Multicomputer processing of user data with centralized event control

ABSTRACT

Aspects of the disclosure relate to multicomputer processing of data from social media service computing platforms and other sources with centralized event control. An event control computing platform may receive information from one or more social media service computing platforms. Subsequently, the event control computing platform may identify, based on the received information, whether a change should be made to user data associated with a user identifiable by the received information. If the information indicates that a change should be made to the user data, then the event control computing platform may extract metadata from the received information to verify the accuracy of the received information. When the metadata verifies the accuracy of the received information, the event control computing platform may generate a command configured to cause a change to the user data and then may transmit the generated command to an event validation computing platform.

BACKGROUND

Aspects of the disclosure relate to electrical computers, digitalprocessing systems, and multicomputer data processing. In particular,one or more aspects of the disclosure relate to enabling multicomputerprocessing of data from social media service computing platforms withcentralized event control.

As computer systems are increasingly utilized to provide automated andelectronic services, such computer systems may obtain and maintainincreasing amounts of various types of sensitive information, andensuring the safety, security, and accuracy of this information may beincreasingly important. In many instances, however, it may be difficultto ensure the safety and security of such information while alsooptimizing the efficient and effective technical operations of thecomputer systems that process such information and/or provide suchautomated and electronic services.

SUMMARY

Aspects of the disclosure provide effective, efficient, scalable, andconvenient technical solutions that address and overcome the technicalproblems associated with providing information security and optimizingthe efficient and effective technical operations of computer systems. Inparticular, one or more aspects of the disclosure provide techniques forprocessing user data using multicomputer data processing technology andcentralized event control to improve information security and enhancetechnical performance.

In accordance with one or more embodiments, an event control computingplatform having at least one processor, a memory, and a communicationinterface may establish, via the communication interface, a plurality ofconnections to a plurality of social media service computing platforms.While the plurality of connections is established, the event controlcomputing platform may receive first information from at least one ofthe plurality of social media service computing platforms. Subsequently,the event control computing platform may identify, based on the firstinformation, whether a change should be made to user data associatedwith a first subordinate user identifiable by the first information.Then the event control computing platform may determine that the firstinformation indicates that a change should be made to the user data.Next, the event control computing platform may extract metadata from thefirst information to verify accuracy of at least one aspect of the firstinformation. Subsequently, the event control computing platform maydetermine that the metadata verifies the accuracy of the at least oneaspect of the first information. Next, the event control computingplatform may generate a command configured to cause the change to theuser data. Finally, the event control computing platform may transmit,via the communication interface, the command to an event validationcomputing platform.

In some embodiments, the event control computing platform may transmit,via the communication interface, to a first subordinate user computingdevice associated with the first subordinate user, a first notificationof the change to the user data. In other embodiments, the event controlcomputing platform may transmit, prior to sending the command configuredto cause the change to the user data, to a supervisory user computingdevice associated with a supervisory user, a request for authorizing thechange to the user data. In further aspects, the event control computingplatform may transmit, via the communication interface, to thesupervisory user computing device associated with the supervisory user,a second notification of the change to the user data.

Further still, the event control computing platform may reprogramfunctionality of the event control computing platform, using a machinelearning engine, to alter a condition under which the user data ischanged. In some embodiments, the event control computing platform mayreprogram functionality of the event control computing platform, usingthe machine learning engine, such that the condition under which theuser data is changed is based on a distance that the first subordinateuser is located away from a residence of the first subordinate user. Inother embodiments, the event control computing platform may reprogramfunctionality of the event control computing platform, using the machinelearning engine, such that the condition under which the user data ischanged is based on a number of other individuals with which the firstsubordinate user is travelling. In other embodiments, the event controlcomputing platform may reprogram functionality of the event controlcomputing platform, using the machine learning engine, such that thecondition under which the user data is changed is based on additionalinformation received from the plurality of social media servicecomputing platforms. The additional information may relate to aplurality of other subordinate users identifiable by the additionalinformation. In other embodiments, the event control computing platformmay reprogram functionality of the event control computing platform,using the machine learning engine, such that the condition under whichthe user data is changed is based on the additional information receivedabout the plurality of other subordinate users that are similar to thefirst subordinate user.

In some embodiments, determining that the metadata verifies the accuracyof the at least one aspect of the first information may comprisedetermining that the metadata verifies the accuracy of a location of thefirst subordinate user. In other aspects, the event control computingplatform may determine that a warning message should be transmitted tothe first subordinate user regarding a future event.

In some aspects, the event control computing platform may determine if athreshold associated with the user data will be exceeded and maytransmit, via the communication interface, the command configured tocause the change to the user data to the event validation computingplatform if the threshold will be exceeded.

In some aspects, receiving the first information from the at least oneof the plurality of social media service computing platforms comprisesreceiving the first information from the at least one of the pluralityof social media service computing platforms in real time.

These features, along with many others, are discussed in greater detailbelow.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of example and not limitedin the accompanying figures in which like reference numerals indicatesimilar elements and in which:

FIGS. 1A and 1B depict an illustrative computing environment forvalidating and controlling events executed across multiple computingplatforms and devices in accordance with one or more exampleembodiments;

FIGS. 2A-2D depict an illustrative event sequence for multicomputerprocessing of user data with centralized event control in accordancewith one or more example embodiments;

FIG. 3 depicts an example graphical user interface to obtainauthorization for making a change to user data associated with asubordinate user in accordance with one or more example embodiments;

FIG. 4 depicts an example warning message transmitted from an eventcontrol computing platform indicating a product recall in accordancewith one or more example embodiments; and

FIG. 5 depicts an illustrative method for multicomputer processing ofuser data with centralized event control in accordance with one or moreexample embodiments.

