Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets

ABSTRACT

Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.17/558,469, filed Dec. 21, 2021, which is a continuation of U.S. patentapplication Ser. No. 17/240,730, filed Apr. 26, 2021, which is acontinuation of U.S. patent application Ser. No. 17/013,193, filed onSep. 4, 2020, titled “Synchronous Interfacing with UnaffiliatedNetworked Systems to Alter Functionality of Sets of Electronic Assets,”each of which is incorporated herein by reference in its entirety.

TECHNICAL FIELD

Embodiments of the present disclosure relate to systems and methods fortransforming functionality of sets of electronic assets via interfacecalls using corresponding sets of networked computing interfaces.

BACKGROUND

A person may carry—in a wallet, purse, bag, or other “carrier”—acollection of many different kinds of electronic “assets” (e.g., severalcredit and debit cards, remote access keys such as radio-frequencyidentification (RFID) cards, gift cards, fobs, and otheridentifications). In some instances, the assets are serviced by manydifferent issuers (e.g., several unaffiliated banks, businesses, andorganizations). If the person loses the carrier, he/she may wish todeactivate all the assets in that carrier while he/she looks for thecarrier to avoid fraudulent or otherwise unauthorized use of theelectronic assets. This is normally achieved by contacting eachindividual third-party issuer of the electronic assets, such as by usinga website or application of each issuer or contacting each issuer bytelephone. Additionally, each issuer may have its own process forpreventing fraudulent use of the asset that is different from otherissuers, making this a relatively slow and cumbersome process at a timewhen the person is already distraught from the loss of the carrier.Moreover, a person may not remember exactly what assets were in theparticular carrier when it was lost, making the process even morefrustrating.

SUMMARY

Various embodiments relate to a method that includes providing, by aprocessor of a computing system through a telecommunications network, toa remote user computing device that includes an input device configuredto detect at least one of biometric data, alphanumeric entries, or iconselections, a portal with a network security access control. The methodincludes receiving, by the processor, via the network security accesscontrol of the portal, login credentials detected using the input deviceof the user computing device, and in response to receiving the logincredentials, determining, by the processor, that the login credentialsare associated with a set of electronic assets corresponding to aplurality of third-party computing systems with application programminginterface (API) gateways, where each of the API gateways is configuredto accept an API call directed to changes in functionality of theelectronic assets. The method includes presenting, by the processor, viathe portal, a virtual icon configured to be selectable using the inputdevice to identify a coordinated action with respect to all electronicassets in the set of electronic assets. The method further includesaccepting, by the processor, via the portal, selection of the virtualicon detected using the input device of the user computing device, andin response to accepting the selection via the portal, executing, by theprocessor, a set of API calls that include an asset-specific API call toeach third-party computing system in the plurality of third-partycomputing systems to implement the coordinated action on all electronicassets in the set of electronic assets.

Various embodiments relate to a computing system having a processor anda memory storing executable code. The executable code causes thecomputing system, when executed, to (i) provide, via an internetconnection, to a user computing device that includes an input deviceconfigured to detect at least one of biometric data, alphanumericentries, or icon selections, a portal with a network security accesscontrol; (ii) receive, via the network security access control of theportal, login credentials detected using the input device of the usercomputing device; (iii) in response to receiving the login credentials,determine that the login credentials are associated with a set ofelectronic assets corresponding to a plurality of third-party computingsystems with application programming interface (API) gateways configuredto accept API calls directed to changes in functionality of theelectronic assets, (iv) present, via the portal, a virtual iconconfigured to be selectable using the input device to identify acoordinated action with respect to all electronic assets in the set ofelectronic assets; (v) accept, via the portal, selection of the virtualicon detected using the input device of the user computing device; and(vi) in response to accepting the selection via the portal, execute aset of API calls including an asset-specific API call to eachthird-party computing system in the plurality of third-party computingsystems to implement the coordinated action on each correspondingelectronic asset in the set of electronic assets.

Various embodiments relate to a method that includes presenting, on adisplay of a mobile device, a graphical user interface (GUI), where themobile device includes an input device configured to detect at least oneof alphanumeric entries, icon selections, or image data. The method alsoincludes receiving, by a processor from the input device, a plurality ofasset definitions for a set of electronic assets, each asset definitionincluding a third-party identifier that is indicative of a respectiveone of a plurality of third-party computing systems. The method alsoincludes identifying, via the processor, the plurality of third-partycomputing systems based on the plurality of third-party identifiers, andpresenting, by the display, via the GUI, a virtual icon configured to beselectable using the input device to identify a coordinated action withrespect to all electronic assets in the set of electronic assets. Themethod further includes receiving, by the processor, selection of thevirtual icon from the input device, and in response to the selection,transmitting, via a transceiver of the mobile device, the selection to aremote computing system to implement the coordinated action on eachcorresponding electronic asset in the set of electronic assets.

These and other features, together with the organization and manner ofoperation thereof, will become apparent from the following detaileddescription when taken in conjunction with the accompanying drawings.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is a block diagram of an electronic asset management system,according to an example embodiment.

FIG. 2 is a block diagram of a user computing device, according to anexample embodiment.

FIG. 3 is a flow diagram of a method of managing a set of electronicassets, according to an example embodiment.

FIG. 4 is an example interface for a user computing device, according toan example embodiment.

FIG. 5 is a flow diagram of a method of populating a set of electronicassets into an electronic asset management system, according to anexample embodiment.

FIGS. 6 and 7 are example interfaces for a user computing device,according to various example embodiments.

FIG. 8 is a flow diagram of a method of implementing a coordinatedaction on a set of electronic assets based on a travel plan, accordingto an example embodiment.

FIG. 9 is an example interface for a user computing device, according toanother example embodiment.

DETAILED DESCRIPTION

Referring to the figures generally, systems, methods, and apparatusesfor managing groupings of electronic assets synchronously and from asingle location (e.g., a central location, portal, etc.) are described.In particular, systems, methods, and apparatuses for taking specificcoordinated action across a grouping of assets consisting of assets thatare independently managed through multiple unaffiliated networkedsystems are described.

Existing third-party issuers of electronic identification cards andother electronic assets, such as government entities and financialinstitutions (e.g., banks), require clients to connect with themdirectly when changes to the operating status of the asset is desired.For example, in a situation where a person loses their wallet or purse,the person may wish to freeze and/or cancel any electronic access oridentification cards that were carried in the purse to preventfraudulent transactions. This process requires the person to notify eachindividual third-party issuer to take the required action. If the walletor purse is ultimately deemed permanently lost, the person may wish toreceive replacement assets. In that case, the cumbersome process ofnotifying each individual issuer needs to be repeated (if the assetswere previously deactivated), or started anew (if assets were notpreviously deactivated, making the cumbersome process unavoidable). Thisprocess may be further complicated by different security protocols orprocedures used by the various, unaffiliated third-party issuers thatare responsible for the electronic assets. If a person is away from homeor traveling internationally, the process of connecting with each issuermay be logistically complicated by differing communications networks.While some third-party issuers offer services to cancel and/or freezecards over the internet, none offer a secure and efficient system forsynchronously controlling sets and/or groupings of electronic assetsfrom multiple unaffiliated networked systems from a single location.

In other situations, a person may wish to engage in some activity thataffects multiple electronic assets from different third-party issuers atthe same time, such as travel. In these situations, the person may onlywant to impose restrictions on (e.g., deactivate or limit usabilitythereof), remove restrictions from (e.g., authorize internationaltransactions), or otherwise alter the functionality of, a grouping ofassets because of their travel plans.

