Control tower for defining access permissions based on data type

ABSTRACT

Systems, methods, and apparatuses for providing a central location to manage permissions provided to third-parties and devices to access and use user data and to manage accounts at multiple entities. A central portal may allow a user to manage all access to account data and personal information as well as usability and functionality of accounts. The user need not log into multiple third-party systems or customer devices to manage previously provided access to the information, provision new access to the information, and to manage financial or other accounts. A user is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal. The user is able to impose restrictions on how user data is used by devices, applications, and third-party systems, and control such features as recurring payments and use of rewards, via a central portal.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.17/005,124 entitled “CONTROL TOWER FOR DEFINING ACCESS PERMISSIONS BASEDON DATA TYPE,” filed Aug. 27, 2020 (now U.S. Pat. No. 10,963,589), whichis a continuation of U.S. patent application Ser. No. 16/653,312entitled “CONTROL TOWER FOR VIRTUAL REWARDS CURRENCY,” filed Oct. 15,2019, which is a continuation-in-part of U.S. patent application Ser.No. 16/457,257 entitled “CONTROL TOWER FOR PROSPECTIVE TRANSACTIONS,”filed Jun. 28, 2019, which is a continuation-in-part of U.S. patentapplication Ser. No. 16/383,388 entitled “CONTROL TOWER FOR PROSPECTIVETRANSACTIONS,” filed Apr. 12, 2019, which is a continuation-in-part ofU.S. patent application Ser. No. 16/215,558 entitled “CONTROL TOWERRESTRICTIONS ON THIRD PARTY PLATFORMS,” filed Dec. 10, 2018, which is acontinuation of U.S. patent application Ser. No. 16/204,831 entitled“ACCESS CONTROL TOWER,” filed Nov. 29, 2018, which claimed priority toU.S. Provisional Patent Application No. 62/766,400 entitled “ACCESSCONTROL TOWER,” filed Oct. 16, 2018. U.S. patent application Ser. No.16/204,831 is a continuation-in-part of U.S. patent application Ser. No.15/723,078 entitled “ACCESS CONTROL TOWER,” filed Oct. 2, 2017, whichclaimed priority to U.S. Provisional Patent Application No. 62/529,360entitled “DATA CONTROL TOWER,” filed Jul. 6, 2017, and to U.S.Provisional Patent Application No. 62/403,396 entitled “DATA CONTROLTOWER,” filed Oct. 3, 2016. U.S. patent application Ser. No. 15/723,078is a continuation-in-part of U.S. patent application Ser. No. 15/629,423entitled “ACCESS CONTROL TOWER,” filed Jun. 21, 2017, which claimedpriority to U.S. Provisional Application No. 62/357,737 entitled“SYSTEMS AND METHODS FOR LOCATION BINDING AUTHENTICATION,” filed Jul. 1,2016. All of the above are incorporated herein by reference in theirentireties.

TECHNICAL FIELD

Embodiments of the present disclosure relate to systems and methods formanaging customer data and customer preferences across a plurality ofplatforms.

BACKGROUND

Many customers link information (e.g., account types, account balances,payment account information, etc.) maintained by a financial institutionto devices (e.g., in a mobile wallet on a smartphone, wearable devices,Internet of Things devices, etc.) and to third-party systems (e.g.,financial health monitoring services, merchant e-commerce systems,social media platforms, mobile wallet systems, etc.). The customer mayshare the information with a plurality of different services. Forexample, the customer may provide account information to a financialhealth monitoring service, payment card information to a plurality ofdifferent mobile wallet services, payment card information to theirfavorite retailers, and the like. Once the access is provided, thecustomer can manage preferences relating to the access at each of thethird-party systems (e.g., via a third-party website or smartphoneapplication). However, this process can be cumbersome when the customerhas authorized a plurality of third-parties to have access to theinformation maintained by the financial institution. Moreover,information shared by the customer becomes stored in additionaldatabases, exposing the customer to additional security risks and makingthe customer's information more likely to become available to unwantedparties (as a result of, for example, the additional databases beinghacked or the customer information otherwise being intentionally orunintentionally leaked).

SUMMARY

Various embodiments relate to a method that may comprise providing aportal. The portal may be provided via a network such as the internet.The portal may be accessible via, for example, a user device. Forexample, the portal may be accessible via an application running on auser device. A user accessing the portal may be presented with one ormore graphical interfaces. The portal may allow the user to viewinformation on one or more accounts of the user. The method may compriseaccepting a selection to enable use of a virtual rewards currency. Theselection may be accepted via the portal. The selection may be to enableuse of the virtual rewards currency for one or more subsequentelectronic transactions. The electronic transactions may involve aselect account. The method may comprise receiving an authorizationrequest for an electronic transaction. The authorization request may bereceived from or via a provider device. The electronic transaction mayinvolve a purchase by the user. The purchase may be from a providercorresponding to the provider device. The provider may be, for example,a merchant, online or otherwise. The provider device may have receivedaccount information corresponding to the select account for thepurchase. The provider device may have received the account informationfrom the user. The user may have provided the account information byinputting information. The information may have been input into theprovider device. The user may, alternatively or additionally, present apayment vehicle associated with the select account to the provider, suchas by presenting a payment card (e.g., a credit or debit card) at apoint of sale device of the provider. Alternatively or additionally, theaccount information may be presented via, for example, a mobile walletapplication implemented via the user device. The method may compriseapplying the virtual rewards currency to cover at least a portion of thepurchase.

In one or more implementations, the method may comprise accepting asecond selection to disable use of the virtual rewards currency withrespect to the select account. The second selection may be received viathe portal.

In one or more implementations, the method may comprise presenting anindication that the virtual rewards currency was applied to thepurchase. The indication may be presented graphically. The indicationmay be presented via the portal.

In one or more implementations, the method may comprise transmitting anapproval of the electronic transaction involving the purchase by theuser. The approval may be transmitted to the provider device.

In one or more implementations, the portal may allow the user to viewinformation on accounts held by two or more entities. The informationmay be provided via communications with corresponding computing systemsof the entities.

In one or more implementations, the virtual rewards currency may takedifferent forms. The virtual rewards currency may be, or may comprise, abonus earned for one of the accounts which may be accessible via theportal. The bonus may be, for example, a “cash back” bonus that may beearned based on use of the account for transactions. Alternatively oradditionally, the virtual rewards currency may be a discount, gift,and/or another item of value provided to the user.

In one or more implementations, the portal may be implemented by acomputing system of a financial institution. The financial institutionmay hold one or more accounts of the user.

In one or more implementations, the portal may allow the user toretroactively apply a second virtual rewards currency to a pasttransaction. The past transaction may have originally been processedwithout use of the second virtual rewards currency.

In one or more implementations, the portal may be configured to receivefrom the user device location data. The location may correspond to thelocation of the user device. The location data may have been detectedusing a location sensor of the user device. The portal may,alternatively or additionally, be configured to present a distance ofthe user device from the provider.

In one or more implementations, the portal may provide a selectable iconcorresponding to the provider. The icon may be configured to, whenselected, result in the presentation of directions to a physicallocation of the provider. The directions may be presented via anapplication, such as a map or navigation application, launched on theuser device upon selection of the icon. Alternatively or additionally,the icon may be configured to, when selected, result in the presentationof a website or application. The website or application may beassociated with the provider, and may be presented on the user device.

Various embodiments relate to a method that may comprise presenting anoption to activate use of a virtual rewards currency. The option may bepresented via a user device. The option may be to activate use of thevirtual rewards currency for one or more subsequent transactions. Asubsequent transaction may involve a select account. The select accountmay be held by a financial services provider. The method may compriseaccepting an indication that a user of the user device has opted toactivate use of the virtual rewards currency for the subsequenttransaction involving the select account. The indication may be acceptedvia the user device. The method may comprise processing the transactionfor which use of the virtual rewards currency was activated. Thetransaction may be processed such that the virtual rewards currency isapplied to the transaction. The transaction may processed via acomputing system of the financial services provider.

In one or more implementations, the option is presented via a portal.The portal may be, but need not be, implemented by a computing system ofthe financial services provider. For example, the portal may beimplemented by a computing system of an entity other than the financialservices provider.

In one or more implementations, processing the transaction may comprisereceiving a request for authorization of the transaction. The requestmay be received from a merchant device, such as a point-of-sale deviceor a device of an online merchant. The method may comprise transmittingan approval of the transaction to the merchant device.

In one or more implementations, the computer system of the financialservices provider may receive the request for authorization from themerchant device. The computer system of the financial services providermay transmit the approval to the merchant device.

In one or more implementations, the method may comprise detecting aphysical location of the user device. The physical location may bedetected via a user device. The physical location may be detected via alocation sensor of the user device. The method may comprise presenting asecond option for navigating to the physical location. The second optionmay be presented via the user device. The option may be for navigatingvia the user device, such as via a navigation application running on theuser device.

In one or more implementations, the second option may be presented via afirst application running on the user device. The method may compriseaccepting a second indication that the user of the user device has optedto navigate to the physical location. The second indication may beaccepted via an input device of the user device. The input device may orinclude, for example, a touchscreen, a virtual or physical keyboard, orotherwise. The method may comprise launching a second application. Thesecond application may be launched via an operating system of the userdevice. The second application may presents a virtual map. The virtualmap may correspond to the user device's present location.

Various embodiments relate to a computing system having a processor anda memory storing executable code which causes the computing system, whenexecuted, to perform specific functions. The computing system may beconfigured to provide a portal. The portal may be presented via theinternet or other network. The computing system may present (via aportal or otherwise) an option to use a virtual rewards currency. Theoption may be to use the virtual rewards currency with respect to aselect account of a user. The option may be selectable via a userdevice, such a user device accessing the portal. The computing systemmay be configured to accept an indication that the user of the userdevice has opted to use the virtual rewards currency. The indication maybe accepted via the portal. The computing system may be configured toapply the virtual rewards currency to a transaction involving the selectaccount.

In one or more implementations, the computing system may be implementedby or otherwise associated with a financial services provider at whichthe select account is held. The computing system may instead beimplemented by or otherwise associated with an entity other than afinancial services provider at which the select account is held.

In one or more implementations, the transaction may be a pasttransaction, such as an already-processed transaction or otherwise onethat was initiated prior to opting to use the virtual rewards currency.The transaction may also be a future transaction, such as an in-processtransaction or otherwise one that is initiated subsequent to opting touse the virtual rewards currency.

One embodiment relates to a method of managing access to customerinformation associated with a customer of a financial institution. Themethod includes receiving, by a financial institution computing systemassociated with a financial institution, a request to view a set ofaccess permissions from a first user device associated with the user.The method also includes identifying, by the financial institutioncomputing system, the set of access permissions associated with theuser, the set of access permissions identifying an entity or device thatmay request information regarding the user from the financialinstitution. The method also includes generating an access permissiondataset based on the identified set of access permissions. The methodalso includes transmitting, by the financial institution computingsystem, the access permission dataset to the user device to facilitatethe presentation of a data control interface to the customer via theuser device, the data control interface configured to receive userinputs to change the set of data access permissions.

Another embodiment relates to a financial institution computing systemassociated with a financial institution. The financial institutioncomputing system includes a network interface configured to communicatedata over a network and an access control circuit. The access controlcircuit is configured to receive, by the network interface, a request toview a set of access permissions from a first user device associatedwith the user. The access control circuit is also configured to identifythe set of access permissions associated with the user, the set ofaccess permissions identifying an entity or device that may requestinformation regarding the user from the financial institution. Theaccess control circuit is further configured to generate an accesspermission dataset based on the identified set of access permissions.The access control circuit is further configured to transmit, by thenetwork interface, the access permission dataset to the user device tofacilitate the presentation of a data control interface to the customervia the user device, the data control interface configured to receiveuser inputs to change the set of data access permissions.

Various embodiments of the disclosure relate to methods, systems, andnon-transitory computer readable medium for managing access to customerinformation of a customer. The customer information may be stored at aservice provider computing system of a service provider. A third-partyaccount may be linked with the customer information. The third-partyaccount may be stored at a third party computing system. The third-partyaccount may be linked with the customer information by the serviceprovider computing system and/or by the third-party computing system.The link may define a subset of the customer information that isaccessible to the third-party computing system. An instruction to deletecustomer data stored in a database of the third-party computing systemmay be received. The instruction to delete may be received from aservice provider client application running on a computing device of thecustomer. The instruction to delete may be received by the serviceprovider computing system. The instruction to delete may be generated inresponse to a corresponding selection by the customer. The instructionto delete may be generated by the service provider client application.The selection may be made via a graphical user interface presented bythe service provider client application. A scrub command may begenerated. The scrub command may be generated by the service providercomputing system. The scrub command may identify the customer and/or thecustomer data to be deleted. The scrub command may be generated inresponse to receiving the instruction to delete. The scrub command maybe transmitted to the third party computing system. The scrub commandmay be transmitted to cause the third-party computing system to deletethe customer data that may have been identified by the scrub command.The customer data may be deleted by the third-party computing systemfrom a database thereof.

In various implementations, an API call may be received. The API callmay be received from the third-party computing system. The API call maybe received by the service provider computing system. The API call mayspecify a subset of the customer information. The subset of the customerinformation specified in the API call may be transmitted to thethird-party computing system. The customer information may betransmitted in response to receiving the API call from the third-partycomputing system. Restrictions may be placed on what customer data isaccessible to the third-party computing system. Additionally oralternatively, restrictions may be placed on how accessible customerdata may be used by the third party computing system. One or morerestrictions may be placed by the customer. One or more restrictions maybe placed via the service provider client application. Statusinformation indicating whether the link is active or inactive may betransmitted to the computing device of the customer. The statusinformation may be presented via the service provider client applicationrunning on the computing device. The scrub command may instruct thethird-party computing system to delete the third-party account of thecustomer from the third-party computing system. The scrub command mayinstruct the third-party computing system to delete customer data of aspecified type from the database of the third-party computing system.The scrub command may instruct the third-party computing system todelete all customer data, or a subset thereof, stored at the third-partycomputing system.

Various embodiments of the disclosure relate to a computing device,which may be a mobile computing device. The computing device may beassociated with a customer of a service provider. The computing devicemay comprise a processor and memory with instructions which, whenexecuted by the processor, cause the device to perform specificfunctions. The specific functions, or a subset thereof, may be performedvia a service provider client application running on the computingdevice. The computing device may receive a request to link a third-partyaccount of the customer with customer information stored at a serviceprovider computing system. The third-party account may be stored at athird party computing system. The link may define a subset of thecustomer information that is accessible to the third-party computingsystem. The computing device may also present a graphical userinterface. The graphical user interface may provide the customer withstatus information on the link. The graphical user interface may alsoallow the customer to make a selection to delete customer data stored ina database of the third-party computing system. The computing device maytransmit an instruction to delete to the service provider computingsystem. The instruction to delete may be transmitted in response to theselection. The service provider computing system may generate a scrubcommand. The scrub command may be generated in response to receiving theinstruction to delete. The scrub command may identify the customerand/or the customer data to be deleted. The scrub command may betransmitted to the third party computing system. The scrub command maybe transmitted by the service provider computing system. The scrubcommand may be configured to cause deletion of the specified customerdata. The customer data may be deleted by the third-party computingsystem.

In various implementations, the graphical user interface allows thecustomer to place restrictions on at least one of (1) what customer datais accessible to the third-party computing system and (2) how accessiblecustomer data may be used by the third party. The graphical userinterface may be presented via the service provider client applicationrunning on the computing device. The graphical user interface mayidentify the third-party account that is linked. The scrub commandinstructs the third-party computing system to delete a third-partyaccount of the customer, to delete customer data of a specified type,and/or delete all customer data stored at the third-party computingsystem.

Various embodiments of the disclosure relate to a computing device,which may be a mobile computing device. The computing device may beassociated with a customer of a service provider. The computing devicemay comprise a processor and memory with instructions which, whenexecuted by the processor, cause the device to perform specificfunctions. The computing device may run a service provider clientapplication. The computing device may perform the specific functions, ora subset thereof, via the service provider client application. Thecomputing device may present a first graphical user interface. The firstgraphical user interface may, at least in part, identify a third-partyaccount that is linked with customer information. The customerinformation may be stored at a service provider computing system of theservice provider. The third-party account may be stored at a third partycomputing system. The link may define a subset of the customerinformation that is accessible to the third-party computing system. Thecomputing device may also present a second graphical user interface. Thesecond graphical user interface may include a selectable link which,when selected, transmits a message to the service provider computingsystem. The message may indicate that the customer wishes to deletecustomer data stored in a database of the third-party computing system.The service provider computing system may generate a scrub command. Thescrub command may be generated in response to receiving the message. Thescrub command may identify the customer and/or the customer data to bedeleted. The computing device may transmits the scrub command to thethird party computing system. The scrub command may be transmitted tocause the third-party computing system to delete the specified customerdata.

Various embodiments of the disclosure relate to a computing devicecomprising a network interface configured to communicate via atelecommunications network. The computing device may also comprise oneor more user interfaces for visually presenting graphical elements andfor receiving user inputs. The computing device may moreover comprise aprocessor and a memory having stored thereon instructions which, whenexecuted by the processor, cause the processor to perform specificfunctions. The computing device may be configured to present aninteractive graphical interface via the user interfaces. The graphicalinterface may identify an entity for which an access permission to userinformation is controlled. The user information may be stored at aservice provider computing system. The computing device may also beconfigured to present a display icon via the interactive graphicalinterface. The display icon may be selecting between a first userinformation and a second user information to be made accessible to theentity. The computing device may moreover be configured to receive, fromthe user interfaces, a signal. The signal may indicate a user inputcorresponding with a selection of one of the first user information andthe second user information via the display icon. The computing devicemay additionally be configured to use the network interface to transmitto the service provider computing system an indication of which one ofthe first user information and the second user information has beenselected. The service provider computing system may grant the entityaccess to the selected user information. Access to the selected userinformation may be granted following receipt by the service providercomputing system of a request from the entity for user information.

In various implementations, the computing device may be configured topresent, via the interactive graphical interface, an indication ofwhether access to user information is permitted or restricted for theentity. The computing device may also be configured to present, via theinteractive graphical interface, a second display icon for selectingbetween at least a first setting to permit access to user informationfor the entity, and a second setting to restrict access to userinformation for the entity. The computing device may be a firstcomputing device, and the entity may be a second computing deviceassociated with the user. In certain versions, the second computingdevice may be a smartphone. In certain versions, the second computingdevice may be a tablet computer. In certain versions, the secondcomputing device may be a wearable device. In certain versions, thesecond computing device may be a smart speaker. In certain versions, thesecond computing device may be a vehicle. The interactive graphicalinterface may be presented via a first application. The entity may be asecond application. The second application may be configured tocommunicate with the service provider computing system to request accessto user information. In certain versions, the first and secondapplications may both run on the computing device. In certain versions,the second application runs on a second computing device. The entity maybe a third-party computing system. The user information may be accountdata for financial transactions involving the third-party computingsystem.

Various embodiments of the disclosure relate to a method for controllingaccess permissions to user devices. The method may comprise presenting,via one or more user interfaces, an interactive graphical interface. Thegraphical interface may identify an entity for which an accesspermission to user information may be controlled. The one or more userinterfaces may be configured to visually present graphical elements andreceive user inputs. The user information may be stored at a serviceprovider computing system. The method may also comprise presenting, viathe interactive graphical interface, a display icon. The display iconmay be for selecting between a first user information and a second userinformation to be made accessible to the entity. The method may moreovercomprise receiving, from the user interfaces, a signal. The signal mayindicate a user input corresponding with a selection of one of the firstuser information and the second user information via the display icon.The method may additionally comprise using a network interface totransmit to the service provider computing system an indication of whichone of the first user information and the second user information hasbeen selected. The service provider computing system may grant theentity access to the selected user information. Access to the selecteduser information may be granted following receipt by the serviceprovider computing system of a request from the entity for userinformation.

In various implementations, an indication of whether access to userinformation is permitted or restricted for the entity may be presentedvia the interactive graphical interface. A second display icon may bepresented via the interactive graphical interface. The second displayicon may be for selecting between at least a first setting to permitaccess to user information for the entity, and a second setting torestrict access to user information for the entity. The computing devicemay be a first computing device, and the entity may be a secondcomputing device associated with the user. In certain versions, thesecond computing device may be a smartphone. In certain versions, thesecond computing device may be a tablet computer. In certain versions,the second computing device may be a smart speaker. In certain versions,the second computing device may be a vehicle. In certain versions, thesecond computing device may be a wearable device. The interactivegraphical interface may be presented via a first application. The entitymay be a second application configured to communicate with the serviceprovider computing system to request access to the user information. Theentity may be a third-party computing system. The third-party computingsystem may be associated with a merchant. The user information may beaccount data for transacting with the third-party computing system. Theuser information may be account data for making purchases from amerchant.

Various embodiments of the disclosure relate to a non-transitorycomputer readable medium having machine instructions stored thereon, theinstructions being executable by a processor of a computing device tocause the processor to perform specific operations. The operations maycomprise presenting an interactive graphical interface via one or moreuser interfaces. The graphical interface may identify an entity forwhich an access permission to user information is controlled. The one ormore user interfaces may be configured to visually present graphicalelements and receive user inputs. The user information may be stored ata service provider computing system. The operations may also comprisepresenting a display icon via the interactive graphical interface. Thedisplay icon may be for selecting between a first user information and asecond user information to be made accessible to the entity. Theoperations may moreover comprise receiving a signal from the userinterfaces. The signal may indicate a user input corresponding with aselection of one of the first user information and the second userinformation via the display icon. The operations may additionallycomprise using a network interface to transmit to the service providercomputing system an indication of which one of the first userinformation and the second user information has been selected. Theservice provider computing system may grant the entity access to theselected user information.

In various implementations, the operations may comprise presenting, viathe interactive graphical interface, an indication of whether access touser information is permitted or restricted for the entity. Theoperations may also comprise presenting, via the interactive graphical,a second display icon for selecting between at least a first setting topermit access to user information for the entity, and a second settingto restrict access to user information for the entity.

Various embodiments of the disclosure relate to a computing device. Thecomputing device may comprise a network interface configured tocommunicate via a telecommunications network, one or more userinterfaces for visually presenting graphical elements and for receivinguser inputs, and a processor and a memory having stored thereoninstructions which, when executed by the processor, cause the processorto perform specific functions. The computing device may be configured topresent an interactive graphical interface via the user interfaces. Theinteractive graphical interface may identify an entity for which anaccess permission to user information is controlled. The userinformation may be stored at a service provider computing system. Thecomputing device may also be configured to present a display icon viathe interactive graphical interface. The display icon may be forselecting the access permission corresponding to the entity. The accesspermission may be selectable between at least a first setting to permitaccess to user information, and a second setting to restrict access touser information. The computing device may moreover be configured toreceive a signal from the user interfaces. The signal may indicate auser input corresponding with a toggling of the display icon between thefirst and second settings. The computing device may additionally beconfigured to use the network interface to transmit to the serviceprovider computing system at least one of an identification of theselected access permission and an indication that the access permissionfor the entity has changed. The service provider computing system maydetermine whether to grant the entity with access to the userinformation according to the access permission.