DETAILED DESCRIPTION

In the following description of various illustrative embodiments,reference is made to the accompanying drawings, which form a parthereof, and in which is shown, by way of illustration, variousembodiments in which aspects of the disclosure may be practiced. It isto be understood that other embodiments may be utilized, and structuraland functional modifications may be made, without departing from thescope of the present disclosure.

It is noted that various connections between elements are discussed inthe following description. It is noted that these connections aregeneral and, unless specified otherwise, may be direct or indirect,wired or wireless, and that the specification is not intended to belimiting in this respect.

Aspects of the disclosure relate to changing user data in response toinformation received from one or more social media service computingplatforms. In some embodiments, the information from the social mediaservice computing platforms may first be validated before action istaken to change the user data.

FIGS. 1A and 1B depict an illustrative computing environment forvalidating and controlling events executed across multiple computingplatforms and devices in accordance with one or more exampleembodiments. Referring to FIG. 1A, computing environment 100 may includeone or more computer systems, one or more computer networks, and/orother computing infrastructure. For example, computing environment 100may include an event control computing platform 110, an event validationcomputing platform 120, an administrative computing device 130, aprivate network 140, a public network 150, a first social media servicecomputing platform 160, a second social media service computing platform170, a data feed aggregation server 180, a supervisory user computingdevice 190, and a subordinate user computing device 195.

As discussed in greater detail below, event control computing platform110 may include one or more computing devices configured to perform oneor more of the functions described herein. For example, event controlcomputing platform 110 may include one or more computers (e.g., laptopcomputers, desktop computers, servers, server blades, or the like) thatare configured to orchestrate event validation operations and eventcontrol operations across multiple computer systems and devices incomputing environment 100.

Event validation computing platform 120 may include one or morecomputing devices configured to validate events based on event datareceived from event control computing platform 110 and/or from othersources. For example, event validation computing platform 120 mayreceive, from event control computing platform 110 and/or one or moreother systems, event information defining one or more events to beexecuted in computing environment 100, and event validation computingplatform 120 subsequently may authorize and/or otherwise validate theone or more events to be executed in computing environment 100, so as toallow the events to proceed and/or otherwise be executed. In someinstances, the one or more events may correspond to one or morefinancial transactions that have been requested by one or more computingdevices, such as supervisory user computing device 190 and/orsubordinate user computing device 195, and event validation computingplatform 120 may evaluate and/or selectively authorize the requestedtransactions based on information stored and/or maintained by eventvalidation computing platform 120 (e.g., such as financial accountinformation, account balance information, transaction historyinformation, and/or account rules) and/or based on information receivedfrom event control computing platform 110 (e.g., such as user-specifictransaction rules, account-specific transaction rules, user-specifictrends information, user-segment trends information, and/or otherinformation) and/or one or more other systems.

Administrative computing device 130 may be a desktop computer, laptopcomputer, workstation, or other computing device that is configured tobe used by an administrative user, such as a network administratorassociated with an organization operating event control computingplatform 110 and/or event validation computing platform 120.

Social media service computing platform 160 may include one or morecomputing devices configured to host a first social media service (whichmay, e.g., be provided by an organization different from theorganization operating event control computing platform 110 and/or eventvalidation computing platform 120). In some instances, social mediaservice computing platform 160 may maintain user profile information forvarious users of the first social media service, provide user interfacesassociated with the first social media service to various user devices(e.g., supervisory user computing device 190, subordinate user computingdevice 195), and provide activity feed data to other systems and/ordevices included in computing environment 100, such as event controlcomputing platform 110, event validation computing platform 120, datafeed aggregation server 180, and/or the like. For instance, social mediaservice computing platform 160 may, in some arrangements, provideactivity feed data (e.g., such as user-specific image data,user-specific geolocation data, user-specific likes data, and/or otheruser-specific data) to event control computing platform 110 to enableone or more functions provided by event control computing platform 110(e.g., such as social-media-enabled financial-transaction functions).

Social media service computing platform 170 may include one or morecomputing devices configured to host a second social media service(which may, e.g., be provided by an organization different from theorganization operating event control computing platform 110 and/or eventvalidation computing platform 120). Additionally, the second socialmedia service may be different from the first social media service(e.g., the second social media service may be provided by anorganization different from the organization providing the first socialmedia service). In some instances, social media service computingplatform 170 may maintain user profile information for various users ofthe second social media service, provide user interfaces associated withthe second social media service to various user devices (e.g.,supervisory user computing device 190, subordinate user computing device195), and provide activity feed data to other systems and/or devicesincluded in computing environment 100, such as event control computingplatform 110, event validation computing platform 120, data feedaggregation server 180, and/or the like. For instance, social mediaservice computing platform 170 may, in some arrangements, provideactivity feed data (e.g., such as user-specific image data,user-specific geolocation data, user-specific likes data, and/or otheruser-specific data) to event control computing platform 110 to enableone or more functions provided by event control computing platform 110(e.g., such as social-media-enabled financial-transaction functions).