Referring generally to the figures, a system for managing sets and/orgroupings of electronic assets from multiple, unaffiliated third-partyissuers is described. In particular, the system provides a selectiontool that allows a user to alter the functionality of all of the assetswithin a single grouping synchronously (e.g., in parallel,simultaneously, at the same time, etc.). The electronic assets may bepayment items such as credit cards, debit cards, gift cards, ornon-payment items such as identification cards and electronic accesskeys. The assets may be grouped within the system based on how they arephysically carried. For example, a single grouping of assets may becontained within the same physical carrier (e.g., purse, wallet, etc.).A first grouping of electronic assets may be a grouping of credit cards,debit cards, RFID cards, and other electronically managed identificationcards that are contained within a person's wallet. A second grouping ofelectronic assets may a grouping of credit cards, gift cards, and otherelectronically managed identification cards that are contained withinthe person's money clip that is used separately from the wallet or purse(e.g., for different occasions, under different circumstances, etc.).The wallet and the money clip may include different groupings of creditcards, and/or identification cards. When the person is using theirwallet, he/she can use the system to quickly deactivate, freeze, orotherwise restrict the use of the second grouping of electronic assets(in the money clip) to protect the assets when not in use, withouthaving to engage with multiple third-party issuers. In the event thatthe wallet and/or money clip becomes lost, the person can use the systemto identify which electronic assets are affected by the loss, and todeactivate, restrict, or otherwise alter all of the electronic assetswithin the first or second groupings at the same time (and with a singleselection). Actions may be performed in a “single click” fashion tosimplify control over multiple assets.

In one embodiment, the system uses a set of application programminginterfaces (APIs) to communicate the desired changes in functionality tothe different, unaffiliated third-party issuers. For example, eachthird-party issuer may be provided with its own API to allow it toimplement different functions for the assets they support. Uponreceiving a selection to modify the functionality of a grouping ofassets, the system executes an asset-specific API call to each of thethird-party computing systems to implement the desired change. Amongother benefits, the use of multiple APIs allows the system to adapt todifferent policies that may be used between different third-partyissuers (e.g., different policies for altering the functionality ofelectronic assets in the same way). Additionally, the use of multipleAPIs that can be executed in parallel is more efficient that othermethods of coordinated control.

The system is also configured to facilitate recognition and grouping ofthe electronic assets. For example, the system can be configured to scaneach of the electronic assets (e.g., cards, etc.) using a sensor of amobile device, and to automatically recognize and the third-party issuerthat supports (e.g., manages, funds, etc.) the asset. In particular, invarious embodiments, the system may be configured to convert image datathat is obtained from the scan to machine readable text, and match thetext with the API that corresponds to the asset. In certain embodiments,the sensor is a magnetic reader, or another form of integratedsensor/reader. In various embodiments, the system is configured toidentify at least one electronic asset through wireless communicationsbetween the mobile device 200 and the electronic asset. Each API,electronic assets, mobile device, etc., may have a corresponding uniqueidentifier (e.g., an API identifier, an asset identifier, a deviceidentifier) that is generated or obtained by the system, and identifiersmay be linked or paired so as to associate the identifiers and indicatethat the corresponding API, asset, device, etc. correspond to eachother. Among other benefits, the automated recognition and integrationof electronic assets from different third-party issuers greatly reducesthe time required to input different electronic assets into the system,and reduces the risk of pairing electronic assets with incorrect APIs.

In one embodiment, the system serves, provides, or otherwise includes aportal (e.g., an internet portal that is accessible via an internetbrowser, an application running on a mobile device, etc.) that isconfigured to maintain asset information, and to facilitate user controlof groupings of electronic assets. The portal may include a networksecurity access control to prevent fraudulent access to the groupings ofassets. The portal may allow the user to take a set of actions, inbatch, on a grouping of assets (e.g., turn off and replace allelectronic assets grouped in “wallet”). The portal may also providenotifications from other third-party issuers, prompting the user to takeany additional steps that are needed with individual third-party issuersto implement the requested actions. In one embodiment, the portal mayautomatically redirect the user to other applications (e.g., sponsoredby one or more third-party issuers) to complete the requested actions.

In one embodiment, the portal may be implemented as part of theoperating system of a user's mobile device to facilitate more rapidselection of the desired actions. For example, a selection tool may beintegrated into a shortcuts screen or through interaction with anapplication icon that corresponds to the portal. For example, in orderto select a certain action with respect to a grouping of electronicassets, the user may select and hold the application icon (e.g., on atouchscreen display) for a threshold period and/or make a selection froma shortcut menu that opens after pressing the application icon for thethreshold period.

The system can also perform other more complex actions with respect toone or more groupings of electronic assets. For example, the portal mayinclude a travel planner that allows the user to enter information onlocations, dates, and other travel-related information to selectivelycontrol pre-defined groupings of assets (e.g., to identify a set ofactions, pre-authorizations, or restrictions to be taken with respect tothe pre-defined grouping of assets). In this way, a user can notify thethird-party issuers about anticipated travel plans, to reduce the riskof the third-party issuers inadvertently locking/freezing funds or otherelectronic assets used due to use of the assets outside of the areawhere the user resides.

As used herein, the term “electronic asset” or “asset” refers to anyform of user and/or user account identification that can be remotelyactivated, deactivated, restricted, or otherwise altered. For example,electronic assets may refer to payment items/vehicles such as paymentcards (e.g., credit cards, charge cards, ATM cards, debit cards,stored-value cards such as gift cards, fleet cards, etc.), checks, andmoney orders. Additionally, electronic assets may refer to non-paymentitems such as electronic identification cards, security access devices(e.g., key cards, RFID access cards, etc.), and the like.

Referring to FIG. 1 , a view of an electronic asset management system100 is shown according to an example embodiment. As described below infurther detail, the electronic asset management system 100 facilitatesthe sharing and management of groupings/sets of electronic assetsassociated with a user. The system 100 includes a primary institution102, at least one third-party computing system 104, and at least oneuser computing device 106. The electronic asset information can includeasset definitions that identify the asset (e.g., account numbers,labels/identifiers for third-party issuers, etc.), transaction and/oruse history of the electronic asset (e.g., account balances, transactioninformation, bill due dates, etc.), and grouping definitions thatinclude asset definitions for all electronics assets contained within asingle carrier. The electronic asset information may also include userpersonal information stored by the primary institution 102 and/or usedby the third-party computing systems 104 for security purposes (e.g.,identity information, authentication information, etc.).

The user may be a customer or an account holder of the primaryinstitution 102. The primary institution 102 includes a remote computingsystem 108. The remote computing system 108 maintains information aboutelectronic assets held by the user and groupings of electronic assets.In one embodiment, the remote computing system 108 also maintainsaccounts held with the primary institution 102 and facilitates themovement of funds into and out of the accounts, or between the accountsin the primary institution 102 and other third-party issuers. Forexample, the primary institution 102 may be a financial institution thatmaintains at least one financial account of the user. Additionally, theremote computing system 108 facilitates the sharing of and the provisionof access to information associated with user accounts to the user, touser computing devices 106, and to third-party computing systems 104.The remote computing system 108 includes a network interface 110. Thenetwork interface 110 is structured to facilitate data communicationwith other computing systems (e.g., the user computing devices 106, thethird-party computing systems 104, etc.) via a network 112. The networkinterface 110 includes hardware and program logic that facilitatesconnection of the remote computing system 108 to the network 112. Forexample, the network interface 110 may include a wireless networktransceiver (e.g., a cellular modem, a Bluetooth transceiver, a WiFitransceiver, etc.) and/or a wired network transceiver (e.g., an Ethernettransceiver). In some arrangements, the network interface 110 includesthe hardware and programming logic sufficient to support communicationover multiple channels of data communication (e.g., the Internet and aninternal primary institution network). Further, in some arrangements,the network interface 110 is structured to encrypt data sent over thenetwork 112 and decrypt received encrypted data.

The remote computing system 108 includes a processing circuit 114 havinga processor 116 and memory 118. The processor 116 may be implemented asa general-purpose processor, an application specific integrated circuit(ASIC), one or more field programmable gate arrays (FPGAs), a digitalsignal processor (DSP), a group of processing components, or othersuitable electronic processing components. The memory 118 includes oneor more memory devices (e.g., RAM, NVRAM, ROM, Flash Memory, hard diskstorage, etc.) that store data and/or computer code for facilitating thevarious processes described herein. Moreover, the memory 118 may be orinclude tangible, non-transient volatile memory or non-volatile memory.