In various implementations, the computing device may be configured topresent, via the interactive graphical interface, an identification ofthe user information accessible to the entity. The user information maybe a first user information. The computing device may be configured topresent a second display icon via the interactive graphical interface.The second icon may be for selecting between the first user informationand a second user information to be made available to the entity. Thecomputing device may be a first computing device. The entity may be asecond computing device associated with the user. In some versions, thesecond computing device may be a smartphone. In some versions, thesecond computing device may be a tablet computer. In some versions, thesecond computing device may be a wearable device. In some versions, thesecond computing device may be a smart speaker. In some versions, thesecond computing device may be a vehicle. The interactive graphicalinterface may be presented via a first application. The entity may be asecond application. The second application may be configured tocommunicate with the service provider computing system to request accessto the user information. In some versions, the first and secondapplications may both run on the computing device. The entity may be athird-party computing system. The third-party computing system may beassociated with a merchant. The user information may be account data formaking purchases from the merchant.

Various embodiments of the disclosure relate to a method for controllingaccess permissions to user devices. The method may comprise presentingan interactive graphical interface via one or more user interfaces. Theinteractive graphical interface may identify an entity for which anaccess permission to user information is controlled. The one or moreuser interfaces may be configured to visually present graphical elementsand receive user inputs. The user information may be stored at a serviceprovider computing system. The method may also comprise presenting adisplay icon via the interactive graphical interface. The display iconmay be for selecting the access permission corresponding to the entitybetween at least a first setting to permit access to user information,and a second setting to restrict access to user information. The methodmay moreover comprise receiving a signal from the user interfaces. Thesignal may indicate a user input corresponding with a toggling of thedisplay icon between the first and second settings. The method mayadditionally comprise using a network interface to transmit to theservice provider computing system at least one of an identification ofthe selected access permission and an indication that the accesspermission for the entity has changed. The network interface may beconfigured to communicate via a telecommunications network. The serviceprovider computing system may determine whether to grant the entity withaccess to the user information according to the access permission.

In various implementations, an identification of the user informationaccessible to the entity may be presented via the interactive graphicalinterface. The user information may be a first user information. Asecond display icon may be presented via the interactive graphicalinterface. The second display icon may be for selecting between thefirst user information and a second user information to be madeavailable to the entity. The computing device may be a first computingdevice, and the entity may be a second computing device associated withthe user. The second computing device may be a smartphone, a tabletcomputer, a smart speaker, a vehicle, and/or a wearable device. Theinteractive graphical interface may be presented via a firstapplication. The entity may be a second application configured tocommunicate with the service provider computing system to request accessto the user information. The first and second applications may both runon the computing device. The entity may be a third-party computingsystem. The third-party computing system may be associated with amerchant. The user information may be account data. The account data maybe for making purchases from the merchant.

Various embodiments of the disclosure relate to a non-transitorycomputer readable medium having machine instructions stored thereon. Theinstructions may be executable by a processor of a computing device tocause the processor to perform specific operations. The operations maycomprise presenting an interactive graphical interface via one or moreuser interfaces. The interactive graphical interface may identify anentity for which an access permission to user information is controlled.The one or more user interfaces may be configured to visually presentgraphical elements and receive user inputs. The user information may bestored at a service provider computing system. The operations may alsocomprise presenting a display icon via the interactive graphicalinterface. The display icon may be for selecting the access permissioncorresponding to the entity. The display icon may allow selection of theaccess permission between at least a first setting to permit access touser information, and a second setting to restrict access to userinformation. The operations may moreover comprise receiving, from theuser interfaces, a signal indicating a user input corresponding with atoggling of the display icon between the first and second settings. Theoperations may additionally comprise using a network interface totransmit to the service provider computing system at least one of anidentification of the selected access permission and an indication thatthe access permission for the entity has changed. The network interfacemay be configured to communicate via a telecommunications network. Theservice provider computing system may determine whether to grant theentity with access to the user information according to the accesspermission.

In various implementations, a second display icon may be presented viathe interactive graphical interface. The second display icon may be forselecting between a first user information and a second user informationto be made accessible to the entity.

Various embodiments of the disclosure relate to a service providercomputing system comprising a network interface configured tocommunicate via a telecommunications network, a processor, and a memoryhaving stored thereon instructions which, when executed by theprocessor, cause the processor to perform specific functions. Theservice provider computing system may receive, via the networkinterface, an access request from a third-party platform. The accessrequest may identify a user and data corresponding to the user. Theservice provider computing system may also verify that the identifieduser has granted the third-party platform access to the identified data.In response to verifying that the identified user has granted access,the service provider computing system may use the network interface totransmit the identified data to the third-party platform. The serviceprovider computing may moreover receive, from a user device of the user,an instruction. The instruction may identify the third-party platformand/or indicate what is to be done with the data provided to thethird-party platform. The service provider computing system mayadditionally use the network interface to transmit a command to thethird-party platform to cause the third-party platform to, consistentwith the instruction from the user device, delete the data received fromthe service provider computing system and/or restrict how the data fromthe service provider computing system is used.

In various implementations, the command may be or include an API call tothe third-party platform. The API call may identify the user and/or thedata to be deleted and/or restricted. The access request may be an APIcall transmitted by the third-party platform to the service providercomputing system. The command may instruct the third-party platform todelete the data from all computer-readable storage media controlled bythe third-party platform. The instruction may identify a selection made,via a graphical interface presented by a client application running onthe user device, between permitting a use of the data and prohibitingthe use of the data. The data may identify a credit or debit card. Theuse may correspond with use of the credit or debit card in an identifiedcategory of financial transactions. The command may instruct thethird-party platform to delete a user account of the user.

Various embodiments of the disclosure relate to a method of reclaiminguser data. The method may comprise receiving an access request from athird-party platform. The access request may identify a user and/or datacorresponding to the user. The method may also comprise verifying thatthe identified user has granted the third-party platform access to theidentified data. The method may moreover comprise transmitting theidentified data to the third-party platform in response to verifyingthat the identified user has granted access. The method may additionallycomprise receiving, from a user device of the user, an instructionidentifying the third-party platform and/or indicating what is to bedone with the data provided to the third-party platform. The method mayfurther comprise transmitting a command to the third-party platform tocause the third-party platform to, consistent with the instruction fromthe user device, delete the data or restrict how the third-partyplatform uses the data.

In various implementations, the command may include an API call to thethird-party platform. The API call may identify the user and/or the datato be deleted and/or restricted. The command may instruct thethird-party platform to delete the data from all computer-readablestorage media controlled by the third-party platform. The command mayinstruct the third-party platform to delete a user account of the user.The third-party platform may be a social media platform. The useraccount may be a social media account of the user. The third-partyplatform may be a third-party computing system of a merchant. The datamay be account data to be used for a purchase at the merchant. The userdevice may be a first user device of the user. The third-party platformmay be a third-party client application running on at least one of thefirst user device and a second user device of the user. The instructionmay identify a selection made, via a graphical interface presented by aclient application running on the user device, between permitting a useof the data and prohibiting the use of the data. The data may includeaccount data usable in financial transactions. The use may correspondwith use of the data in an identified category of financialtransactions. The account data may be for a credit or debit card. Theidentified category of financial transactions may be foreigntransactions.

Various embodiments of the disclosure relate to a non-transitorycomputer readable medium having machine instructions stored thereon, theinstructions being executable by a processor of a computing device tocause the processor to perform specific operations related to reclaiminguser data. The operations may comprise receiving an access request froma third-party platform, the access request identifying a user and datacorresponding to the user. The operations may also comprise verifyingthat the identified user has granted the third-party platform access tothe identified data. The operations may moreover comprise, in responseto verifying that the identified user has granted access, transmittingthe identified data to the third-party platform. The operations mayadditionally comprise receiving, from a user device of the user, aninstruction identifying the third-party platform and indicating what isto be done with the data provided to the third-party platform. Theoperations may further comprise transmitting a command to thethird-party platform to cause the third-party platform to, consistentwith the instruction from the user device, delete the data or restricthow the third-party platform uses the data.

Various embodiments relate to a method comprising providing a portal.The portal may include one or more graphical interfaces allowing a userto disable automated payments from selected accounts to selectedrecipients. The portal may be accessed via a user device. The portal maybe configured to accept a first selection to disable a first automatedpayment in which a first financial account is used to make automatedpayments to a first recipient. The portal may be configured to accept asecond selection of a second automated payment in which a secondfinancial account is used to make automated payments to a secondrecipient. The first financial account may be held by one (a first)financial institution and the second financial account may be held byanother (a second) financial institution. The first and secondselections may be accepted via the user device accessing the portal.

In one or more implementations, at least one of the first and secondrecipients is a third financial account. The third financial account maybe held at one of the first and second financial institutions.Alternatively, the third financial account may be held at a thirdfinancial institution.

In one or more implementations, the method may comprise disabling one orboth of the first and second automated payments.

In one or more implementations, the portal may be implemented by acomputing system of the first financial institution. Disabling the firstautomated payment may comprise declining a subsequent payment requestfrom a first device corresponding to the first recipient.

In one or more implementations, disabling the second automated paymentmay comprise transmitting an indication to a computing system of thesecond financial institution that the second automated payment has beendisabled.

In one or more implementations, the portal may be implemented by a firstcomputing system of an entity other than the first and second financialinstitutions. Disabling the first recurring payment may comprise sendinga transmission to a second computing system of the first financialinstitution. The transmission may be sent by the first computing system.The transmission may indicate that the first recurring payment is to bedisabled.

In one or more implementations, disabling the second recurring paymentmay comprise sending a transmission to a third computing system of thesecond financial institution. The transmission may be sent by the firstcomputing system. The transmission may indicate that the secondrecurring payment is to be disabled.

In one or more implementations, the transmission to the second computingsystem may comprise an API call to the second computing system. The APIcall may be accompanied by a security token authenticating the firstcomputing system. The API call may additionally or alternatively beaccompanied by an identification of a user and/or an account numberassociated with the first financial account.

Various embodiments relate to a method comprising providing a portalwith one or more graphical interfaces. The graphical interfaces mayallow a user to control automated payments from one or more financialaccounts to one or more recipients. The portal may allow the user tocontrol automated payments via a user device. The portal may beconfigured to accept selection of a financial account used to makeautomated payments. The portal may be configured to accept selection ofa recipient of the automated payments from the selected financialaccount. The portal may be configured to accept an indication that theautomated payments are to be disabled. One or more of the selections andthe indication may be accepted via the user device. The method maycomprise disabling the automated payments from the financial account tothe recipient.

In one or more implementations, the method may be implemented by acomputing system of a financial institution at which the financialaccount is held. The method may comprise declining a subsequent paymentrequest. The subsequent payment request may be received from a computingdevice corresponding to the recipient of the automated payments.

In one or more implementations, the method may be implemented by athird-party computing system of a third-party that is not a financialinstitution at which the financial account is held. The method maycomprise sending a transmission indicating that the automated paymentshave been disabled. The transmission may be sent to a financialinstitution computing system of the financial institution.

In one or more implementations, the portal may be configured to acceptselection of a second financial account used to make automated payments.The portal may be configured to accept selection of a second recipientof the automated payments from the second financial account. The portalmay be configured to accept an indication that the automated paymentsfrom the second financial account to the second recipient are to bedisabled. One or more of the selections may be accepted via the userdevice. The method may comprise disabling the automated payments fromthe second financial account to the second recipient.

Various embodiments relate to a method of providing a portal accessibleto a user device via a network. The portal may be configured to presenta list that includes a first selectable icon corresponding to a firstfinancial account. The list may include a second selectable iconcorresponding to a second financial account. The list may be presentedvia a first graphical interface. The first and second financial accountsmay be held at different financial institutions. The portal may beconfigured to accept a first indication that one of the first and secondfinancial accounts has been selected by the user via one of the firstand second selectable icons. The first indication may be accepted viathe user device. The portal may be configured to present a selectableoption to stop one or more subsequent recurring payments from theselected one of the first and second financial accounts. The selectableoption may be presented via a second graphical interface. The secondgraphical interface may be accessed on the user device. The portal maybe configured to accept a second indication that the option to stopsubsequent recurring payments has been selected by the user via theselectable option. The second indication may be accepted from the userdevice.

In one or more implementations, the method is not implemented by eitherof the financial institutions at which the first and second financialaccounts are held.

In one or more implementations, the method is implemented by a computingsystem associated with a financial institution holding one of the firstand second financial accounts used for the recurring payments. Themethod may comprise declining a subsequent recurring payment request.The subsequent recurring payment request may be received from an entitydevice corresponding to a recipient of the recurring payments to bestopped.

In one or more implementations, the portal may be configured to accept aselection of the other of the first and second financial accounts fromwhich recurring payments are made. The selection may be accepted fromthe user device. The portal may be configured to accept a secondselection to stop subsequent recurring payments from the other of thefirst and second financial accounts. The second selection may beaccepted via the user device.

Various embodiments relate to a method comprising providing a portalwith one or more graphical interfaces. The one or more graphicalinterfaces may allow a user to disable selected financial accounts foridentified entities such that payments from the selected financialaccounts will be declined for the identified entities. The selectedfinancial accounts may be disabled via a user device. The portal may beconfigured to present to the user a first graphical interface with alist that includes a first selectable icon corresponding to a firstentity, and a second selectable icon corresponding to a second entity.The first graphical interface may identify a financial account used tomake recurring payments to the first and second entities. The firstgraphical interface may be accessible via the user device. The portalmay be configured to accept a first indication that one of the first andsecond entities has been selected by the user via one of the first andsecond selectable icons. The first indication may be accepted from theuser device. The portal may be configured to present to the user aselectable option to stop one or more subsequent recurring payments tothe selected one of the first and second entities. The selectable optionmay presented via a second graphical interface. The second graphicalinterface may be accessed on the user device. The portal may beconfigured to accept a second indication that the option to stopsubsequent recurring payments has been selected by the user via theselectable option. The second indication may be accepted from the userdevice. The portal may be configured to decline a recurring paymentrequest. The recurring payment request may be received from an entitydevice corresponding to the selected one of the first and secondentities. The recurring payment request may be received subsequent toacceptance of the second indication.

In one or more implementations, the portal may be configured to presenta duration selector. The duration selector may be configured to allowthe user to identify a duration during which recurring payment requestsfrom the selected one of the first and second entities will be declined.

In one or more implementations, the duration selector may be configuredto allow the user to select a number of months during which recurringpayment requests will be declined, after which recurring paymentrequests will not be declined.

In one or more implementations, the portal may be implemented by acomputing system of a financial institution holding the financialaccount used for the recurring payments. The portal need not beimplemented by a computing system of a financial institution holding thefinancial account used for the recurring payments. The portal mayinstead be implemented by a computing system of a third-party entityother than the financial institution holding the financial account usedfor the recurring payments.

In one or more implementations, the portal may be configured to allowthe user to define a set of access permissions identifying an entity ordevice that may request information regarding the user from thecomputing system.

In one or more implementations, the portal may be implemented by acomputing system of a financial institution holding the financialaccount used for the recurring payments. The method may compriseaccepting payment requests from a first entity device of the firstentity and from a second entity device of the second entity. The paymentrequests may be accepted before accepting the second indication via theportal. The method may comprise initiating debits from the financialaccount for each payment request.

In one or more implementations, the portal may be accessed via a mobileapplication running on the user device.

In one or more implementations, the portal may be configured to displayone or more prior recurring payments to the selected one of the firstand second entities. The recurring payments may be displayed afteraccepting the first indication.

In one or more implementations, the portal may be configured to displaya status of the financial account. The status may be displayed afteraccepting the first indication.

In one or more implementations, the method may comprise accepting anauthorization to approve recurring payment requests from devices of thefirst and second entities. The authorization may be accepted via theuser device.

In one or more implementations, the central portal may be configured toallow the user to disable selected financial accounts with respect toidentified financial wallet accounts such that payments via theidentified financial wallet accounts will be declined for the selectedfinancial accounts.

In one or more implementations, the financial account may be a debitcard of the user. The recurring payments may be made using the debitcard.

Various embodiments relate to a computing system configured to provide aportal. The portal may be accessible to a user device via a network. Theportal may be configured to allow a user to disable selected financialaccounts for identified entities such that payments from the selectedfinancial accounts will be declined for the identified entities. Theuser may be allowed to disable selected financial accounts via the userdevice accessing the central portal. The portal may be configured topresent a list that includes a first selectable icon corresponding to afirst entity, and a second selectable icon corresponding to a secondentity. The list may be presented via a first graphical interface. Thefirst graphical interface may identify a financial account used to makerecurring payments to the first and second entities. The portal may beconfigured to accept a first indication that one of the first and secondentities has been selected by the user via one of the first and secondselectable icons. The first indication may be accepted from the userdevice. The portal may be configured to present a selectable option tostop one or more subsequent recurring payments to the selected one ofthe first and second entities. The selectable option may be presentedvia a second graphical interface accessed on the user device. The portalmay be configured to accept a second indication that the option to stopsubsequent recurring payments has been selected by the user via theselectable option. The second indication may be accepted from the userdevice. The computing system may be configured to decline a recurringpayment request. The recurring payment request may be received from anentity device corresponding to the selected one of the first and secondentities. The request may be received subsequent to acceptance of thesecond indication via the central portal.

In one or more implementations, the portal may be configured to presenta duration selector. The duration selector may be configured to allowthe user to identify a duration during which recurring payment requestsfrom the selected one of the first and second entities will be declined.

In one or more implementations, the computing system may be associatedwith a financial institution holding the financial account used for therecurring payments. The central portal may be further configured toallow the user to define a set of access permissions identifying anentity or device that may request information regarding the user fromthe computing system.

Various embodiments relate to a user device running an application. Theapplication may be configured to access, via a network, a portalimplemented by a computing system. The portal may be configured to allowa user to disable selected financial accounts for identified entitiessuch that payments from the selected financial accounts will be declinedor approved for the identified entities by the computing system. Theapplication may be configured to present a list that includes a firstselectable icon corresponding to a first entity, and a second selectableicon corresponding to a second entity. The list may be presented via afirst graphical interface. The first graphical interface may identify afinancial account used to make recurring payments to the first andsecond entities. The application may be configured to accept a firstindication that one of the first and second entities has been selectedby the user via one of the first and second selectable icons. The firstindication may be accepted via one or more user interfaces of the userdevice. The application may be configured to present a selectable optionto stop one or more subsequent recurring payments to the selected one ofthe first and second entities. The selectable option may be presentedvia a second graphical interface. The application may be configured toaccept a second indication that the option to stop subsequent recurringpayments has been selected by the user via the selectable option. Thesecond indication may be accepted via the one or more user interfaces.The application may be configured to transmit the second indication tocause the computing system to decline a recurring payment request. Thepayment request may be received by the computing system from an entitydevice corresponding to the selected one of the first and secondentities. The payment request may be received subsequent to acceptanceof the second indication.

In one or more implementations, the application may be configured topresent a duration selector. The duration selector may be configured toallow the user to identify a duration during which recurring paymentrequests from the selected one of the first and second entities will bedeclined.

In one or more implementations, the computing system may be associatedwith a financial institution holding the financial account used for therecurring payments. The portal may be configured to allow the user todefine a set of access permissions identifying an entity or device thatmay request information regarding the user from the computing system.

In one or more implementations, the application may be configured topresent a hide-payee selector. The hide-payee selector may be configuredto allow the user to select a payee to be excluded from a recurringpayments list.

These and other features, together with the organization and manner ofoperation thereof, will become apparent from the following detaileddescription when taken in conjunction with the accompanying drawings.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is a block diagram of an information control system, according toan example embodiment.

FIG. 2 is a block diagram of a customer mobile device, according to anexample embodiment.

FIG. 3 is a flow diagram of a method of managing access to customerinformation maintained by a financial institution, according to anexample embodiment.

FIGS. 4-7 each show example data control tower customer interfaces,according to example embodiments.

FIGS. 8-9 show third party client application customer interfaces,according to example embodiments.

FIGS. 10-13 each show example data control tower customer interfaces,according to example embodiments.

FIG. 14 is a flow diagram of a method of mitigating potential fraudassociated with access to customer information, according to an exampleembodiment.

FIG. 15 shows an example customer alert interface, according to anexample embodiment.

FIG. 16 shows an example data control tower customer interface,according to an example embodiment.

FIGS. 17-19 each show example data control tower customer interfaces,according to example embodiments.

FIG. 20 shows an example account control customer interface, accordingto an example embodiment.

FIG. 21 shows an example device control customer interface formanagement of various devices, according to an example embodiment.

FIG. 22 shows an example account control customer interface formanagement of connections of various accounts, according to an exampleembodiment.

FIG. 23 shows an example account control customer interface formanagement of various accounts, according to an example embodiment.

FIG. 24 shows an example account control customer interface allowing foraccounts to be turned on/off or removed/deleted, according to an exampleembodiment.

FIG. 25 shows an example account control customer interface allowing acustomer to confirm that an account is to be removed/deleted, accordingto an example embodiment.

FIG. 26 shows an example account control customer interface once anaccount has been removed/deleted, according to an example embodiment.

FIGS. 27A-27F show example recurring payment/stop payment interfaces,according to an example embodiment.

FIGS. 28A-28J show example automated payment control interfaces,according to example embodiments.

FIGS. 29A and 29B show example automated payment control interfaces,according to example embodiments.

FIGS. 30A-30P show example rewards control interfaces, according tovarious potential embodiments.

DETAILED DESCRIPTION

Referring to the figures generally, systems, methods, and apparatusesfor providing a customer a central location to manage permissionsprovided to third-parties and devices to access and use customerinformation maintained by a financial institution or other serviceprovider are described. The central location serves as a central portalwhere a customer of the financial institution can manage all access toaccount information and personal information stored at the financialinstitution. Accordingly, the customer does not need to log into eachindividual third-party system or customer device to manage previouslyprovided access to the customer information or to provision new accessto the customer information.

Referring to FIG. 1 , a view of an information management system 100 isshown according to an example embodiment. As described below in furtherdetail, the information management system 100 facilitates the sharing ofcustomer information associated with a customer 102 and maintained by afinancial institution 104 to third-parties systems 106 and customerdevices 108. The shared customer information can include any combinationof account information associated with financial accounts held by thecustomer 102 with the financial institution 104 (e.g., types of accountsowned, account numbers, account balances, transaction information, billdue dates, etc.), documents that the customer 102 stores with thefinancial institution 104 or that are generated by the financialinstitution 104 (e.g., account statements, tax documents, scanneddriver's license/passport, any uploaded files, etc.), and customerpersonal information stored by the financial institution 104 (e.g.,identity information, authentication information, etc.).