Data feed aggregation server 180 may include one or more computingdevices configured to aggregate data feeds from various source systems(e.g., social media service computing platform 160, social media servicecomputing platform 170, and/or other sources) and/or communicate datafeeds to various destination systems (e.g., event control computingplatform 110). In some instances, data feed aggregation server 180 mayreceive social media activity feed data from various social mediaplatforms (e.g., social media service computing platform 160, socialmedia service computing platform 170), merchant offer data from variousmerchant platforms (e.g., defining one or more merchant-specific offersthat may be redeemable by customers at such merchants), and/or otheractivity data and/or content from other sources, and data feedaggregation server 180 may aggregate any and/or all of the received datato produce an aggregated data feed. Subsequently, data feed aggregationserver 180 may communicate and/or otherwise provide the aggregated datafeed to one or more destination systems, such as event control computingplatform 110, so as to enable one or more functions provided by eventcontrol computing platform 110 (e.g., such as social-media-enabledfinancial-transaction functions). In some instances, the aggregated datafeed may be communicated by data feed aggregation server 180 to eventcontrol computing platform 110 via a secure and/or encryptedcommunications link established between event control computing platform110 and data feed aggregation server 180. In other instances, data feedsmay be separately communicated from each of platforms 160, 170 toplatform 110 via multiple secure and/or encrypted communications linksestablished between platforms 160, 170 and platform 110.

Supervisory user computing device 190 may be a desktop computer, laptopcomputer, workstation, or other computing device that is configured tobe used by a supervisory user. Subordinate user computing device 195 maybe a desktop computer, laptop computer, workstation, or other computingdevice that is configured to be used by a subordinate user. In somearrangements, the supervisory user may be a parent and the subordinateuser may be a teen or other minor supervised by the parent. Forinstance, the user of supervisory user computing device 190 may utilizesupervisory user computing device 190 to define one or more rules (e.g.,such as spending limits, transaction approval conditions, and/or thelike) for the user of subordinate user computing device 195. Inaddition, as the user of subordinate user computing device 195 utilizessubordinate user computing device 195 and/or one or more other systemsand/or devices to request transactions, event control computing platform110 and/or event validation computing platform 120 may selectivelyauthorize such transactions based on rules received from supervisoryuser computing device 190 and/or defined by the user of supervisory usercomputing device 190 and/or based on other factors and/or rules.

Computing environment 100 also may include one or more networks, whichmay interconnect one or more of event control computing platform 110,event validation computing platform 120, administrative computing device130, social media service computing platform 160, social media servicecomputing platform 170, data feed aggregation server 180, supervisoryuser computing device 190, and subordinate user computing device 195.For example, computing environment 100 may include private network 140,which may be owned and/or operated by a specific organization and/orwhich may interconnect one or more systems and/or other devicesassociated with the specific organization. For example, event controlcomputing platform 110, event validation computing platform 120, andadministrative computing device 130 may be owned and/or operated by aspecific organization, such as a financial institution, and privatenetwork 140 may interconnect event control computing platform 110, eventvalidation computing platform 120, administrative computing device 130,and one or more other systems and/or devices associated with theorganization. Additionally, private network 140 may connect (e.g., viaone or more firewalls) to one or more external networks not associatedwith the organization, such as public network 150. Public network 150may, for instance, include the internet and may connect various systemsand/or devices not associated with the organization operating privatenetwork 140. For example, public network 150 may interconnect socialmedia service computing platform 160, social media service computingplatform 170, data feed aggregation server 180, supervisory usercomputing device 190, subordinate user computing device 195, and/orvarious other systems and/or devices.

In some arrangements, the computing devices that make up and/or areincluded in event control computing platform 110, event validationcomputing platform 120, administrative computing device 130, socialmedia service computing platform 160, social media service computingplatform 170, data feed aggregation server 180, supervisory usercomputing device 190, and subordinate user computing device 195 may beany type of computing device capable of receiving a user interface,receiving input via the user interface, and communicating the receivedinput to one or more other computing devices. For example, the computingdevices that make up and/or are included in event control computingplatform 110, event validation computing platform 120, administrativecomputing device 130, social media service computing platform 160,social media service computing platform 170, data feed aggregationserver 180, supervisory user computing device 190, and subordinate usercomputing device 195 may, in some instances, be and/or include servercomputers, desktop computers, laptop computers, tablet computers, smartphones, or the like that may include one or more processors, memories,communication interfaces, storage devices, and/or other components. Asnoted above, and as illustrated in greater detail below, any and/or allof the computing devices that make up and/or are included in eventcontrol computing platform 110, event validation computing platform 120,administrative computing device 130, social media service computingplatform 160, social media service computing platform 170, data feedaggregation server 180, supervisory user computing device 190, andsubordinate user computing device 195 may, in some instances, bespecial-purpose computing devices configured to perform specificfunctions.

Referring to FIG. 1B, event control computing platform 110 may includeone or more processor(s) 111, memory(s) 112, and communicationinterface(s) 113. A data bus may interconnect processor(s) 111,memory(s) 112, and communication interface(s) 113. Communicationinterface(s) 113 may be one or more network interfaces configured tosupport communications between event control computing platform 110 andone or more networks (e.g., private network 140, public network 150).For example, event control computing platform 110 may establish one ormore connections and/or communication links to one or more other systemsand/or devices (e.g., event validation computing platform 120,administrative computing device 130, social media service computingplatform 160, social media service computing platform 170, data feedaggregation server 180, supervisory user computing device 190, andsubordinate user computing device 195) via communication interface(s)113, and event control computing platform 110 may exchange data with theone or more other systems and/or devices (e.g., event validationcomputing platform 120, administrative computing device 130, socialmedia service computing platform 160, social media service computingplatform 170, data feed aggregation server 180, supervisory usercomputing device 190, and subordinate user computing device 195) viacommunication interface(s) 113 while the one or more connections and/orcommunication links are established. Memory(s) 112 may include one ormore program modules having instructions that when executed byprocessor(s) 111 cause event control computing platform 110 to performone or more functions described herein and/or one or more databases thatmay store and/or otherwise maintain information which may be used bysuch program modules and/or processor(s) 111. In some instances, the oneor more program modules and/or databases may be stored by and/ormaintained in different memory units of event control computing platform110 and/or by different computing devices that may form and/or otherwisemake up event control computing platform 110.