As shown in FIG. 1 , the remote computing system 108 includes an accesscontrol circuit 120 and an electronic asset management circuit 122.Although shown as separate circuits in FIG. 1 , in some arrangements,the access control circuit 120 and/or the electronic asset managementcircuit 122 are part of the processing circuit 114. Other arrangementsmay include more or less circuits without departing from the spirit andscope of the present disclosure. Further, some arrangements may combinethe activities of one circuit with another circuit to form a singlecircuit. Therefore, those of ordinary skill in the art will appreciatethat the present arrangement is not meant to be limiting. The accesscontrol circuit 120 is structured to manage the sharing and provision ofcustomer information to third-party computing systems 104 and to usercomputing devices 106 based on permissions and preferences of the user.The electronic asset management circuit 122 is structured to performvarious electronic asset management functions for groupings ofelectronic assets, including maintaining an electronic asset database124, sharing electronic asset information between the user computingdevices 106 and third-party computing systems 104, analyzing assetdefinitions, selecting third-party API calls based on asset definitions,and synchronously routing commands/selections from the user computingdevices to the third-party computing systems 104 using the API calls.

The remote computing system 108 includes the electronic asset database124. In some arrangements, the electronic asset database 124 is part ofthe memory 118. The electronic asset database 124 is structured to hold,store, categorize, and otherwise serve as a repository for electronicasset information, groupings of assets, user selections, and APIs. Forexample, the electronic asset database 124 may store asset definitionsthat identify the electronic assets such as account numbers, third-partyidentifiers that are indicative of a respective one of the plurality ofthird-party computing systems 104, grouping definitions including listsof electronic assets that are contained within different carriers, andthe like. The electronic asset database 124 may also include informationrelated to use of each grouping of electronic assets, or individualelectronic assets within each grouping (e.g., account balances,use/transaction information, account ownership information, and thelike). The electronic asset database 124 is structured to selectivelyprovide access to information relating to groupings of electronic assets(e.g., to the user via the user computing devices 106). In somearrangements, the remote computing system 108 includes other databases,such as customer document and information databases structured to storenon-asset related information or other documents associated with theuser for distribution to third-party computing systems 104 at theapproval of the user.

Still referring to FIG. 1 , the electronic asset management system 100includes at least one third-party computing system 104. The third-partycomputing system 104 may be unaffiliated with the remote computingsystem 108 and/or may have separate security protocols from the remotecomputing system 108. Additionally, in embodiments with multiplethird-party computing systems 104, at least two of the third-partycomputing systems 104 are unaffiliated with one another. In other words,each third-party computing system 104 is affiliated with a separate(e.g., different, etc.) third-party issuer that maintains, sponsors, orotherwise services at least one electronic asset. As used herein, theterm “unaffiliated” means that at least two recipient computing systemsare those of separate unrelated entities and/or institutions that haveseparate security protocols. The third-party computing systems 104 arecommunicably coupled to the primary institution 102 through remotecomputing system 108 and can be authorized by the user to accessinformation associated with the user that is stored, generated,maintained, and/or controlled in part by the primary institution 102.For example, the third-party computing systems 104 may be affiliatedwith any combination of merchants (e.g., brick-and-mortar retailers,e-commerce merchants, etc.), payment networks (e.g., payment networksaffiliated with credit cards offered by the primary institution 102and/or third-party issuers that are not affiliated with the primaryinstitution 102), governments, businesses (e.g., employers), or thelike. As described in further detail below, the user can submit requeststo manage electronic assets that are affiliated with the third-partyissuers through the remote computing system 108.

The user is associated with various user computing devices 106. The usercomputing devices 106 may include, for example, desktop computers ormobile devices such as smartphones, tablet computers, laptop computers,wearables (e.g., smart watches, smart glasses, fitness trackers, etc.),and/or internet of things (“IOT”) devices (e.g., Amazon Echo®, smartappliances, etc.). The user computing devices 106 provide access toinformation associated with the user (e.g., information regardinggroupings of assets, etc.) that is stored, generated, maintained, and/orcontrolled in part by the primary institution 102.

The devices of the system 100 communicate via the network 112. Thenetwork 112 may include any combination of the Internet and an internalprivate network (e.g., any combination of wired and/or wirelessnetworks, telecommunications networks, etc.). Through data communicationover the network 112, the remote computing system 108 can coordinaterequests from the user computing devices 106 to the third-party issuers(e.g., third-party computing systems 104) to change the functionality ofdifferent groupings of electronic assets.

As shown in FIG. 1 , the remote computing system 108 includes userdevice APIs 126 that define how the remote computing system 108communicates electronic asset information with the user computingdevices 106. The user device APIs facilitate the sharing of and accessto the electronic asset information stored at the remote computingsystem 108 based on permissions and preferences provided by the user.The user device APIs also facilitate the transmission ofcommands/selections from the user computing devices 106 to the remotecomputing system 108 to control functionality of groupings of assets.

The remote computing system 108 also includes third-party APIs 128 thatdefine how the remote computing system 108 shares electronic assetinformation with the third-party computing systems 104. The third-partyAPIs 128 may facilitate the sharing of and access to information relatedto one or more electronic assets within a grouping of electronic assets(e.g., electronic assets that are supported, serviced, or otherwisecontrolled by a third-party issuer that is associated with thethird-party APIs 128). The third-party APIs also facilitate thetransmission of commands/selections from the remote computing system 108to the third-party computing systems 104 to synchronously control thefunctionality of groupings of assets. As used herein, the term“synchronously” refers to the substantially coordinated control ofassets that are supported by multiple, unaffiliated third-partycomputing systems 104. For example, synchronous control may refer to thetransmission of API calls to each of the third-party computing system inparallel (e.g., at the same time), or in a controlled sequence (e.g.,not necessarily at the same time) to reduce the average time required toactivate, deactivate, restrict, or otherwise manage each asset from thegrouping of assets. In one embodiment, the third-party APIs 128 arespecifically configured to transmit requests/commands/selections throughthird-party API gateways 130 of the third-party computing systems 104.For example, the primary institution 102 may have arrangements withthird-party issuers, and may have APIs 128 that are specific to eachissuer, and that conform to the specific procedural requirements thateach issuer has for changing the functionality of electronic assets thatare managed by the third-party issuer. API calls (requests, commands,selections from the remote computing system 108) are routed by thethird-party API gateways 130. Each API may require APIs calls thatfollow specific protocols, such as what data (e.g., security or accesstokens, identifiers, etc.) is required with the API call, formatting ofdata provided, encryption, etc. The third-party API gateways 130 aremanagement tools that accept (e.g., receive, authenticate, verify,analyze, decipher, decrypt, etc.) all API calls from the remotecomputing system 108, aggregate the various services required to fulfillthem, and take the appropriate action through the third-party computingsystems 104. The APIs 128 may include encryption to ensure the securetransfer of information between the remote computing system 108 and thethird-party computing systems 104.

The access control circuit 120 controls access to the electronic assetinformation by the user computing devices 106 via the user device APIs126. The access control circuit 120 may form part of a network securityaccess control that prevents unauthorized viewing of electronic assetinformation. In some arrangements, the remote computing system 108provisions requested electronic asset information to a given usercomputing device 106 for local storage on the user computing device 106.For example, the remote computing system 108 can provision groupingdefinitions that indicate which assets are associated with whichcarriers (e.g., which credit cards, RFID cards, gift cards, etc. arecontained within a user's purse or another carrier), asset definitionssuch as third-party issuer identifiers that are indicative of thethird-party issuer that is associated with each electronic asset, andother electronic asset information (e.g., transaction history forgroupings of electronic assets or individual electronic assets fromwithin one or more groupings, etc.). In other arrangements, the remotecomputing system 108 provides access to remotely display, present, oranalyze electronic asset information stored at the remote computingsystem 108 while the remote computing system 108 retains control overthe electronic asset information. For example, the remote computingsystem 108 can provide access to an internet server to presentdesignated electronic asset information through a website for theprimary institution 102, when the internet server requests theinformation, without directly transmitting the data to the internetserver.

Referring now to FIG. 2 , a more detailed view of a user computingdevice 106 is shown, according to an example embodiment. The usercomputing device 106 shown in FIG. 2 is a mobile device 200. The mobiledevice 200 is structured to exchange data over the network 112, executesoftware applications, access websites, generate graphical userinterfaces, and perform other operations described herein. The mobiledevice 200 may include one or more of a smartphone or other cellulardevice, a wearable computing device (e.g., eyewear, a watch or bracelet,etc.), a tablet, a portable gaming device, a laptop, and other portablecomputing devices.