The customer 102 is an account holder with the financial institution104. The financial institution 104 includes a financial institutioncomputing system 110. The financial institution computing system 110maintains information about accounts held with the financial institution104 and facilitates the movement of funds into and out of the accounts.Additionally, the financial institution computing system 110 facilitatesthe sharing of and the provision of access to information associatedwith customer accounts to the customer 102, to customer devices 108, andto third-party systems 106. The financial institution computing system110 includes a network interface 112. The network interface 112 isstructured to facilitate data communication with other computing systems(e.g., the customer devices 108, the third-party systems 106, etc.) viaa network 126. The network interface 112 includes hardware and programlogic that facilitates connection of the financial institution computingsystem 110 to the network 126. For example, the network interface 112may include a wireless network transceiver (e.g., a cellular modem, aBluetooth transceiver, a WiFi transceiver, etc.) and/or a wired networktransceiver (e.g., an Ethernet transceiver). In some arrangements, thenetwork interface 112 includes the hardware and programming logicsufficient to support communication over multiple channels of datacommunication (e.g., the Internet and an internal financial institutionnetwork). Further, in some arrangements, the network interface 112 isstructured to encrypt data sent over the network 126 and decryptreceived encrypted data.

The financial institution computing system 110 includes a processingcircuit 114 having a processor 116 and memory 118. The processor 116 maybe implemented as a general-purpose processor, an application specificintegrated circuit (ASIC), one or more field programmable gate arrays(FPGAs), a digital signal processor (DSP), a group of processingcomponents, or other suitable electronic processing components. Thememory 118 includes one or more memory devices (e.g., RAM, NVRAM, ROM,Flash Memory, hard disk storage, etc.) that store data and/or computercode for facilitating the various processes described herein. Moreover,the memory 118 may be or include tangible, non-transient volatile memoryor non-volatile memory.

The financial institution computing system 110 includes an accountmanagement circuit 120 and an access control circuit 122. Although shownas separate circuits in FIG. 1 , in some arrangements, the accountmanagement circuit 120 and/or the access control circuit 122 are part ofthe processing circuit 116. Other arrangements may include more or lesscircuits without departing from the spirit and scope of the presentdisclosure. Further, some arrangements may combine the activities of onecircuit with another circuit to form a single circuit. Therefore, thoseof ordinary skill in the art will appreciate that the presentarrangement is not meant to be limiting. The account management circuit120 is structured to perform various account management functions,including maintaining an accounts database 124, updating accountbalances, applying interest to accounts, processing payments related toaccounts, and the like. The access control circuit 122 is structured tomanage the sharing and provision of customer information to third-partysystems 106 and to customer devices 108 based on permissions andpreferences of the customer 102.

The financial institution computing system 110 includes the accountsdatabase 124. In some arrangements, the accounts database 124 is part ofthe memory 118. The accounts database 124 is structured to hold, store,categorize, and otherwise serve as a repository for informationassociated with accounts (e.g., loan accounts, savings accounts,checking accounts, credit accounts, etc.) held by the financialinstitution 104. For example, the accounts database 124 may storeaccount numbers, account balances, transaction information, accountownership information, and the like. The accounts database 124 isstructured to selectively provide access to information relating toaccounts at the financial institution 104 (e.g., to the customer 102 viaa customer device 108). In some arrangements, the financial institutioncomputing system 110 includes other databases, such as customer documentand information databases structured to store non-account relatedinformation or other documents associated with the customer 102 fordistribution to third-parties at the approval of the customer 102.

Still referring to FIG. 1 , the system 100 includes at least onethird-party system 106. Each third-party system 106 is affiliated with athird-party that the customer 102 can authorize to access informationassociated with the customer 102 that is stored, generated, maintained,and/or controlled in part by the financial institution 104. For example,the third-party systems 106 may be affiliated with any combination ofmerchants (e.g., brick-and-mortar retailers, e-commerce merchants,etc.), financial health companies (e.g., investment firms, Mint®, etc.),mobile wallet systems (e.g., third-party mobile wallet systems notaffiliated with or operated by the financial institution 104, mobilewallet systems affiliated with or operated by the financial institution104), payment networks (e.g., payment networks affiliated with creditcards offered by the financial institution 104), social media networks,service providers (e.g., tax filing services), cloud storage systems(e.g., document back-up systems, such as Google® Drive, Dropbox®, etc.),utility providers (e.g., electric companies, cable companies, cell phoneproviders, gas companies, etc.), messaging networks, personal organizers(e.g., calendar and scheduling services, bill pay services, e-mailsystems, etc.), governments, businesses (e.g., employers, businessesrequesting information concerning the customer 102), or the like. Eachof the third-parties may be provided access to different portions of theinformation associated with the customer 102 that is stored, generated,maintained, and/or controlled in part by the financial institution 104.For example, an e-commerce merchant may be provided access to paymentaccount and billing address information, while a financial healthcompany may be provided access to account balance information andtransaction information. As described in further detail below, thecustomer 102 can provide a given third-party access to designatedinformation, limit access to information, and revoke access toinformation through an access control portal (“access control tower”)provided by the financial institution 104.

The customer 102 is associated with various customer devices 108. Thecustomer devices 108 may include, for example, smartphones, tabletcomputers, laptop computers, desktop computers, wearables (e.g., smartwatches, smart glasses, fitness trackers, etc.), internet of things(“IOT”) devices (e.g., Amazon Echo®, smart appliances, etc.). Each ofthe customer devices 108 may be provided access to different portions ofthe information associated with the customer 102 that is stored,generated, maintained, and/or controlled in part by the financialinstitution 104. For example, a smartphone may be provided access topayment account and billing address information for a mobile walletrunning on the smartphone, while an IOT device may be provided access topayment information, account balance information, and transactioninformation to execute purchases and review transactions. As describedin further detail below, the customer 102 can provide a given customerdevice 108 access to designated information, limit access toinformation, and revoke access to information through the access controltower provided by the financial institution 104. In some arrangements,the customer devices 108 do not communicate with the financialinstitution computing system 110 via the network 126. For example, thecustomer devices 108 can include payment cards (e.g., credit cards,debit cards, smart cards, etc.) that have account information that canbe linked by the financial institution computing system 110 to accountinformation and customer preferences stored at the financial institutioncomputing system 110.

The devices of the system 100 communicate via the network 126. Thenetwork 126 may include any combination of the Internet and an internalprivate network (e.g., a private network maintained by the financialinstitution 104). Through data communication over the network 126, thefinancial institution computing system 110 can share customerinformation with the third-party systems 106 and the customer devices108.

The financial institution computing system 110 includes customerinformation APIs 128 that define how the financial institution computingsystem 110 communicates customer information with the third-partysystems 106 and the customer devices 108. The APIs facilitate thesharing of and access to the customer information stored at thefinancial institution computing system 110 based on permissions andpreferences provided by the customer 102.

The access control circuit 122 controls access to the customerinformation by the third-party systems 106 and the customer devices 108via the APIs 128. In some arrangements, the financial institutioncomputing system 110 provisions requested customer data to a giventhird-party system 106 or customer device 108 for local storage on thethird-party system 106 or the customer device 108. For example, thefinancial institution computing system 110 can provision paymentinformation, such as payment tokens associated with payment accounts, toa mobile wallet system for local storage at the mobile wallet system. Inother arrangements, the financial institution computing system 110provides access to remotely display, present, or analyze customerinformation stored at the financial institution computing system 110while the financial institution computing system 110 retains controlover the customer information. For example, the financial institutioncomputing system 110 can provide access to a financial health system topresent designated customer account information through a financialhealth website, such as balances, transaction information, and the like,when the financial health system requests the information, withoutdirectly transmitting the data to the financial health system.

Generally, through the information management system 100, the customer102 can provision access to customer information to third-party systems106 and to customer devices 108 (e.g., by permitting the third-partysystem 106 or the customer device 108 to communicate with the financialinstitution computing system 110 to retrieve the customer information).The customer information is maintained by the financial institution 104via the financial institution computing system 110. The customerinformation can include any information associated with the customer 102that is generated by or maintained by the financial institution 104,including customer account information (e.g., account numbers, billingaddress, balance information, transaction information, account typeinformation, account statements, etc.), personal information (e.g., dateof birth, social security number, tax identifications, addresses, phonenumbers, e-mail addresses, aliases, etc.), information provided to thefinancial institution 104 during the account opening process (e.g.,driver's license scans, passport scans, marriage certificates, propertydeeds, etc.). Additionally, customer information can include any otherinformation provided by the customer 102 to the financial institution104 for the purposes of controlling access to the provided information.This other information may include data files, personal information,documents, or the like. The customer 102 can provision access to thecustomer information through the third-party, the customer device 108,or via the FI computing system data control tower. Additionally, thecustomer 102 can manage all previously provided access permissions viathe data control tower to change an access level, set permissions,revoke access, or the like. As described herein, the provision of thecustomer information can be managed on a payment level (e.g., managingall third-party and device access to customer account identifyinginformation such as account numbers and billing addresses for thepurposes of making payments), on an application level (e.g., managingthird party and device access to customer information for purposes ofincorporating such information into third party applications), and on adevice level (e.g., managing the devices that may receive the customerinformation).

Referring now to FIG. 2 , a more detailed view of a customer device 108is shown, according to an example embodiment. The customer device 108shown in FIG. 2 is a customer mobile device 200. The customer mobiledevice 200 is structured to exchange data over the network 126, executesoftware applications, access websites, generate graphical customerinterfaces, and perform other operations described herein. The customermobile device 200 may include one or more of a smartphone or othercellular device, a wearable computing device (e.g., eyewear, a watch orbracelet, etc.), a tablet, a portable gaming device, a laptop, and otherportable computing devices.

In the example shown, the customer mobile device 200 includes a networkinterface 202 enabling the customer mobile device 200 to communicate viathe network 126, an input/output device (“I/O” device) 204, third partyclient applications 206, and a financial institution client application208. I/O device 204 includes hardware and associated logics configuredto to exchange information with a customer and other devices (e.g., amerchant transaction terminal). An input aspect of the I/O device 204allows the customer to provide information to the customer mobile device200, and may include, for example, a mechanical keyboard, a touchscreen,a microphone, a camera, a fingerprint scanner, any customer input deviceengageable to the customer mobile device 200 via a USB, serial cable,Ethernet cable, and so on. An output aspect of the I/O device 204 allowsthe customer to receive information from the customer mobile device 200,and may include, for example, a digital display, a speaker, illuminatingicons, LEDs, and so on. The I/O device 204 may include systems,components, devices, and apparatuses that serve both input and outputfunctions, allowing the financial institution computing system 110exchange information with the customer mobile device 200. Such systems,components, devices and apparatuses include, for example, radiofrequency transceivers (e.g., RF or NFC-based transceivers) and othershort range wireless transceivers (e.g., Bluetooth®, laser-based datatransmitters, etc.).

Third party client applications 206 are structured to provide thecustomer with access to services offered by various third parties (e.g.,associated with third party systems 106). Some third party clientapplications 206 may be hard coded onto the memory of the customermobile device 200, while other third party client application 206 may beweb-based interface applications, where the customer has to log onto oraccess the web-based interface before usage, and these applications aresupported by a separate computing system comprising one or more servers,processors, network interface circuits, or the like (e.g., third partysystems 106), that transmit the applications for use to the mobiledevice.

In some arrangements, the third party client applications 206 arestructured to permit management of at least one customer accountassociated with a third party service. Accordingly, a particular thirdparty client application 206 may be communicably coupled to a thirdparty system 106 via the network 126. Through this communicativecoupling, the third party system 106 may provide displays regarding theparticular third party service or application. For example, one thirdparty client application 206 may include a calendar application, and thedisplays provided by third party client application 206 may enable thecustomer 102 to input information regarding customer events, meetings,appointments (e.g., information regarding the timing and location ofcustomer events). Upon the customer 102 inputting such informationregarding the customer events, the customer-input information is storedat a third party system 106, and incorporated into future displaysprovided to the customer 102 via the third party client application.Through such displays, the customer 102 is able view thepreviously-input information via a calendar interface. Other third partyclient applications 206 include, but are not limited to financial healthapplications (e.g., applications configured to provide the customer 102with financial advice), and social media applications.

In some embodiments, some of the third party client applications 206include APIs specifically configured to request information from thefinancial institution computing system 110. For example, the financialinstitution 104 may have arrangements with third parties providing thirdparty client applications 206. Under such arrangements, the customer 102is able to provide particular third party client applications 206 withaccess to subsets of information pertaining to the customer 102 storedat the financial institution computing system 110 (e.g., in the accountsdatabase 124). Upon the customer 102 providing such permission to athird party client application 206, the customer mobile device 200 maytransmit information requests to the financial institution computingsystem 110 via such APIs, and utilize information received from thefinancial institution computing system 110 to update the displaysrendered viewable by the customer 102 via the third party clientapplication 206.

To illustrate, the customer 102 may provide a calendar application withcustomer bill payment information stored at the financial institutioncomputing system 110. The calendar application may include a widgetspecifically configured to enable the customer 102 to insert the billpayment information into the calendar application. This way, thecustomer 102 is reminded of bill payments in the third party clientapplication 206.

In various arrangements, the particular communications channel throughwhich customer financial information is provided to the third partyclient application 206 may vary depending on the implementation of thethird party client application 206. For example, if the third partyclient application 206 is web-based, a third party system 106 providingthe third party client application 206 to the customer mobile device 200may receive the customer information maintained at the financialinstitution computing system 110, and incorporate that information intovarious displays rendered on the customer mobile device 200 via thethird party client application 206

In situations where a third party client application 206 is a nativeapplication on the customer mobile device 200, the customer mobiledevice 200 may formulate and transmit an information request via an APIin the third party client application 206 to the financial institutioncomputing system 110. The information request may include an identifier(e.g., encryption key) that is based at least in part on the identity ofthe third party client application 206, on the type of information thatmay be shared with the third party client application 206, and/or on thecustomer devices 108 from which the information request may betransmitted. In some implementations, the information request may berouted via financial institution client application 208. For example,the third party client application 206 may make a request to thefinancial institution client application 208, which obtains therequested information from the financial institution computing system110. As such, depending on the application permissions provided by thecustomer 102 via the methods described herein, the financial institutioncomputing system 110 (and/or the financial institution clientapplication 208) may allow or deny the third party client application206 access to the requested information.

The financial institution client application 208 is structured toprovide displays to the customer mobile device 200 that enable thecustomer 102 to manage financial accounts. Accordingly, the financialinstitution client application 208 is communicably coupled to thefinancial institution computing system 110 (e.g., the account managementcircuit 120 and the access control circuit 122) and is structured topermit management of the customer financial accounts and transactions.The displays provided by the financial institution client application208 may be indicative of current account balances, pending transactions,profile information (e.g., contact information), and the like.

Further, in some embodiments, the financial institution clientapplication 208 is structured to present displays pertaining to theaccess control tower discussed herein. In this regard, via the financialinstitution client application 208, the customer mobile device 200 isconfigured to receive various datasets from the financial institutioncomputing system 110 describing the entities (e.g., third party systems106, customer devices 108, third party applications 206) to which thecustomer 102 has provided access to customer financial information. Thecustomer mobile device 200, via the financial institution clientapplication 208, is configured to render such datasets into various datacontrol tower interfaces. As described herein, through such interfaces,the customer 102 is able to modify the quantity of information availableto these entities, and provide additional entities with access toinformation at the financial institution computing system 110.

In some embodiments, the customer mobile device 200 is configured (e.g.,via the financial institution client application 208) to perform variousoperations described herein as being performed by the financialinstitution computing system 110. For example, in one embodiment,financial institution client application 208 includes APIs structured tointegrate with various third party client applications 206 on thecustomer mobile device 200. Through such APIs, customer informationreceived from the financial institution computing system 110 via thefinancial institution client application 208 may be shared with thethird party client applications 206, and utilized by the third partyclient applications 206.

In some embodiments, the financial institution client application 208 isa separate software application implemented on the customer mobiledevice 200. The financial institution client application 208 may bedownloaded by the customer mobile device 200 prior to its usage, hardcoded into the memory of the customer mobile device 200, or be aweb-based interface application such that the customer mobile device 200may provide a web browser to the application, which may be executedremotely from the customer mobile device 200. In the latter instance,the customer 102 may have to log onto or access the web-based interfacebefore usage of the applications. Further, and in this regard, thefinancial institution client application 208 may be supported by aseparate computing system including one or more servers, processors,network interface circuits, etc. that transmit applications for use tothe customer mobile device 200.

It should be understood that other customer devices 108 (e.g., customerdevices 108 other than a customer mobile device 200) may includeapplications that are similar to the third party client applications 206and financial institution client application 208 discussed above. Forexample, a customer smart appliance may include an applicationassociated with the financial institution 104 that enables the customer102 to view the access control tower, and manage customer accounts. Inanother example, a customer smart speaker may include an applicationthrough which the customer 102 may modify access permissions to variousentities via voice commands.

Referring to FIG. 3 , a flow diagram of a method 300 of managing accessto customer information maintained by the financial institution 104 isshown according to an example embodiment. The method 300 is performed bythe financial institution computing system 110 (e.g., by the accesscontrol circuit 122, by the processor 116, etc.).

The method 300 begins when a customer 102 is authenticated at 302. Thefinancial institution computing system 110 receives an authenticationrequest from the customer 102 via a computing device associated with thecustomer (e.g., a smartphone via a mobile banking application, acomputing device via a web-based banking portal, etc.). In an alternatearrangement, the request may be received via an ATM (or other computingdevice allowing a user to perform financial transactions, such asreceiving cash, making payments, transferring funds, etc.) associatedwith the financial institution 104. The authentication request indicatesthat an individual purporting to be the customer 102 is attempting toaccess the access control tower to manage access to the customerinformation associated with the customer 102. The authentication requestincludes customer authentication information (e.g., customer name,password, biometric, debit card dip in an ATM, PIN, etc.). Based on thecustomer authentication information, the request is either granted ordenied. If the request is denied, step 302 of the method 300 does notoccur, and the method 300 ends. The description of the method 300continues for situations in which the customer 102 is authenticated.

Access to the data control tower portal is provided at 304. After thecustomer 102 is authenticated, the financial institution computingsystem 110 provides the customer 102 access to the data control towerportal. The access to the data control tower portal may be facilitatedthrough a computing device associated with the customer (e.g., asmartphone via a mobile banking application, a computing device via aweb-based banking portal, etc.). The computing device presentsinteractive graphical customer interfaces to the customer 102 throughwhich the customer 102 can manage the access controls for the customerinformation. The data control tower portal may be part of a mobilebanking application or a remote banking website associated with thefinancial institution 104. As noted above, in some arrangements, theaccess to the customer information can be managed on a payments level(e.g., managing all of the third parties that the customer 102 mayengage in a transaction with accounts held by the customer 102 at thefinancial institution 104), on a device level (e.g., managing whichcustomer devices 108 have access to data stored at the financialinstitution computing system 110), and on an application level (e.g.,managing all third party client applications 206 on a customer mobiledevice 200 that have access to information stored at the financialinstitution computing system 110). FIGS. 4-7 and FIGS. 11-13 showexample customer interfaces associated with the data control tower thatdemonstrate various management features of the data control tower.

Referring to FIG. 4 , a data control tower customer interface 400 isshown according to an example embodiment. The customer interface 400 isshown as a display on the customer mobile device 200. The customerinterface 400 includes a payments toggle 404, an applications toggle406, and a devices toggle 408. As shown by the bolded outline of thepayments toggle 404, the payments toggle 404 is selected. Accordingly,the customer interface 400 is a payment level customer interface. Whilein the payment level customer interface, the customer 102 can select anaccount held by with the financial institution 104 via the dropdown box410. As shown in FIG. 4 , the customer 102 has selected a checkingaccount. After selecting a specific account, a merchant listing 412 anda wallet listing 418 is populated. Each entry in the merchant listing412 identifies a merchant (e.g., brick-and-mortar merchants andecommerce merchants) to which the customer 102 has provided or mayprovide permission to make a payment with an account (e.g., the selectedchecking account) held by the customer 102 at the financial institution104.

To populate the merchant listing 412, the financial institutioncomputing system 110 may access the accounts database 124. For example,the access control circuit 122 may retrieve a customer transactionhistory from the accounts database 124 and identify various merchants atwhich the customer 102 performed transactions using the selectedchecking account (or other accounts held by the customer 102 at thefinancial institution 104). Alternatively, the customer 102 may havepreviously permitted the financial institution 104 to provide accountinformation to various merchants (e.g., via the add button 426 describedbelow). Alternatively, the financial institution computing system 110may transmit various requests to third party systems 106 which, inresponse (e.g., via various APIs provided at the third party systems106) may transmit indications to the financial institution computingsystem 110 that the customer 102 has provided information describing thechecking account (e.g., an account number) to the third party system106. For example, the financial institution 104 may have arrangementswith various merchants. Under such arrangements, the merchants may agreeto notify the financial institution 104 upon the customer providinginformation associated with the financial institution 104 (e.g.,information pertaining to a customer account) to the merchant.

Each entry in the merchant listing 412 may include a display button 414as well as a status indicator 416. By pressing the display button 414associated with a particular entry, the customer may provide an input toprogram logic being executed by the customer mobile device 200 (e.g.,program logic that is part of the financial institution clientapplication 208) to update the interface 400 to incorporate a merchantaccess mechanism for the merchant of the entry. The merchant accessmechanism may be incorporated into the interface 400 in a similar manneras the wallet access mechanisms 424 described below. The merchant accessmechanism may identify the information pertaining to the checkingaccount (or other account) that was provided to the merchant. In variousembodiments, the merchant access mechanism may include a tokenizedaccount number (e.g., a surrogate value for the actual account number ofthe checking account), an actual account number, a debit card number,and so on.

The status indicators 416 indicate the status of various accesspermissions that the customer 102 has provided to various merchants. Inthe example shown in FIG. 4 , the customer 102 is currently permittingeach of the merchants identified in the merchant listing 412 to accessat least some form of customer information maintained at the financialinstitution computing system 110. However, in some embodiments, thecustomer 102 may provide an input to program logic being executed by thecustomer mobile device 200 by interacting with the status indicators416. For example, the customer 102 may revoke a particular merchant'spermission to access customer information by pressing the “off” portionof a particular status indicator 416. In response, the customer mobiledevice 200 may transmit a notification signal to the financialinstitution computing system 110 and, in response, the access controlcircuit 122 may update the permissions for that merchant such that thefinancial institution computing system 110 will not grant variousinformation requests regarding the customer 102 transmitted by the thirdparty system 106 to the financial institution computing system 110 overthe network 126. Alternatively or additionally, the financialinstitution computing system 110 may update settings associated with thecustomer 102's account such that any transaction request from thatmerchant is denied. Thus, by the interface 400, the customer 102 is ableto control the access of various third party systems 106 to information.

