 504 provides location data 528, contactsdata 530, and/or search or search history data 532 that takes the formof location data 428, contacts data 430, and/or search history data 432,respectively. Yet further, the GUI 504 provides zip code data 534,transaction history data 536, and/or balance data 538 that takes theform of zip code data 434, transaction history data 436, and/or balancedata 438, respectively.

As shown, the GUI 504 also provides notifications 542 and/or 544. Forexample, the notification 542 provides that the entity 546 wishes toreceive and/or have access to at least a portion of the connections data526 for a value or an amount 548. Notably, the entity 546 may be anonline service provider that wishes to receive the user's connectiondata 526 to identify possible networking connections, professionalnetworking groups, and/or other possible connections identifiable fromthe connections data 526 that may facilitate targeted services and/oradvertisements of the service provider. In some instances, the entity546 may represent a number of entities and/or service providersinterested in at least a portion of the connections data 526 for themarket value or amount 548.

As also shown, the, notification 544 provides that entity 548 wishes toreceive and/or have access to at least a portion of the location data528 for a value or an amount 550. Notably, the entity 548 may be aprovider of mobile apps and/or online entity that wishes to receive theuser's smartphone location data 528 to transmit targeted offers and/oradvertisements based on location. In some instances, the entity 546 mayrepresent a number of entities and/or service providers interested in atleast a portion of the location data 528 for the market value or amount550.

In some instances, the amounts 548 and/or 550 may be based on one ormore arbitration models, possibly taking into account intrinsic valuesof the user, extrinsic values of the entities 546 and/or 548, andpossibly a combination of these values, as described above. In someinstances, the notifications 542 and/or 544 may each provide a level oftrust associated with providing the connections data 526 to the entity546 and the location data 528 to the entity 548, respectively. Yetfurther, the PIP 512 may provide the notifications 542 and/or 544 withvarious details of the entities 546 and/or 548 to further determinewhether to approve requests from the entities 546 and/or 548 for thedata 526 and/or 528, respectively.

As noted, the machine-readable instructions may be executable to causethe machine, such as the smartphone system 500, to perform furtheroperations. For example, the operations may include determining a value548 for the data entry 526 from the number of data entries 522-538 basedat least on one or more entities 546 interested in the data entry 526.Further, the indication of the PIP 512 may be displayed to furtherindicate the value 548 for the at least one data entry 526. Further, theoperations may include receiving an indication to transfer the dataentry 526 to the one or more entities 546 for a fee for the value 548based at least on one or more touch inputs from the user. Yet further,the operations may include causing the indication PIP 512 displayed tofurther indicate details of the transfer of the data entry 526 to theone or more entities 546.

FIG. 5B illustrates the exemplary system 400 with the client device 502,according to another embodiment. As described above, the system 500 maybe referred to as the smartphone system 500. As shown, the graphicaluser interface (GUI) 504 may provide the indication of the personalinformation platform (PIP) 512. Yet further, the data entries 522-538may be provided in a list format, possibly with other data entries ascontemplated with the ellipses. In addition, each data entry may beprovided with at least one account from the accounts 514, 516, and/or518, among other possible accounts. Further, each data entry may beprovided with a value metric that indicates a market value for theentry, such as the values 548 and/or 550. Yet further, each data entrymay be provided by a trust indicator based on the one or more accounts514, 516, and/or 518 provided with each data entry.

As shown, the indication of the PIP 512 in the GUI 504 provides theentity 546 provided with access to the connections data 526 for thevalue 548, possibly with a rule 560. For example, the rule 560 may besimilar to the rule 336 described above in relation to FIG. 3, where theentity 546 has access to a particular subset of the connections data526, possibly without access to other subsets of the connections data526. Further, the indication of the PIP 512 provides the entity 548provided with access to the location data 528 for the value 550,possibly based on a rule 562. For example, the rule 560 may be similarto the rule 338 described above. Notably, the rules 560 and/or 562 mayor may not affect the values 546 and/or 548, possibly based on therestrictions and/or limitations of the rules 560 and/or 562.

It should be noted that each of the data entries 522-538 possibly shownare based on the position of the scroll bar 520. Further, as noted, eachentry may also be provided with level of trust associated with each dataentry. For example, the level of trust for each entry may indicatewhether the one or more accounts 514, 516, and/or 518 provided with thedata entry is trusted with each particular data. As noted, themachine-readable instructions may be executable to cause the machine,such as the smartphone system 500, to perform further operations. Insome instances, the operations may include generating a report cardassociated with the personal information platform 512 on a periodicbasis. Further, the operations may include causing the client device 502to display the report card on the periodic basis, where the report carddisplayed indicates a level of trust for each of the number of dataentries 522-538. For example, the report card may display the level oftrust based at least on the one or more accounts 514, 516, and/or 518provided with the number of data entries 522-538.

