System for dynamically appending and transforming static activity data transmitted to a user device application

ABSTRACT

Embodiments of the invention are directed to a system, method, and computer program product for dynamically appending and transforming static activity data transmitted to a user device application. In particular, the invention provides a secure platform for dynamic restructuring and inter-connection of inline activity data. The system first determines that a first user, via a first networked device, has initiated a first electronic activity. The system then constructs and transmits a first static activity data set to a second resource application of the second networked device associated with the second user. The system then alters the transmitted first static activity data set of the first electronic activity, in response to the second user modifying an activity parameter item of the first electronic activity, in situ, prior to finalization authorization processing of the first electronic activity by a recipient system, without requiring initialization of an additional electronic activity.

FIELD OF THE INVENTION

The present invention is directed to, in general, a novel, proactiveapproach for securely preforming electronic activities. Specifically,embodiments of the invention are directed to dynamic restructuring andinter-connection of inline activity data, in-situ during finalizationauthorization of an electronic activity without requiring initializationof an additional electronic activity.

BACKGROUND

Over the last few years, there has been a significant increase in thenumber of electronic activities, due to widespread use of smartphone,tablet computers, laptop computers, transaction terminals, andelectronic computing devices in general. Typically, certain electronicactivities require a chain of transmissions, e.g., a first transmissionfrom a originating first networked device to an authorizing secondnetworked device, and a subsequent second transmission from a the secondnetworked device to a processing recipient system. However, inconventional systems the activity data that is transmitted from theoriginating first networked device to an authorizing second networkeddevice cannot be modified by the second networked device, before thesubsequent transmission to the processing recipient system. If theparameters of the first electronic activity are required to be modifiedafter the originating first networked device has initiated thetransmission, the only recourse in conventional systems, if at allpossible, is to end the first electronic activity and start a secondelectronic activity all over again with the new parameters. This resultsin increased processing delays, and squandered processing resources.Moreover, the delay in restarting with a second electronic activity mayadversely affect the time-sensitive electronic activities.

Accordingly, there is a need for systems and methods for dynamicallyappending and transforming transmitted static activity data for anelectronic activity, without requiring ending of the electronic activityand restarting with an additional electronic activity. The previousdiscussion of the background to the invention is provided forillustrative purposes only and is not an acknowledgement or admissionthat any of the material referred to is or was part of the commongeneral knowledge as at the priority date of the application.

SUMMARY

The present invention provides a novel solution to the foregoingshortcomings of conventional systems and provides improvements totechnology by dynamically appending and transforming static activitydata transmitted to a user device application. The present invention notonly dynamic restructuring and inter-connection of inline activity data,in-situ during finalization authorization of an electronic activity, butalso precludes the need for undesirable initialization of an additionalelectronic activity. In one aspect, the present invention is directed toin general a system for dynamically appending and transforming staticactivity data transmitted to a user device application, a correspondingmethod, and computer program product. The system typically includes atleast one processing device operatively coupled to at least one memorydevice and at least one communication device connected to a distributednetwork. The system also typically includes a module stored in the atleast one memory device comprising executable instructions that whenexecuted cause the processing device and hence the system to perform oneor more functions described below. In one embodiment, the system isconfigured to: determine, based on receiving a first transmission from afirst resource application of a first networked device, that a firstuser associated with the first networked device has requestedfinalization authorization of a first electronic activity, wherein thefirst electronic activity is associated with a first resource transferfrom a second resource associated with a second user to a first resourceassociated with the first user; construct a first static activity dataset associated with the first electronic activity, wherein the firststatic activity data set comprises a plurality of first activityparameter items; transmit the first static activity data set to a secondresource application of the second networked device associated with thesecond user; present, via a second user interface of the second resourceapplication, the plurality of first activity parameter items of thefirst static activity data set on the second networked device associatedwith the second user; receive, via the second user interface of thesecond resource application, a first user input from the second user foraltering a resource magnitude type activity parameter item of theplurality of first activity parameter items for the first electronicactivity; in response to the receiving the second user input, constructa second static activity data set associated with altering the resourcemagnitude type activity parameter item of the plurality of firstactivity parameter items for the first electronic activity; transmit thesecond static activity data set to the first resource application of thefirst networked device, wherein the transmission of the second staticactivity data set is structured to present the altered resourcemagnitude type activity parameter item to the first user, via a firstuser interface of the first resource application; alter the first staticactivity data set based on receiving an alteration validation of thesecond static activity data set from the first resource application ofthe first networked device; transmit the altered first static activitydata set to the recipient system, wherein the first static activity dataset, when processed, is structured to cause the recipient system toperform the first electronic activity based on the altered first staticactivity data set; and present, to the first user via the first resourceapplication and to the second user via the second resource application,a notification indicating the completion of the first electronicactivity based on receiving an activity communication from the recipientsystem.

In another embodiment, and in combination with any of the previousembodiments, altering the first static activity data, further comprises:parsing the second static activity data set associated with altering theresource magnitude type activity parameter item of the plurality offirst activity parameter items for the first electronic activity; andbased on determining that the second activity data set is associatedwith an increase in the resource magnitude type activity parameter item,automatically transmitting the alteration validation of the secondstatic activity data set.

In another embodiment, and in combination with any of the previousembodiments, altering the first static activity data set, furthercomprises: parsing the second static activity data set associated withaltering the resource magnitude type activity parameter item of theplurality of first activity parameter items for the first electronicactivity; and based on determining that the second activity data set isassociated with a decrease in the resource magnitude type activityparameter item, presenting, via the first user interface of the firstresource application, a request for the alteration validation of thesecond static activity data set from the first user.

In another embodiment, and in combination with any of the previousembodiments, altering the first static activity data set furthercomprises: receiving, via the first user interface of the first resourceapplication, a second user input from the first user for altering thesecond static activity data set, in response to presenting the requestfor the alteration validation of the second static activity data setfrom the first user; in response to the receiving the second user input,construct a third static activity data set by altering the second staticactivity data set; transmit the third static activity data set to thesecond resource application of the second networked device, wherein thetransmission of the third static activity data set is structured topresent the third static activity data set to the second user, via thesecond user interface of the second resource application; and alteringthe first static activity data set in response to receiving aconfirmation from the second user, via the second user interface of thesecond resource application.