Still referring to FIG. 4 , the interface 400 further includes a walletlisting 418. The wallet listing 418 may include various entries (e.g.,wallet 1 and wallet 2) describing various payment services that thecustomer has permitted the financial institution 104 to provide accountinformation to. The payment services may include applications throughwhich the customer 102 may perform various types of transactions (e.g.,online transactions, person-to-person transactions, mobile wallettransactions, etc.). As such, entries in the wallet listing 418 mayinclude mobile wallet applications (e.g., Samsung Pay®, Apple Pay®,etc.) and person-to-person payment applications (e.g., Venmo®, Zelle™,PayPal®, etc.). Similar to the entries in the merchant listing 412discussed above, each entry may include a display button 420 and astatus indicator 422. As indicated by the bolded outline of the displaybutton 420, the display button 420 associated with a particular entry inthe wallet listing 418 has been selected by the customer 102. As shown,upon the customer 102 selecting the display button 420, various walletaccess mechanisms 424 are shown.

The wallet access mechanisms 424 may include the information that thecustomer 102 has permitted the payment service associated with the entry(e.g., wallet 2) of the wallet listing to access by the methodsdescribed herein. In the example shown, the wallet access mechanisms 424present the customer 102 information pertaining to all accountinformation that the customer 102 has permitted the payment service toaccess. As such, wallet access mechanisms 424 include an account numberassociated with both a credit account and a debit account (e.g.,associated with the checking account). It should be understood that, inalternative arrangements, only wallet access mechanisms associated withthe account selected via the dropdown box 410 may be shown.Additionally, different wallet access mechanisms 424 such as tokens,account names, and the like associated with the customer 102's accountsmay also be shown. As shown in FIG. 4 , the customer 102 has turned offthe payment service's access to the debit card number associated withthe checking account, and permitted the payment service to access toaccess the credit card number associated with a credit account held bythe customer 102. In some embodiments, responsive to the customer 102revoking an access permission to a particular wallet, the financialinstitution computing system 110 may transmit a signal to a third partywallet provider associated with the wallet configured to cause a paymenttoken or the like to be deleted at the third party wallet provider.

The customer interface 400 also includes an add button 426 and a deletebutton 428. If the customer 102 interacts with the add button 426, thecustomer 102 can add a new merchant and/or payment service to themerchant listing 412 and/or wallet listing 418. For example, in responseto the customer 102 selecting the add button 426, an additionalinterface is presented to the customer 102. The additional interface mayinclude a drop down menu listing various merchants that the customer 102may select to provide permission to access the customer information.Additionally, the interface may enable the customer 102 to identify theparticular information that may be provided to the identified merchant.Upon the customer selecting a particular merchant to grant permission,the financial institution computing system 110 may update the accesspermissions stored in association with the account of the customer 102.As a result, upon receipt of a request from the identified merchant(e.g., via a third party system 106 over the network 126), the financialinstitution computing system 110 may provide the selected information tothe merchant.

Referring to FIG. 5 , a data control tower customer interface 500 isshown according to an example embodiment. The customer interface 500 issimilar to the customer interface 400. As such, like numbering is usedbetween FIGS. 4 and 5 to designate like components of the customerinterfaces 400 and 500. The customer interface 500 is shown as beingdisplayed on the customer mobile device 200. As with the customerinterface 400, the customer interface 500 includes the payments toggle404, the application toggle 406, and the devices toggle 408. As shown bythe bolded outline of the applications toggle 406, the applicationstoggle 406 is selected. Accordingly, the customer interface 500 is anapplication level management customer interface. As shown, the interface500 includes a listing 502 of various applications that the customer 102has provided access to various forms of customer information maintainedat the financial institution computing system 110. The listing 502 mayinclude various third party client applications 206 installed on thecustomer mobile device 200 and/or other customer devices 108 that thecustomer 102 has provided access to information stored at the financialinstitution computing system 110.

Similar to the interface 400 discussed above, each entry in theapplication listing 502 may include a display button 504 and a statusindicator 506. As indicated by the bolded outline of the display button504, the customer 102 has selected the display button 504 to cause anapplication access mechanism 508 to be shown. The application accessmechanism 508 may include a description of the customer information towhich the customer 102 has provided the application access. In theexample shown, the application associated with the selected displaybutton 504 is a calendar application and the access mechanism is thecustomer's bill payments. By providing the calendar application withaccess to the customer 102's bill payments, the customer 102 may bereminded of upcoming payments via the calendar application. As such,various events or reminders may be created by the calendar applicationbased on the information provided by the financial institution 104. Forexample, upon the customer 102 providing the calendar application withaccess to customer bill payment information (e.g., describing therecipient of the upcoming payment, the due date, and the amount owed),the calendar application may list upcoming payments owed by the customer102.

The customer 102 may first provide the calendar application with accessto customer bill payment information by, for example, hitting the addbutton 426. Upon the customer 102 hitting the add button 426, thecustomer 102 may be brought to another interface enabling the customer102 to identify an application to provide with access to customerfinancial data.

Referring now to FIG. 6 , a data control tower customer interface 600 isshown according to an example embodiment. Like numbering is used betweenFIGS. 4-6 to designate like components of the customer interfaces 400,500, and 600. The customer interface 600 is shown as displayed on thecustomer mobile device 200. As with the customer interfaces 400 and 500,the interface 600 includes a payment toggle 404, and application toggle406, and a devices toggle 408. As shown by the bolded outline of theapplication toggle 406, the application toggle 406 is selected. In someembodiments, the customer interface 600 is presented upon the customer102 selecting the add button 426 of the interface 500 discussed above.The interface 600 includes an application dropdown 602, a featuresdropdown 604, an account selection dropdown 606, a cancel button 608,and a submit button 610. The application dropdown 602 includes a list ofvarious applications. For example, upon the customer 102 selecting theadd button 426 on the interface 500, program logic being executed by aprocessor of the customer mobile device 200 may access an applicationregistry to identify various applications installed on the customermobile device 200. The application dropdown 602 may include an entry foreach application installed on the customer mobile device 200.Alternatively, the application dropdown 602 may include a subset of theapplications installed on the customer mobile device 200. For example,the financial institution 104 may only share customer information with aset of applications provided by trusted entities. As such, the programlogic being executed by the processor of the customer mobile device 200may cross reference the applications that are installed on the customermobile device 200 with a list of trusted applications (e.g., based onapplication keys, titles, or the like) and incorporate the trustedapplications that are installed on the customer mobile device 200 intothe application dropdown.

The features dropdown 604 may include a dropdown list of various formsof information maintained by the financial institution computing system110. Using the features dropdown, the customer 102 may select the formsof information to share with the application selected via theapplication dropdown 602. In some arrangements, the forms of informationprovided by the features dropdown 604 may be dependent on the particularapplication selected by the customer 102. Accordingly, once the customer102 selects an application via the application dropdown, the featuresdropdown 604 may be populated. In the example shown, the customer 102has selected a calendar application via the application dropdown 602 andselected to provide the calendar application with access to informationregarding customer bill payments. After providing the calendarapplication with such access, the customer 102 may setup the calendarapplication to use the bill payment information. Such a setup process isdescribed below in relation to FIGS. 8 and 9 .

The accounts dropdown 606 lists various accounts held by the customer102 at the financial institution 104. The customer 102 may select theaccount to use in conjunction with the selected application and/orfeature. In the example shown, the customer 102 has selected a checkingaccount to use in conjunction with a bill payment features integratedwith the calendar application. Thus, according to the processesdescribed below, the customer 102 may setup payments via the calendarapplication using the selected payment account. The cancel button 608enables the customer 102 to cancel adding an application to the listing502 of the interface 500. In some embodiments, upon the customer 102selecting the cancel button 608, the customer 102 is brought back to theinterface 500. The submit button 610 enables the customer 102 to providean input to the program logic being executed to the customer mobiledevice 200 to share the identified information with the selectedapplication. As such, the selected information may be incorporated intothe selected application to facilitate the customer 102's utilization ofthe selected application.

Referring now to FIG. 7 , a data control tower customer interface 700 isshown according to an example embodiment. The customer interface 600 issimilar to the customer interfaces 400 and 500. Like numbering is usedbetween FIGS. 4-7 to designate like components. The customer interface700 is shown as displayed on the customer mobile device 200. As withcustomer interfaces 400 and 500, the customer interface 700 includes thepayments toggle 404, the applications toggle 406, and the devices toggle408. As shown by the bolded outline of the devices toggle 408, thedevices toggle 408 is selected by the customer 102. Accordingly, thecustomer interface 700 is a device level management customer interface.While in the device level management customer interface, the customer102 can manage the information that various customer devices 108 haveaccess to.

In the example shown, the interface 700 includes a device listing 702.The device listing may list various customer devices 108 that thecustomer 102 has registered with the financial institution 104. Forexample, for each customer device 108, the customer 102 may download andinstall an application provided by the financial institution 104, orregister the customer device 108 via a website provided by the financialinstitution computing system 110. Upon registration and/or installation,a device identifier may be assigned to each customer device 108 by thefinancial institution computing system 110 and stored in associationwith the customer 102 (e.g., in the accounts database 124). Upon thecustomer 102 accessing the data control tower portal (e.g., at step 304of the method 300), the financial institution computing system 110 mayretrieve the various device identifiers stored in association with thecustomer 102 and transmit a device dataset to the customer mobile device200 that is used by, for example, a mobile banking application of thecustomer mobile device 200 to populate the listing 702.

Various forms of customer devices 108 may populate various entries ofthe listing 702. Customer devices 108 may include, for example, smartphones, wearable computing devices (e.g., smart watches, smart glasses,and the like), smart speakers, vehicle computing devices, various IOTdevices (e.g., thermostats, appliances, televisions, and the like),smart phones, tablets, video game consoles, and the like. Similar to theinterfaces 400 and 500, each entry in the listing 702 may include adisplay button 704 and a status indicator 706. As shown by the boldedoutline of the display button 704, the display button 704 of thatparticular entry has been selected by the customer 102. Selection of thedisplay button 704 causes a device access mechanism 708 to be presentedto the customer 102. Device access mechanism 708 may inform the customer102 as to the type of information that may be accessed via the customerdevice 108 associated with the entry. In the example shown, the customer102's smart speaker (e.g., an Amazon Echo®) has been provided withaccess to the transaction history of the customer maintained at theaccounts database 124. In some embodiments, in response to the customer102 selecting the display button 704, a plurality of potential deviceaccess mechanisms 708 may be presented to the customer 102. The deviceaccess mechanisms 708 may include all potential information that thecustomer may provide to the customer device 108 associated with theselected entry. Depending on the implementation, such device accessmechanisms may include, amongst other things, customer account balanceinformation, customer bill payment information, a customer transactionhistory, customer alerts, and customer account identifying information(e.g., account numbers, tokens, etc.).

By hitting the display button 704, the customer 102 may selectivelymodify the access of various customer devices 108 to various forms ofinformation via manipulation of the status indicators 706. For example,by manipulating a status indicator 706 relating to a particular customerdevice 108, the customer 102 may provide an input to program logic(e.g., of a mobile banking application) being executed by the processorthe customer mobile device 200. The input may cause the customer mobiledevice 200 to transmit a signal to the financial institution computingsystem 110 over the network 126 causing the financial institutioncomputing system 110 to update customer account settings. For example,upon receipt of such a signal, the financial institution computingsystem 110 may update an entry of a customer device dataset maintainedat the accounts database 124. The entry may include the deviceidentifier discussed above associated with the selected customer device108 as well as various access permissions. The entry may be updated suchthat, if the customer 102 were to attempt to access information from theselected customer device 108, the information would not be provided tothe customer device 108 (e.g., the customer 102 may be presented with an“information unavailable” screen, or the like).

While the above examples relate to interfaces presented to the customer102 via a customer mobile device 200, it should be understood that thecustomer 102 may perform similar operations with respect to severalother types of customer devices 108. For example, the customer 102 mayalso adjust the third party systems 106 that have access to the customerfinancial information via a smartwatch, a smart appliance, a computingsystem in a vehicle of the customer 102, a smart speaker, and any othercustomer device 108 via applications or websites associated with thefinancial institution 104 implemented thereon.

Referring again to FIG. 3 and the method 300, updated access permissionsor settings are received at 306. The financial institution computingsystem 110 receives the updated access permissions or settings from thecustomer 102 via the access control tower portal (e.g., from a computingdevice that the customer 102 is using to access the access control towerportal). The updated access permissions or settings may relate tomerchants, payment services, applications, and devices discussed withrespect to FIGS. 4-7 .

The financial institution computing system 110 determines if externalaction is required to implement the updated access permissions orsettings at 308. In some arrangements, the type of access permission orsetting being updated requires that the financial institution computingsystem 110 transmits commands to a customer device 108 or to athird-party system 106 to implement the updated access permissions orsettings. For example, if the updated access permission or settingrelates to revoking or provisioning a payment token stored on a customerdevice 108, the financial institution computing system 110 may need tosend a command to either (1) deactivate or remove the payment token fromthe customer device 108 or the third-party systems 106 affiliated withthe mobile wallet (e.g., a third-party mobile wallet server, a paymentnetwork server that manages a token vault associated with the paymenttoken, etc.) or (2) activate or provision the token to the mobile walletvia the customer device 108 and/or the third-party systems 106. In otherarrangements, the type of access permission or setting being updated canbe performed at the financial institution computing system 110 withoutadditional commands sent to a customer device 108 or a third-partysystem 106. For example, if the updated access permission or settingrelates to revoking a third-party's access to account balanceinformation, the financial institution computing system 110 can performan internal update at the financial institution computing system 110adjusting the API permissions associated with the third-party withoutthe need to send a command to the third-party system 106 associated withthe affected third-party.

If external action is required, commands are transmitted to theappropriate recipient at 310. The financial institution computing system110 transmits the update commands to the appropriate third-party systems106 and/or customer devices 108. If no external action is required, theupdated access permissions or settings are implemented at 312. Thefinancial institution computing system 110 updates internal accountaccess permissions or settings in the accounts database 124.Additionally, in some arrangements, the update to the account accesspermissions or settings requires both external and internal action. Insuch arrangements, both steps 310 and 312 are performed. Based on theupdated settings and permissions, the financial institution computingsystem 110 facilitates the sharing (or denial of requests to access)customer information to the external systems (e.g., customer devices 108and third-party systems 106).

In an example implementation, the customer 102 may utilize the datacontrol portal to update payment information stored at various thirdparty systems 106. For example, if the customer 102 gets a new accountat the financial institution 104 or loses a credit card, the customer102 may wish to update the payment information stored at the variousthird party systems 106. In some embodiments, upon the customer 102updating account information stored in the accounts database 124, thefinancial institution computing system 110 (e.g., via the access controlcircuit 122) is configured to provide the updated information to thevarious third parties, applications, and devices to which the customerhas provided access via the data control portal. For example, upon thecustomer changing an account number, the financial institution computingsystem 110 may transmit an information packet including the updatedaccount information and a customer identifier to the third party system106 associated with a particular merchant. Such customer identifiers maybe established between the financial institution 104 and third partyupon the customer providing the third party with access to informationstored at the financial institution computing system 110. Thus, based onthe customer identifier, the third party system 106 may identify acustomer account at the third party (e.g., a shopping account) andupdate the customer's financial information associated with the account.Such a process may be repeated for any third party systems 106 havingaccess to customer financial information. As such, the customer need notupdate account information stored at individual third party systems 106,as this can be accomplished via a single visit to the data controltower.

Referring now to FIG. 8 , a third party client application interface 800is shown, according to an example embodiment. The third party clientapplication interface 800 may be rendered by a third party clientapplication 206 on the customer mobile device 200 upon the customer 102providing the third party client application 206 with access tofinancial data (e.g., as discussed above with respect to FIGS. 5 and 6). In the example shown, the third party client application 206 is acalendar application. As such, the interface 800 includes a calendarwindow 802 describing various customer events. The interface 800 alsoincludes addition buttons 804 enabling the customer 102 to add itemsthat are included in the calendar window 802. In the example shown,among the addition buttons 804 is a financial event button 806. In anexample, the third party client application 206 rendering the interface800 includes a widget specifically configured to generate the financialevent button 806 upon receipt of financial data from the financialinstitution computing system 110. In the example shown, the customer 102has provided the third party client application 206 with informationregarding customer bill payments (coinciding with the example shown inFIG. 6 ).

In an example, upon the customer 102 selecting the financial eventsbutton 806, the third party client application 206 configures thecustomer mobile device 200 to request customer bill payment information(e.g., via the customer mobile device 200 or via a combination of thecustomer mobile device 200 and a third party system 106) from thefinancial institution computing system 110. In response, the financialinstitution computing system 100 verifies that the access permissionsstored in association with the customer 102 permit the requestedinformation to be provided to the third party client application 206. Ifso, the requested customer financial data is provided to a computingsystem (e.g., the customer mobile device 200 or a third party system106) associated with the third party client application 206.

Third party client application interface 800 further includes afinancial information window 808 that includes the customer financialinformation received from the financial institution computing system110. In the example shown, the financial information window 808 lists anupcoming bill payment 810. As such, through the systems and methodsdisclosed herein, the customer 102 is able to request and view financialdata from various vantage points.

Upon the customer 102 selecting the upcoming bill payment 810, thedisplays presented via the third party client application 206 may beupdated. Referring to FIG. 9 , another third party client applicationinterface 900 is shown, according to an example embodiment. Theapplication interface 900 may be presented to the customer 102 upon thecustomer 102 selecting the upcoming bill payment 810 discussed inrelation to FIG. 8 . As shown, the interface includes a calendar window902 describing various customer events. Calendar window 902 includes anadditional event 904 that describes the upcoming bill payment 810selected by the customer 102. Additionally, the interface 900 includesan addition button 906 enabling the customer 102 to input informationregarding an additional customer event.

Interface 900 also includes a payment window 908. For example, the thirdparty client application 206 rendering the interface 900 on the customermobile device 200 may include a payments widget configured to generatetransaction requests using customer account information received fromthe financial institution computing system 110 in accordance withvarious systems and methods disclosed herein. As discussed above inrelation to FIG. 5 , the customer may indicate a preference to provide athird party client application 206 with access to customer checkingaccount information. Thus, the financial institution computing system110, upon receiving an information request generated via the third partyclient application 206, may transmit both the customer bill paymentinformation and the customer checking account information. Suchinformation may be used by the third party client application 206 toformulate a transaction request in response to the customer 102indicating such a preference (e.g., via the payment button 910). Thepayments widget may enable the customer 102 to request that a payment bemade for the bill depicted by the additional event 904. The interface900 also enables the customer 102 to change the account informationshared with the third party client application 206 via an edit button912. Upon the customer 102 selecting the edit button 912 an additionalinterface may be displayed to the customer 102 that enables the customer102 to provide inputs to change the account used to make the depictedpayment.

Referring now to FIG. 10 , a data control tower interface 1000 is shown,according to an example embodiment. The data control tower interface1000 is shown as a display presented via the customer mobile device 200(e.g., via the financial institution client application 208). In someembodiments, the interface 1000 serves as an alternative to theinterfaces 400, 500, and 700 described above. As shown, the interface1000 includes a generic access toggle 1002 and an account-by-accounttoggle 1004. As indicated by the emboldened generic access toggle 1002,the generic access toggle 1002 has been selected by the customer 102.The interface 1000 includes a connection search box 1006, functionalityaccess points 1008, an entity listing 1010, and a device listing 1014.The connection search box 1006 enables the customer 102 to input theidentity of an entity (e.g., application, merchant, or device) to whichthe customer 102 has provided access to the customer information. Thefunctionality access points 1008 include various icons providing thecustomer with access to various functionalities provided via thefinancial institution client application 208. For example, thefunctionality access points 1008 may provide the customer with access toview balances associated with their accounts, transfer funds betweenaccounts, register for accounts, make payments via a mobile walletassociated with the financial institution 104, and view statementsassociated with the accounts.

The entity listing 1010 lists each entity (e.g., applications andmerchants) that the customer has provided any sort of access to thecustomer information stored at the financial institution computingsystem 110. The entity listing 1010 includes a plurality of selectableentries 1012. Each entry may list the number of accounts that have beenconnected to the associated entity. Upon the customer selecting aparticular entity, a different interface may be presented to thecustomer 102 enabling the customer 102 to update that entity's accesspermissions. The device listing 1014 lists each customer device 108having access to customer information. Similar to the entity listing1010, the device listing 1014 includes entries 1016 associated withparticular customer devices 108. While the entity listing 1010 and thedevice listing 1014 are shown as been separate from one another, itshould be understood that, in one embodiment, the entity listing 1006and device listing 1110 are combined into a single listing.

In various embodiments, the data control tower interface 1000 may takealternative forms. For example, in some embodiments, the generic accesstoggle 1002 enables the customer to view/scroll through variouscategories of accesses to customer information. For example, a firstcategory box may generally include a listing of the customer's accountsor cards associated with the financial institution 104. Via thiscategory box, the customer may select any of the cards to view variousforms of information regarding the selected card (e.g., balance, generaloff and on status, transaction listing, etc.). An example of such aninterface presented to the customer when the customer selects a card isdescribed with respect to FIG. 20 . Additional category boxes mayinclude recurring payments made via the customer's accounts at thefinancial institution 104, the customer's application data sharingpreferences, and the customer's mobile wallets. As such, the datacontrol tower interface 1000 provides the customer with a single accesspoint to perform a various diverse array of actions with respect totheir finances.

In some embodiments, an additional category of accesses to customerinformation may include aggregators that access the customer'sinformation at the financial institution 104 on behalf of the customerto perform functions on behalf of the customer. By selecting aparticular aggregator on the data control tower interface 1000, thecustomer may provide inputs to disable the aggregator's access tocustomer information. For example, the financial institution computingsystem 110 may update access permissions associated with the customerinformation APIs 128 to deny information requests coming from thirdparty systems 106 known to be associated with the aggregator. As such,the customer has control over the locations to which private informationis disseminated. Other aggregators may utilize customer accountinformation (e.g., account numbers) obtained from the financialinstitution 104 to make payments on behalf of the customer. For thesetypes of aggregators, the data control tower interface 1000 enables thecustomer to quickly turn off payments made by these aggregators.

In some instances, aggregators that customers permit to access theirinformation may provide the information to third parties (i.e.,“sub-aggregators.”). Such data transfers between aggregators andsub-aggregators limit the customers' ability to control locations atwhich their data is stored. Beneficially, the systems and methodsdescribed herein enable customers to prevent such transfers. This isaccomplished through the financial institution 104 monitoringrelationships between aggregators and various sub-aggregators. Forexample, as part of an information sharing arrangement between anaggregator and the financial institution 104 (e.g., to establish acustomer information API 128), the financial institution may require theaggregator to recurrently provide an updated listing of sub-aggregatorswith which they share information. Additionally, the financialinstitution 104 may require the aggregator to update their sharing ofcustomer information with the sub-aggregators in response to thecustomer providing an input to do so via the data control tower portaldescribed herein. Using the information provided by the aggregatorsunder such an arrangement, the financial institution 104 may maintain adirectory mapping aggregators to sub-aggregators.