For example, memory(s) 112 b may have, store, and/or include an eventcontrol module 112 a, an event control database 112 b, a connectionmanagement module 112 c, and a machine learning engine 112 d. Eventcontrol module 112 a may have, store, and/or include instructions thatdirect and/or cause event control computing platform 110 to orchestrateevent validation operations and event control operations across multiplecomputer systems and devices in computing environment 100 and performother associated functions, as discussed in greater detail below. Eventcontrol database 112 b may store information used by event controlcomputing platform 110 in orchestrating event validation operations andevent control operations across multiple computer systems and devices incomputing environment 100 and in performing other associated functions.Connection management module 112 c may have, store, and/or includeinstructions that direct and/or cause event control computing platform110 to establish one or more connections and/or communication links toone or more other systems and/or devices (e.g., event validationcomputing platform 120, administrative computing device 130, socialmedia service computing platform 160, social media service computingplatform 170, data feed aggregation server 180, supervisory usercomputing device 190, and subordinate user computing device 195) viacommunication interface(s) 113 and/or to manage and/or otherwise controlthe exchanging of data with the one or more other systems and/or devices(e.g., event validation computing platform 120, administrative computingdevice 130, social media service computing platform 160, social mediaservice computing platform 170, data feed aggregation server 180,supervisory user computing device 190, and subordinate user computingdevice 195) via communication interface(s) 113 while the one or moreconnections and/or communication links are established. Machine learningengine 112 d may have, store, and/or include instructions that directand/or cause event control computing platform 110 to dynamically analyzedata collected by event control computing platform 110 based onhistorical data sets and/or present operations and automaticallyoptimize the functions provided by event control computing platform 110based on analyzing such data.

FIGS. 2A-2D depict an illustrative event sequence for multicomputerprocessing of user data with centralized event control in accordancewith one or more example embodiments. Referring to FIG. 2A, at step 201,event control computing platform 110 may establish, via communicationinterface 113, a first connection to a first social media servicecomputing platform 160 and in step 202, event control computing platform110 may establish, via communication interface 113, a second connectionto a second social media service computing platform 170. In general,event control computing platform 110 may establish connections to anynumber of social media service computing platforms. In some aspects, adata feed aggregation server 180 may aggregate all of the informationfrom social media service computing platforms 160, 170 and other sourcesprior to processing that information. In one example, event controlcomputing platform 110 may be operated by a financial institution suchas a bank.

Social media service computing platforms 160, 170 may provide one ormore social media feeds with information related to one or more users. Auser may register with social media service computing platforms 160, 170and social media service computing platforms 160, 170 may generate auser account and associated user credentials for logging into the useraccount. When the user enters valid user credentials, social mediaservice computing platforms 160, 170 may provide the user with access toone or more services hosted by social media service computing platforms160, 170. For example, the services hosted by social media servicecomputing platforms 160, 170 may enable the user to receive and transmitmessages to other users, upload pictures, share content of interest, andprovide location information to generate a personalized social mediafeed associated with the user. The services hosted by social mediaservice computing platforms 160, 170 also may enable the user to controlwho has access to the information in his or her personalized socialmedia feed. For example, the user may limit access to user devicesassociated with friends, close acquaintances, or family members. In someexamples, the user may also allow access to user devices associated withusers that do not have an account on social media service computingplatforms 160, 170.

Event control computing platform 110 (and/or associated devices such asadministrative computing device 130) may also have access to a givenuser's social media feed on social media service computing platforms160, 170 through private network 140 and public network 150. This accessmay be provided by the user associated with a given user account orsomeone who supervises the user associated with the user account (e.g.,parent, guardian, or the like). Thus, once event control computingplatform 110 has established connections to social media servicecomputing platforms 160, 170, event control computing platform 110 mayreceive social media information from the first social media servicecomputing platform 160 in step 203 and from the second social mediaservice computing platform 170 in step 204. In addition, event controlcomputing platform 110 may also establish connections to supervisory andsubordinate user computing devices 190, 195 and receive additionalinformation from these devices. Further still, event control computingplatform 110 may receive additional information (e.g., information aboutfinancial transactions made by a given user, or the like) fromadditional sources (e.g., financial accounts) accessible to platform110. Event control computing platform 110 may be specially configured toinclude decryption capabilities to allow the information to betransmitted safely and securely.

In some aspects, event control computing platform 110 may receiveinformation from social media service computing platforms 160, 170 inreal time as data is posted to social media service computing platforms160, 170. In one example, in receiving information in real time, theinformation may be received by platform 110 within two minutes of beingposted to social media service computing platforms 160, 170.

Once event control computing platform 110 receives social mediainformation from social media computing platforms 160, 170, platform 110may identify, based on this information, whether a change should be madeto user data associated with a user identifiable by the receivedinformation. In some aspects, the user identifiable by the receivedinformation may be a subordinate user. Thus, in step 205, event controlcomputing platform 110 may identify, based on the information receivedin steps 203 and 204, whether a change should be made to user dataassociated with the subordinate user identifiable by the receivedinformation. In some aspects, only a part of the information received insteps 203 and 204 may pertain to a given subordinate user, as otherinformation received in steps 203 and 204 may pertain to othersubordinate users and/or supervisory users. Thus, platform 110 mayprocess only a part of the received information to identify whether achange should be made to user data associated with a given subordinateuser.