In another embodiment, and in combination with any of the previousembodiments, constructing the second static activity data set associatedwith altering the resource magnitude type activity parameter item of theplurality of first activity parameter items further comprises: inresponse to the receiving the first user input from the second user,constructing at least one second activity parameter item associated withaltering the resource magnitude type activity parameter item of theplurality of first activity parameter items; and constructing the secondstatic activity data set associated with the first electronic activity,wherein the second static activity data set comprises (i) the at leastone second activity parameter item associated with altering the resourcemagnitude type activity parameter item of the plurality of firstactivity parameter items, and (ii) a unique activity identifierparameter item of the plurality of first activity parameter items.

In another embodiment, and in combination with any of the previousembodiments, altering the first static activity data set furthercomprises: removing the resource magnitude type activity parameter itemof the plurality of first activity parameter items from the firstactivity data set; and appending the at least one second activityparameter item at a predetermined location in the plurality of firstactivity parameter items of the first activity data set.

In another embodiment, and in combination with any of the previousembodiments, presenting the altered resource magnitude type activityparameter item to the first user, via the first user interface of thefirst resource application, further comprises: parsing the second staticactivity data set to identify the unique activity identifier parameteritem of the plurality of first activity parameter items; associating thesecond static activity data set with the first electronic activity;presenting, via the first user interface of the first resourceapplication, the at least one second activity parameter item associatedwith altering the resource magnitude type activity parameter item of theplurality of first activity parameter items to the first user; andpresenting, via the first user interface of the first resourceapplication, a request for the alteration validation of the secondstatic activity data set from the first user.

In another embodiment, and in combination with any of the previousembodiments, associating the second static activity data set with thefirst electronic activity further comprises: retrieving the constructedfirst static activity data set associated with the first electronicactivity, wherein the first static activity data set comprises theplurality of first activity parameter items comprising the resourcemagnitude type activity parameter item. Moreover, presenting, via thefirst user interface of the first resource application, the at least onesecond activity parameter item further comprises: presenting theplurality of first activity parameter items comprising the resourcemagnitude type activity parameter item; and overlaying a presentation ofthe at least one second activity parameter item comprising a graphicallink to the presented the resource magnitude type activity parameteritem.

In another embodiment, and in combination with any of the previousembodiments, altering the first static activity data set furthercomprises: receiving, via the first user interface of the first resourceapplication, a second user input from the first user for altering the atleast one second activity parameter item of the second static activitydata set associated with altering the resource magnitude type activityparameter item of the plurality of first activity parameter items; inresponse to the receiving the second user input from the first user,constructing at least one third activity parameter item associated withthe second user input for altering the at least one second activityparameter item; constructing a third static activity data set associatedwith the first electronic activity, wherein the second static activitydata set comprises (i) the at least one third activity parameter itemassociated with the second user input for altering the at least onesecond activity parameter item, and (ii) the unique activity identifierparameter item of the plurality of first activity parameter items;transmitting the third static activity data set to the second resourceapplication of the second networked device, wherein the transmission ofthe third static activity data set is structured to present the at leastone third activity parameter item to the second user, via the seconduser interface of the second resource application; and altering thefirst static activity data set in response to receiving a confirmationfrom the second user associated with the at least one third activityparameter item, via the second user interface of the second resourceapplication, by: (i) removing the resource magnitude type activityparameter item of the plurality of first activity parameter items fromthe first activity data set; and (ii) appending the at least one thirdactivity parameter item at a predetermined location in the plurality offirst activity parameter items of the first activity data set.

In another embodiment, and in combination with any of the previousembodiments, the at least one third activity parameter item to thesecond user, via the second user interface of the second resourceapplication, further comprises: parsing the third static activity dataset to identify the unique activity identifier parameter item of theplurality of first activity parameter items; associating the thirdstatic activity data set with the first electronic activity; presenting,via the first user interface of the first resource application, the atleast one second activity parameter item associated with altering theresource magnitude type activity parameter item of the plurality offirst activity parameter items to the first user; and presenting, viathe first user interface of the first resource application, a requestfor the alteration validation of the second static activity data setfrom the first user.

In another embodiment, and in combination with any of the previousembodiments, constructing the first static activity data set associatedwith the first electronic activity further comprises: storing the firststatic activity data set comprising the plurality of first activityparameter items at a first memory device of the first networked device;and generating a first authorization instruction associated with thefirst electronic activity for the recipient system, wherein the firstauthorization instruction comprises a processing instruction for therecipient system to perform the first electronic activity.

In another embodiment, and in combination with any of the previousembodiments, transmitting the altered first static activity data set tothe recipient system further comprises: generating a secondauthorization instruction for the first electronic activity, wherein thesecond authorization instruction is structured to modify the processinginstruction for the recipient system based on the altered first staticactivity data set; and transmitting the second authorization instructionfor the first electronic activity to the recipient system, wherein thesecond authorization instruction, when processed, is structured to causethe recipient system to perform the first electronic activity based onthe altered first static activity data set.

In another embodiment, and in combination with any of the previousembodiments, the plurality of first activity parameter items of thefirst static activity data set associated with the first electronicactivity comprise a first user annotation item, wherein the first userannotation item is input by the first user, wherein the first userannotation item is in a natural language format.

In another embodiment, and in combination with any of the previousembodiments, the second static activity data set associated with thefirst electronic activity comprises a second user annotation item,wherein the second user annotation item is input by the second user,wherein the second user annotation item is in a natural language format.