In some embodiments, the directory is used to populate the data controltower interface 1000. For example, upon the customer providing an inputto view an aggregator's access permissions, the customer mobile device200 may query the directory for a listing of sub-aggregators associatedwith that aggregator (i.e., a listing of sub-aggregators that theselected aggregator shares information with). The listing ofsub-aggregators may appear on the data control tower interface 1000 inconjunction with a set of toggle switches enabling the customer to turnoff that sub-aggregator's access to the customer's information. Upon thecustomer turning off a sub-aggregator's access, the customer mobiledevice 200 (e.g., either directly or via the financial institutioncomputing system 110) may issue a command to a third party system 106associated with the selected aggregator to update data accesspermissions such that the customer information is no longer shared withthe indicated sub-aggregator. Thus, the data control tower portaldescribed herein provides the customer with very complete control of thelocations at which their information is accessed.

In various embodiments, a customer may choose to restrict sharing ofinformation in general or in relation to particular third parties,accounts, devices, applications, and/or types of information. Thecustomer may limit sharing of information by selecting, for example, a“restrict sharing” icon in a data control tower user interface. Incertain implementations, the customer may wish to prohibit a recipientof the customer's information (e.g., the third party, device, and/orapplication) from giving another third party, device, and/or applicationaccess to all of the information, or a subset of the information (e.g.,more sensitive information, such as financial account information). Insome versions, a level of sharing may be set on a spectrum ranging from“no sharing” to “all sharing allowed” using, for example, a slider thatmay be moved by swiping in one direction to reduce the level of sharingallowed, and an in opposing direction to increase the level of sharingallowed. In some implementations, example intermediary levels of sharingmay correspond with, for example, permission to share non-personalinformation only, permission to share non-financial information only,permission to share anonymized information only, permission to sharewith particular recipients or for particular purposes, etc. In certainimplementations, setting a level or type of sharing that is permittedmay allow the customer to set privacy settings with a third party tocontrol what is allowed to happen with the customer's information. Insome implementations, a limitation on information sharing may limit theservices or functionalities that can be provided by, for example, athird party computing system, an application, or a device. For example,restricting the sharing of financial information by a wallet applicationmay turn off one or more accounts (e.g., debit and credit cards) listedunder the functionality of the wallet application (see, e.g., 424 inFIG. 4 ) or the access to transactions to be provided to a computingdevice like a smart speaker (see, e.g., 704 in FIG. 7 )

Referring now to FIG. 11 , a data control tower interface 1100 is shown,according to an example embodiment. The data control tower interface1100 is similar to the data control tower interface 1000 described withrespect to FIG. 10 in that the interface 1100 also includes a genericaccess toggle 1002, an account-by-account access toggle 1004, and aconnections search box 1006. As indicated by the emboldenedaccount-by-account access toggle 1004, the account-by-account accesstoggle 1004 has been selected by the customer 102.

As shown, the interface 1100 includes a first account listing 1102 and asecond account listing 1106. The first and second account listings 1102and 1106 including listings 1104 and 1108 of various entities (e.g.,applications, customer devices 108, third party systems 106) that thecustomer has provided information regarding the associated account to.As such, the customer 102 may quickly view various locations thatcurrently have access to information associated with a particularaccount.

Referring now to FIG. 12 , an entity permission control interface 1200is shown, according to an example embodiment. The entity permissioncontrol interface 1200 (or another interface similar thereto) may bepresented to the customer 102 (e.g., via the financial institutionclient application 208) upon the customer selecting an entity in any ofthe listings 1010, 1014, 1102, and/or 1108 described with respect toFIGS. 10 and 11 . In the example shown, the interface 1200 is presentedto the customer 102 upon the customer 102 selecting a merchant inmerchant listing 1010 described with respect to FIG. 10 . As shown, theinterface 1200 includes an account selection portion 1202, a transactionlisting 1204, and an account access toggle switch 1206. The accountselection portion 1202 includes all of the accounts that the customer102 has enabled the merchant to access. The account selection portion1202 includes graphical depictions of the various accounts that thecustomer has provided access to. The customer 102 may swipe the accountselection portion 1202 to select a particular account. Upon the customerselecting an account, the customer mobile device 200 may query theaccounts database 124 to retrieve the customer's transactions with thatparticular account at the merchant, and use that data to populate thetransaction listing 1204. Alternatively, the customer mobile device 200and/or financial institution computing system 110 may initiatecommunications with an associated third party system 106 to obtain thecustomer 102's transaction data. As such, the transaction listing 1204presents the customer 102 with the customer's transactions at theassociated merchant occurring within a predetermined period (e.g., as ofaccount opening, last year, last month, etc.).

The account access toggle switch 1206 is configured to receive acustomer input to permit/revoke the depicted merchant's access toinformation associated with the selected account. In the example shown,the customer 102 is providing the third party system 106 associated withthe merchant with access to the account information. In response to thecustomer 102 switching the account access toggle switch 1206 to anopposing position, the customer mobile device 200 may transmit a commandto the financial institution computing system 110 causing the financialinstitution computing system 110 to update the customer 102's accesspermissions to prevent the merchant from having access to the associatedaccount information. In some embodiments, the account access toggleswitch 1206 is configured to receive a customer input to temporarilyinactivate the selected account.

In various embodiments, account information may be saved by a thirdparty for use in future transactions. For example, a customer may make apurchase at a merchant using a particular account (e.g., a credit ordebit card), and the merchant may save the account information so thatthe next time the customer makes a purchase from the merchant, thecustomer does not have to re-enter the account information. The customermay permit multiple online merchants to save information correspondingto several accounts for future use. The customer may subsequently changehis or her mind and wish that the saved account information be deleted.This may be accomplished, in some implementations, via a user interfaceallowing the customer to select or toggle, for example, a “delete savedaccount information” option with respect to one or more entities,without having to make separate, cumbersome requests with each entity.Deleting saved account information need not necessarily, in certainimplementations, restrict the entity from accessing the accountinformation for use for a transaction in the future (without saving theaccount information after the transaction has completed). Rather,deleting the saved information removes the information from the entity'sdatabases. Such removal decreases the risk that, if the entity'scomputing systems are hacked or the information in the databases isotherwise leaked or made public, the customer's information would becompromised. The ability to conveniently choose to delete savedinformation from one or more third-party databases via a control towerapplication, while still potentially making the information available tothe third party on an as-needed basis in the future, is less cumbersome,saving time and computing resources, and enhances the security ofsensitive customer information by better controlling its availabilityand retention.

Referring now to FIG. 13 , an entity permission control interface 1300is shown, according to an example embodiment. The entity permissioncontrol interface 1300 (or another interface similar thereto) may bepresented to the customer 102 (e.g., via the financial institutionclient application 208) upon the customer 102 selecting an entity in anyof the listings 1010, 1014, 1102, and/or 1108 described with respect toFIGS. 10 and 11 . In the example shown, the interface 1300 is presentedto the customer 102 upon the customer 102 selecting an application(e.g., a financial health application, or a payment servicesapplication) in listing 1010 described with respect to FIG. 10 . Theinterface 1300 includes a cash accounts listing 1302, a credit accountlisting 1308, and a payments toggle switch 1314. The cash accountslisting 1302 includes a general toggle switch 1304 and toggle switches1306 associated with individual cash accounts of the customer 102. Withthe general toggle switch 1304, the customer 102 may permit or revokethe associated application's access to information (e.g., transactionhistory, balance information, etc.) associated with all of thecustomer's cash accounts. Using the toggle switches 1306, the customermay revoke the application's access to individual cash accounts.Similarly, the credit account listing 1308 includes a general toggleswitch 1310 and individual toggle switches 1310 enabling the customer102 to permit or revoke access to information regarding the customer102's credit accounts.

The payments toggle switch 1314 is configured to receive a customerinput to enable or disable payments via the application associated withthe selected application. Thus, using the toggle switches 1304, 1306,1310, and 1312, the customer may permit the application to accessinformation associated with the depicted accounts. Using the paymentstoggle switch 1314, the customer generally enables payments to be madevia the selected application. In other words, the payments toggle switch1314 is configured to update a set of transaction rules maintained atthe financial institution computing system 110 (e.g., via the accountmanagement circuit 120). As a result, if the customer disables paymentsvia a particular application, any transaction requests received from thecustomer mobile device 200 via that application will be denied. As,such, the data control portal enables the customer 102 to manageparticular entities' access to information as well as the manner inwhich that information may be used.

Referring to FIG. 14 , a flow diagram of a method 1400 of mitigatingpotential fraud associated with access to customer information is shownaccording to an example embodiment. The method 1400 is performed by thefinancial institution computing system 110 (e.g., by the access controlcircuit 122, by the processor 116, etc.).

The method 1400 begins when fraudulent activity is detected at 1402. Insome arrangements, the financial institution computing system 110determines there is fraudulent activity associated with the customer 102based on analyzing customer information access patterns, transactionpatterns, and the like. The fraudulent activity may relate tocompromised financial information (e.g., a compromised payment tokenassociated with fraudulent purchases, a compromised account number, acompromised payment device, etc.) or misappropriation of other customerinformation (e.g., fraudulent access to customer information stored atthe financial institution computing system 110, fraudulent downloads ofdata or document stored at the financial institution computing system110, or the like). In some arrangements, the fraudulent activity can bereported by the customer 102 (e.g., via a customer device 108) if thecustomer 102 becomes aware of potential fraudulent activity associatedwith the customer information managed by the financial institutioncomputing system 110. Similarly, in some arrangements, the fraudulentactivity can be reported by the third-party associated with the fraud.For example, if a merchant becomes aware that the merchant's e-commercesystem has been hacked by fraudsters, and that the customer informationstored on or able to be accessed by the e-commerce system is at risk,the merchant can transmit a message to the financial institutioncomputing system 110 indicating the fraud. In still furtherarrangements, the financial institution computing system 110 canidentify potentially fraudulent activity from other sources, such asnews agencies that report on data breaches associated with thethird-party systems 106.

In an example, the financial institution computing system 110 detects anunusual pattern of activity in association with a third party clientapplication 206. For example, customer information may be requested viaa third party client application 206 at a more frequent than usual rate.In another example, the financial institution computing system 110(e.g., via the account management circuit 120) detects an unusualpattern of activity based on customer transaction data. For example, ifthe account management circuit 120 receives a transaction request from aparticular customer device 108 to request payment to a particularmerchant, the account management circuit 120 may compare the amount ofthe transaction to transactions previously engaged in by the customer102 (e.g., stored in the accounts database 124) and, if the amountdiffers from previous transactions engaged in by the customer 102, or ifcustomer 102 has never engaged in a transaction at the particularmerchant, detect an unusual pattern of activity.

After fraudulent activity is detected at 1402, access privileges areremoved at 1404. The financial institution computing system 110 removesaccess privileges to the customer information in at least one of aplurality different ways. In some arrangements the financial institutioncomputing system 110 revokes access privileges to the customerinformation stored at the financial institution computing system 110(e.g., customer information stored in the accounts database 124). Inother arrangements or additionally, the financial institution computingsystem 110 can pull customer information from the third-party system 106or at the customer device 108 associated with the detected fraudulentactivity. For example, if a payment token is associated with thefraudulent activity, the financial institution computing system 110 canprevent a third-party mobile wallet from accessing the payment token viathe customer information APIs 128 and/or pull the payment token from thethird-party mobile wallet computing system if the payment token waspreviously transmitted to the third-party mobile wallet computingsystem.

An alert is sent to the customer 102 at 1406. The financial institutioncomputing system 110 transmits an alert to a customer device 108associated with the customer 102. The alert may be any of a textmessage, an automated telephone call, an e-mail, an in-application pushnotification, or a combination thereof. The alert indicates thatpotential fraudulent activity was detected with respect to the customerinformation. In some arrangements, the alert identifies a specificthird-party system 106 associated with the potential fraudulentactivity. For example, the alert may indicate that a specificthird-party system 106 is attempting to access a piece of customerinformation that is out of the norm of access patterns associated withthe third-party system 106. In some arrangements, the alert iscustomer-interactive such that the customer 102 can reply to the alert(e.g., by interacting with a hyperlink, by interacting with embeddedbuttons, by replying, etc.) to indicate that the potential fraudulentactivity was unauthorized or authorized.

Referring now to FIG. 15 , an alert interface 1500 is shown, accordingto an example embodiment. The alert interface 1500 may be rendered tothe customer 102 via a financial institution client application 208 onthe customer mobile device 200. Additionally, alert interfaces similarto the alert interface 1500 may be displayed on various other customerdevices 108 at the same time that the alert interface 1100 is presentedvia the customer mobile device 200. As such, the customer 102 is alertedof the detected fraudulent activity irrespective of the particularcustomer device 108 possessed by the customer 102 at the time theunusual activity is detected and the customer alerted. In this regard,fraud alerts in other forms are envisioned. For example, the financialinstitution computing system 110 may formulate a sound notification andtransmit the sound notification to a customer device 108 that includes asmart speaker.

In the example shown, the alert interface 1500 includes a description1502 of actions taken by the financial institution computing system 110(e.g., via the access control circuit 122) and the reason that suchactions were taken. For example, the financial institution computingsystem 110 (e.g., via the access control circuit 122) may update theaccess privileges associated with a particular third party clientapplication 206 on the customer mobile device 200, and the description1502 may indicate as much to the customer 102. Additionally, the alertinterface 1500 includes a customer action window 1504. The customeraction window 1104 requests the customer 102 to verify recenttransactions that caused delivery of the alert to the customer 102.Customer action window 1504 includes a first option 1506 enabling thecustomer 102 to view recent transactions (or information requests) andto indicate their legitimacy to the financial institution computingsystem 110. Customer action window 1504 also includes a deferral option1508 enabling the customer 102 to put off the verification process to alater time.

Referring now to FIG. 16 , a data control tower customer interface 1600is shown according to an example embodiment, the customer interface 1600is similar to the customer interface 500 discussed above. Like numberingis used between FIGS. 5 and 16 to designate like components. As with thecustomer interface 1400, an application toggle 406 has been selected bythe customer 102. In some embodiments, the customer interface 1600 ispresented to the customer 102 after the customer 102 selects thedeferral option 1508 presented to the customer 102 on the alertinterface 1100 discussed above.

In various embodiments, the interface 1600 is presented to the customer102 upon the customer 102 accessing the data control tower (e.g., viaperformance of the steps 302 and 304 discussed above) after unusualactivity with respect to customer application activity has beendetected. In the example shown, the interface 1600 includes an unusualactivity indication 1602 notifying the customer 102 that unusualactivity has been detected with respect to a particular applicationlisted in the application listing 502. Additionally, the customerinterface 1600 includes a verification button 1604 enabling the customer102 to view the transactions that caused the display of the unusualactivity information 1302.

Referring back to FIG. 14 and the method 1400, a customer response isreceived at 1408. In some arrangements, the financial institutioncomputing system 110 receives a response from the customer 102 via thecustomer device 108. The customer response may be input by the customer102 into the alert transmitted to a customer device 108 at 1406. Thecustomer response provides an indication as to whether the potentialfraudulent activity is authorized or unauthorized. In arrangements wherethe potential fraudulent activity is authorized by the customer 102, thecustomer response may include a reversal request. The financialinstitution computing system 110 determines if the customer responseincludes a reversal request at 1410. If a reversal request was received,the access privileges removed at 1404 are restored at 1412. If areversal request was not received, or after the access privileges arerestored at 1412, the method 1400 ends.

Referring generally to FIGS. 17-19 , example data control towerinterfaces are shown, according to various example embodiments. Forexample, the interfaces shown in FIGS. 17-19 may serve as alternativesto those shown in FIGS. 4-7 described herein. Referring to FIG. 17 , adata control tower user interface 1700 is shown according to an exampleembodiment. The user interface 1700 is shown as a display on the mobiledevice 200 described with respect to FIG. 2 . The user interface 1700includes an account toggle 1704 and a channel toggle 1706. As shown bythe bolded outline of the account toggle 1704, the account toggle 1704is selected.

Accordingly, the user interface 1700 is an account level management userinterface. While in the account level management user interface, thecustomer 102 can select an account held with the financial institution104 via the drop down box 1708. As shown in FIG. 17 , the customer 102has selected a checking account. After selecting a specific account, alisting 1710 of connected account access channels is populated. Thelisting 1710 identifies each channel that the customer 102 haspreviously configured to access the checking account. Each entry in thelisting 1710 identifies a specific channel (e.g., a debit card, mobilewallet 1, mobile wallet 2, etc.), a channel access mechanism (e.g., adebit card number, a token identifier, an account number, etc.), andwhether the channel access is currently active or inactive via a slidertoggle 1712 (where “Y” means the channel is active, and “N” means thechannel is inactive). A channel may be a customer device 108 (e.g., awearable device, a payment card, etc.) or a third-party system 106(e.g., a mobile wallet, a retailer bill pay system, a utility companysystem, etc.).

The customer 102 can interact with a given slider toggle 1712 toactivate or deactivate a given channel's access to the selected account.For example, as shown in the user interface 1700, the debit card isactive (as shown by the associated slider toggle 1712 being in the “Y”position). Accordingly, when the customer 102 attempts to use the debitcard to make a payment (e.g., a purchase with a merchant) or withdrawcash from an ATM, the debit card is linked to the checking accountidentified in the drop down box 1708, and the payment can go through orfunds can be withdrawn (assuming the checking account has theappropriate balance). If the customer 102 interacts with the slidertoggle 1712 to deactivate the debit card's access to the checkingaccount (e.g., by sliding the toggle 1712 to the “N” position), thedebit card is no longer linked to the checking account. If the slidingtoggle 1712 is in the “N” position and the customer 102 attempts to usethe debit card at a merchant point-of-sale system or an ATM, thetransaction will be denied or not processed from the checking account.

The user interface 1700 also includes an add button 1714 and a deletebutton 1716. If the customer 102 interacts with the add button 1714, thecustomer 102 can add a new channel to the listing 1710 of approvedchannels that are linked to the identified account. In doing so, thecustomer 102 may need to register the customer device 108 (e.g., byproviding a device identifier, by providing a primary account number ofa payment card, by logging into an application or website via thecustomer device 108, etc.) or the third-party system 106 (e.g., bylogging into a third-party website or application associated with thethird-party system 106) with the financial institution 104 to pair thechannel with the financial institution computing system 110. If thecustomer 102 interacts with the delete button 1716, the customer 102 canselect a channel in the listing 1710 to revoke access of the selectedchannel to the account.

In certain implementations, toggling the sliding toggle 1712 to “N”temporarily deactivates the channel's link to the account whilemaintaining the link for possible future reactivation and use.Deactivation of a link can be implemented, for example, by decliningrequests for access unless and until the link reactivated, withoutrequiring re-registration to reestablish a new link between the channeland the account. By contrast, deletion of a channel may dissociate theaccount from the channel and sever the link between the account and thedeleted channel, such that subsequent steps (e.g., selecting add button1714 or otherwise registering or “signing up” anew) may be required forrelinking. In some implementations, deleting a channel may includedeletion or deactivation of encryption keys and access tokens such thata new key and/or access token would need to be generated if a new linkis to be established.

In various embodiments, deletion of a channel may additionally oralternatively require or involve deletion of certain information withrespect to the customer or the account. For example, deletion of achannel may result in deletion of customer data from the computingsystems of a third party, from relevant applications, and/or fromapplicable devices. In some implementations, deletion of an account mayresult in the transmission of a scrub command, instruction, or messagefrom the financial institution client application 208, from thefinancial institution computing system 110, and/or from a third-partyintermediary (e.g., a computing system in a financial network, such as acomputing system of Visa Inc.) to one or more third-party systems 106,customer devices 108, and/or third-party client applications 206. Insome implementations, the scrub command, instruction, or message mayrequest or require, for example, that the customer's account (e.g., aPayPal account) be deleted from third-party systems. Additionally oralternatively, the scrub command, instruction, or message may request orrequire, for example, that all customer data, or a specified subsetthereof, be wiped from third-party systems and applications. In someimplementations, if a customer selects the delete button 1716, thecustomer may be prompted (e.g., via another graphical user interface)about whether a scrub command is desired. The customer may be asked, forexample, “Would you like your data scrubbed from third-party systems andapplications?” If the customer responds affirmatively, the scrub commandmay be transmitted. Otherwise, if the customer does not respondaffirmatively, the link may be severed without the scrub command beingtransmitted.

Referring to FIG. 18 , a data control tower user interface 1800 is shownaccording to an example embodiment. The user interface 1800 is similarto the user interface 1700. As such, like numbering is used betweenFIGS. 17 and 18 to designate like components of the user interfaces 1700and 1800. The user interface 1800 is shown as a display on the mobiledevice 200. As with the user interface 1700, the user interface 1800includes the account toggle 1704 and the channel toggle 1706. As shownby the bolded outline of the channel toggle 1706, the channel toggle1706 is selected. Accordingly, the user interface 1800 is a channellevel management user interface. While in the channel level managementuser interface, the customer 102 can select a channel that is pairedwith the financial institution 104 via the drop down box 1802. A channelmay be a customer device 108 (e.g., a wearable device, a payment card,etc.) or a third-party system 106 (e.g., a mobile wallet, a retailerbill pay system, a utility company system, a cloud storage system,etc.). As shown in FIG. 18 , the customer 102 has selected a mobilewallet as the channel to manage. After selecting a specific channel, alisting 1804 of accounts associated with the channel is populated. Thelisting 1804 identifies each account that that the customer 102 haspreviously configured to be accessed by the selected channel. Each entryin the listing 1804 identifies a specific account (e.g., a debit card, acredit card, etc.), an account access mechanism (e.g., a payment token),and whether the account is currently active or inactive via a slidertoggle 1806 (where “Y” means the account is active, and “N” means theaccount is inactive).

The customer 102 can interact with a given slider toggle 1806 toactivate or deactivate the selected channel's access to an accountassociated with the slider toggle 1806. For example, as shown in theuser interface 1800, the token associated with credit card 1 is active(as shown by the associated slider toggle 1806 being in the “Y”position). Accordingly, when the customer 102 attempts to make a paymentwith the mobile wallet (e.g., a purchase with a merchant) credit card 1is listed as an option for the payment source of the transaction. If thecustomer 102 interacts with the slider toggle 1806 to deactivate thechannel's access to the token associated with credit card 1 (e.g., bysliding the toggle 1806 to the “N” position), the credit card is nolonger listed as a payment source in the mobile wallet (or is listed asan unavailable payment source). For example, in response to the customer102 deactivating the channel's access, the financial institutioncomputing system 110 may transmit a command to a third party system 106associated with a token service provider instructing the third partysystem 106 to delete or temporarily deactivate the token.