In the example shown, the mobile device 200 includes a network interface202 (e.g., a transceiver) enabling the mobile device 200 to communicatevia the network 112. The mobile device 200 also includes a userinterface 204 (an input output (I/O) device, etc.), and a processingcircuit 206 including a memory 208 and a processor 210. As shown in FIG.2 , the user interface 204 includes hardware and associated logicsconfigured to exchange information with a user. An input aspect of theuser interface 204 allows the user to provide information to the mobiledevice 200, and may include, for example, a mechanical keyboard, atouchscreen, a microphone, a camera, biometric scanner to receivebiometric data such as a fingerprint scanner, any user input device thatis engageable to the mobile device 200 via a USB, serial cable, Ethernetcable, and so on. As shown in FIG. 2 , the mobile device 200 includes asensor 212 that is configured to capture image data. The sensor 212 maybe a camera or another optical sensor that is built into the mobiledevice 200. An output aspect of the user interface 204 allows the userto receive information from the mobile device 200, and may include, forexample, a digital display 214 (e.g., a touchscreen display, an LCDdisplay, and other monitor types), a speaker, illuminating icons, LEDs,and so on.

The user portal 216 (e.g., user portal circuit, etc.) is structured toprovide the user with access to services offered by the primaryinstitution 102 (e.g., the remote computing system 108). The user portal216 may be, or may be accessed via, a software application that may beprovided by or associated with the primary institution 102 (via theremote computing system 108). As such, the user portal 216 may be hardcoded onto the memory of the mobile device 200. In another embodiment,the user portal 216 may be one or more web-based interface applicationsthat are supported by a separate computing system comprising one or moreservers, processors, network interface circuits, or the like, thattransmit the application to the mobile device 200, and where the userhas to log onto or access the web-based interface before usage.

The user portal 216 is structured to provide displays to the mobiledevice 200 that enable the user to view and manage groupings ofelectronic assets through the remote computing system 108. Accordingly,the user portal 216 is communicably coupled to the remote computingsystem 108 (e.g., the access control circuit 120 and the electronicasset management circuit 122).

Further, via the user portal 216, the mobile device 200 is configured toreceive and display various datasets from the remote computing system108 to facilitate management and control of the groupings of electronicassets (and individual electronic assets within each grouping). Themobile device 200, via the user portal 216, is configured to render suchdatasets into the GUI of the user portal 216. As described herein,through such GUIs, the user is able to modify the functionality ofcertain groupings of electronic assets.

In some embodiments, the mobile device 200 is configured (e.g., via theuser portal 216) to perform various operations described herein as beingperformed by the remote computing system 108. For example, in oneembodiment, the user portal 216 includes APIs structured to facilitateexchange of information between the mobile device 200 and the variousthird-party computing systems 104 independently or at least partiallyindependently from the remote computing system 108.

In some embodiments, the user portal 216 is a separate softwareapplication implemented on the mobile device 200. The user portal 216may be downloaded by the mobile device 200 prior to its usage, hardcoded into the memory 208 of the mobile device 200, or be a web-basedinterface application such that the mobile device 200 may provide a webbrowser to the application, which may be executed remotely from themobile device 200. In the latter instance, the user may have to log ontoor access the web-based interface before usage of the applications.Further, and in this regard, the user portal 216 may be supported by aseparate computing system including one or more servers, processors,network interface circuits, or the like that transmit applications foruse to the mobile device 200.

It should be understood that other user computing devices 106 (e.g.,user computing devices 106 other than a mobile device 200) may includeapplications that are similar to the user portal 216 discussed above.For example, a smart appliance may include an application associatedwith the primary institution 102 that enables the user to exchangeinformation with the remote computing system 108 and/or third-partycomputing systems 104 to manage groupings of electronic assets. Inanother example, a smart speaker may include an application throughwhich the user may modify the functionality of at least one grouping ofelectronic assets via voice commands. In certain embodiments, a user mayspeak a command, such as “deactivate,” “turn off,” “restrict,” etc.,followed by an identification of a set of electronic assets (such as thename of a carrier) to be altered. In some embodiments, the system mayverify the voice signature as being that of an owner or other authorizeduser, decipher the audio in the spoken command to interpret the spokenwords as commanding an action upon a specified grouping of electronicassets, and alter the electronic assets in the specified grouping ofelectronic assets according to the command. In certain embodiments,authenticating the command may require detection of a spoken passcode orsound signature, alternatively or additionally to verification of avoice signature as being that of the owner or authorized user.

Referring to FIG. 3 , a flow diagram of a method 300 of managinggroupings of electronic assets is shown, according to an exampleembodiment. Method 300 may be implemented using the system 100 of FIG. 1, and particularly, by the remote computing system 108 (e.g., by theprocessor 116 of the remote computing system 108). As such, referencewill be made to the system 100 when describing method 300. In anotherembodiment, at least portions of method 300 may be performed by the usercomputing device 106. In another embodiment, additional, fewer, and/ordifferent operations may be performed. It will be appreciated that theorder or flow of operations indicated by the flow diagrams and arrowswith respect to the methods described herein is not meant to belimiting. For example, in one embodiment, two or more of the operationsof method 300 may be performed simultaneously.

At operation 302, a portal is provided with a network security accesscontrol. The portal 216 may be, or may be accessed through, a softwareapplication that is provided by a remote computing system 108 to theuser computing device 106. For example, the portal 216 may be providedby the remote computing system 108 as a mobile app that is downloadedand installed onto the user computing device 106. In another embodiment,the portal 216 may be hosted at the remote computing system 108 (e.g.,via a server, etc.) and may be accessed by the user computing device106, for example, through a web-browser via an internet connection(e.g., through the network interface 202). The network security accesscontrol may be an interface of the portal 216 that prompts an individualto enter login credentials such as biometric data, alphanumeric entries,icon selections, and the like to identify the individual to the remotecomputing system 108.

The method 300 may further include receiving an authentication requestfrom the user computing device 106 through the network security accesscontrol. The authentication request indicates that an individualpurporting to be a customer, employee, or other authorized individual isattempting to access the portal 216 to view electronic asset informationand/or to control the functionality of groupings of electronic assets.At operation 304, the remote computing system 108 receives logincredentials from the user computing device 106. Operation 304 mayinclude receiving, by the user computing device 106, inputs from theuser interface 204 (e.g., login credentials that are detected using aninput device of the user interface). For example, operation 304 mayinclude receiving biometric data such as fingerprint data from afingerprint scanner, or image data from a user-facing camera. In anotherembodiment, operation 304 may include receiving combinations ofalphanumeric characters (e.g., a pin, password, etc.), or somecombination of different types of user inputs through the user interface204.

At operation 306, the remote computing system 108 determines that thelogin credentials are associated with a set of electronic assets, orwith an individual who is authorized to manage functionality of the setof electronic assets. The electronic assets may correspond to aplurality of different third-party computing systems 104. Thethird-party computing systems 104 may include API gateways 130 that areconfigured to accept API calls directed to changes in the usability(e.g., functionality, operability, etc.) of the electronic assets.Operation 306 may include comparing the login credentials to a list oflogin credentials stored in the electronic asset database 124 of theremote computing system 108, including login credentials associated withvarious third-party issuers. Operation 306 may include confirming thelogin credentials are valid by identifying the login credentials fromthe list of login credentials to prevent fraudulent access to electronicasset information and control tools.

At operation 308, the remote computing system 108 presents, via theportal 216, a virtual icon. The virtual icon is selectable using theuser interface 204 of the user computing device 106 to identify acoordinated action with respect to all electronic assets in the set ofelectronic assets. The coordinated action may be a change infunctionality of all of the assets within a single physical carrier suchas activation, deactivation, or other use restrictions. Examples of userestrictions include restrictions on an amount of funds that can beaccessed through the electronic asset, transaction limits, a number oftransactions, locations where the electronic asset may be used (e.g.,geographical locations, certain lists of merchants or businesses, etc.),the types of products that may be purchased or otherwise accessed usingthe electronic asset, physical or virtual locations which may beaccessed via an electronic key, and the like. Other examples of userestrictions include requiring pre-approval of transactions (e.g.,requiring confirmation by an account owner before a transaction can beprocessed, etc.) or restrictions that require notifications to the assetowner each time the asset is used. Yet another example of a coordinatedaction is ordering a replacement of all of the assets within a set ofelectronic assets (e.g., submitting a request to have new electronicassets mailed or otherwise delivered to the asset owner, etc.). Thevirtual icon may be a selectable interface (e.g., toggle, indicator,etc.) that is accessible from within the portal 216, and that allows auser to toggle between different functionalities that are available forthe set of electronic assets. In another embodiment, the portal 216 isat least partially integrated with and forms part of an operating systemof the user computing device 106. In this way, the virtual icon may bepresented on an interface of the operating system (e.g., a home screen,desktop view, etc.) of, for example the mobile device.