The features, functions, and advantages that have been discussed may beachieved independently in various embodiments of the present inventionor may be combined with yet other embodiments, further details of whichcan be seen with reference to the following description and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Having thus described embodiments of the invention in general terms,reference will now be made the accompanying drawings, wherein:

FIG. 1 schematically depicts an electronic activity processing systemand environment 100, in accordance with an aspect of the presentinvention;

FIG. 2 schematically depicts a high level process flow for dynamicallyappending and transforming static activity data of electronicactivities, in accordance with some embodiments of the invention;

FIG. 3A schematically depicts an illustrative representation andprocessing environment 300A of dynamically appending and transformingstatic activity data of electronic activities, in accordance with someembodiments of the invention;

FIG. 3B schematically depicts an illustrative representation 300B andprocessing environment of dynamically appending and transforming staticactivity data of electronic activities, in accordance with someembodiments of the invention; and

FIG. 4 schematically depicts an illustrative representation 400 of aresource application user interface, in accordance with some embodimentsof the invention.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

Embodiments of the present invention will now be described more fullyhereinafter with reference to the accompanying drawings, in which some,but not all, embodiments of the invention are shown. Indeed, theinvention may be embodied in many different forms and should not beconstrued as limited to the embodiments set forth herein; rather, theseembodiments are provided so that this disclosure will satisfy applicablelegal requirements. Where possible, any terms expressed in the singularform herein are meant to also include the plural form and vice versa,unless explicitly stated otherwise. Also, as used herein, the term “a”and/or “an” shall mean “one or more,” even though the phrase “one ormore” is also used herein. Furthermore, when it is said herein thatsomething is “based on” something else, it may be based on one or moreother things as well. In other words, unless expressly indicatedotherwise, as used herein “based on” means “based at least in part on”or “based at least partially on.” Like numbers refer to like elementsthroughout.

In some embodiments, an “entity” refers to an organization, a company, agroup, an institute, a business or the like associated with initiatingand/or performing electronic activities. Typically, the entity comprisessystems, devices, applications and/or the like for initiating and/orperforming electronic activities. In some embodiments, the entityinitiates and/or performs electronic activities in response to receivinginstructions from an associated user. In some embodiments, an “entity”as used herein may be a financial institution. For the purposes of thisinvention, a “financial institution” may be defined as any organization,entity, or the like in the business of moving, investing, or lendingmoney, dealing in financial instruments, or providing financialservices. This may include commercial banks, thrifts, federal and statesavings banks, savings and loan associations, credit unions, investmentcompanies, insurance companies and the like. In some embodiments, theentity may allow a user to establish an account with the entity. An“account” may be the relationship that the user has with the entity.Examples of accounts include a deposit account, such as a transactionalaccount (e.g., a banking account), a savings account, an investmentaccount, a money market account, a time deposit, a demand deposit, apre-paid account, a credit account, a non-monetary user profile thatincludes only personal information associated with the user, or thelike. The account is associated with and/or maintained by an entity. Inother embodiments, an “entity” may not be a financial institution.Examples for non-financial entities include cloud computing systems,database systems, block chain systems for data processing, and the like.

Unless specifically limited by the context, an “electronic activity”,“user activity”, “transaction” or “activity” refers to activitiesassociated with electronic resources, such as the user's resources. Insome embodiments, the electronic activity refers to resource transfersbetween resources, e.g., a transfer of a resource value from a firstresource and a second resource. For example, the electronic activity mayrefer to transmission of resource value comprising predetermined data(e.g. files, text, images, and the like) from a first resource (e.g., auser device, a database, a server, a cloud storage system, and the like)to a second resource (e.g., another device, database, and the like).Typically, a first system (e.g., a user device or a networked device),for example, based on receiving instructions from a user, transmitsactivity parameters (e.g., location of the file, time of transmission,unique identifier of the source resource system, certificates of thetarget resource system, authentication information, and the like) to arecipient system (e.g., a system associated with one or more of theresources, an entity system, and the like) which then performs theelectronic activity (transfer of the file from the source resourcesystem to the target resource system). As another example, in someembodiments, the electronic activity refers to transfer of a resourcevalue comprising financial resources (e.g. a predetermined transferamount) from a first resource (e.g., a source user account) to a secondresource (e.g., another target account). Typically, a first system(e.g., a user device), for example, based on receiving instructions froma user, transmits activity parameters (e.g., the transfer amount, timeand date of the transfer, unique identifiers of the source user accountand the target user account, and the like) to a recipient system (e.g.,a financial institution associated with the source account and/or thetarget account) which then performs the electronic activity (transfer ofthe predetermined amount from the source user account to the targetaccount).

As such, in some embodiments, an electronic activity or a user activitymay refer to a purchase of goods or services, a return of goods orservices, a payment transaction, a credit transaction, or otherinteraction involving a user's resources (e.g., a bank account). Asanother example, in some embodiments, a user activity may refer toviewing account balances, modifying user information and contactinformation associated with an account, modifying alert/notificationpreferences, viewing transaction/activity history,transferring/redeeming loyalty points and the like. In some embodiments,the user activity is associated with an entity application stored on auser device, for example, a digital wallet application, a mobile/onlinebanking application, a merchant application, a browser application, asocial media application and the like. Typically, a user activity is anelectronic transaction or electronic activity in which the user isemploying a mobile device, computing device, or other electronic deviceto initiate, execute and/or complete the activity.

As used herein, a “bank account” refers to a credit account, adebit/deposit account, or the like. Although the phrase “bank account”includes the term “bank,” the account need not be maintained by a bankand may, instead, be maintained by other financial institutions. Forexample, in the context of a financial institution, a user activity ortransaction may refer to one or more of a sale of goods and/or services,an account balance inquiry, a rewards transfer, an account moneytransfer, opening a bank application on a user's computer or mobiledevice, a user accessing their e-wallet (e.g., mobile wallet) or onlinebanking account or any other interaction involving the user and/or theuser's device that is detectable by the financial institution. Asfurther examples, a user activity may occur when an entity associatedwith the user is alerted via the transaction of the user's location. Auser activity may occur when a user accesses a building, uses a rewardscard, and/or performs an account balance query. A user activity mayoccur as a user's device establishes a wireless connection, such as aWi-Fi connection, with a point-of-sale terminal. In some embodiments, auser activity may include one or more of the following: purchasing,renting, selling, and/or leasing goods and/or services (e.g., groceries,stamps, tickets, DVDs, vending machine items, and the like); withdrawingcash; making payments (e.g., paying monthly bills; paying federal,state, and/or local taxes; and the like); sending remittances;transferring balances from one account to another account; loading moneyonto stored value cards (SVCs) and/or prepaid cards; donating tocharities; and/or the like.