In other aspects, platform 110 may process information received fromsocial media service computing platforms 160, 170 in view of additionalinformation available to event control computing platform 110. In oneexample, platform 110 may have access to financial records associatedwith the relevant subordinate user and/or associated supervisory user.Thus, in this example, platform 110 may process social media informationin view of this additional financial information to identify whether achange should be made to user data of a given subordinate user.

In one example, event control computing platform 110 may identify, basedon the information received in steps 203 and 204, whether a financiallimit associated with an account of a given subordinate user should beincreased. Event control computing platform 110 may identify that thereceived information indicates that the subordinate user in question isin need of additional financial resources based on a message posted on asocial media feed associated with the subordinate user's social mediaaccount or associated with a social media account of another known to beaccompanying the subordinate user in question. Additionally oralternatively, event control computing platform 110 may determine thatthe received information includes a location of the subordinate user andthat the location of the subordinate user indicates that the subordinateuser is in need of financial resources. This information, in combinationwith financial records associated with the subordinate user in question,may allow platform 110 to further establish that the subordinate user isin need of financial resources.

For example, a subordinate user (e.g., a teenager) may be seeking a cabor a ride-share service ride to return home from a baseball game on aFriday night. The teenager may realize that he lacks the funds necessaryto purchase a ride home and so may post a message on his social mediaaccount. The message may indicate that he is stranded at the sportingevent and that his bank account is low on funds. Alternatively, he maypost a picture of himself standing in front of the baseball stadium witha message that indicates he is in need of money for the ride home. Eventcontrol computing platform 110 may receive the message and/or picture todetermine that the teenager is in need of financial resources. Inparticular, platform 110 may identify, based on the receivedinformation, that funds should be added to the teenager's accountbecause he is stranded at the baseball stadium without a ride home.

In another example, a subordinate user may be travelling (e.g.,overseas, to a summer camp, or the like) and his current line of creditmay be insufficient to meet his needs or may be working improperly.Event control computing platform 110 may flag this situation afteranalyzing the information received from social media service computingplatforms 160, 170. Platform 110 may then be used to transfer funds tothe subordinate user in this situation, such as to a mobile wallet, toallow the subordinate user to retrieve the funds. In addition, platform110 may be used to automatically pre-queue an automated teller machine(ATM) transaction so that the subordinate user can get cash. In each ofthese examples, platform 110 may allow one or both of the supervisoryuser and/or associated subordinate user to opt in to the serviceprovided by platform 110 and provide funds to the subordinate user orother users in case of a detected emergency.

If the information received from social media service computingplatforms 160, 170 does not indicate that a change should be made touser data associated with a given subordinate user, then the process maystop. In step 206, however, event control computing platform 110 maydetermine that the information received from social media servicecomputing platforms 160, 170 indicates that a change should be made touser data associated with the subordinate user in question.

In one example, the change to the user data is a change to a financiallimit of an account associated with the subordinate user in question. Inthis example, platform 110 may identify, based on the receivedinformation from social media service computing platforms 160, 170 alongwith other information (e.g., financial records), whether there is arealistic chance of an event that poses some danger to the subordinateuser in question, such as unavailability of funds when the situationnecessitates those funds (e.g., being stranded with no money for a cab,needing to buy groceries, stuck at a remote location and in need of gas,or the like). In addition, event control computing platform 110 mayidentify, based on the received information, whether a predeterminedthreshold for the funds available to the subordinate user or other useris in danger of being crossed.

Once the determination is made that a change should be made to userdata, event control computing platform 110, in step 207, may extractmetadata from the received information to verify the accuracy of atleast one aspect of the information in step 207. Metadata associatedwith the received information may include any data about the receivedinformation, including data related to a date and time of a social mediaposting, a location at which a posted image was taken, a device withwhich the posted image was taken, a location of a given subordinate userwhen posting to his social media account, an identity of a user accountto which a social media posting was made, and a location from which theuser who posted a social media message logged into his user account,among other things.

Once metadata related to the received information has been extracted,event control computing platform 110 may determine that the metadataverifies the accuracy of various aspects of the received information instep 208. For example, platform 110 may verify a location of asubordinate user based on social media information from social mediaservice computing platforms 160, 170. Such an identification may bebased on various types of information, including a photo tagged withgeolocation data and taken by the subordinate user in question or byanother individual known to be accompanying the subordinate user inquestion. Platform 110 may use metadata associated with the photo toverify where the photo was taken, thus providing one additionalindicator of the location of the subordinate user in question.

In addition, platform 110 may further verify the location of the userfrom an identification of landmarks within a photo posted by the user inquestion or someone known to be accompanying the user in question. Inthis aspect, event control computing platform 110 may include imageprocessing capabilities to extract and identify known landmarks fromreceived image data. Further still, a user may directly identify hislocation via a message posted to his social media feed, or someone knownto be accompanying the user in question may have posted a message thatidentifies the location of the user. Computing platform 110 may thenextract metadata associated with a related photo to corroborate or castdoubt on the stated location of the user in question. If the metadataassociated with the received information casts doubt on the statedlocation of the user in question, then event control computing platform110 may take other steps, including attempting to verify the location ofa given subordinate user by contacting an associated supervisory user.

Similarly, platform 110 may also verify or discredit other informationfrom social media service computing platforms 160, 170. For example,platform 110 may use machine learning engine 112 d to deriveintelligence from patterns of user behavior to determine anticipatedneeds or to corroborate or disqualify proposed needs of users. Forexample, if a subordinate user posts on his social media site that hemissed the bus or is broke, platform 110 may use the time and date ofthe post, geolocation information extracted from the post, relatedaccount balance information of the subordinate user in question, and/orany transaction information related to the subordinate user todistinguish between a real need and a false positive.