Referring to FIG. 4 , an example display 400 of a mobile device (e.g.,mobile device 200) is shown, according to an example embodiment. Theexample display 400 presents a home screen 402 of the mobile device fromwhich the user may access different applications. The home screen 402forms part of a GUI of the operating system that presents tiles 404,with each tile 404 corresponding with an application that is installed(or installable) on the mobile device. In the example of FIG. 4 , thehome screen 402 of the mobile device provides for a tile overlay mode,or shortcut access mode that is initiated upon detection of a certaingesture or other input, such as a press and hold gesture, a double tapor triple tap on the tile 404, and/or other gestures or inputs thatdiffer from the gestures or inputs used to indicate application launchor tile movement. The tile overlay mode may allow the user to makeselections of virtual icons and perform operations to affect theusability of one or more sets of assets with a minimal number ofgestures (e.g., without launching the application, etc.). In anotherembodiment, the tile 404 itself is the virtual icon, which is selectedby a specific gesture or input (e.g., a triple tap, which automaticallyselects the virtual icon to enable/disable or otherwise modify thefunctionality of a specific set of assets).

As shown in FIG. 4 , the tile overlay mode generates a GUI (e.g.,shortcuts menu, selection pane, etc.) that is configured to presentselection options (e.g., virtual icons) to the user. A first exampleselection GUI 406 is shown toward the lower end of the display 214 ofthe mobile device in FIG. 4 . The first selection GUI 406 includes alist. A first column (e.g., leftmost column as shown in FIG. 4 )includes a listing of identifiers 408 for each set/grouping ofelectronic assets. In the example of FIG. 4 , the identifiers 408 arethe names of individual carriers (e.g., yellow bag, wallet, jacket,etc.) in which the set of electronic assets is physically contained. Asecond column (e.g., rightmost column as shown in FIG. 4 ) includes alisting of selections (e.g., coordinated actions) for each set ofelectronic assets. In the first selection GUI 406, the selection foreach set of assets is a toggle 408 that can be selected, through theuser interface 204, to enable or disable (e.g., freeze or otherwiserestrict the use of) all of the electronic assets within each carrier.In this way, the coordinated action can be taken across all assets in aset of electronic assets with a single click, rather than having toindividually specify the desired change in functionality for eachindividual asset. The first selection GUI 406 also shows the currentstatus of each set of assets by the current position of the toggle 408.

In another embodiment, the number of selections and selection optionspresented for each set of electronic assets may be different. Forexample, FIG. 4 also shows a second selection GUI 407, in which multipleoptions are provided for modifying the functionality of each set ofelectronic assets. Selections are made by touching the desired selectioncontainer 409 in the second selection GUI 407 (e.g., by a single tap onthe selection container 409 on a touchscreen display, etc.). Optionsinclude enabling or disabling (e.g., freezing) each set of electronicassets, and canceling each set of electronic assets (e.g., permanentlydeactivating and/or ordering new electronic assets). In otherembodiments, the types of coordinated actions that may be selected fromthe GUIs may be different. For example, selections may include a limitedoperability mode and/or restricted access mode, which permits onlycertain transactions to be performed by the electronic assets (e.g.,only being used within a certain geographical area, at only certainstores or on only certain types of products, only during certain timesof day, limited transaction amounts, etc.). Such functionality isparticularly useful when a user has provided one of his/her carriers toa relative or another trusted individual (e.g., a child, etc.) fortemporary use. In another embodiment, the virtual icon may be accessiblefrom a different GUI that is separate from the mobile app tile 404. Forexample the virtual icon may be accessed from a drop-down menu of theoperating system on the mobile device (e.g., when the user swipesdownward from the top of the touchscreen display from the home screen,etc.). In various embodiments, any available changes (e.g., alterationsto the functionality) to the electronic assets may be presented asoptions, and the changes may be predefined as “modes” (e.g., userdefined modes for the assets that may be presented in place of, or inaddition to, “enable” and “disable”), such as “daytime” mode to restrictthe electronic assets to usability during a predefined time period(e.g., as 7 am to 7 pm, or between sunrise and sunset times for thephysical location of the electronic assets, which may be determined,e.g., via a GPS of the electronic asset, via a device to which theelectronic asset is presented, and/or via a device which otherwisedetects the electronic asset when physically nearby).

Returning to FIG. 3 , operation 308 may further include accepting, bythe remote computing system 108, via the portal 216, selection of thevirtual icon that is detected from the user interface 204. Operation 308may include receiving, via the network interface 110, a signal from theuser computing device 106 that indicates the desired selection, andconfirming the selection by comparing the selection to a list ofavailable coordinated actions stored in the electronic asset database124.

At operation 310, the remote computing system 108, in response toaccepting the selection via the portal 216, executes a set of API callsto each third-party computing system 104 to synchronously, orsubstantially synchronously implement the coordinated action across allof the electronic assets that are contained within a single carrier.Operation 310 may include identifying a list of asset-specific API callsthat correspond with the required procedures for different, unaffiliatedthird-party computing systems 104 (e.g., third-party computing systems104 having different security protocols, third-party computing systems104 associated with separate unrelated entities and/or institutions).For example, operation 310 may include matching the selection with a setof asset-specific API calls stored in the electronic asset database 124using a selection engine, or by crawling through the electronic assetdatabase 124 to match the selection with an appropriate identifier thatcorresponds with the selection. Operation 310 may include transmitting,by the network interface 110, via the API calls, the coordinated actionfor each asset in the set of electronic assets to a corresponding one ofthe third-party computing systems 104 (e.g., via API gateways 130 of thethird-party computing systems 104). In one embodiment, the remotecomputing system 108 is configured to transmit the asset-specific APIcalls in parallel, which reduces the time required to perform thecoordinated action across all of the assets within the set of electronicassets. In other embodiments, the remote computing system 108 isconfigured to transmit the asset-specific API calls in a controlledsequence to reduce the average time required to activate, deactivate,restrict, or otherwise control each electronic asset of the set ofelectronic assets. For example, the remote computing system 108 may beconfigured to transmit API calls in a prescribed sequence to control thefunctionality of assets with less robust/complex security protocolsfirst, to focus processing power on those assets before transmitting APIcalls to third-party computing systems 104 with more robust and/orcomplex security protocols. In some embodiments, a prescribed sequencemay be based on the characteristics of the electronic assets (such asvulnerability to security breach) or other factors such as, for example,time of day, season, physical location, etc. (e.g., certain assets mayme more vulnerable to security breach at certain times, and/or may lesscomputationally demanding to alter at certain times, and such assets maybe prioritized over relatively less vulnerable assets or relatively morecomputationally demanding assets depending on when the command to alterthe electronic assets is received). In various embodiments, such aprescribed sequencing for effecting alterations to the functionality ofa set of electronic assets may maximize or otherwise enhance efficiencyby, for example, altering the functionality of the largest number ofelectronic assets (at least electronic assets of certain types) in theshortest amount of time. Operation 310 may include transmittinginformation associated with the user (e.g., login credentials, userinformation, etc.) to confirm the identity of the user to thethird-party computing systems 104, along with the selection.

Operation 310 may further include operations performed by thethird-party computing systems 104 to implement the coordinated action.For example, the third-party computing systems 104 may determine whetherthe information transmitted via the third-party APIs 128 is sufficientto complete the coordinated action. In the event that furtherinformation is required, the third-party computing systems 104 maytransmit notifications, via the network 112 to one, or a combination of,the remote computing system 108 and the user computing device 106. Thenotifications may include a prompt that requests additional userinformation to complete the requested action. For example, the prompt(e.g., text, pop-up, etc.) may be a notification on the user computingdevice 106 to confirm that they requested the coordinated action.