As used herein, an “online banking account” is an account that isassociated with one or more user accounts at a financial institution.For example, the user may have an online banking account that isassociated with the user's checking account, savings account, investmentaccount, and/or credit account at a particular financial institution.Authentication credentials comprising a username and password aretypically associated with the online banking account and can be used bythe user to gain access to the online banking account. The onlinebanking account may be accessed by the user over a network (e.g., theInternet) via a computer device, such as a personal computer, laptop, ormobile device (e.g., a smartphone or tablet). The online banking accountmay be accessed by the user via a mobile or online banking website orvia a mobile or online banking application. A customer may access anonline banking account to view account balances, view transactionhistory, view statements, transfer funds, and pay bills. More than oneuser may have access to the same online banking account. In this regard,each user may have a different username and password. Accordingly, oneor more users may have a sub-account associated with the online bankingaccount.

A “user” may be an individual or group of individuals associated with anentity that provides the system for assessing network authenticationrequirements based on situational instance. In some embodiments, the“user” may be a financial institution user (e.g., an account holder or aperson who has an account (e.g., banking account, credit account, or thelike)). In one aspect, a user may be any financial institution userseeking to perform user activities associated with the financialinstitution or any other affiliate entities associated with thefinancial institution. In some embodiments, the user may be anindividual who may be interested in opening an account with thefinancial institution. In some other embodiments, a user may be anyindividual who may be interested in the authentication features offeredby the financial institution/entity. In some embodiments, a “user” maybe a financial institution employee (e.g., an underwriter, a projectmanager, an IT specialist, a manager, an administrator, an internaloperations analyst, bank teller or the like) capable of operating thesystem described herein. For purposes of this invention, the term “user”and “customer” may be used interchangeably.

With advancements in technology infrastructures and wirelesscommunication implementation, electronic devices such as transactionterminals such as point of sale terminals, portable multi-functiondevices, such as laptop computers, tablet computers, mobile phones,smart phones, wearable devices and the like are common. Typically,individuals may also have a mobile user device with them. Theseelectronic devices may enable performance of user activities (e.g.,financial activities, purchases, resource transfers, accessing resourcedata stored at other systems and databases and the like) based onrequisite authorization. These electronic devices may also be configuredto allow the user to perform the one or more user activities,transactions or resource transfers through an application, acceptauthentication credentials from the user, transmit authenticationcredentials for validation at external systems, etc.

Embodiments of the present invention address the above needs and/orachieve other advantages by providing apparatuses (e.g., a system,computer program product and/or other devices) and methods fordynamically appending and transforming static activity data transmittedto a user device application, as will be described in detail elsewherein the specification. FIG. 1 illustrates an electronic activityprocessing system environment 100, in accordance with some embodimentsof the present invention. FIG. 1 provides a unique system that includesspecialized servers and systems, communicably linked across adistributive network of nodes required to perform the functions ofdynamically appending and transforming static activity data transmittedto a user device application. The authentication system provides asecure platform for dynamic restructuring and inter-connection of inlineactivity data, in-situ during finalization authorization of anelectronic activity without requiring initialization of an additionalelectronic activity.

As illustrated in FIG. 1, a processing system 108, or electronicactivity processing system 108 or application server (e.g., a financialinstitution system 108) is operatively coupled, via a network 101 touser devices such as a first networked device 104, a second networkeddevice 164, etc., to the recipient system 106 (e.g., another secondfinancial institution system 106) and/or to one or more secondarysystems. In this way, the processing system 108 can send information toand receive information from the user devices such as a first networkeddevice 104, a second networked device 164, etc., the recipient system106, and one or more secondary systems. FIG. 1 illustrates only oneexample of an embodiment of the system environment 100, and it will beappreciated that in other embodiments one or more of the systems,devices, or servers may be combined into a single system, device, orserver, or be made up of multiple systems, devices, or servers.

The network 101 may be a system specific distributive network receivingand distributing specific network feeds and identifying specific networkassociated triggers. The network 101 may also be a global area network(GAN), such as the Internet, a wide area network (WAN), a local areanetwork (LAN), or any other type of network or combination of networks.The network 101 may provide for wireline, wireless, or a combinationwireline and wireless communication between devices on the network 101.In some embodiments, the network 101 may enable communication betweendevices thorough near-field communication, transmission ofelectromagnetic waves, sound waves or any other suitable means.

In some embodiments, the first user 102 is an individual that has a userdevice, i.e., the first networked device 104, such as a mobile phone,tablet, or the like and who seeks to perform one or more electronicactivities or user activities. In some embodiments, the second user 162is another individual that has a user device, i.e., the second networkeddevice 164, such as a mobile phone, tablet, or the like and who seeks toperform one or more electronic activities or user activities.

FIG. 1 also illustrates the first networked device 104. The firstnetworked device 104 (also referred to as a first user device or a userdevice, typically associated with the first user 102) may refer to adevice or a combination of devices that are configured to capture (i.e.,receive and/or process) one or more instructions, inputs, authenticationcredentials, and the like from the user 102 such as a computing device(e.g., a mobile device, a smart phone, a laptop computer and/or anothercomputing device), smart devices (e.g., smart TVs, smart doors, smartspeakers, personal digital assistant devices), wearable devices (e.g.,smart watches, fitness devices, virtual/augmented reality devices), GPSdevices, proximity/location sensors/beacon devices, visual capturedevices and/or the like to capture authentication credentials associatedwith the user. The first networked device 104 may be, for example, adesktop personal computer, a mobile system, such as a cellular phone,smart phone, personal data assistant (PDA), laptop, or the like. Thefirst networked device 104 generally comprises a communication device112 comprising input/output devices and/or sensors, a processing device114, and a memory device 116. The first networked device 104 maycomprise other devices that are not illustrated, configured for locationdetermination/navigation (GPS devices, accelerometers and the like), forauthentication (fingerprint scanners, microphones, iris scanners and thelike), for image capture (cameras, AR devices and the like), for display(screens, hologram projectors and the like), and other purposes. Thefirst networked device 104 is a computing system that enables the userto perform one or more user activities, e.g., initiating one or moreelectronic activities for resource transfers, payment requests, etc. Theprocessing device 114 is operatively coupled to the communication device112 and the memory device 116. The processing device 114 uses thecommunication device 112 to communicate with the network 101 and otherdevices on the network 101, such as, but not limited to the processingsystem 108. As such, the communication device 112 generally comprises amodem, server, or other device for communicating with other devices onthe network 101.