As shown in FIG. 5B, an indication of the report card 552 is provided.In particular, the balance 554 may indicate the values 548 and/or 550accumulated based on transferring the connections data 526 and/or thelocation data 528. Yet, as noted, the values 548 and/or 550 may reflectvalues received based on use, possibly each time the entities 546 and/or548 use the data 526 and/or 528, respectively. Further, the trust level556 may indicate one or more levels of trust associated with the dataentries 522-538 provided with the accounts 514, 516, and/or 518, and/orthe entities 546 and/or 548. Yet further, the privacy level 558 mayindication one or more levels of privacy associated the data entries522-538 provided with the accounts 514, 516, and/or 518, and/or theentities 546 and/or 548.

As such, considering the scenarios of the more conservative user and themore experimental user, the report card 552 may facilitate user to helpgauge their positions with the one or more arbitration models. Forexample, the more conservative user may have a lower balance 554 andhigher levels of trust 556 and/or privacy 558. Yet further, the moreexperimental user may have a higher balance 554 and lower levels oftrust 556 and/or privacy 558. In some embodiments, the operations mayinclude generating the report card 552 associated with the personalinformation platform 512 based on the transfer of the data entries 526and/or 528 to the one or more entities 546 and/or 548. The operationsmay also include causing the client device 502 to display the reportcard 552 such that the report card 552 displays a level of trust 556associated with the transfer of the data entries 526 and/or 528 to theone or more entities 546 and/or 548.

FIG. 6 illustrates an exemplary method 600, respectively, according toan embodiment. Notably, one or more steps of the method 600 describedherein may be omitted, performed in a different sequence, and/orcombined with other methods for various types of applicationscontemplated herein.

As shown in FIG. 6, at step 602, the method 600 may include receiving arequest for user data from one or more entities able to provide a numberof services for a user. For example, referring back to FIGS. 5A and 5B,the request may be received in the form of the notifications 542 and/or544. In particular, the one or more entities 546 and/or 548 may requestfor the user data, including the connections data 526 and/or thelocation data 528. Yet, for purposes of illustration, the one or moreentities 546 and/or 548 may request for the data 522-538.

At step 604, in response to receiving the request, the method 600 mayinclude determining a number of data entries associated with a personalinformation platform of the user. For example, the number of dataentries 522-538 may be determined to be associated with the PIP 512 ofthe user.

At step 606, the method 600 may include determining one or more dataentries from the number of data entries based at least on one or moreservices provided for the user, where the one or more services isdetermined from the number of services available to the user. Forexample, the one or more data entries, including the connections data526 and/or the location data 528, may be determined from the dataentries 522-538 based at least on one or more services provided for theuser.

At step 608, the method 600 may include causing a client device todisplay an indication of the personal information platform, where theindication displays the one or more data entries determined from thenumber of data entries based at least on the one or more servicesprovided for the user. For example, the indication of the PIP 512 may bedisplayed with the connections data 526 and/or the location data 528determined from the data entries 522-538 based at least on the one ormore services provided for the user.

Notably, in some instances, the user may request and/or select the oneor more services from the number of services available to the user. Assuch, the method 600 may include determining the one or more dataentries 526 and/or 528 is required by the one or more entities 546and/or 548 to provide or carry out the one or more services requestedand/or selected by the user. As such, the one or more entities 546and/or 548 may include the minimum number of data entries, such as theconnections data 526 and/or the location data 528, to carry out the oneor more services. Thus, the one or more data entries 526 and/or 528 maybe determined based at least on determining the one or more data entries526 and/or 528 is required by the one or more entities 546 and/or 548.

In some embodiments, the indication of the PIP 512 may be displayed onthe graphical user interface 504 of the client device 502 configured toreceive one or more user inputs. As such, in some instances, the method600 may further include determining accesses of the one or more entities546 and/or 548. For example, referring back to FIG. 3 the accesses 330,332, and/or 334 may be determined for entities, such as the one or moreentities 546 and/or 548. As such, the one or more entities 546 and/or548 may have such accesses to the one or more data entries 526 and/or528, possibly based on the one or more user inputs to the GUI 504.

In some embodiments, the method 500 may include determining a value 550for the data entry 528 from the one or more data entries 546 and/or 548based at least on the one or more entities 546 and/or 548 interested inthe data entry 528. In some instances, the indication of the PIP 512 maybe displayed to further provide the value 550 for the data entry 528.

In some embodiments, the method 500 may include determining a secondvalue for the data entry 528 based on one or more second entitiesinterested in the one data entry 528. For example, there may be other(second) entities also interested in the location data 528. As such, theindication of the PIP 512 may be displayed to further provide the secondvalue.