Referring to FIG. 5 , a flow diagram of a method 500 of populating a setof electronic assets into an electronic asset management system isshown, according to an example embodiment. Method 500 may be implementedusing the system 100 of FIG. 1 , and particularly, the mobile device 200of FIG. 2 (e.g., the processor 210 of the mobile device 200). As such,reference will be made to the mobile device 200 of FIG. 2 . However, itwill be appreciated that in other embodiments, a different usercomputing device 106 may be used (e.g., a desktop computer, an IoTdevice, etc.). In another embodiment, additional, fewer, and/ordifferent operations may be performed.

At operation 502, the mobile device 200 presents, on the display of themobile device 200, a GUI. Operation 502 may include receiving aselection of a software app that corresponds to the portal 216 from thehome screen of the mobile device 200, or receiving a command to navigateto the portal 216 from a web-browser installed on the mobile device 200.Operation 502 may also include receiving login credentials from the userinterface 204 of the mobile device 200 to access the portal 216.

At operation 504, the mobile device 200 receives, from the userinterface 204, a plurality of asset definitions for a set of electronicassets. Each asset definition may include a third-party identifier thatis indicative of a respective one of the plurality of third-partyissuers (e.g., third-party computing systems 104). The third-partyidentifier may be a name of one of the third-party issuers. In otherembodiments, the third-party identifier may be a logo that is associatedwith the third-party issuer. The asset definitions may also includeother information regarding the electronic assets, such as an accountnumber associated with the asset, expiration information, securitycodes, and/or identifying information for the user (e.g., user name,date of birth, etc.). The asset definitions together may form a carrierdefinition that identifies all of the assets within a single group(e.g., a group representative of a single physical carrier, etc.).Operation 504 may include receiving manual entry of the assetdefinitions from the user interface 204 (e.g., via a keyboard, etc.). Inother embodiments, the asset definition may include one or more imagesor scans of the electronic asset (e.g., taking a picture of theelectronic asset, reading a magnetic strip on the back of the asset,etc.), and/or communications with the electronic assets (through, e.g.,near-field communications with embedded microchips in the electronicassets, an RFID tag, or another contactless card identificationtechnique) as will be further described.

FIGS. 6 and 7 show example interfaces that may be presented in theportal 216 to facilitate entry of asset definitions. In particular, FIG.6 shows an interface 600 that is used to present carrier and assetdefinitions to a user. As shown in FIG. 6 , the interface 600 includes aheader label 602 that identifies the selected carrier and the electronicassets contained within the carrier. The header label 602 also includesa status indicator that shows the current operability of the set ofelectronic assets (e.g., whether the electronic assets are enabled, ordisabled, deactivated, or otherwise restricted). The header label 602also includes a virtual icon 604 that can be used to select coordinatedactions, or to access a listing of virtual icons that correspond todifferent coordinated actions. The set of electronic assets arerepresented in FIG. 6 by a plurality of asset labels 603. Additionalinformation regarding each individual asset from the set of electronicassets may be accessed by selecting a corresponding one of the assetlabels 603. The asset labels 603 may also provide user access to amodifications interface that can be used to modify/edit electronic assetinformation (e.g., asset definitions) through the user interface 204.Additionally, a selection pane 606 at the bottom of the interface 600allows a user to add or delete assets from the defined set of electronicassets.

In some embodiments, the portal 216 includes a scan tool that providesautomated entry of asset definitions, and which significantly reducesthe required amount of user interaction with the portal 216. The scantool may be configured to exchange information with one or more userinterfaces 204. For example, FIG. 7 shows an example scan tool interface700 that is configured to exchange information with a sensor 212 of theuser interface 204. In particular, the scan tool interface 700 isconfigured to exchange information with and control operation of acamera or other optical sensor onboard the mobile device 200. As shownin FIG. 7 , the scan tool interface 700 includes a window 702 thatprovides real-time image data from the camera. In this example, thecamera is facing a credit card 704 that is positioned behind the mobiledevice 200. The window 702 may include various alignment indicators 706and/or other features to facilitate user interaction with the scan tooland to improve feature recognition of the credit card or otherelectronic asset. For example, the alignment indicators 706 may includea cross-hatch pattern on the center of the window 702, which may changecolor depending on the how well the electronic asset is aligned with thewindow 702 or encompassed by the window 702. The scan tool interface 700may be configured to control the camera (e.g., to refocus the camera, tomodify lighting provided by an external LED or other illuminatingdevice, etc.) to improve recognition of image data captured by thecamera. The scan tool interface 700 may also include a capture button708 to take a snapshot of the real-time image data for furtherprocessing by the portal 216, which may be performed onboard the mobiledevice 200 and/or remotely (e.g., by the remote computing system 108).

In various embodiments, other (e.g., contactless) asset identificationtechniques may be employed to obtain information regarding theelectronic assets. For example, the portal 216 may be configured tointerface with a magnetic card reader that is connected to the usercomputing device 200, to identify the asset by reading a magnetic stripintegrated into the asset (e.g., by swiping a credit card through amagnetic reader, etc.). The portal 216 may be configured to receive theinformation regarding the electronic asset through the reader, and/oranother form of scanner/reading hardware. In another embodiment, atleast one electronic asset may be identified through wireless (e.g.,radio frequency) communications between the mobile device 200 and theelectronic asset. For example, the electronic asset may include a radiochip, antennae, RFID tag, or another near-field communication technologyto transmit information regarding the electronic asset. The portal 216may be configured to receive the information regarding the electronicasset through the network interface 202 (e.g., a transceiver) of themobile device 200, and/or another wireless communications interface. Forexample, the portal 216 may be configured to wirelessly communicate withthe electronic asset and receive a data packet from the electronic asset(e.g., the third party identifier) when the electronic asset is placednear the mobile device 200. The data packet may include the informationregarding the electronic asset, which may be encrypted to preventfraudulent duplication of the electronic asset. In one embodiment, theportal 216 may be configured to receive information regarding the entireset of electronic assets simultaneously; for example, from any carrierthat is placed near the mobile device 200 that contains multipleelectronic assets using near-field technology. In various potentialembodiments, one or more electronic assets and/or devices with which theelectronic assets interface may employ “EMV” standards (managed byEMVCo). EMV specifications include, for example, encrypted data exchangestandards for cards via either microchip insert or contactlessfunctions. EMV specifications and standards relate to contact,contactless, mobile, payment tokenization, QR code, secure remotecommerce, and 3-D secure technologies.

Returning to FIG. 5 , the method 500 further includes identifying aplurality of third-party computing systems based on the plurality ofasset definitions, at 506. Operation 506 may include analyzing the imagedata, retrieved from the camera, to determine an API identifier thatcorresponds with one of the plurality of third-party issuers (e.g.,third-party computing systems 104). For example, operation 506 mayinclude using optical character recognition to convert portions of theimage data into machine-readable text. The portion of the image data maycorrespond with a logo 710 including a name of the third-party issuer ora symbol that is synonymous with the identity of the third-party issuer.Operation 506 may further include matching the machine-readable text toan API identifier of a plurality of API identifiers (e.g., from a listof API identifiers stored in memory). Operation 506 may include usingone or more neural network models (e.g., convolutional neural networks,etc.) to facilitate identification of the API identifier. In oneembodiment, operation 506 includes extracting pixel features from theimage data, analyzing the features (e.g., color depth of each pixel,etc.), and comparing the features and their arrangement with known logos710 (e.g., logos stored in the electronic asset database 124) todetermine the API identifier.

In an embodiment where at least one electronic asset includes a wirelesscommunication device, operation 506 may include analyzing the signalreceived from the electronic asset to determine the API identifier.Operation 506 may include decrypting the signal (e.g., data packet) fromthe electronic asset using a key or other data decryption methodologyemployed by a respective one of the third-party issuers. The key may beprovided by the third-party issuer, and may be selected by the processorbased on the signal (e.g., the type of signal, content of the signal,etc.) that is received from the electronic asset (e.g., from a liststored in memory). In another embodiment, operation 506 may includetransmitting the signal to at least one of the third-party computingsystems 104 for further processing and dissemination. In other words,the remote computing system 108 may be configured to query thethird-party computing systems 104 for data/information related to theelectronic asset by transmitting the signals associated with theelectronic assets.