The first networked device 104 (also referred to as a first user deviceor a user device, typically associated with the first user 102)comprises computer-readable instructions 120 and data storage 118 storedin the memory device 116, which in one embodiment includes thecomputer-readable instructions 120 of a first resource application 122.In some embodiments first networked device 104 may refer to multipleuser devices that may be configured to communicate with each other, withthe processing system and/or other systems via the network 101. In someembodiments, the processing system 108 transmits the application 122 toand/or causes the processing device 114 to install/store the firstresource application 122 on the first networked device 104. In someembodiments, the first resource application 122, when executed by theprocessing device 114 is configured to cause the first networked device104 to perform one or more steps described herein. In some embodiments,the first resource application 122 is similar to the electronic activityprocessing application 158 described below. The first resourceapplication 122 may be a standalone application configured for receivingactivity data/instructions associated with an electronic activity from auser (typically via the first user interface 122 a of the first resourceapplication 122), transmitting electronic activity data and/orgenerating a static activity data set as described herein, or the firstresource application 122 may refer to one or more existing applicationson the user device that are configured to perform one or more of thesesteps. In some embodiments, the first resource application 122associated with the first user 102 may be associated with a paymentnetwork application structured for person-to person (P2P) paymentsand/or real time payments (RTP), with the second user 162 being a partof the same payment network and having a corresponding payment networkapplication structured for person-to person (P2P) payments and/or realtime payments (RTP) (second resource application 174). In someembodiments the processing system 108 and/or a financial institutionsystem may transmit control signals to the user device, configured tocause the first resource application 122 to perform one or morefunctions or steps associated with electronic activity processing, forexample, causing the application to trigger one or more sensors or inputdevices of the first networked device 104 to capture an authenticationcredential based on instructions receiving in an capture signal from theprocessing system 108, to cause the first networked device 104 torequest user input/information from the first user 102, and the like.

FIG. 1 also illustrates the second networked device 164. The secondnetworked device 164 (also referred to as a second user device or a userdevice, typically associated with the second user 162) may refer to adevice or a combination of devices that are configured to capture (i.e.,receive and/or process) one or more instructions, inputs, authenticationcredentials, and the like from the second user 162 such as a computingdevice (e.g., a mobile device, a smart phone, a laptop computer and/oranother computing device), smart devices (e.g., smart TVs, smart doors,smart speakers, personal digital assistant devices), wearable devices(e.g., smart watches, fitness devices, virtual/augmented realitydevices), GPS devices, proximity/location sensors/beacon devices, visualcapture devices and/or the like to capture authentication credentialsassociated with the user. The second networked device 164 may be, forexample, a desktop personal computer, a mobile system, such as acellular phone, smart phone, personal data assistant (PDA), laptop, orthe like. The second networked device 164 generally comprises acommunication device 162 comprising input/output devices and/or sensors,a processing device 168, and a memory device 170. The second networkeddevice 164 may comprise other devices that are not illustrated,configured for location determination/navigation (GPS devices,accelerometers and the like), for authentication (fingerprint scanners,microphones, iris scanners and the like), for image capture (cameras, ARdevices and the like), for display (screens, hologram projectors and thelike), and other purposes. The second networked device 164 is acomputing system that enables the user to perform one or more useractivities, e.g., initiating one or more electronic activities forresource transfers, payment requests, etc. The processing device 168 isoperatively coupled to the communication device 162 and the memorydevice 170. The processing device 168 uses the communication device 162to communicate with the network 101 and other devices on the network101, such as, but not limited to the processing system 108. As such, thecommunication device 162 generally comprises a modem, server, or otherdevice for communicating with other devices on the network 101.

The second networked device 164 (also referred to as a second userdevice or a user device, typically associated with the second user 162)comprises computer-readable instructions 172 and data storage 178 storedin the memory device 170, which in one embodiment includes thecomputer-readable instructions 172 of a second resource application 174.In some embodiments second networked device 164 may refer to multipleuser devices that may be configured to communicate with each other, withthe processing system and/or other systems via the network 101. In someembodiments, the processing system 108 transmits the application 174 toand/or causes the processing device 168 to install/store the secondresource application 174 on the user device 164. In some embodiments,the second resource application 174, when executed by the processingdevice 168 is configured to cause the second networked device 164 toperform one or more steps described herein. In some embodiments, thesecond resource application 174 is similar to the electronic activityprocessing application 158 described below. The second resourceapplication 174 may be a standalone application configured for receivingactivity data/instructions associated with an electronic activity from auser (typically via the second user interface 174 a of the secondresource application 174), transmitting electronic activity data and/orgenerating a static activity data set as described herein, or the secondresource application 174 may refer to one or more existing applicationson the user device that are configured to perform one or more of thesesteps. In some embodiments, the second resource application 174associated with the second user 162 may be associated with a paymentnetwork application structured for person-to person (P2P) paymentsand/or real time payments (RTP), with the first user 102 being a part ofthe same payment network and having a corresponding payment networkapplication structured for person-to person (P2P) payments and/or realtime payments (RTP) (first resource application 122). In someembodiments the processing system 108 and/or a financial institutionsystem may transmit control signals to the user device, configured tocause the second resource application 174 to perform one or morefunctions or steps associated with electronic activity processing, forexample, causing the application to trigger one or more sensors or inputdevices of the second networked device 164 to capture an authenticationcredential based on instructions receiving in an capture signal from theprocessing system 108, to cause the second networked device 164 torequest user input/information from the second user 162, and the like.