Each entry in the listing 1804 also includes a default payment indicator1808 and a delete payment button 1810. The default payment indicator1808 is highlighted to indicate the default payment source of the mobilewallet. As shown in FIG. 18 , the selected default payment method forthe mobile wallet is the debit card. If the customer 102 interacts withthe default payment indicator 1808 of a different entry (e.g., creditcard 1 or credit card 2), the customer 102 can change the defaultpayment source for the mobile wallet even though the customer is notinteracting directly with the mobile wallet. If the customer 102interacts with the delete payment button 1810 for a given entry, thecustomer 102 can remove the associated payment source from the mobilewallet. Thus, the user interface 1800 enables the customer 102 todeactivate and activate tokens, select a default payment vehicle for amobile wallet, and remove a payment vehicle from a mobile wallet on thesame user interface. To populate the user interface 1800, the financialinstitution computing system 110 may utilize one of the customerinformation APIs 128 associated with a mobile wallet provider of themobile wallet selected via the drop down box 1802. In other words, inresponse to receiving an indication of the customer 102's selection ofthe mobile wallet via the drop down box 1802, the financial institutioncomputing system 110 may formulate an API information request includingan identifier associated with the third party system 106. The APIinformation request may request information regarding the customer 102'smobile wallet account (e.g., token activation statuses, default paymentvehicles, etc.). Upon receipt of the API information request, the thirdparty system 106 may verify the financial institution computing system110 and, in response, provide the requested information.

Still referring to FIG. 18 , the user interface 1800 also includes anadd new payment source button 1812. If the customer 102 interacts withthe add new payment source button 1812, the customer 102 can provision apayment token associated with a new payment source to the mobile wallet.The customer 102 can manually input the payment card information (e.g.,primary account number, expiration date, billing address, card securitycode, card verification value, etc.) or select a payment card that thecustomer 102 has that is associated with (i.e., issued by) the financialinstitution 104. When the payment card information is provided by thecustomer 102, the FI computing system 110 can automatically request apayment card token (e.g., from a payment network associated with thepayment card) and transmit the payment card token to the mobile walletsystem (e.g., via a customer information API 128) such that the paymentcard is provisioned to the mobile wallet.

Referring to FIG. 19 , a data control tower user interface 1900 isshown, according to an example embodiment. The user interface 1900 issimilar to the user interfaces 1700 and 1800. As such, like numbering isused between FIGS. 17 through 19 to designate like components of theuser interfaces 1700, 1800, and 1900. The user interface 1900 is shownas a display on the mobile device 200. As with the user interfaces 1700and 1800, the user interface 1900 includes the account toggle 1704 andthe channel toggle 1706. As shown by the bolded outline of the channeltoggle 1706, the channel toggle 1706 is selected. Accordingly, the userinterface 1900 is a channel level management user interface. While inthe channel level management user interface, the customer 102 can selecta channel that is paired with the financial institution 104 via the dropdown box 1802. As shown in FIG. 19 , the customer 102 has selected adebit card as the channel to manage. The debit card channel of FIG. 19has different manageable features than the mobile wallet of FIG. 18 .Accordingly, the specific channel level management user interfacespresented to the customer 102 while accessing the access control towerportal may differ depending on the channel selected by the user.

The debit card specific user interface 1900 includes a linked accountdrop down box 1902. The linked account drop down box 1902 allows thecustomer 102 to change the account associated with the selected debitcard. As shown in FIG. 19 , the debit card is currently linked to achecking account ending in “5678”. If the customer 102 has additionaldemand deposit accounts with the financial institution 104, the customer102 selects a different account to associate the debit card with via thedrop down box 1902.

Additionally, the user interface 1900 includes a plurality of differentpurchase controls 1904. Each of the purchase controls 1904 includes atoggle slider 1906 that allows the customer 102 to activate ordeactivate a particular control associated with the debit card (where“Y” means the feature is active, and “N” means the feature is inactive).The purchase controls 1904 may include a point of sale control thateither permits or blocks the debit card from being used at a merchantpoint of sale system, an ATM control that either permits or blocks thedebit card from being used at an ATM, a mobile wallet control thateither permits or blocks the debit card from being used in a mobilewallet, a merchant e-commerce control that either permits or blocks thedebit card from being used at a merchant e-commerce site, a travel frauddetection control that turns on or off a fraud detection feature, andthe like. The customer 102 can interact with a given toggle slider 1906to activate or deactivate the associated purchase control 1904. Theavailable purchase controls may vary by channel. In someimplementations, toggling a toggle slider (or other user input)alternatively or additionally restricts the storage of customer datainformation following use of the information in a transaction. Forexample, a user input may allow the customer to prohibit customerinformation from being stored, such as prevention of the storage by ane-commerce merchant of debit or credit card information as a storedpayment method.

Referring now to FIG. 20 , an account control customer interface 2000 isshown, according to an example embodiment. In various embodiments, thecustomer is presented with the account user interface 2000 (e.g., viathe financial institution client application 208) upon the customerselecting an account on the data control tower interface 1000 describedwith respect to FIG. 10 . As shown, the account control customerinterface 2000 includes a listing of various controls associated with anaccount. As shown, a first toggle switch control 2002 is configured toreceive an input from the customer to turn off the account as a whole.As a result of receiving this input, the customer mobile device 200transmits a notification signal to the financial institution computingsystem 110, which in turn temporarily deactivates the customer's accountfrom use in any sort of transaction. This is particularly useful if thecustomer temporarily misplaces a card. Another set of toggle switches2004 provides the customer with a more particularized control. Forexample, via the set of toggle switches 2004, the customer is able toturn the selected accounts on and off for international and UnitedStates payments. As shown, the selected account has been turned off forinternational transactions, but left on for domestic transactions. Assuch, upon receipt of a transaction request from an internationalpayment network, the financial institution computing system 110 wouldautomatically deny the transaction request. This way, fraudulentinternational transaction activity can be prevented. Additionally, thecustomer need not contact the financial institution to turn the accounton prior to travelling internationally.

Another toggle switch 2006 enables the customer to turn the selectedaccount on and off for use in a particular mobile wallet. Thus, theaccount control interface 2000 may include a number of toggle switchessimilar to the toggle switch 2006 depending on the mobile wallets thatthe customer has registered for. In response to the customer switching acard off for a particular mobile wallet, the financial institutioncomputing system 110 may contact a token service provider associatedwith the mobile wallet (or contact the mobile wallet provider directly)to, for example, deactivate an account token to disable access. Invarious embodiments, the account control customer interface 2000includes many additional transaction controls. For example, the user maymanually restrict amounts (e.g., transactions exceeding a thresholddollar value), locations (e.g., transactions in certain geographicallocations, certain types of merchants such as certain retailers, etc.),times (e.g., between specified hours, on particular days of the week ormonth or on holidays, etc.), and the like that the card may be turnedoff or turned on for use in transactions. As such, not only does thefinancial institution client application 208 provide the customer withcontrol over external entities that have access to customer accountinformation, but it also provides the customer with an extensive amountof personal controls over each individual account.

In various embodiments, a control tower portal allows the customer toinstruct entities (e.g., third party computing systems and applications,customer computing devices, etc.) to delete accounts, restrict the useor sharing of customer data, and/or to delete customer data (e.g., alldata or data of a particular type). In some implementations,restrictions on customer data or deletion thereof may be accomplishedby, for example, the financial institution computing system 110 and/orthe financial institution client application 208 making an API call tothird party systems 106 to have customer data restricted or deleted (ormarked for subsequent restriction or deletion). The control tower portalmay allow for multiple levels of deletion or scrubbing. For example, anaccount may be deleted, all accounts may be deleted, all accounts of acertain type may be deleted, certain customer data or customer data ofparticular types may be deleted, and/or all customer data may bedeleted. In some implementations, only customer data received from thefinancial institution computing system 110 through access granted by thecustomer (and not received by the third party from other sources, suchas directly from the customer) may be marked for deletion.Advantageously, the ability to choose to have account data deletedempowers the customer with the right to be partially or whollyforgotten.

Referring to FIG. 21 , a data control tower customer interface 2100 isshown according to an example embodiment. The customer interface 2100 issimilar to the customer interfaces 400 and 700. Like numbering is usedbetween FIGS. 4 and 7 to designate like components. The customerinterface 2100 is shown as a display on the customer mobile device 200.The interface 2100 includes a device listing 702 with customer devices108 that the customer 102 has registered with the financial institution104. In addition to the add button 426 and the delete button 428,customer interface 2100 additionally provides a scrub button 2130 toallow the customer to have customer data deleted from one of the devicesin the device listing 702. In response to selection of the scrub button2130, the customer may be asked to select which device to scrub. Invarious implementations, after a device to be scrubbed has beenselected, the customer may be asked (e.g., via another interface) toidentify the customer data to be deleted from the device. For example,the customer may be allowed to specify that personal information shouldbe deleted (e.g., name, address, telephone number, social securitynumber, etc.), financial information should be deleted (e.g., accountnumbers, balances, etc.), all customer data should be deleted (e.g., alldata that the device received via the financial institution computingsystem 110, or all customer information regardless of source), anaccount should be deleted (e.g., a subscription, profile, or paymentaccount), etc.

In the example customer interface 2100, devices from which customer datahave been deleted or accounts deleted are marked as having been“scrubbed” by scrubbed icon 2104. As shown in customer interface 2100,the smart vehicle has been scrubbed. The customer may wish to scrub adevice if, for example, the device is lost, stolen, sold, or donated(such as a stolen car or a lost smart watch). It is noted that, as aconsequence of the smart vehicle being scrubbed, granting the smartvehicle with access to customer data cannot be turned on or off (asindicated by the “-- N/A --” in FIG. 21 ). The link may bere-established via add button 426, and/or the smart vehicle may beremoved from device listing 702 via delete button 428.

Similarly, referring to FIG. 22 , a data control tower interface 2200 isshown, according to an example embodiment. The data control towerinterface 2200 is shown as a display presented via the customer mobiledevice 200 (e.g., via the financial institution client application 208).In some embodiments, the interface 2200 serves as an alternative tointerfaces 400, 500, 700, and 1000 described above. As shown, theinterface 2200 includes entity listing 1010 (e.g., applications andmerchants) and device listing 1014 (e.g., customer devices 108). Amongthe entity entries 1012, entity 2202 (“Entity 3”) is indicated as havingbeen scrubbed. In some implementations, the indication that the entityhas been scrubbed is not presented in interface 2200 until confirmationis received from the entity (e.g., a third party client application 206and/or a third party system 106) by the financial institution clientapplication 208 (directly or via the financial institution computingsystem 110) that the account or other customer data has been deletedfrom the entity's computing system. Similarly, among device entries1016, device 2204 (“Device 3”) is indicated as having been scrubbed,which may not be presented until confirmation is received by thefinancial institution client application 208 (directly or via thefinancial institution computing system 110) directly from the device orfrom a computing system with which the device is networked. In certainimplementations, scrubbed entities and devices can be removed fromlistings 1010 and 1014, respectively, using a delete button (similar tothe delete button in FIG. 21 , not shown in FIG. 22 ).

Referring to FIG. 23 , a data control tower interface 2300 is shown,according to an example embodiment. The data control tower interface2300 is shown as a display presented via the customer mobile device 200(e.g., via the financial institution client application 208). In someembodiments, the interface 2300 serves as an alternative to interfaces400, 500, 700, and 1000 described above. Interface 2300 may serve as alanding page for a customer using control tower to manage digitalconnections between entities, applications, devices, etc. As shown,interface 2300 includes an access toggle 2302 that allows the customerto select viewing all digital connections, cards, and recurringpayments. As indicated by the underlining, “View All” has been selectedby the customer 102. The interface 2300 includes a card listing 2304 anda recurring payments listing 2306. The card listing 2304 identifiescustomer accounts and their statuses. At 2304, the Platinum Debit Cardwith number ending in 1603 is indicated as being “on” or enabled orotherwise accessible.

Referring to FIG. 24 , a data control tower interface 2400 is shown,according to an example embodiment. The data control tower interface2400 is shown as a display presented via the customer mobile device 200(e.g., via the financial institution client application 208). In someembodiments, the interface 2400 serves as a “details” page showing moredetails with respect to, for example, one of the cards listed in FIG. 23. In interface 2400, “Debit, ATM, and Prepaid Cards” 2404 are listed, asare their statuses. For the Platinum Debit Card ending in 1603, atransaction controls section 2406 allows the customer to control thetransactions that may involve the debit card through, for example,geographical or other restrictions. In interface 2400, the identifiedcard is not restricted from being used internationally, as indicated bythe status toggle 2414. The customer may use the status toggle 2414 toblock transactions outside of the United States for the card.

A digital wallet controls section 2408 allows for control over the useof the card in transactions and funds transfers. An entities listing2410 lists entities that are linked with the card (e.g., that may usethe card for transactions, like making purchases or funds transfers, orthat otherwise may access data related to the card, such as for checkingaccount balance, confirming that the account is still open, ordetermining the next payment due date). Entities listing 2410 ininterface 2400 includes two entities (Entity 1 and Entity 2), and eachentity is provided with a corresponding remove button 2416. Selection ofthe remove button 2416 for an entity allows the customer to, forexample, delete customer data and/or delete the account that ismaintained by the entity and with which the customer's debit card islinked. For example, Entity 1 may be PayPal Holdings or Amazon.com, andthe customer may have a PayPal account which uses the debit card forpayments, or an account at Amazon.com which uses the debit card forpurchases. In various versions, the customer may press the remove button2416 corresponding with one of the entities to, for example, delete theuser account at the entity (e.g., delete the PayPal account orAmazon.com account). Alternatively or additionally, the remove button2416 may allow the customer to delete the customer's account dataspecific to the debit card ending in 1603 (e.g., the account number,expiration date, etc.) saved in a database in a computing system ofPayPal, Amazon.com, or other entity, without necessarily deleting othercustomer data. In some implementations, the remove button 2416 causes ascrub command, instruction, or message to be generated and transmittedto the application, device, or system of the entity. In variousimplementations, the scrub command identifies the data to be deletedfrom the databases of the third-party systems 106. The scrub command maybe transmitted to the third party system 106 (with an identification ofthe customer data to be scrubbed) directly or via a financial paymentprocessing network.

Referring to FIG. 25 , a data control tower interface 2500 is shown,according to an example embodiment. The data control tower interface2500 is shown as a display presented via the customer mobile device 200(e.g., via the financial institution client application 208). In someembodiments, the interface 2500 serves as a confirmation modal for cardremoval following selection of one of the remove buttons 2416 ofinterface 2400. In interface 2500, a confirmation window 2516 requiresthe customer to confirm that removal of the debit card ending in 1603from Entity 1 is desired by selecting the “continue” button, or tocancel the removal request by selecting a “cancel” button. If removal isconfirmed, the customer may be presented with an interface 2600 shown inFIG. 26 , which provides a details page with the selected entityremoved. That is, interface 2600 corresponds with interface 2400, butEntity 1 is “removed” from listing 2410. The customer may choose to alsoremove Entity 2 in the same manner that Entity 1 was removed, asdiscussed above, or leave the connection with Entity 2 in place.

Referring to FIGS. 27A-27F, control tower interfaces 2700A-2700F areshown, according to example embodiments. The control tower interfacesare shown as a display presented via the customer mobile device 200(e.g., via the financial institution client application 208). In someembodiments, the interfaces 2700A-2700F allow for review and managementof recurring payments. For example, the interfaces 2700A-2700F may allowa user to view payees receiving payments on a recurring basis for eachaccount/payment vehicle, view past payments to payees from one or moreaccounts/payment vehicles, stop all subsequent payments to a payee froma particular account/payment vehicle (permanently or for a specifiedtime period), and/or stop one or more subsequent payments to the payeefrom the account/payment vehicle. In various implementations, arecurring payment involves an arrangement in which a user makes paymentsregularly (e.g., each month or each quarter) or as debts become due,commonly from a predetermined (although changeable) account (e.g., achecking account, debit card, or credit card). A recurring payment mayhave a predetermined end date (e.g., loan payments that end when theloan is repaid), or may continue indefinitely until a potential futureoccurrence (e.g., utility payments that will continue until the usermoves from a residence at which the utilities are consumed). Recurringpayments may be initiated by the payor (e.g., a user's financialinstitution initiates a transfer of funds from an account of the user),and/or by the payee (e.g., an authorized payee submits a request thatindicates a user account number, an amount to be paid, a payee accountnumber, and/or a payment authorization from the payor). Recurringpayments may be for fixed amounts (e.g., a mortgage) or for variableamounts (e.g., depending on what goods/services were actually consumed).In certain implementations, a recurring payment may be identified as aconsequence of the user having made multiple payments to the same payeein the past, regardless of whether there is a particular arrangementbetween the user and the payee.

FIG. 27A provides interface 2700A with an example recurring paymentslanding page, which may be presented, for example, upon selection ofrecurring payments listing 2306 in FIG. 23 . Interface 2700A includes apayment vehicle identification region 2702. In FIG. 27A, the paymentvehicle is a debit card with a number ending in 3669. A status indicator2704 indicates that the identified payment vehicle (“Alliance DebitCard”) has a status of “On.” If the user wishes to change the status(to, e.g., deactivate the identified payment vehicle for particular orall entities or to otherwise make another change), the user mayactivate/select a change-status icon 2706, and make a change via, forexample, interface 1200 of FIG. 12 , interface 2000 of FIG. 20 ,interface 2400 of FIG. 24 , or another suitable interface. A payeelisting 2708 identifies recipients of recurring payments. Additionalpayees not presented in interface 2700A, if any, may be viewed byselecting show-more icon 2710. The listed payees may be selected fordetails and changes.

In interface 2700B of FIG. 27B, payee Bay Club Systems has been selected(e.g., by selecting the arrowhead 2712, the name “Bay Club Systems,” orsomewhere in the region 2714 identifying the payee). Interface 2700Ballows the user to review a listing of payments for the payee identifiedat 2718 using the account identified at 2720. The identified account hasits status indicated at status indicator 2722, and like change-statusicon 2706, a change-status icon 2724 allows the user to make a change tothe status of the account identified at 2718. In variousimplementations, the listing 2726 includes past payments by date andamount. The list may be collapsed using minimizer icon 2728 to “hide”the transaction history. In some implementations, listing 2726 mayadditionally or alternatively include future payments that have not beenmade but are scheduled/arranged, and/or future payments which are notnecessarily known to be scheduled or arranged but areexpected/anticipated/deduced based on payment history. Moreover, thelisting 2726 may include payments that are being processed but not yetpaid. A payment may be in-process if, for example, a financialinstitution has begun a funds transfer process (upon, e.g., receipt of avalid payment request from a payee). The different types of payments maybe presented differently or otherwise presented so as to indicate theirdifferent status. For example, past/completed payments, in-process, andfuture payments may be presented with differing emphasis (e.g.,different colors, fonts, font sizes, formatting, etc.), or may bepresented in separate sections (e.g., past payments, followed byin-process payments, followed by future payments) that may be, forexample, labeled or separated by a line or other markings oralphanumeric characters.

In various implementations, interface 2700B may provide a manage payeeicon 2730 and/or a hide payee icon 2732, depending on the payee orpayment arrangement. Interface 2700B (as well as interfaces 2700C-2700F)also provide a home-page icon 2734 to allow the user to leave therecurring payments interfaces and return to the control tower main/homepage (e.g., interface 400 of FIG. 4 , or interface 1000 of FIG. 10 ). Ifmanage payee icon 2730 is selected, the user may be presented with, forexample, interface 2700C of FIG. 27C to select from one or more actions.Via interface 2700C, the user may select to stop making payments to theselected payee at 2740, or to suppress the payment from being displayedin a recurring payments list (e.g., payee listing 2708) at 2742. Incertain versions, the user may make a selection using one of thecorresponding selectors 2744, 2746 (in FIG. 27C, 2744 corresponding with“stop this payment” has been selected). In other versions, otherselection mechanisms may be employed, such as drop-down menus,selectable icons, voice command, etc. The user may then cancel the“manage payee” process by selecting cancel icon 2748, or proceed withthe selected option by selecting continue icon 2750. If the cancel iconis selected, the user may be returned to the recurring payments landingpage at interface 2700A, or to another control tower screen.

In various embodiments, if the user selects the continue icon 2750, theuser may be presented with a suggestion or recommendation to contact thepayee. This may be suitable, for example, in cases in which the user hasgranted the payee with authorization that, by agreement, is onlyrevocable through the payee. Even in cases in which the recurringpayment may be stopped at any time through the financial institution,the user may wish to contact the payee to arrange for payment in analternative manner (e.g., using a different account/payment vehicle).

Interface 2700D provides contact information for the payee at 2756. Theuser may be allowed to select a cancel icon 2758 to turn back, orcontinue icon 2760 to proceed with the request.

In various embodiments, a user wishing to continue may, for example, bepresented with a confirmation page via interface 2700E in FIG. 27E. Theuser may be asked to confirm that he or she wishes to stop the one ormore subsequent payments. Interface 2700E includes a cancel icon 2766 toturn back, and a continue icon 2768 to proceed with the stop paymentrequest. Interface 2700E may provide additional details on the request,such as timing (e.g., stop payment takes effect immediately, within aspecified time, or starting at a future date, which may be selectable bythe user), and whether the stop payment is inapplicable to any payments,such as certain in-process payments. Optionally, in various embodiments,the user may be allowed to select a duration for which the stop paymentremains in effect via a duration selector 2770. By default, a stoppayment request may be permanent, indefinite, or for a certain specifiedtime (such as three years). In interface 2700E, the user may optionallybe presented with various selectable durations at 2772, such as 6months, 1 year, or 2 years. The user may be allowed to select one of theidentified time periods, and may optionally be allowed to select anothertime period by selecting “other” and selecting/entering a time periodthat is not listed. Other mechanisms for selecting a duration may beused. Interface 2700E also provides the user another chance to changehis or her mind via a cancel icon 2774, or to choose to proceed withconfirmation (potentially for a selected duration) via a continue icon2776.

In various embodiments, if the stop recurring payment is confirmed(e.g., by selection of continue icon 2776), the financial institutionmay: cancel future payments that would have been initiated by thefinancial institution; decline one or more subsequent payment requestsfrom the identified payee from the corresponding account/paymentvehicle; and/or to communicate to the payee the user's desire to revokehis or her authorization for, or to otherwise cease, subsequentpayments, from the identified account/payment vehicle. In someimplementations, a payment authorization may be revoked via, forexample, an API call from the financial institution computing system 110to the third-party system 106 of the payee. Such an API call mayinclude, for example: a security/access token (which may have beenreceived from the third-party system 106) that authenticates thefinancial institution computing system 110; an identification of theuser/payor; an identification of the account/payment vehicle; a uniqueidentifier for the recurring payment (which may have beengenerated/assigned by the financial institution or the payee); detailson one or more past payments; details on one or more subsequentpayments; an effective date; a duration for the cessation of therecurring payment, if the user identified a duration (e.g., at 2770) orthe cessation is otherwise not permanent; and/or any other relevantinformation.