In some examples, once event control computing platform 110 has verifiedthe accuracy of the relevant portions of the received information, eventcontrol computing platform 110 may then transmit, in step 209, a requestfor authorizing a change to user data associated with a subordinate userto a supervisory user computing device 190 of a supervisory userassociated with the subordinate user in question. In one example, thesupervisory user may be a parent or guardian of a subordinate user(e.g., a teen) and the change to the user data may include an increaseto a financial limit of an account used by the teen. The supervisoryuser may choose to authorize or reject the change to the teen's accountbased on the supervisory user's knowledge of the teen's need. If thesupervisory user decides to reject authorization of the change to theuser data, then the process may stop and event control computingplatform 110 may not make any changes to the user data associated withthe relevant subordinate user.

In one example, event control computing platform 110 may also calculatethe amount of funds that should be transferred to the subordinate user'saccount. This calculation may be based on a variety of factors and ifthe situation relates to the subordinate user being stranded without thenecessary funds for a ride home, these factors may include how far thesubordinate user is away from home, fuel charges associated with thelocation where the subordinate user is located, historical rates forobtaining a cab or a ride-share service ride home from the locationwhere the subordinate user is located.

To obtain authorization for making a change to user data associated witha subordinate user, event control computing platform 110 may causesupervisory user computing device 190 to display and/or otherwisepresent a graphical user interface similar to graphical user interface300, which is illustrated in FIG. 3. As shown in FIG. 3, graphical userinterface 300 may include information related to the change in userdata. For example, interface 300 may include the proposed date of thechange to the user data and the type of change being requested. In theexample shown in FIG. 3, event control computing platform 110 isrequesting an increase in the amount of funds available to a givensubordinate user associated with the supervisory user to which therequest has been sent (e.g., via a parent-child relationship). Further,graphical user interface 300 may indicate the amount of funds to beadded to the subordinate user's account and may further indicate thatthe proposed increase in funds available to the subordinate user is asingle, non-repeating occurrence. In the example shown in FIG. 3, thesupervisory user may modify the proposed increase to the amount of fundsto which the subordinate user has access and/or may approve or rejectthe proposed change. Interface 300 may also include the reason that theincrease in funds is being requested. In this example, event controlcomputing platform 110 may monitor a subordinate user's banking andsocial media activity and filter/combine large volumes of information toproduce information that is timely, relevant, financially actionable,and specific to an individual. Moreover, platform 110 may determine thecontext to prevent automated action taken against false positives or badinformation.

In step 210, supervisory user computing device 190 associated with asupervisory user may authorize a change to user data associated with arelated subordinate user. In some examples, the supervisory user may usesupervisory user computing device 190 to send a text message, email,voicemail, or any other type of message to event control computingplatform 110 to indicate whether he authorizes the change to the userdata of the subordinate user. In other examples, event control computingplatform 110 may not need to transmit the request for authorization instep 209 because the supervisory user may have already providedauthorization or may have instructed event control computing platform110 that prior authorization is not necessary.

Next, in step 211, event control computing platform 110 may generate acommand to change the user data associated with the relevant subordinateuser. In one example, the change in the user data may be related to anincrease in a financial limit of an account used by the subordinate userso that the subordinate user has access to more funds. In this example,event control computing platform 110 may transfer money into thesubordinate user's account to help him get out of a difficult situationwithout intervention by the associated supervisory users (e.g., withouthaving the associated supervisory users transfer money into thesubordinate user's account themselves). In this regard, platform 110 mayact as a local custodian (e.g., a real-time financial advisor) withinpredetermined boundaries set by the supervisory user to help theassociated subordinate user when the need arises.

Once a command has been generated, event control computing platform 110may then transmit the command to event validation computing platform 120in step 212. Event validation computing platform 120 may then processthe command to change the user data in the way specified by the receivedcommand. Finally, in step 213, event control computing platform 110 maythen transmit a notification of the change to the user data tosubordinate user computing device 195.

In one example, event validation computing platform 120 may transferfunds from a financial account of a supervisory user to a financialaccount of an associated subordinate user once platform 120 receives thecommand to change user data associated with the relevant subordinateuser.

In some aspects, event control computing platform 110 may reprogramfunctionality of platform 110, using machine learning engine 112 d, toalter a condition under which user data is changed. For example,platform 110 may change user data based on a distance that a user isaway from his residence, based on a number of other individuals that areaccompanying the user (e.g., friends, relatives), and/or based on thenumber of other individuals about which event control computing platform110 receives information. In basing the change to a given subordinateuser's user data on information about other individuals, event controlcomputing platform 110 may identify, based on the received information,which subordinate users have characteristics similar (e.g., similar age,location, hobbies) to the subordinate user in question. Event controlcomputing platform 110 may then base a decision to change user data onthe received information associated with those subordinate users thatare similar to the subordinate user in question.

In other examples, event control computing platform 110 may receiveinformation from social media service computing platforms 160, 170 andtransmit other types of messages to both supervisory and subordinateuser computing devices 190, 195 based on the received information. Forexample, event control computing platform 110 may identify, based oninformation received from social media service computing platforms 160,170 and other sources, that a particular product poses some sort ofdanger or is under a product recall (e.g., stock keeping unit(SKU)-level data). Platform 110 may determine the identity of theproduct in question and the merchants that sell that product. In thisscenario, platform 110 may transmit a warning message to one or both ofsupervisory and subordinate user computing devices 190, 195 about theproduct in question. The warning message may indicate that that theproduct in question poses some sort of danger or is under a productrecall, as shown in FIG. 4. Message 400 may include the name and adescription of the product as well as a warning to let subordinate andsupervisory users know that they should not purchase the product.