As further illustrated in FIG. 1, the processing system 108 or theelectronic activity processing system 108 generally comprises acommunication device 146, a processing device 148, and a memory device150. As used herein, the term “processing device” generally includescircuitry used for implementing the communication and/or logic functionsof the particular system. For example, a processing device may include adigital signal processor device, a microprocessor device, and variousanalog-to-digital converters, digital-to-analog converters, and othersupport circuits and/or combinations of the foregoing. Control andsignal processing functions of the system are allocated between theseprocessing devices according to their respective capabilities. Theprocessing device may include functionality to operate one or moresoftware programs based on computer-readable instructions thereof, whichmay be stored in a memory device.

The processing device 148 is operatively coupled to the communicationdevice 146 and the memory device 150. The processing device 148 uses thecommunication device 146 to communicate with the network 101 and otherdevices on the network 101, such as, but not limited to the recipientsystem 106, the user device(s) 104 and the secondary system(s) 110. Assuch, the communication device 146 generally comprises a modem, server,or other device for communicating with other devices on the network 101.

As further illustrated in FIG. 1, the processing system 108 comprisescomputer-readable instructions 154 stored in the memory device 150,which in one embodiment includes the computer-readable instructions 154of an electronic activity processing application 158. In someembodiments, the memory device 150 includes data storage 152 for storingdata related to the system environment, but not limited to data createdand/or used by the electronic activity processing application 158. Insome embodiments, executing the computer readable instructions of theelectronic activity processing application 158 causes the processingdevice 148 to perform one or more steps for electronic activityprocessing described herein. In the embodiment illustrated in FIG. 1 anddescribed throughout much of this specification, the electronic activityprocessing application 158 may receive electronic activity data from theuser devices, i.e., the first networked device 104 and the secondnetworked device 164. In some embodiments, the processing system 108 mayretrieve user authentication information, capture device information,financial information and the like from the user devices (firstnetworked device 104 and the second networked device 164) and/or therecipient system 106. In this way, the electronic activity processingapplication 158 may communicate with the recipient system 106, the userdevices (first networked device 104 and the second networked device164), secondary system 110, merchant systems and other third partysystems.

In some embodiments, the electronic activity processing application 158may control the functioning of the first networked device 104 and thesecond networked device 164. In some embodiments, the electronicactivity processing application 158 computer readable instructions 154or computer-readable program code, the when executed by the processingdevice 148, causes the processing device to perform one or more stepsdescribed herein and/or transmit control instructions to other systemsand devices to cause the systems and devices to perform specific tasks.

As illustrated in FIG. 1, the recipient system 106 is connected to theprocessing system 108 and may be associated with a financial institutionnetwork (e.g., a recipient bank for an account transfer electronicactivity). The recipient system 106 may refer to a financial institutionsystem, a transaction terminal or other devices or systems associatedwith performing the sure activity. In this way, while only one recipientsystem 106 is illustrated in FIG. 1, it is understood that multiplenetwork systems may make up the system environment 100. In someembodiments, the recipient system 106 is substantially similar to theprocessing system 108. The recipient system 106 generally comprises acommunication device 136, a processing device 138, and a memory device140. The recipient system 106 comprises computer-readable instructions142 stored in the memory device 140, which in one embodiment includesthe computer-readable instructions 142 of a finalization authorizationapplication 144. In some embodiments, the processing system 108 (e.g.,based on executing the application 158) transmits and/or causes theprocessing device 138 to install/store the finalization authorizationapplication 144 on the recipient system 106. In some embodiments, thefinalization authorization application 144, when executed by theprocessing device 138 is configured to cause the recipient system 106 toperform one or more steps described herein (e.g., decode and processinline activity data sets received from the processing system). In someembodiments, the finalization authorization application 144 is similarto the electronic activity processing application 158 described above.The recipient system 106 may communicate with the processing system 108to receive static activity data sets, indicate processing of staticactivity data sets, indicate completion of an electronic activity,request validation of authentication credentials and the like. Theprocessing system 108 may communicate with the recipient system 106 viaa secure connection 160 generated for secure encrypted communicationsbetween the two systems. In some embodiments, the secure connection 160may be an operative communication link/channel established via thenetwork 101.

It is understood that the servers, systems, and devices described hereinillustrate one embodiment of the invention. It is further understoodthat one or more of the servers, systems, and devices can be combined inother embodiments and still function in the same or similar way as theembodiments described herein. The feature of the invention will now bedescribed with respect to FIG. 2 in conjunction with FIGS. 3A-3B and 4.FIG. 2 schematically depicts a high level process flow and processingenvironment 200 for dynamically appending and transforming staticactivity data of electronic activities, in accordance with someembodiments of the invention. FIGS. 3A and 3B schematically depictillustrative representations and processing environments 300A and 300B,respectively, of the dynamically appended and transformed staticactivity data in various situations, in accordance with some embodimentsof the invention. FIG. 4 schematically depicts an illustrativerepresentation 400 of a resource application user interface (e.g., firstuser interface 122 a and/or second user interface 174 a) of a resourceapplication (e.g., first resource application 122 and/or second resourceapplication 174) displayed on a user device (first networked device 104and/or the second networked device 164), respectively, in accordancewith some embodiments of the invention.