At operation 508, the mobile device 200 presents, through the display214, via the portal 216, a virtual icon that is selectable to identify acoordinated action with respect to all of the assets within a set ofelectronic assets. The virtual icon may be the same or similar to thevirtual icon described with reference to FIG. 4 . For example, thevirtual icon may be presented by the display 214 as a selectable tile ona home screen of the mobile device 200. In another embodiment, thevirtual icon may be a selectable toggle from within the portal 216. Atoperation 510, the mobile device 200 receives a selection of the virtualicon from a user interface of the mobile device 200. Operation 510 mayinclude receiving a command signal from a keyboard, touchscreen, and/ormicrophone of the mobile device 200 that is indicative of userinteraction with the virtual icon. At operation 512, the mobile device200 transmits the selection of the virtual icon to the remote computingsystem 108 to implement the coordinated action on all assets in the setof electronic assets, as described in detail with reference to themethod 300 of FIG. 3 .

Referring to FIG. 8 , a flow diagram of a method 800 of implementing acoordinated action on a set of electronic assets based on a travel planis shown, according to an example embodiment. As with other methodsdescribed herein, method 800 may be implemented using the system 100 ofFIG. 1 (e.g., via a user computing device such as the mobile device 200,a different user computing device 106, the remote computing device 108,or some combination thereof). As such reference will be made to elementsof the system 100 and mobile device 200 when describing method 800. Inanother embodiment, the method 800 may include additional, fewer, and/ordifferent operations.

At operation 802, the mobile device 200 presents, on the display 214 ofthe mobile device 200, a travel planner for a grouping of electronicassets. The grouping may be the set of electronic assets for at leastone carrier, or some combination of individual assets from multiplecarriers. The grouping may include electronic assets that will becarried with the user while travelling. In another embodiment, thegrouping may include electronic assets that will remain behind, and areto be frozen or disabled during travel to prevent fraudulent use.Operation 802 may include receiving a selection, via the user interface204, of a software app corresponding to the portal 216 from the homescreen of the mobile device 200, or receiving a command to navigate tothe portal 216 from a web-browser installed on the mobile device 200.Operation 802 may further include navigating through the portal 216 tothe travel planner.

FIG. 9 shows an example travel planner 900 that may be accessed throughthe portal 216 by the mobile device 200, according to an embodiment. Thetravel planner 900 is selectable by the user interface 204 of the mobiledevice 200 to identify a set of travel parameters. The travel parametersmay include travel actions to be taken with respect to a grouping ofelectronic assets, and a travel selection indicative of at least one ofa location of travel and/or a date of travel. The travel actions may beone or more coordinated actions to apply to a grouping of electronicassets. For example, the travel actions may be coordinated actions thatenable the use of the grouping of electronic assets in differentgeographical areas (e.g., areas outside of the range of typical use, indifferent states and/or countries than where the user resides). Inanother embodiment, the travel actions may be coordinated actions thatincrease a transaction limit, account balance, or number of transactionsto thereby accommodate the needs of the user during travel. For example,the user may need access to additional funds from their credit cardduring travel to accommodate stays in hotels, food, and relatedpurchases. In the embodiment of FIG. 9 , the travel planner 900 includesa travel actions button 902 to facilitate the selection of travelactions. The travel actions button 902 may generate a separate selectionwindow with a listing of the different groupings of assets and virtualicons with different coordinated actions for each grouping.

The travel selection may be a combination of information that informsthe remote computing system 108 about where the user will travel (e.g.,the state, country, etc.) and when the travel will occur (i.e., thedates of travel). As shown in FIG. 9 , the travel planner includes acalendar interface 904 to facilitate the assignment of travel dates andtimes. Commands received by the portal 216, via the user interface 204,are used to add, delete, or otherwise manipulate events 906 on thecalendar. A separate travel location button 908 is provided by thetravel planner 900 to facilitate the selection of geographical areas atwhich the grouping of assets will be used.

Returning to FIG. 8 , the method 800 additionally includes receiving aselection of travel parameters from the user interface 204, includingthe travel actions and the travel selection, at 804. Operation 804 mayfurther include transmitting the travel parameters, via the networkinterface 202 of the mobile device 200, to the remote computing device108. Operation 804 may further include storing the travel parameters inthe electronic asset database 124 for monitoring and future use. In oneembodiment, operation 804 includes initializing a transmission delay toprevent the travel actions from being transmitted to the third-partycomputing systems 104 until the date of travel, or some threshold periodin advance of the date of travel.

At operation 806, the remote computing device 108, in response toaccepting the selection of travel parameters via the portal 216 (priorto or at the beginning of travel), executes a set of API calls toimplement the selection of travel parameters on the grouping(s) ofelectronic assets. In one embodiment, operation 806 includes executingthe set of API calls to the third-party computing systems 104 after thetransmission delay has elapsed.

It is noted that any of the features, selectors, icons, functionalities,information, elements, or other aspects of any one interface or figuremay be combined or swapped with or applied to any of the features,selectors, icons, functionalities, information, elements, or otheraspects of any other interface or figure.

The embodiments described herein have been described with reference todrawings. The drawings illustrate certain details of specificembodiments that implement the systems, methods and programs describedherein. However, describing the embodiments with drawings should not beconstrued as imposing on the disclosure any limitations that may bepresent in the drawings.

It should be understood that no claim element herein is to be construedunder the provisions of 35 U.S.C. § 112(f), unless the element isexpressly recited using the phrase “means for.”

As used herein, the term “circuit” may include hardware structured toexecute the functions described herein. In some embodiments, eachrespective “circuit” may include machine-readable media for configuringthe hardware to execute the functions described herein. The circuit maybe embodied as one or more circuitry components including, but notlimited to, processing circuitry, network interfaces, peripheraldevices, input devices, output devices, sensors, etc. In someembodiments, a circuit may take the form of one or more analog circuits,electronic circuits (e.g., integrated circuits (IC), discrete circuits,system on a chip (SOCs) circuits, etc.), telecommunication circuits,hybrid circuits, and any other type of “circuit.” In this regard, the“circuit” may include any type of component for accomplishing orfacilitating achievement of the operations described herein. Forexample, a circuit as described herein may include one or moretransistors, logic gates (e.g., NAND, AND, NOR, OR, XOR, NOT, XNOR,etc.), resistors, multiplexers, registers, capacitors, inductors,diodes, wiring, and so on).

The “circuit” may also include one or more dedicated processorscommunicatively coupled to one or more dedicated memory or memorydevices. In this regard, the one or more dedicated processors mayexecute instructions stored in the dedicated memory or may executeinstructions otherwise accessible to the one or more dedicatedprocessors. In some embodiments, the one or more dedicated processorsmay be embodied in various ways. The one or more dedicated processorsmay be constructed in a manner sufficient to perform at least theoperations described herein. In some embodiments, the one or morededicated processors may be shared by multiple circuits (e.g., circuit Aand circuit B may comprise or otherwise share the same processor which,in some example embodiments, may execute instructions stored, orotherwise accessed, via different areas of memory). Alternatively oradditionally, the one or more dedicated processors may be structured toperform or otherwise execute certain operations independent of one ormore co-processors. In other example embodiments, two or more processorsmay be coupled via a bus to enable independent, parallel, pipelined, ormulti-threaded instruction execution. Each processor may be implementedas one or more general-purpose processors, application specificintegrated circuits (ASICs), field programmable gate arrays (FPGAs),digital signal processors (DSPs), or other suitable electronic dataprocessing components structured to execute instructions provided bymemory. The one or more dedicated processors may take the form of asingle core processor, multi-core processor (e.g., a dual coreprocessor, triple core processor, quad core processor, etc.),microprocessor, etc.

Any foregoing references to currency or funds are intended to includefiat currencies, non-fiat currencies (e.g., precious metals), andmath-based currencies (often referred to as cryptocurrencies). Examplesof math-based currencies include Bitcoin, Litecoin, Dogecoin, and thelike.

It should be noted that although the diagrams herein may show a specificorder and composition of method steps, it is understood that the orderof these steps may differ from what is depicted. For example, two ormore steps may be performed concurrently or with partial concurrence.Also, some method steps that are performed as discrete steps may becombined, steps being performed as a combined step may be separated intodiscrete steps, the sequence of certain processes may be reversed orotherwise varied, and the nature or number of discrete processes may bealtered or varied. The order or sequence of any element or apparatus maybe varied or substituted according to alternative embodiments.Accordingly, all such modifications are intended to be included withinthe scope of the present disclosure as defined in the appended claims.