In various embodiments, the user may additionally or alternatively beallowed to remove (hide/suppress) a payee/recurring payment from beinglisted. For example, in interface 2700B, a user may select hide payeeicon 2732. In certain implementations, control tower may, upon detectingthat the hide payee icon 2732 has been selected, present the user with,for example, interface 2700F in FIG. 27F. Interface 2700F requests thatthe user confirm that he or she wishes to hide a selected payee from thelanding page list (i.e., the list on the landing page of interface2700A). The user may be presented with a cancel icon 2784 to be selectedif he or she does not wish to hide the payee from the list, and acontinue icon 2786 to be selected if he or she wishes to proceed withthe request to hide the payee. Selection of one of the icons 2784, 2786may, in various implementations, return the user to the landing page ofinterface 2700 or to payee management interface 2700B.

In some implementations, the option to stop a recurring payment for aparticular account/payment vehicle and/or for a particular payee may notbe available for various reasons, and the user may thus only be providedthe option to hide the recurring payment (e.g., 2732 but not 2730).Additionally or alternatively, if a recurring payment is not cancelablevia control tower, the user may be advised to contact the merchant (see,e.g., interface 2700D and the contact information at 2756). In someimplementations, if the user indicated a desire to have the financialinstitution send a request to the payee on the user's behalf to requestthat the payee cancel or pause a recurring payment (with theunderstanding that a recurring payment will be deemed to remain ineffect until the payee confirms that it will stop/pause the recurringpayment) but the payee does not honor the request, the user may wish tocontact the payee himself/herself, and/or hide the recurring payment.

Referring to FIGS. 28A-28J, control tower interfaces 2800A-2800J areshown, according to example embodiments. The control tower interfacesmay be presented via, for example, a display of mobile device 200. Insome embodiments, the interfaces 2800A-2800J allow for control overautomated or other recurring payments. For example, the interfaces2800A-2800F may allow a user to view and manage automated payments froma first source account held by a first entity to one or more recipients(which may be financial or non-financial (e.g., merchant or serviceprovider) accounts at the first entity and/or at other entities), anddisable or otherwise control or manage the automated payments, while theinterfaces 2800G-2800J may allow a user to view and manage automatedpayments from a second source account held by the first entity or by asecond entity to one or more recipients (which may be financial ornon-financial accounts at the first and/or second entities, and/or atother entities), and disable or otherwise control or manage theautomated payments. In various implementations, an automated payment maybe a recurring payment involving an arrangement in which a sourceaccount is used to make payments on an automated basis periodically(e.g., each month, each quarter, or each year) or as debts become due,commonly from a predetermined (although changeable) account (e.g., achecking account, debit card, or credit card) to a destination accountor recipient. An automated payment may have a predetermined end date, ormay continue indefinitely until a potential future occurrence. Automatedpayments may be initiated by the payor and/or by the payee. Automatedpayments may be for fixed amounts or for variable amounts.

FIG. 28A provides interface 2800A with an example automated paymentslanding page, which may be presented, for example, upon selection ofrecurring payments listing 2306 in FIG. 23 . Interface 2800A allows auser to select a source account at 2802 via a source account selector2804, which as illustrated in FIG. 28A, is a drop-down menu but may beany other selection mechanism. In interface 2800B of FIG. 28B, thedrop-down menu of selector 2804 has been selected, and selectableaccounts are presented at 2806. The user may be allowed to select anaccount from among one or more accounts (financial or otherwise) at oneor more entities (e.g., one or more financial institutions). One or moreof the accounts, potentially held at multiple entities, may be managedvia the “Control Tower” application. Status indicators may indicatewhether each account is enabled or disabled with respect to one or morefunctionalities (e.g., usability in certain types of or alltransactions, accessibility by devices, accounts, and/or entities,etc.).

In interface 2800C of FIG. 28C, Account 1 a at Entity 1 has beenselected via selector 2804. Entity 1 may be, but need not be, the entityproviding the “Control Tower” client application used to reviewrecurring payments. An entity listing 2808 identifies recipients ofautomated payments from the selected account (i.e., Account 1 a in FIG.28C). Because payments may be made from one account (e.g., a checkingaccount) held by an entity (e.g., a bank) to another account (e.g., acredit card) held by the same entity, entity listing 2808 identifiesEntity 1 for Account 1 a. The listed entities may be selected forreviewing details and/or for making changes. In interface 2800D of FIG.28D, Entity 3 has been selected (e.g., by selecting the arrowhead 2810or the name “Entity 3”). Interface 2800D allows the user to review anautomated payments listing 2812 identifying automated paymentarrangements with Entity 3 using Account 1 a. In FIG. 28D, recurringpayments from Account 1 a held by Entity 1 are made to Accounts 3 b and3 c held by Entity 3. The payments to Account 3 b are identified ascurrently being “enabled,” with a frequency of payments to Account 3 bset to monthly. In some implementations, a frequency selector 2814 (suchas a drop-down menu or other selection mechanism) may be used to make achange to the frequency with which automated payments are made fromAccount 1 a to Account 3 b. The payments to account 3 c are identifiedas currently being “disabled,” with a frequency set to quarterly. Astatus changer 2816 allows the user to change the status of theautomated payments. The status changer may be, for example, a sliderthat allows the user to move a black square between the left and rightsides of a rectangle, or any other selector mechanism. Because thecurrent status of payments to Account 3 b is enabled, the black squareof its status changer 2816 is on the left side, and because the currentstatus of payments to Account 3 c is disabled, the black square of itsstatus changer is on the right side. The status may be changed todisabled by sliding or otherwise touching or selecting the statuschanger 2816 to move the black square leftward, and enabled by slidingor otherwise touching or selecting the status changer 2816 to move thesquare rightward.

In interface 2800E of FIG. 28E, the user has made a selection (via,e.g., status changer 2816) to disable automatic payments from Account 1a to Account 3 b. A dialogue box 2820 requests confirmation. Optionally,in various embodiments, the user may be allowed to select a duration forwhich the disabling of the automated payments remains in effect via aduration selector 2822. In interface 2800E, a duration of 1 year hasbeen selected (as indicated by the black rectangle with “1 year”). Theuser may cancel the request to disable the automated payment by choosing“cancel,” or may choose to confirm disabling of the automatic payment bychoosing “disable.”

After confirming that the automated payment is to be disabled (e.g., byselecting “disable” in dialogue box 2820 of interface 2800E), the usermay be returned to the listing of automated payments made to Entity 3using Account 1 a, as illustrated by interface 2800F of FIG. 28F.Interface 2800F shows at 2830 that the status of automated payments toAccount 3 b has been disabled (as indicated by “disabled” in bold). Inthe illustrated example, the automated payment has only been disabledfor a certain duration. Interface 2800F may thus indicate that automatedpayment to Account 3 b has been disabled until a specified date (e.g.,one year from the current date if “1 year” is selected as the optionalduration).

In example implementations, the user may then wish to select anothersource account from which automated payments are made to one or moreentities. Interface 2800G in FIG. 28G illustrates that the user mayselect a source account via the source account selector 2804. Ininterface 2800G, the drop-down menu of selector 2804 has been selected,and selectable accounts are presented at 2840. The user may then choose,for example, Account 2 a at Entity 2, and be presented with, forexample, interface 2800H in FIG. 28H. The user may then be presentedwith a list of entities to which automated payments are made via listing2844, and may select Entity 1 via arrowhead 2848.

In various embodiments, the user may then be presented with interface2800I of FIG. 28I, which indicates that Account 2 a held by Entity 2 isused to make automated payments to Accounts 1 b and 1 c held by Entity1. As illustrated in FIG. 28I, automated payment to Account 1 b isdisabled, while automated payment to Account 1 c is enabled. The usermay then choose to, for example, enable automated payment from Account2A at Entity 2 to Account 1 b at Entity 1 via status changer 2850,and/or to disable automated payment from Account 2 a to Account 1 c viastatus changer 2852.

In interface 2800J of FIG. 28J, the user has made a selection to disableautomatic payment from Account 2 a to Account 1 c. In certainimplementations, the user may be presented with a dialogue box analogousto dialogue box 2820. In some versions, the user may alternatively oradditionally be presented with modified dialogue box 2860 for confirmingthat an automated payment is to be disabled. Dialogue box 2860 allowsthe user to disable the automated payment “indefinitely.” In someimplementations, such a selection would leave the automated payment inthe corresponding listing of automated payments with a disabled status(until changed). Dialogue box 2860 also allows the user to choose topermanently disable the recurring payment. In certain embodiments, sucha selection would disable automated payment and also remove the optionto re-enable the automated payment. In some embodiments, permanentdisablement would additionally delete the account from the listing ofautomated payments from Account 2 a to Entity 1. The user may be also beallowed to cancel the request to disable the automated payment and, forexample, return to interface 2800I.

Once an automated payment is disabled or enabled, the entity holding thesource account and/or the entity holding the destination account may benotified via a transmission to a computing system or device associatedwith the entities. In some versions, this may involve an API call to thecomputing system or device. For example, in some implementations, if anautomated payment from Account 1 c to Account 2 a is disabled, an APIcall (or other transmission) may be sent by a computing system or deviceof the entity providing the “Control Tower” application (e.g., Entity 1,Entity 2, or a third-party entity), or by the user device running theapplication, to a computing system or device of the one or more entitiesholding the accounts involved in the automated payment. Alternatively oradditionally to such a notification, in some implementations, asubsequent payment request may be declined. The API calls may beaccompanied by security tokens and data identifying the automatedpayment or relevant users, entities, and/or accounts.

Referring to FIGS. 29A and 29B, control tower interfaces 2900A and 2900Bare shown, according to example embodiments. The control towerinterfaces may be presented via, for example, a display of mobile device200. In some embodiments, the interfaces 2900A and 2900B allow forcontrol over automated or other recurring payments by selecting theautomated payment arrangement to be managed or controlled. For example,interface 2900A provides an automated payment listing 2904 withautomated payments 1, 2, and 3. The automated payments need not beorganized by funding account or recipient, but may instead involve anycombination of source and destination accounts. For example, automatedpayment 1 involves payment from account 1 a to 2 b, automated payment 2involves payment from account 2 a to 1 c, and automated payment 3involves payment from account 3 b to 4 b.

In interface 2900B, automated payment 2 has been selected via arrowhead2908. Interface 2900B identifies the selected automated payment (i.e.,automated payment 2) at 2910. At 2912, interface 2900B identifies theentity and account (i.e., Entity 2, Account 2 a) used to make theautomated payment, as well as historical, account, or other informationon the payments or recipient (such as the most recent payment to Account1 c, as presented in FIG. 29B). Interface 2900B may also allow the userto choose to disable automated payments via selector 2914 (whileallowing for subsequent re-enablement) or delete automated payments viaselector 2916 (requiring the automated payment to be set up or otherwiseadded again). The user may also be allowed to manage the source account(i.e., Account 2 a) via selector 2918, and manage the destinationaccount (i.e., Account 1 c) via selector 2920. Selecting to manage thesource and/or destination accounts via 2918 and/or 2920 may allow theuser to, for example, disable (e.g., turn off) an account, unlink theaccount from various applications, devices, etc.), or otherwise reviewinformation on and control aspects of the corresponding accounts.

In example versions, a “Control Tower” application allows for control oftransactions between financial institutions. For example, a user mayhave a Bank A checking account and a Bank B credit card. The user isable to disable automatic payment of the Bank B credit card from theBank A checking account via Control Tower. The same Control Tower usermay also have a Bank A credit card and a Bank C checking account. Inaddition to being able to disable automatic payment of the Bank B creditcard from the Bank A checking account via Control Tower, the user isable to disable automatic payment of the Bank A credit card from theBank C checking account via Control Tower.

In various embodiments, the Control Tower application is not a clientapplication of any of the financial institutions involved in thetransactions that are controllable via the client application. Theapplication may be a client application of a third-party entity. Invarious embodiments, the Control Tower application may be a clientapplication of one of the financial institutions involved in theinter-institutional transactions controllable via the clientapplication.

Referring to FIGS. 30A-30P, control tower interfaces 3000A-3000P areshown, according to various potential embodiments. The control towerinterfaces may be presented via, for example, a display of mobile device200. In some embodiments, the interfaces 3000A-3000P allow for controlover use of virtual rewards currency (used interchangeably with“rewards”) corresponding with value provided to an account holder butnot yet exchanged by the account holder for a benefit (i.e., not yet“redeemed”), such as bonuses, discounts, and promotional gifts. Certainrewards may be exchanged for a benefit by being converted into monetarycurrency, such as when a bonus is a “cashback” bonus redeemable via amonetary deposit into a user's financial account or for a purchase.Certain rewards may be redeemed for other benefits, such as a percentdiscount on a purchase or receipt of a (non-monetary) gift (e.g., anitem gifted by a merchant with a purchase).

A user may be granted rewards (i.e., rewards may be “earned” by a userfrom, e.g., an issuer of a credit card) through, for example, use of apayment card or other payment vehicle, and the value of the rewards maybe determined based on types of transactions (e.g., purchases of certaincategories of items or from certain merchants), amounts of transactions(e.g., one percent of purchases), etc. In certain embodiments, rewardsmay be conferred based on performance of certain activities, such asvisiting a certain location, presenting a mobile device to a scannerdevice capable of detecting the mobile device (via, e.g., NFC), speakingcertain promotional phrases (which may be detected via a microphone of amobile device, and the sound recording, or confirmation that the phrasewas recognized as having been spoken in a sound recording, may betransmitted to, e.g., a device associated with a merchant or paymentcard issuer), or otherwise.

In various implementations, whether a user has visited a certainlocation (e.g., a mall or gas station) may be determined in differentways. For example, a mobile device's location sensor (e.g., GPS device)may be used to determine a location of a mobile device (e.g., a mobiledevice known to be associated with an account holder) to determine, forexample, that a user has walked into a store, even if no purchase ismade. Alternatively or additionally, a mobile device's microphone may beused to detect ambient sounds, and the ambient sounds analyzed (e.g., bythe mobile device, such as by using an application running on the mobiledevice, or by a remote computing system to which the ambient sounds aretransmitted) to determine whether a sound signature in the ambientsounds matches (or is sufficiently close to) the sounds expected at thelocation being visited (e.g., a sound signature of a musical tune beingbroadcast over a speaker at the destination to be visited may berecognized in the ambient sounds captured using the microphone of themobile device of the user/account holder). Similarly, a mobile device'scamera or other sensor may be used, alternatively or additionally, tocapture an image and the image analyzed to determine whether the imageincludes an item (such as a landmark, signage, a person, a feature ofthe landscape, etc.) expected to be located at the place to be visitedfor earning a reward.

In example embodiments in which virtual rewards currency is earnedthrough performance of activities (e.g., activities other than purchasesor other transactions involving the relevant payment card or otherpayment vehicle), an account holder may install and run an application,such as a “control tower” application, rewards application, or bankingapplication, on his or her mobile device (e.g., a smartphone). Theapplication may be retrieved, for example, through a digitaldistribution platform. The application, when running, may interface withvarious devices of the mobile device, such as a GPS device or otherlocation sensors, ambient sensors like a microphone and/or a camera, anduser interfaces such as a touchscreen. The mobile application may trackor otherwise determine whether certain activities have been performedthrough interaction with the user and the devices of the mobile device.The signals from the devices (e.g., GPS, microphone, etc.) of the mobiledevice may be received (via, e.g., an operating system of the mobiledevice) and processed by the application and/or by a remote serverreceiving data from the mobile device. If the signals reveal that anactivity that earns rewards has been performed, the value of thecorresponding rewards may be determined and credited to the user'saccount.

The interfaces 3000A-3000P may allow a user to view and manage when andhow rewards may be exchanged for a benefit. Interface 3000A in FIG. 30Aprovides an example rewards home page that allows the user to selectcertain potential functionalities with respect to rewards management.Interface 3000B in FIG. 30B provides an example definitions page uponselection of “Definitions” icon 3002A in FIG. 30A. Interface 3000Boptionally allows the user to categorize certain accounts, providers, orrewards by creating groups. For example, a user may wish to groupselected accounts, providers, and/or rewards together so that an actionor selection is automatically applied to multiple accounts, providers,and/or rewards in batch (e.g., all the accounts, providers, and/orrewards in a defined group).

In interface 3000B, the user has chosen to define a new group (asindicated by the thicker, bolded rectangle of new group icon 3004) ofproviders (as indicated by the thicker, bolded rectangle of providersicon 3008). A user may also choose to edit an existing group (e.g., agroup previously defined via new group icon 3004). Providers may bemerchants (such as online merchants and/or merchants with physicalstores) or other entities through which rewards may be redeemed inexchange for something of value. The user may enter a name or otherdesignation for the grouping (for easier reference) at name field 3010.If the user were editing a group (rather than defining a new group), the(unpopulated) name field 3008 may be a replaced with, for example, adrop-down menu or other selector allowing the user to identify whichgroup is to be edited.

In example interface 3000B, providers may be added (e.g., via addprovider icon 3012) or deleted (e.g., via delete provider icon 3014)from the grouping being defined. The user may select providers to add ordelete via, for example, drop-down menus. Through an “add provider”drop-down menu (such as drop-down 3016), the user may be presented witha list of known providers via which a reward may be redeemed, and theuser may select one of the providers to add to the group being definedor edited. Similarly, through a “delete provider” drop-down menu (notshown), the user may be presented with selectable providers that havepreviously been added to the provider group, and selected providerswould be removed from the group being defined or edited. If “accounts”or “rewards” were selected, it would be accounts or rewards,respectively (rather than providers), that could be selected foraddition to or deletion from a group. Once a user is done with entries,the user may choose to save the new group (or save changes to an editedgroup) via a save group icon 3018, after which the user may be, forexample, returned to the rewards home (e.g., interface 3000A) orreturned to a rewards definitions page (e.g., interface 3000B withsettings reset to default so as to remove prior selections) in which auser is allowed to select whether to create or edit a group (e.g., viaicon 3004 or 3006).

Example interface 3000C of FIG. 30C may be presented upon, for example,selection of accounts icon 3002C in FIG. 30A. Interface 3000C presentsan account listing 3020, which identifies user accounts that may earn,or have earned, rewards, and/or through which rewards may be redeemable.The accounts may be held by or at multiple entities (e.g., multiplebanks or other financial institutions), and they may be accounts ofdifferent types (e.g., credit card, debit card, savings account, etc.)with different methods in which rewards are earned and/or redeemed(e.g., different percentages, transaction types, performable activities,etc.). Each account has a status indicator that indicates whether theaccount is currently “On” (and thus enabled, activated, or otherwisealways usable or usable in some respect, such as usable for certaintransactions or during certain times) or “Off” (and thus disabled,deactivated, or otherwise entirely unusable or unusable in somerespect). The user may be allowed to change the status of an account by,for example, selecting the corresponding status indicator (e.g., bytouching “Status” or “On” or “Off” for a particular account on atouchscreen) and selecting a different status (e.g., via anotherinterface discussed herein). If there are other accounts that do not fiton the screen, a user may view them by, for example, scrolling the page(e.g., by swiping up on a touchscreen) or by selecting “Show MoreAccounts” at the bottom of interface 3000C.

One of the accounts from account listing 3020 may be selected by, forexample, activating (e.g., by touching or otherwise selecting) theaccount identifier (e.g., the label “Entity 4 Account 3” or thedesignation “ . . . 3456”) or a corresponding arrowhead or other icon.In FIG. 30D, arrowhead icon 3022 corresponding with Entity 3 Account 2has been selected. Interface 3000D of FIG. 30D includes a selectionidentification region 3024, which identifies which account has beenselected for review and/or management. A provider listing 3026identifies available providers through which rewards may be redeemed.For each provider, rewards redeemable at the provider is listed. Incertain implementations, rewards earned with respect to one account maybe usable with respect to another account at the same entity or atanother entity. For example, a reward earned via one or moretransactions involving a first account (e.g., purchases made using acredit card issued by bank A) may be redeemed via one or moretransactions involving a second account (e.g., for a purchase made witha debit card issued by Bank B).

In FIG. 30D, provider listing 3026 identifies Providers 1 and 2, each ofwhich has two rewards that may be activated for redemption through atransaction involving the corresponding provider (e.g., a purchase fromthe provider). A status indicator 3028 indicates whether use of rewardsin transactions involving the selected account is enabled for thecorresponding provider. In the version of status indicator 3028 shown inFIG. 30D, a black solid square may be positioned to the left of arectangle to indicate, for example, that all selectable rewards areenabled, the black solid square may be positioned to the right of therectangle to indicate that all selectable rewards are disabled, and theblack solid square may be positioned in the middle (or otherwisesomewhere between the left and right) to indicate that at least onereward is enabled while at least one reward is disabled. Statusindicators corresponding to particular rewards may indicate whether thecorresponding reward is enabled or disabled in a similar fashion. Forexample, status indicator 3030A may indicate that a particular reward isenabled (i.e., would be applied or otherwise used) if a square ispositioned to the left (e.g., a square with a “Y” for “yes”), and statusindicator 3030B may indicate that a particular reward is disabled (i.e.,would not be applied or otherwise used) if a square is positioned to theright (e.g., a square with a “N” for “no”).

Status indicators discussed herein (e.g., the status indicators in FIGS.30A-30P, such as status indicators 3028, 3030A, 3030B) may function as“toggles” or switches that may be selected or otherwise activated totoggle or otherwise change the indicated status. For example, the statuscorresponding to “Pay with Bonus” (valued at “$YY”) is indicated asbeing enabled (“Y”) at status indicator 3030A in FIG. 30D, and can bechanged to disabled (“N)” by, for example, touching (or touching anddragging rightward) the status indicator 3030A on a touchscreen.

In certain implementations, a user may be allowed to indicate afrequency for a reward, such as a maximum number of times the rewardwould be applied or otherwise used. Frequency may be indicated via afrequency selector 3032, and may have a value of, for example, “1”, “2”,or another selected value “z”. The frequency value may be changed, forexample, via a selection made using a drop down menu or via an inputinto a text box. Additionally or alternatively to frequency, the usermay be allowed to provide a time window or duration during which thereward will be applied, after which the reward would be deactivateduntil reactivated again. Duration may be indicated via a durationselector 3034, and may have a value of, for example, an hour fromactivation, 24 hours from activation, the day of activation (e.g., untilmidnight), within a week (“Wk”) from activation, the week of activation(e.g., until midnight on the upcoming Sunday), indefinitely (e.g., untildeactivated or expended), or a specified future time period (e.g.,during a promotional period, during a lunch hour, etc.). The time windowmay be changed, for example, via a selection made using a drop downmenu, via an input into a text box, or otherwise.