Referring now to FIG. 2, a high level process flow 200 is provided fordynamically appending and transforming static activity data transmittedto a user device application. The process flow and processingenvironment 200 is directed to, in general, a secure platform fordynamic restructuring and inter-connection of inline activity data,in-situ during finalization authorization of an electronic activitywithout requiring initialization of an additional electronic activity.In some embodiments, the “system” as used herein refers to theprocessing system 108, whose activities may be performed based onexecuting computer readable/executable instructions of the electronicactivity processing application 158 by the processing device 148. Inother embodiments, the “system” may refer to the first networked device104 and/or the second networked device 164. FIG. 3A schematicallydepicts an illustrative representation and processing environment 300Aof dynamically appending and transforming static activity data ofelectronic activities, in accordance with some embodiments of theinvention. FIG. 3B schematically depicts an illustrative representation300B and processing environment of dynamically appending andtransforming static activity data of electronic activities, inaccordance with some embodiments of the invention. FIG. 4 schematicallydepicts an illustrative representation 400 of a resource applicationuser interface, in accordance with some embodiments of the invention.The steps, features and components of the invention for dynamicallyappending and transforming static activity data transmitted to a userdevice application will now be described in conjunction with FIGS. 2-4.

As illustrated by block 202 of FIG. 2, the system may receive (and/orretrieve) data associated with an electronic activity. Typically, afirst user (or another system) may initiate the first electronicactivity, for example, using a graphical user interface 122 a of a firstresource application 122 provided by the system on the first networkeddevice 104. The system may then receive a first transmission indicatingthat a first user associated with the first networked device hasrequested finalization authorization of a first electronic activity. Thesystem may then determine that the first electronic activity isassociated with a first resource transfer from a second resourceassociated with a second user to a first resource associated with thefirst user, e.g., based on analyzing the transmission. For example, thefirst user may initiate the first electronic activity for requesting apayment from the second user. Here, the first electronic activity is inthe form of a payment transfer and is typically associated with a firstresource transfer of a resource magnitude (e.g., payment value oramount) from a second resource associated with a second user (e.g., anaccount of the second user) to a first resource associated with thefirst user (e.g., an account of the first user). The user may thenprovide activity parameters associated with the first electronicactivity, such as time of the resource transfer, annotation itemsdescribing the reasons for requesting the transfer etc. As anotherexample, the first user may initiate the first electronic activity forrequesting one or more electronic resources or access to one of moreelectronic resources (e.g., electronic documents, electronic files,etc.) of the second user. Here, the first electronic activity is in theform of a payment transfer and is typically associated with a firstresource transfer of a resource magnitude (e.g., transmission of one ormore electronic files, providing access to one of more files, etc.) froma second resource associated with a second user (e.g., a device storageof the second user) to a first resource associated with the first user(e.g., a device storage of the first user). Moreover, the firstnetworked device of the first user, for example, based on receivinginstructions from a user, may transmit activity parameters to thesystem. These activity parameters may include location of the file, timeof transmission, unique identifier of the source resource system,certificates of the target resource system, authentication information,and the like.

Typically, the first user interface 122 a of the first application 122is structured to allow the user to provide user inputs to initiate thefirst electronic activity and request finalization authorization of theactivity from the first user interface 122 a. It is noted that, thefirst application 122 is structured to allow the user to provide userinputs in the form of natural language, as text, speech, etc., and/orvia operating one or more graphical elements (e.g., text boxes, actionbuttons, etc.) of the first user interface 122 a. As an example, in theinstance of utilizing the natural language form of inputs, the firstuser may merely provide a speech/audio input by saying or a textualinput by typing “request finalization authorization an “A1” (resourcemagnitude) from “B2” (a second user) for “Ccccccccc . . . ” (e.g.,description of the activity, reasons for requesting the resourcetransfer).”

In response to receiving user inputs to initiate the first electronicactivity and request finalization authorization of the activity from thefirst user interface 122 a, the first application 122 typicallytransmits the user inputs to the system as a first transmission. Thesystem may then parse the received first transmission to determine theparticulars of transmission, i.e., determine that that a first userassociated with the first networked device has requested finalizationauthorization of a first electronic activity, and that the firstelectronic activity is associated with a first resource transfer from asecond resource associated with a second user to a first resourceassociated with the first user. Continuing with the previous example ofnatural language input, the system may parse the user input in thenatural language format to identify that the first user is requesting aresource transfer having an “A1” magnitude from a second user named“B2,” for the purposes of “Ccccccccc . . . ”.

The system may then further analyze the first transmission to identifywhether the transmission contains any additional activity parameters. Ifso, the system may extract the additional activity parameters. If thetransmission does not contain activity parameters that are required forthe finalization authorization or processing of the activity, the systemmay determine one or more activity parameters associated with the firstelectronic activity. Here, the system may determine activity parameterssuch as source account/resource unique identifier, targetaccount/resource unique identifier, transfer amount (resourcemagnitude/resource value), date/time of the payment transfer electronicactivity, authorization codes, and/or the like. Continuing with theprevious example of natural language input, the system determine that aunique identifier of a first resource of the first user, and a uniqueidentifier of a second resource of the second user named “B2” isrequired. In this regard, the system may determine these parameters,e.g., based on prior electronic activities of the user, user accountinformation, based on requesting additional user inputs etc. Here, insome instances, the system may determine these parameters, based on thecategorical context of “Ccccccccc . . . ” (e.g., description of theactivity, reasons for requesting the resource transfer). For instance,“Ccccccccc . . . ” may indicate that the first user is requestingpayment for yesterday's event, or baby-sitting services, gardeningservices, etc. rendered by the first user during a certain time intervalof a certain day. Here, the system may review the first user's calendar,the first user's records, etc., based on receiving requisite permissionsfrom the first user, and automatically determine the full name of thesecond user B2 and a unique identifier of a second resource of thesecond user.

The system may further determine that the second user is associated witha second networked device 164 (i.e., second user device), and inresponse establish an operative communication channel with the secondnetworked device. Moreover, the system may determine whether the asecond networked device comprises a second resource application 174 (i)that is a counterpart of the first resource application associated withthe second user (e.g., a payment network application of the second userthat is in the same payment network as that of the first resourceapplication of the first user), and/or (ii) that is compatible with thetransmissions from the first resource application (e.g., static activitydata sets described below) and dynamic modification of thetransmissions. If not, the system may initiate installation of thesecond resource application on the second networked device, e.g., afterreceiving requisite permissions from the second user.