Because event control computing platform 110 may receive informationfrom social media service computing platforms 160, 170 and other sourcesabout many different individuals, platform 110 may be able to identifytrends and draw inferences from those trends to be able to provideinformation to individuals based on those inferences. For example, ifplatform 110 identifies a correlation between individuals purchasing aproduct at a particular merchant and injuries to those individuals, thenplatform 110 may transmit a warning message to subordinate andsupervisory users that may be at a risk for purchasing that product. Forexample, based on the received information, platform 110 may identifythat many users are getting injured from using a popular bicycle or aregetting sick from purchasing coffee at a popular restaurant. In thisadditional way, event control computing platform 110 may serve toprotect individuals from potentially dangerous events.

FIG. 5 depicts an illustrative method for multicomputer processing ofuser data with centralized event control in accordance with one or moreexample embodiments. Referring to FIG. 5, at step 505, a computingplatform having at least one processor, a memory, and a communicationinterface may establish, via the communication interface, a plurality ofconnections to a plurality of social media service computing platforms.Subsequently, at step 510, the computing platform may receive firstinformation from at least one of the plurality of social media servicecomputing platforms. Then, at step 515, the computing platform mayidentify, using a machine learning engine, based on the firstinformation, whether a change should be made to user data associatedwith a first subordinate user identifiable by the first information, andat step 520, the computing platform may determine that the firstinformation indicates that a change should be made to the user data. Atstep 525, the computing platform may extract metadata from the firstinformation to verify the accuracy of at least one aspect of the firstinformation, and at step 530, the computing platform may then determinethat the metadata verifies the accuracy of the at least one aspect ofthe first information. Next, in step 535, the computing platform maygenerate a command configured to cause the change to the user data.Finally, in step 540, the computing platform may transmit, via thecommunication interface, the command to an event validation computingplatform.

One or more aspects of the disclosure may be embodied in computer-usabledata or computer-executable instructions, such as in one or more programmodules, executed by one or more computers or other devices to performthe operations described herein. Generally, program modules includeroutines, programs, objects, components, data structures, and the likethat perform particular tasks or implement particular abstract datatypes when executed by one or more processors in a computer or otherdata processing device. The computer-executable instructions may bestored as computer-readable instructions on a computer-readable mediumsuch as a hard disk, optical disk, removable storage media, solid-statememory, RAM, and the like. The functionality of the program modules maybe combined or distributed as desired in various embodiments. Inaddition, the functionality may be embodied in whole or in part infirmware or hardware equivalents, such as integrated circuits,application-specific integrated circuits (ASICs), field programmablegate arrays (FPGA), and the like. Particular data structures may be usedto more effectively implement one or more aspects of the disclosure, andsuch data structures are contemplated to be within the scope of computerexecutable instructions and computer-usable data described herein.

Various aspects described herein may be embodied as a method, anapparatus, or as one or more computer-readable media storingcomputer-executable instructions. Accordingly, those aspects may takethe form of an entirely hardware embodiment, an entirely softwareembodiment, an entirely firmware embodiment, or an embodiment combiningsoftware, hardware, and firmware aspects in any combination. Inaddition, various signals representing data or events as describedherein may be transferred between a source and a destination in the formof light or electromagnetic waves traveling through signal-conductingmedia such as metal wires, optical fibers, or wireless transmissionmedia (e.g., air or space). In general, the one or morecomputer-readable media may be and/or include one or more non-transitorycomputer-readable media.

As described herein, the various methods and acts may be operativeacross one or more computing servers and one or more networks. Thefunctionality may be distributed in any manner, or may be located in asingle computing device (e.g., a server, a client computer, and thelike). For example, in alternative embodiments, one or more of thecomputing platforms discussed above may be combined into a singlecomputing platform, and the various functions of each computing platformmay be performed by the single computing platform. In such arrangements,any and/or all of the above-discussed communications between computingplatforms may correspond to data being accessed, moved, modified,updated, and/or otherwise used by the single computing platform.Additionally or alternatively, one or more of the computing platformsdiscussed above may be implemented in one or more virtual machines thatare provided by one or more physical computing devices. In sucharrangements, the various functions of each computing platform may beperformed by the one or more virtual machines, and any and/or all of theabove-discussed communications between computing platforms maycorrespond to data being accessed, moved, modified, updated, and/orotherwise used by the one or more virtual machines.

Aspects of the disclosure have been described in terms of illustrativeembodiments thereof. Numerous other embodiments, modifications, andvariations within the scope and spirit of the appended claims will occurto persons of ordinary skill in the art from a review of thisdisclosure. For example, one or more of the steps depicted in theillustrative figures may be performed in other than the recited order,and one or more depicted steps may be optional in accordance withaspects of the disclosure.