In some embodiments, the method 500 may include generating a portion ofthe report card 552 associated with the personal information platform512 based on the value 550 for the data entry 528. Further, the method500 may include causing the client device 502 to display the portion ofthe report card 552. In some instances, the report card indicates alevel of trust 556 associated with a transfer of the data entry 528 tothe one or more entities 548 for the value 550 determined.

FIG. 7 illustrates an exemplary system 700 with a client device 702,according to an embodiment. As shown, the client device 702 may take theform of the client device 402 and/or 502 described above in relation toFIGS. 4A-5B. For example, the client device 702 may include a graphicaluser interface (GUI) 704 that takes the form of the graphical userinterface 404 and/or 504. Further, the GUI 704 may provide the PIP 512described in relation to FIGS. 5A-6. Yet further, the GUI 704 mayprovide the data 522-538 and/or the accounts 514, 516, and/or 518.

As shown, the client device 702 may be in a location 720 shown on thegeographical map 710, shown for illustrative purposes. For example, theclient device 702 may be proximate to the entities 712, 714, 716, and/or718 shown on the geographic map 720 as buildings or stores. Inparticular, the client device 702 may be at a location 720 within thebuilding of the entity 716. In some instances, the one or more hardwareprocessors (e.g., the processor 134) of the client device 702 may beconfigured to determine the location 730, possibly based on globalpositioning system (GPS) coordinates of the client device 702.

In some instances, the one or more hardware processors (e.g., processors112 and/or 232) of the smartphone system 700 may determine the location720 by retrieving data from the client device 702. For example, thelocation 720 may be determined by cellular protocol data, including GSM,CDMA, UMTS, EV-DO, WiMAX, or LTE data, and/or base station data, amongother forms of data possibly available from the PIP 512. In addition,the location 720 may be further determined by sensor data, movement data(e.g., acceleration and/or velocity data) of the client device 702,temperature data, radio-frequency identifier (RFID) data, near-fieldcommunications (NFC) data, among other possible forms of data availablefrom the PIP 512.

As also shown, the portion of the PIP 512 may provide a notification 708that indicates the entity 716 wants the user's email 722 for a value724. For example, the PIP 512 may provide the notification 708 based ona request received by the entity 716. Further, the PIP 512 may providethe notification 708 based on the user's location 720 being within thestore of the entity 716, probably indicating the user's interest in theentity 716 and/or the services or products provided by the entity 716.As such, the user may accept the request in the notification 708 and theuser's email 722 may be transferred to the entity 716 for the value 724.

In some instances, the notification 708 may be further customized. Forexample, the notification 708 may include customized alerts based oncertain access thresholds and/or geographical locations. In particular,the alerts may be configured to indicate an entity from another countryor region is requesting the user's email 722, e.g., someone in Africa orEurope is requesting to access the user's email 722. Further, the alertsmay be configured such that entities located a given radius or athreshold radius from the location 720 may be blocked by the PIP 512from making such requests. The customization may be provided by the PIP512 and/or by the user through one or more control mechanisms of the GUI704, such as user inputs to the GUI 704.

FIG. 8 illustrates an exemplary wearable computing device 800, accordingto an embodiment. As illustrated, the wearable computing device 800 maytake the form of a smart watch. Further, the device 800 may include agraphical user interface (GUI) 804 that may include a smaller version ofthe GUIs 404 and/or 504. As shown, the GUI 804 may provide the personalinformation platform (PIP) 512 as described above. Further, the GUI 804may provide a notification that, as noted above, indicates the entity716 wants the user's email 722 for a value 724.

Further, the wearable computing device 800 may include a wrist band 806that secures around a user's wrist 802. In addition, the wearablecomputing device 800 may include a number of buttons 808 configured tocontrol the GUI 804 and/or sensors 810. The sensors 810, possiblylocated on the inside surfaces of the wrist band 806, may be configuredto receive a number of inputs associated with the user. For example, theone or more sensors 810 may include accelerometers, gyroscopes,compasses, barometers, capacitive sensors, haptic sensors, temperaturesensors, ambient light sensors, sound sensors, image sensors, biometricsensors, moisture sensors, electrodes, and/or chemical sampling sensors,among other types of sensors to receive inputs directly and/orindirectly from the user. As such, the PIP 504 may provide notificationsfrom various entities based on detecting movements, activities, and/orvarious biometrics of the user.

The present disclosure, the accompanying figures, and the claims are notintended to limit the present disclosure to the example embodimentsdisclosed. As such, it is contemplated that various alternateembodiments and/or modifications to the embodiment disclosed, whetherexplicitly described or implied herein, are possible in light of thedisclosure and/or the figures. Having thus described embodiments of thepresent disclosure, persons of ordinary skill in the art will recognizethat changes may be made to the embodiments disclosed without departingfrom the scope of the present disclosure.