The foregoing description of embodiments has been presented for purposesof illustration and description. It is not intended to be exhaustive orto limit the disclosure to the precise form disclosed, and modificationsand variations are possible in light of the above teachings or may beacquired from this disclosure. The embodiments were chosen and describedin order to explain the principals of the disclosure and its practicalapplication to enable one skilled in the art to utilize the variousembodiments and with various modifications as are suited to theparticular use contemplated. Other substitutions, modifications, changesand omissions may be made in the design, operating conditions andarrangement of the embodiments without departing from the scope of thepresent disclosure as expressed in the appended claims.

What is claimed is:
 1. A method comprising: providing, by a processor ofa computing system through a telecommunications network, to a remoteuser computing device comprising an input device configured to detect atleast one of biometric data, alphanumeric entries, or icon selections, aportal with a network security access control; receiving via the portal,by the processor, for the network security access control, logincredentials detected using the input device of the user computingdevice, and verifying that the login credentials grant access to anaccount associated with a set of electronic assets corresponding to aplurality of third-party computing systems with application programminginterface (API) gateways configured to accept API calls directed tochanges in functionality of the electronic assets; receiving, by theprocessor, via the portal, a selection of a coordinated action withrespect to all electronic assets in the set of electronic assets, theselection detected via the input device of the remote user computingdevice; and executing, by the processor, based on the selection, a setof API calls comprising an asset-specific API call to each third-partycomputing system in the plurality of third-party computing systems toimplement the coordinated action on all electronic assets in the set ofelectronic assets.
 2. The method of claim 1, further comprising:determining, by the processor, an asset definition for each of the setof electronic assets, each asset definition comprising a third-partyidentifier that is indicative of a respective one of the plurality ofthird-party computing systems; and identifying, via the processor, theplurality of third-party computing systems based on the plurality ofthird-party identifiers.
 3. The method of claim 2, wherein determiningthe asset definition for at least one electronic asset of the set ofelectronic assets comprises: presenting, by the processor, via theportal, a scan tool configured to interface with an optical sensor ofthe user computing device and capture an image using the optical sensor;receiving, by the processor, the image of the electronic asset capturedusing the optical sensor; and analyzing, by the processor, the image todetermine the third-party identifier.
 4. The method of claim 2, whereindetermining the asset definition for at least one electronic asset ofthe set of electronic assets comprises: presenting, by the processor,via the portal, a scan tool configured to interface with a transceiverof the user computing device and wirelessly communicate throughnear-field communications with the at least one electronic asset toacquire a data packet therefrom; receiving, by the processor, the datapacket acquired via the transceiver; and analyzing, by the processor,the data packet to determine the third-party identifier.
 5. The methodof claim 2, wherein the asset definitions together form a carrierdefinition, further comprising receiving, by the processor from the usercomputing device, a plurality of carrier definitions, each carrierdefinition of the plurality of carrier definitions associated with adifferent carrier.
 6. The method of claim 2, wherein the third-partyidentifier comprises a logo, and wherein identifying each one of theplurality of third-party computing systems comprises: using opticalcharacter recognition to convert the logo to machine-readable text; andmatching the machine-readable text to one of a plurality of APIidentifiers corresponding to the asset-specific API call.
 7. The methodof claim 2, wherein the third-party identifier comprises a logo, andwherein identifying each one of the plurality of third-party computingsystems comprises associating the logo with one of a plurality of APIidentifiers corresponding to the asset-specific API call.
 8. The methodof claim 1, further comprising: presenting, by the processor, via theportal, a travel planner configured to be selectable using the inputdevice to identify a set of travel actions to be taken with respect to agrouping of electronic assets, and a travel selection indicative of atleast one of a location of travel or a date of travel, the grouping ofelectronic assets comprising at least one electronic asset from the setof electronic assets; receiving, by the processor, via the portal,selection of the set of travel actions and the travel selection; andexecuting, by the processor, based on the selection, the set of APIcalls to implement the selection of the set of travel actions on thegrouping of electronic assets.
 9. The method of claim 1, wherein theportal forms part of an operating system of the user computing device,and wherein the selection is presented from one of a shortcuts screen oran application tile that corresponds to a provider application for oneof the electronic assets.
 10. The method of claim 1, wherein the set ofelectronic assets comprises a non-payment item.
 11. The method of claim1, wherein the coordinated action imposes restrictions on the use ofeach one of the set of electronic assets.
 12. The method of claim 1,wherein the coordinated action is ordering replacements of each one ofthe set of electronic assets.
 13. A computing system having a processorand a memory storing executable code which causes the computing system,when executed, to: provide, via an internet connection, to a usercomputing device comprising an input device configured to detect atleast one of biometric data, alphanumeric entries, or icon selections,access to a portal with a network security access control; receive, viathe portal, login credentials detected using the input device of theuser computing device and verify that the login credentials grant accessto an account associated with a set of electronic assets correspondingto a plurality of third-party computing systems with applicationprogramming interface (API) gateways configured to accept API callsdirected to changes in functionality of the electronic assets; receive,via the portal, a selection of a coordinated action with respect to allelectronic assets in the set of electronic assets, the selectiondetected via the input device of the remote user computing device; andexecute, based on the selection, a set of API calls comprising anasset-specific API call to each third-party computing system in theplurality of third-party computing systems to implement the coordinatedaction on each corresponding electronic asset in the set of electronicassets.
 14. The computing system of claim 13, wherein the executablecode further causes the computing system, when executed, to: determine,via the portal, an asset definition for each of the set of electronicassets, each asset definition comprising a third-party identifier thatis indicative of a respective one of the plurality of third-partycomputing systems; and identify the plurality of third-party computingsystems based on the plurality of third-party identifiers.
 15. Thecomputing system of claim 14, wherein determining the asset definitionfor at least one electronic asset of the set of electronic assetscomprises: presenting, via the portal, a scan tool configured tointerface with an optical sensor of the user computing device andcapture an image using the optical sensor; and receiving, via theportal, the image of the electronic asset captured using the electronicsensor; and analyzing, by the processor, the image to determine thethird-party identifier.
 16. The computing system of claim 13, whereinthe third-party identifier comprises a logo, and wherein identifyingeach one of the plurality of third-party computing systems comprises:using optical character recognition to convert the logo tomachine-readable text; and matching the machine-readable text to one ofa plurality of API identifiers corresponding to the asset-specific APIcall.
 17. The computing system of claim 13, wherein the executable codefurther causes the computing system, when executed, to: present, via theportal, a travel planner configured to be selectable using the inputdevice to identify a set of travel actions to be taken with respect to agrouping of electronic assets, and a travel selection indicative of atleast one of a location of travel or a date of travel, the grouping ofelectronic assets comprising at least one electronic asset from the setof electronic assets; receive, via the portal, selection of the set oftravel actions and the travel selection; and executing, based on theselection, the set of API calls to implement the selection of the set oftravel actions on the grouping of electronic assets.
 18. A method,comprising: presenting, on a display of a mobile device, a graphicaluser interface (GUI), the mobile device comprising an input deviceconfigured to detect at least one of alphanumeric entries, iconselections, or image data; receiving, by a processor from the inputdevice, a plurality of asset definitions for a set of electronic assets,each asset definition comprising a third-party identifier that isindicative of a respective one of a plurality of third-party computingsystems; presenting, by the display, via the GUI, a virtual iconconfigured to be selectable using the input device to identify acoordinated action with respect to all electronic assets in the set ofelectronic assets; detecting, by the processor, via the input device, aselection of the virtual icon from the input device; and transmitting,based on the selection, via a transceiver of the mobile device, anindication of the selection to a remote computing system to implementthe coordinated action on all electronic assets in the set of electronicassets.
 19. The method of claim 18, wherein the GUI comprises a scantool, and wherein receiving the asset definition for at least oneelectronic asset of the set of electronic assets comprises: capturing,via the input device, using the scan tool, image data of the electronicasset; and analyzing the image data to identify the third-partyidentifier.
 20. The method of claim 18, wherein the third-partyidentifier comprises a logo, and wherein the method further comprisesidentifying, via the processor, the plurality of third-party computingsystems based on the plurality of third-party identifiers by: usingoptical character recognition to convert the logo to machine-readabletext; matching the machine-readable text to an API identifier of aplurality of API identifiers corresponding to one of the plurality ofthird-party computing systems; and transmitting, via the transceiver,the API identifier to the remote computing system.