In various implementations, the application may indicate how far away aprovider is from a location, such as the current location of the mobiledevice on which the application is running, from the user's knownresidence, or from the user's anticipated location based on the currentdate and time (e.g., from a user's workplace during work hours). Atdistance indicator 3036, interface 3000D may indicate that Provider 1,through which certain rewards may be redeemable, is a certain distanceaway (e.g., 0.1 miles), and a navigation selector (“Navigate”), ifactivated (e.g., by touching “Navigate” on a touchscreen), may assistthe user in reaching the provider. For example, the navigation selectormay launch a mapping or driving application and provide the address ofthe provider to the mapping/driving application as the user'sdestination, or the application may display driving directions (with orwithout GPS navigation) within the application without launching orinterfacing with another application or device. Interface 3000D alsoprovides a “Switch View” selector 3038 (which may include a drop downmenu with alternative selectable views) to allow the user to switch fromthe current view (e.g., providers for a selected account as in interface3000D) to another view (e.g., the view of interface 3000F).

Example interface 3000E of FIG. 30E is another example interface thatmay be presented upon, for example, selection of accounts icon 3002C inFIG. 30A. Interface 3000E presents an account listing 3040, whichidentifies user accounts and account groups (“Account Group 1” and“Account Group 2”), which may correspond with multiple accounts that canbe selected, enabled, disabled, etc., as a group. Such groupings mayhave been defined, for example, via interface 3000B. Account groups mayinclude accounts in certain categories (which may be, e.g., user-definedor automatically categorized by, e.g., the application), such as allcredit cards regardless of issuing financial institution, all paymentcards of a particular issuing financial institution, all non-creditpayment vehicles, etc. Each account group may include accounts held atmultiple entities or one entity, and they may be accounts of a certaintype or a certain method in which rewards are earned and/or redeemed, ormay be accounts of different types with different methods in whichrewards are earned and/or redeemed. Each grouping has a status indicatorthat indicates whether some or all of the accounts in the group/categoryare currently “On” or “Off”.

One of the accounts from account listing 3040 may be selected by, forexample, activating (e.g., by touching or otherwise selecting) theaccount identifier or a corresponding arrowhead or other icon. In FIG.30F, arrowhead icon 3042 corresponding with Entity 3 Account 2 has beenselected, analogous to FIG. 30D. A rewards listing 3044 identifiesavailable rewards which may be redeemed through transactions involvingthe selected account (e.g., Entity 3 Account 2). For each reward,providers at which the reward is redeemable are listed. In certainimplementations, rewards earned with respect to one provider may betransferable or otherwise redeemable with another provider. For example,a discount earned for a first provider may be applied in one or moretransactions involving a second provider.

In FIG. 30F, rewards listing 3044 identifies “Cash Bonus” as a firstreward that may be redeemed through transactions involving Providers 2and 4, and “Discount” as a second reward that may be redeemed throughtransactions involving Providers 4 and 5. A balance indicator 3046 mayspecify what rewards balance remains. A status indicator 3048 indicateswhether use of a corresponding reward (“Cash Bonus”) is enabled withrespect to transactions involving the selected account (e.g., Entity 3Account 2) at the listed provider or providers (e.g., Providers 2 and4). In the version of status indicator 3048 shown in FIG. 30F, a blacksolid square may be positioned to the left of a rectangle to indicate,for example, that use of the reward is enabled with respect to alllisted providers, the black solid square may be positioned to the rightof the rectangle to indicate that use of the reward is disabled for alllisted providers, and the black solid square may be positioned in themiddle (or otherwise somewhere between the left and right) to indicatethat use of the reward is enabled with respect to at least one providerwhile use of the reward is disabled with respect to at least oneprovider. Status indicators corresponding to particular providers mayindicate whether use of a reward is enabled or disabled in a similarfashion (e.g., a square positioned to the left with a “Y” for “yes” mayindicate the reward is enabled for use at a corresponding provider in atransaction involving the identified account, and a square positioned tothe right with a “N” for “no” may indicate the reward is not usable atthe corresponding provider in a transaction involving the identifiedaccount).

Example interface 3000G of FIG. 30G may be presented upon, for example,selection of providers icon 3002G in FIG. 30A. Interface 3000G presentsa provider listing 3050, which identifies providers at which rewards areor may be redeemable. Each provider has a status indicator thatindicates whether the provider is currently “On” (and thus use ofrewards is enabled, activated, or otherwise usable) or “Off” (and thususe of rewards is disabled, deactivated, or otherwise unusable). Theuser may be allowed to change the status for a provider by, for example,selecting the corresponding status indicator (e.g., by touching “Status”or “On” or “Off” for a particular provider on a touchscreen) andselecting a different status (e.g., via another interface discussedelsewhere). The application may allow the user to “visit” (virtuallyand/or physically) a provider via a visit icon 3052. If the provider isan online merchant, selection of the visit icon 3052 may direct the userto the merchant's website (in-application or via a separate Internetbrowser or other application launched by the application), and if theprovider has a physical location, selection of the visit icon 3052 mayprovide directions or navigation (e.g., within the same applicationand/or by launching another application). If there are other providersthat do not fit on the screen, a user may view them by, for example,scrolling the page (e.g., by swiping up on a touchscreen) or byselecting “Show More Providers” at the bottom of interface 3000G.

One of the providers from provider listing 3050 may be selected by, forexample, activating (e.g., by touching or otherwise selecting) theidentified provider or a corresponding arrowhead or other icon. In FIG.30H, arrowhead icon 3054 corresponding with Provider 3 has beenselected. The provider, as well as its location, promotional offerings,and/or other information may be presented at a provider identificationregion 3056, which identifies which provider has been selected forreview and/or management. An account listing 3058 identifies particularaccounts with specified rewards which may be redeemable through theidentified provider. Rewards earned with respect to more than oneaccount may be usable with respect to one provider. In FIG. 30H, accountlisting 3058 identifies Entity 2 Account 1 and Entity 3 Account 3, eachof which has two rewards that may be individually activated anddeactivated for redemption through a transaction involving thecorresponding provider (e.g., a purchase from Provider 3). Statusindicators corresponding to particular rewards (e.g., “Apply 15%Discount”) may indicate whether the particular reward is enabled ordisabled for use at the identified provider (e.g., Provider 3) in atransaction involving the identified account (e.g., Entity 2 Account 1).

Example interface 30001 of FIG. 30I may, in a similar fashion, bepresented upon, for example, selection of providers icon 3002G in FIG.30A. Interface 30001 presents a provider listing 3060, which identifiesproviders or provider categories at which rewards are or may beredeemable. Provider categories may correspond with multiple providersthat can be selected, enabled, disabled, etc., as a group. Suchgroupings may have been defined, for example, via interface 3000B.Provider groups may include providers in certain categories (which maybe, e.g., user-defined or automatically categorized by, e.g., theapplication), such as merchants selling a certain category of goods. Oneof the providers from provider listing 3060 may be selected by, forexample, activating (e.g., by touching or otherwise selecting) theprovider identifier or a corresponding arrowhead or other icon. In FIG.30J, arrowhead icon 3062 corresponding with Provider 3 has beenselected. A rewards listing 3064 identifies particular rewards (e.g.,discount and cash bonus) which may be redeemable at the identifiedprovider.

Example interfaces 3000K of FIG. 30K and 3000M of FIG. 30M may bepresented upon, for example, selection of rewards icon 3002K in FIG.30A. Interfaces 3000K and 3000M present rewards listings 3070 and 3080,which identify earned or earnable rewards and rewards groupings. Ifthere are other rewards or rewards groupings that do not fit on thescreen, a user may view them by, for example, scrolling the page (e.g.,by swiping up on a touchscreen) or by selecting “Show More Rewards” atthe bottom of interfaces 3000K and 3000M. One of the rewards fromrewards listings 3070 and 3080 may be selected by, for example,activating (e.g., by touching or otherwise selecting) the identifiedreward or a corresponding arrowhead or other icon. In FIGS. 30L and 30N,arrowhead icons 3072 and 3082, respectively, corresponding with CashBonus 1 has been selected. Rewards listing 3074 in FIG. 30L may identifyparticular accounts through which the identified reward (here, CashBonus 1) has been earned and may be redeemed, with specified providersthrough which the identified reward may be redeemable listed below theaccount identifier (e.g., “Cash Bonus 1” may be activated for use atProvider 3 and/or at the providers in Provider Category 5 in one or moretransactions involving Entity 2 Account 1). Status indicator 3076indicates that use of “Cash Bonus 1” is disabled for use at Provider 3in transactions involving Entity 2 Account 1, and may be enabled bytoggling status indicator 3076. Rewards listing 3084 in FIG. 30Nidentifies particular providers or provider groups at which theidentified rewards may be redeemed (e.g., the cash bonus may beactivated for use at the providers in Provider Category 3). Statusindicator 3086 indicates that use of “Cash Bonus 1” (which may have beenearned through past transactions involving Entity 1 Account 1) isdisabled for use at the providers in Provider Category 3 in subsequenttransactions involving Entity 1 Account 1, and may be enabled bytoggling status indicator 3086.

Example interface 30000 of FIG. 30O may be presented upon, for example,selection of history icon 30020 in FIG. 30A. Interface 30000 presentstransaction listing 3090, which identifies transactions (by, e.g.,account, provider, date, and transaction amount) involving user accountsaccessible to the Control Tower application. If rewards were applied tothe transaction, transaction listing 3090 may indicate, for example,which rewards were applied, the amount of rewards applied, the amount ofthe transaction not covered by the reward, the remaining rewardsbalance, etc. If there are other transactions that do not fit on thescreen, a user may view them by, for example, scrolling the page (e.g.,by swiping up on a touchscreen) or by selecting “Show More Transactions”at the bottom of interface 30000.

One of the transactions from transaction listing 3090 may be selectedby, for example, activating (e.g., by touching or otherwise selecting)the identified transaction or a corresponding arrowhead or other icon.In FIG. 30P, arrowhead icons 3092 corresponding with the transaction atProvider 6, has been selected. Interface 3000P provides additionalinformation for the selected transaction. Interface 3000P may allow theuser to retroactively apply an available reward to the transaction at3094. The rewards that are redeemable for the transaction are a $Y bonusand a Z % discount. As indicated by the bolded rectangles, the user hasselected (at 3096) the bonus, and has selected (at 3098) to confirmapplication of the selected bonus to the transaction. This allows theuser to retroactively apply a virtual rewards currency to a transactionthat was partially or wholly paid-for using monetary currency, and mayresult in a credit to the corresponding account of the user once theretroactive application of the rewards has been processed. In variousimplementations, rewards may be retroactively applied so as to applymultiple rewards to a transaction, to apply a reward to a transaction towhich a reward was not previously applied, and/or to change the rewardthat is applied to selected transactions. In certain implementations,in-process transactions may be listed in a transaction listing, and theuser allowed to select which rewards (if any) are to be applied to thetransactions before processing of the transaction is completed (e.g.,before debiting and crediting of monies and rewards has occurred).

It is noted that any of the features, selectors, icons, functionalities,information, elements, or other aspects of any one interface or figuremay be combined or swapped with or applied to any of the features,selectors, icons, functionalities, information, elements, or otheraspects of any other interface or figure.

The embodiments described herein have been described with reference todrawings. The drawings illustrate certain details of specificembodiments that implement the systems, methods and programs describedherein. However, describing the embodiments with drawings should not beconstrued as imposing on the disclosure any limitations that may bepresent in the drawings.

It should be understood that no claim element herein is to be construedunder the provisions of 35 U.S.C. § 112(f), unless the element isexpressly recited using the phrase “means for.”

As used herein, the term “circuit” may include hardware structured toexecute the functions described herein. In some embodiments, eachrespective “circuit” may include machine-readable media for configuringthe hardware to execute the functions described herein. The circuit maybe embodied as one or more circuitry components including, but notlimited to, processing circuitry, network interfaces, peripheraldevices, input devices, output devices, sensors, etc. In someembodiments, a circuit may take the form of one or more analog circuits,electronic circuits (e.g., integrated circuits (IC), discrete circuits,system on a chip (SOCs) circuits, etc.), telecommunication circuits,hybrid circuits, and any other type of “circuit.” In this regard, the“circuit” may include any type of component for accomplishing orfacilitating achievement of the operations described herein. Forexample, a circuit as described herein may include one or moretransistors, logic gates (e.g., NAND, AND, NOR, OR, XOR, NOT, XNOR,etc.), resistors, multiplexers, registers, capacitors, inductors,diodes, wiring, and so on).

The “circuit” may also include one or more dedicated processorscommunicatively coupled to one or more dedicated memory or memorydevices. In this regard, the one or more dedicated processors mayexecute instructions stored in the dedicated memory or may executeinstructions otherwise accessible to the one or more dedicatedprocessors. In some embodiments, the one or more dedicated processorsmay be embodied in various ways. The one or more dedicated processorsmay be constructed in a manner sufficient to perform at least theoperations described herein. In some embodiments, the one or morededicated processors may be shared by multiple circuits (e.g., circuit Aand circuit B may comprise or otherwise share the same processor which,in some example embodiments, may execute instructions stored, orotherwise accessed, via different areas of memory). Alternatively oradditionally, the one or more dedicated processors may be structured toperform or otherwise execute certain operations independent of one ormore co-processors. In other example embodiments, two or more processorsmay be coupled via a bus to enable independent, parallel, pipelined, ormulti-threaded instruction execution. Each processor may be implementedas one or more general-purpose processors, application specificintegrated circuits (ASICs), field programmable gate arrays (FPGAs),digital signal processors (DSPs), or other suitable electronic dataprocessing components structured to execute instructions provided bymemory. The one or more dedicated processors may take the form of asingle core processor, multi-core processor (e.g., a dual coreprocessor, triple core processor, quad core processor, etc.),microprocessor, etc.

Any foregoing references to currency or funds are intended to includefiat currencies, non-fiat currencies (e.g., precious metals), andmath-based currencies (often referred to as cryptocurrencies). Examplesof math-based currencies include Bitcoin, Litecoin, Dogecoin, and thelike.

It should be noted that although the diagrams herein may show a specificorder and composition of method steps, it is understood that the orderof these steps may differ from what is depicted. For example, two ormore steps may be performed concurrently or with partial concurrence.Also, some method steps that are performed as discrete steps may becombined, steps being performed as a combined step may be separated intodiscrete steps, the sequence of certain processes may be reversed orotherwise varied, and the nature or number of discrete processes may bealtered or varied. The order or sequence of any element or apparatus maybe varied or substituted according to alternative embodiments.Accordingly, all such modifications are intended to be included withinthe scope of the present disclosure as defined in the appended claims.

The foregoing description of embodiments has been presented for purposesof illustration and description. It is not intended to be exhaustive orto limit the disclosure to the precise form disclosed, and modificationsand variations are possible in light of the above teachings or may beacquired from this disclosure. The embodiments were chosen and describedin order to explain the principals of the disclosure and its practicalapplication to enable one skilled in the art to utilize the variousembodiments and with various modifications as are suited to theparticular use contemplated. Other substitutions, modifications, changesand omissions may be made in the design, operating conditions andarrangement of the embodiments without departing from the scope of thepresent disclosure as expressed in the appended claims

What is claimed is:
 1. A security system of a first entity, the securitysystem comprising one or more hardware processors configured to: serve,by the first entity to a user device, an internet access control portalfor controlling, via an interactive graphical user interface (GUI),account access by a service provider client application whichcommunicates, when executed on the user device, with a service providercomputing system of a second entity; accept, via the internet accesscontrol portal, a login credential and verify that the login credentialgrants access to the internet access control portal; present, by thefirst entity in the GUI of the internet portal, based on the verifyingthat the login credential grants access to the internet access controlportal, an account listing comprising a financial account linked withthe service provider client application, wherein the financial accountcomprises financial and nonfinancial account data; detect, via theaccount listing in the GUI of the internet portal, selection of thefinancial account; present, by the first entity in the GUI of theinternet access control portal, an access permissions listing comprisingone or more security settings attributable to the linked serviceprovider client application running on the user device; detect, by thefirst entity via the access permissions listing in the GUI of theinternet access control portal, selection of a first set of one or moresecurity settings corresponding to one or more data types orfunctionalities associated with the service provider client application;receive a first application programming interface (API) call comprisinga first account request associated with the service provider clientapplication sent from the service provider computing system of thesecond entity; verify by the first entity that the received first APIcall complies with the first set of security settings attributed to theservice provider client application; in response to verifying that thefirst account request complies with the first set of security settings,grant the first account request to the service provider clientapplication; present, in the GUI of the internet access control portal,the access permissions listing comprising the one or more securitysettings attributable to the service provider client application;detect, via the access permissions listing in the GUI of the internetaccess control portal, selection of a different second set of one ormore security settings corresponding to the one or more data types orfunctionalities associated with the service provider client application;receive by the first entity, from the service provider computing systemof the second entity, a different second API call comprising a secondaccount request for the service provider client application; determineby the first entity that the second API call does not comply with thesecond set of security settings attributed to the service providerclient application; and in response to determining by the first entitythat the second API call does not comply with the second set of securitysettings, decline the second account request.
 2. The system of claim 1,wherein the one or more hardware processors are further configured togenerate, by the first entity in response to the selection of the firstset of security settings, an access token corresponding to the first setof security settings attributed to the service provider clientapplication and transmit the access token to the service providercomputing system of the second entity indicating limited access, by theservice provider client application, to a first subset of the financialand nonfinancial data of the financial account.
 3. The system of claim2, wherein the one or more processors are configured to, in response todetecting selection of the second set of security settings, deactivatethe access token.
 4. The system of claim 2, wherein the one or moreprocessors are configured to, in response to detecting selection of thesecond set of security settings: generate a second access tokencorresponding to the second set of security settings attributed to theservice provider client application; and transmit the second accesstoken to the service provider computing system for limited access, bythe service provider client application, to a second subset of thefinancial and nonfinancial data of the financial account.
 5. The systemof claim 2, wherein the first API call comprises the access tokengenerated by the first entity, and wherein the one or more hardwareprocessors are further configured to authenticate the access token sentby the second entity before granting the first account request to theservice provider client application.
 6. The system of claim 2, whereinthe second API call comprises the access token generated by the firstentity.
 7. The system of claim 1, wherein the one or more processors areconfigured to verify that the first API call complies with the first setof security settings attributed to the service provider clientapplication by determining that the first request is for a data type ora functionality granted to the service provider client applicationthrough the first set of security settings.
 8. The system of claim 1,wherein the one or more processors are configured to determine that thesecond API call does not comply with the second set of security settingsattributed to the service provider client application by determiningthat the second request is for a data type or a functionality notgranted to the client application through the second set of securitysettings.
 9. The system of claim 1, wherein the access control listingpresented by the one or more processors comprises an access controlcorresponding to accessing information on financial transactionsinvolving the financial account.
 10. The system of claim 1, wherein thefirst set of security settings defines one or more data types in theaccount data that are accessible to the service provider clientapplication.
 11. The system of claim 1, wherein the access controllisting presented by the one or more processors comprises an accesscontrol corresponding to access to nonfinancial account data.
 12. Thesystem of claim 1, wherein the access control listing presented by theone or more processors corresponds to financial transactions involvingthe financial account.
 13. The system of claim 1, wherein the second setof security settings revokes one or more access permissions granted inthe first set of security settings.
 14. The system of claim 1, whereinthe second set of security settings revokes all access permissionsgranted by the first set of security settings.
 15. The system of claim1, wherein the second set of security settings adds one or more accesspermissions not granted in the first set of security settings.
 16. Amethod implemented by a security system of a first entity, the securitysystem comprising one or more hardware processors, the methodcomprising: serving, by the first entity to a user device, by the one ormore processors, an internet portal comprising an interactive GUIgranting security control over account access permissions for clientapplications, wherein the internet portal is used as an access controlportal provided for controlling account access by a service providercomputing system of a second entity; accepting, via the internet portal,by the one or more processors, a login credential and verify that thelogin credential grants access to the internet portal; presenting, bythe first entity in the GUI of the internet portal, by the one or moreprocessors, in response to verifying that the login credential grantsaccess to the internet portal, an account listing comprising a financialaccount linked with one or more client applications which communicate,when executed on the user device, with the service provider computingsystem of the second entity; detecting, via the account listing in theGUI of the internet portal, by the one or more processors, selection ofthe financial account comprising financial and nonfinancial accountdata; presenting, by the first entity in the GUI of the internet portal,by the one or more processors, an access permissions listing comprisingone or more security settings attributable to a service provider clientapplication running on the user device; detecting, by the first entityvia the access permissions listing in the GUI of the internet portal, bythe one or more hardware processors, selection of a first set of one ormore security settings corresponding to one or more data types orfunctionalities associated with the service provider client application;receiving by the one or more processors, a first API call comprising afirst account request for the service provider client application sentfrom the service provider computing system; verifying, by the one ormore processors of the first entity, that the received first API callcomplies with the first set of security settings attributed to theservice provider client application; in response to verifying that thefirst account request complies with the first set of security settings,granting, by the one or more processors, the first account request tothe service provider client application; presenting, in the GUI of theinternet portal, by the one or more processors, the access permissionslisting comprising the one or more security settings attributable to theservice provider client application; detecting, via the accesspermissions listing in the GUI of the internet portal, by the one ormore processors, selection of a different second set of one or moresecurity settings corresponding to the one or more data types orfunctionalities associated with the service provider client application;receiving, from the service provider computing system, by the one ormore hardware processors of the first entity, a second API callcomprising a second account request for the service provider clientapplication; determining, by the one or more hardware processors, thatthe second API call does not comply with the second set of securitysettings attributed to the service provider client application; and inresponse to determining by the first entity that the second API calldoes not comply with the second set of security settings, decline thesecond account request.
 17. The method of claim 16, further comprisinggenerating, by the first entity in response to the selection of thefirst set of security settings, by the one or more processors, an accesstoken corresponding to the first set of security settings attributed tothe service provider client application and transmit the access token tothe service provider computing system of the second entity indicatinglimited access, by the service provider client application, to a firstsubset of the financial and nonfinancial data of the financial account.18. The method of claim 17, further comprising, in response to detectingselection of the second set of security settings, performing at leastone of: deactivating, by the one or more processors, the access token;or generating, by the one or more processors, a second access tokencorresponding to the second set of security settings attributed to theservice provider client application, and transmitting the second accesstoken to the service provider computing system for limited access, bythe service provider client application, to a second subset of thefinancial and nonfinancial data of the financial account.
 19. The methodof claim 17, wherein the first API call further comprises the securitytoken, and wherein the method further comprises, before granting thefirst account request, authenticating, by the one or more processors,the access token received and sent by the second entity.
 20. The methodof claim 16, wherein verifying that the first API call complies with thefirst set of security settings attributed to the service provider clientapplication comprises determining, by the one or more processors, thatthe first request is for a data type or a functionality granted to theservice provider client application through the first set of securitysettings, and wherein determining that the second API call does notcomply with the second set of security settings attributed to theservice provider client application comprises determining, by the one ormore processors, that the second request is for a data type or afunctionality not granted to the service provider client applicationthrough the second set of security settings.