The invention claimed is:
 1. A system, comprising: a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising: determining, based on a request from a first entity, a first access policy for providing data access to the first entity, wherein the first access policy specifies a set of data corresponding to a set of data types associated with a user to be accessible by the first entity; analyzing a utilization by the first entity of data of a first data type; determining that the data of the first data type is not required by the first entity for providing a service to the user based on the analyzing; and in response to determining that the data of the first data type is not required by the first entity, modifying the first access policy to exclude data of the first data type from the set of data accessible by the first entity.
 2. The system of claim 1, wherein the operations further comprise: analyzing an interaction between the user and an interface provided by the first entity; determining, based on the analyzing the interaction, that second data of a second data type is required by the first entity for providing the service to the user; and in response to determining that the second data of the second data type is required by the first entity, modifying the first access policy to include the second data of the second data type in the set of data accessible by the first entity.
 3. The system of claim 1, wherein the analyzing comprises accessing one or more websites associated with the first entity.
 4. The system of claim 1, wherein the analyzing comprises monitoring user interactions between the user and one or more websites associated with the first entity.
 5. The system of claim 1, wherein the operations further comprise: presenting, on a user device of the user, a notification indicating that the data of the first data type is accessible by first entity but is not utilized by the first entity.
 6. The system of claim 1, wherein the service provided by the first entity comprises at least one of an e-mail service, an electronic payment service, a social media service, or an item fulfillment service.
 7. The system of claim 1, wherein the operations further comprise: analyzing a utilization by the first entity of second data of the second data type associated with the user; and determining a monetary value of the second data based on the analyzing the utilization by the first entity of the second data of the second data type.
 8. A method, comprising: receiving, by one or more hardware processors, a request for accessing a set of data corresponding to a set of data types associated with a user by a first entity; determining, by the one or more hardware processors, a first access policy for providing data access to the first entity, wherein the first access policy specifies a set of data corresponding to a set of data types associated with a user to be accessible by the first entity; analyzing, by the one or more hardware processors, a utilization by the first entity of the set of data; and modifying, by the one or more hardware processors, the first access policy for the first entity based on the analyzing.
 9. The method of claim 8, wherein the modifying comprises removing a subset of data from the set of data to be accessible by the first entity.
 10. The method of claim 8, wherein the modifying comprises adding data corresponding to a data type not included in the set of data types to the set of data to be accessible by the first entity.
 11. The method of claim 8, wherein the analyzing comprises accessing one or more websites associated with the first entity.
 12. The method of claim 8, wherein the analyzing comprises monitoring user interactions between the user and one or more websites associated with the first entity.
 13. The method of claim 8, further comprising: receiving, from a user device associated with the user, one or more inputs indicating a change of the first access policy, wherein the modifying the first access policy is further based on the one or more inputs.
 14. The method of claim 8, further comprise: presenting, on a user device associated with the user, a report indicating one or more data accesses of the first entity to the set of data.
 15. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising: determining, based on a request from a first entity, a first access policy for providing data access to the first entity, wherein the first access policy specifies a set of data corresponding to a set of data types associated with a user to be accessible by the first entity; analyzing a utilization by the first entity of data of at least a first data type in the set of data types for providing a service to the user; and modifying the first access policy based on the analyzing.
 16. The non-transitory machine-readable medium of claim 15, wherein the operations further comprise: determining a plurality of rules associated with third-party access of data of a first data type, wherein the modifying the first access policy is further based on the plurality of rules and comprises a restriction of access to the data of the first data type by the first entity.
 17. The non-transitory machine-readable medium of claim 15, wherein the operations further comprise: determining a second access policy for providing data access to a second entity, wherein the second access policy specifies a second set of data corresponding to a second set of data types associated with a user to be accessible by the second entity; analyzing a utilization by the second entity of data of a second data type in the second set of data types; and modifying the second access policy based on the analyzing the utilization by the second entity of data of the second data type.
 18. The non-transitory machine-readable medium of claim 15, wherein the operations further comprise: monitoring data access by the first entity to the set of data; and presenting, on a user device associated with the user, a report indicating one or more data accesses of the first entity to the set of data based on the monitoring.
 19. The non-transitory machine-readable medium of claim 15, wherein the modifying comprises removing the data of the first data type from the set of data to be accessible by the first entity.
 20. The non-transitory machine-readable medium of claim 15, wherein the modifying comprises adding data corresponding to a data type not included in the set of data types to the set of data to be accessible by the first entity. 