What is claimed is:
 1. A computing platform, comprising: at least oneprocessor; a communication interface communicatively coupled to the atleast one processor; and memory storing computer-readable instructionsthat, when executed by the at least one processor, cause the computingplatform to: establish, via the communication interface, a plurality ofconnections to a plurality of social media service computing platforms;while the plurality of connections is established, receive firstinformation from at least one of the plurality of social media servicecomputing platforms; identify, based on the first information, whether achange should be made to user data associated with a first subordinateuser identifiable by the first information; determine that the firstinformation indicates that a change should be made to the user data;extract metadata from the first information to verify accuracy of atleast one aspect of the first information; determine that the metadataverifies the accuracy of the at least one aspect of the firstinformation; generate a command causing the change to the user data; andtransmit, via the communication interface, the command to an eventvalidation computing platform.
 2. The computing platform of claim 1,wherein the memory stores additional computer-readable instructionsthat, when executed by the at least one processor, cause the computingplatform to: transmit, via the communication interface, to a computingdevice associated with the first subordinate user, a first notificationof the change to the user data.
 3. The computing platform of claim 2,wherein the memory stores additional computer-readable instructionsthat, when executed by the at least one processor, cause the computingplatform to: transmit, prior to sending the command causing the changeto the user data, to a supervisory user computing device associated witha supervisory user, a request for authorizing the change to the userdata.
 4. The computing platform of claim 3, wherein the memory storesadditional computer-readable instructions that, when executed by the atleast one processor, cause the computing platform to: transmit, via thecommunication interface, to the supervisory user computing deviceassociated with the supervisory user, a second notification of thechange to the user data.
 5. The computing platform of claim 3, whereinthe memory stores additional computer-readable instructions that, whenexecuted by the at least one processor, cause the computing platform to:reprogram functionality of the computing platform, using a machinelearning engine, to alter a condition under which the user data ischanged.
 6. The computing platform of claim 5, wherein the memory storesadditional computer-readable instructions that, when executed by the atleast one processor, cause the computing platform to: reprogramfunctionality of the computing platform, using the machine learningengine, such that the condition under which the user data is changed isbased on a distance that the first subordinate user is located away froma residence of the first subordinate user.
 7. The computing platform ofclaim 5, wherein the memory stores additional computer-readableinstructions that, when executed by the at least one processor, causethe computing platform to: reprogram functionality of the computingplatform, using the machine learning engine, such that the conditionunder which the user data is changed is based on a number of otherindividuals with which the first subordinate user is travelling.
 8. Thecomputing platform of claim 5, wherein the memory stores additionalcomputer-readable instructions that, when executed by the at least oneprocessor, cause the computing platform to: reprogram functionality ofthe computing platform, using the machine learning engine, such that thecondition under which the user data is changed is based on additionalinformation received from the plurality of social media servicecomputing platforms, wherein the additional information relates to aplurality of other subordinate users identifiable by the additionalinformation.
 9. The computing platform of claim 8, wherein the memorystores additional computer-readable instructions that, when executed bythe at least one processor, cause the computing platform to: reprogramfunctionality of the computing platform, using the machine learningengine, such that the condition under which the user data is changed isbased on the additional information received about the plurality ofother subordinate users that are similar to the first subordinate user.10. The computing platform of claim 1, wherein the determining that themetadata verifies the accuracy of the at least one aspect of the firstinformation comprises determining that the metadata verifies theaccuracy of a location of the first subordinate user.
 11. The computingplatform of claim 1, wherein the memory stores additionalcomputer-readable instructions that, when executed by the at least oneprocessor, cause the computing platform to: determine that a warningmessage should be transmitted to the first subordinate user regarding afuture event.
 12. The computing platform of claim 1, wherein the memorystores additional computer-readable instructions that, when executed bythe at least one processor, cause the computing platform to: determineif a threshold associated with the user data will be exceeded; andtransmit, via the communication interface, the command to the eventvalidation computing platform if the threshold will be exceeded.
 13. Amethod, comprising: at a computing platform comprising at least oneprocessor, memory, and a communication interface: establishing, via thecommunication interface, a plurality of connections to a plurality ofsocial media service computing platforms; while the plurality ofconnections is established, receiving first information from at leastone of the plurality of social media service computing platforms;identifying, based on the first information, whether a change should bemade to user data associated with a first subordinate user identifiableby the first information; determining that the first informationindicates that a change should be made to the user data; extractingmetadata from the first information to verify accuracy of at least oneaspect of the first information; determining that the metadata verifiesthe accuracy of the at least one aspect of the first information;generating a command causing the change to the user data; andtransmitting, via the communication interface, the command to an eventvalidation computing platform.
 14. The method of claim 13, furthercomprising: transmitting, prior to sending the command causing thechange to the user data, to a supervisory user computing deviceassociated with a supervisory user, a request for authorizing the changeto the user data.
 15. The method of claim 13, further comprising:reprogramming functionality of the computing platform, using a machinelearning engine, to alter a condition under which the user data ischanged.
 16. The method of claim 13, wherein the determining that themetadata verifies the accuracy of the at least one aspect of the firstinformation comprises determining that the metadata verifies theaccuracy of a location of the first subordinate user.
 17. The method ofclaim 13, further comprising: determining that a warning message shouldbe transmitted to the first subordinate user regarding a future event.18. The method of claim 13, further comprising: determining if athreshold associated with the user data will be exceeded; andtransmitting, via the communication interface, the command to the eventvalidation computing platform if the threshold will be exceeded.
 19. Themethod of claim 13, wherein the receiving the first information from theat least one of the plurality of social media service computingplatforms comprises receiving the first information from the at leastone of the plurality of social media service computing platforms in realtime.
 20. One or more non-transitory computer-readable media storinginstructions that, when executed by a computing platform comprising atleast one processor, memory, and a communication interface, cause thecomputing platform to: establish, via the communication interface, aplurality of connections to a plurality of social media servicecomputing platforms; while the plurality of connections is established,receive first information from at least one of the plurality of socialmedia service computing platforms; identify, based on the firstinformation, whether a change should be made to user data associatedwith a first subordinate user identifiable by the first information;determine that the first information indicates that a change should bemade to the user data; extract metadata from the first information toverify accuracy of at least one aspect of the first information;determine that the metadata verifies the accuracy of the at least oneaspect of the first information; generate a command causing the changeto the user data; and transmit, via the communication interface, thecommand to an event validation computing platform.