Next, the system (the electronic activity processing application 158 inparticular), may then construct a first static activity data setassociated with the first electronic activity, as illustrated by block204. The first static activity data set comprises a plurality of firstactivity parameter items associated with activity parameters associatedwith performing the first electronic activity. Typically, these activityparameter items are particulars associated with the first electronicactivity which are required to perform the first electronic activity. Asillustrated by FIGS. 3A-3B, the system may construct a first staticactivity data set 310 and store it at the first networked device 104.The first static activity data set 310 comprises a plurality of firstactivity parameter items 312, each relating to one or more activityparameters. The system may assign an activity identifier to uniquelyidentify the first electronic activity and construct a unique activityidentifier parameter item 312 a containing the activity identifier. Thesystem may the construct another activity parameter item, a resourcemagnitude type activity parameter item 312 b containing the resourcevalue of the resource transfer (e.g., payment amount, number ofdocuments, storage location of files, etc.). The system may alsoconstruct an activity parameter item indicating the second user, anactivity parameter item indicating the second networked device of thesecond user, an activity parameter item indicating the unique identifierof the second user resource, and/or the like.

The system may further construct a first user annotation item 312 c,typically containing a statement or comment or description input by thefirst user, typically in a natural language format as described above.In some embodiments, the system splices together the user input (e.g.,“Ccccccccc . . . ” (e.g., description of the activity, reasons forrequesting the resource transfer)) with activity parameters identifiedby the system to construct the first user annotation item 312 c. Forinstance, the system determine that the user input description indicatesthat the resource transfer is associated with an event at a certainprior day. The system may then identify the location of the event, theduration, etc., and insert it at appropriate locations (e.g., atlocations that result in a meaningful for a natural language) of theuser input to construct the first user annotation item 312 c.

The system may further construct a processing instruction annotationitem that is structured to cause the second networked device to processthe static activity data set differently that it would process otherdata. For instance, the system determine that the user input descriptionindicates that the second user would prefer to receive the request forfinalization authorization at a predetermined time interval in thefuture, or determine that a geographic location of the second user isassociated with processing during a predetermined time interval in thefuture. The system may then construct a processing instruction thatcauses the second networked device of the second user to receive thetransmission of the static activity data set, but not display or notifythe user until predetermined time interval in the future. Here, theprocessing instruction causes the second resource application to run inthe background until the predetermined time interval in the future, whenit initiates presentation of the static data on a second user interfaceof the second resource application. In this manner, the static data maybe sent to the second networked device ahead of time, such that even ifthe second networked device is offline or loses network connectivity atthe predetermined time interval, the second resource application torunning in the background is still able to display the static datareceived ahead of time. As another example, the system determine thatthe user input description indicates that the second user would prefernon-intrusive notifications. The system may then construct a processinginstruction that causes the second networked device of the second userto receive the transmission of the static activity data set, but notdisplay or notify the user when the user is not performing other taskson the second networked device. Here, the processing instruction causesthe second resource application to run in the background until itdetermines that the second user is not operating on any otherapplications before initiating presentation of the static data on asecond user interface of the second resource application.

In some embodiments, the plurality of first activity parameter items 312are constructed as disparate data structures that are linked together(e.g., with pointers), e.g., a linked list.

In some embodiments, the plurality of first activity parameter items 312are constructed as a first activity data string in an activity dataformat. The activity data format typically comprises a syntax forconstructing the activity parameters into the first activity datastring. In some embodiments, some or all of the activity parameters arepresent in natural language or ordinary language in the first activitydata string. The system may construct a first activity data stringhaving N activity parameters items 312: “[first activity parameter 1][first activity parameter 2] . . . [first activity parameter N]”. Asanother example of electronic activity of a payment transfer, theactivity parameter 1 maybe a source account unique identifier/number,the activity parameter 2 maybe a target account uniqueidentifier/number, an activity parameter 3 maybe a transfermagnitude/amount value (e.g., resource magnitude type activity parameteritem 312 b), an activity parameter 4 maybe a time for payment transfer,an activity parameter 5 maybe an activity type code, an activityparameter 6 maybe the unique activity identifier parameter item 312 a,and an activity parameter 7 maybe the first user annotation item 312 cinput by the first user. Typically, the activity parameters may beordered/arranged, spaced, and/or separated by other alphanumeric orsymbol characters in accordance with the syntax of the activity dataformat. In some embodiments, some or all of the activity parameters arepresent in alphanumeric characters of natural language in the firstactivity data string, and may be spaced apart, joined end to end, and/orseparated using predetermined alphanumeric characters or predeterminedsymbol characters. For an electronic activity of the payment transfer,for example, the first activity data string may be: “aaaa111a bbbb222b111.11 111111 cc”. In some embodiments, the activity data formatcomprises a high-level programming language format, e.g., includingactivity parameters in natural language characters. In some embodiments,the activity data format comprises a low-level programming languageformat.

In some embodiments, for constructing the first activity data string,the system modifies at least one activity parameter associated with thefirst electronic activity received from a first networked device fromthe original parameters to a new modified parameter to obfuscate thedata during transmission to enhance the security of the transmissionsand to prevent interception by unauthorized individuals. The system thengenerates an authorization instruction that indicates the modification,which is encoded for transmission. The processing instruction comprisesa predetermined method for altering the particular modified at least oneactivity parameter of the modified first activity data string forobtaining the original parameters and successfully performing the firstelectronic activity at the recipient system. Typically it is possible todetermine the modification and reverse the modification to obtain theoriginal activity parameters for processing only based on decoding theassociated authorization instruction. Typically, the at least oneactivity parameter of the first activity data string is modified oraltered such that processing the modified first activity data stringhaving the modified at least one activity parameter, results in therecipient system unsuccessfully performing the first electronicactivity. Continuing with the previous example, the system may modifythe activity parameters such that all instances of character 1 arereplaced with character 3, resulting in the first activity data stringmay of: “aaaa333a bbbb222b 333.33 333333 cc”. An encoded authorizationinstruction, described below, maybe structured such that decoding theauthorization instruction would indicate the substitution of thecharacter 1 with 3 to the recipient system, which may then replace thecharacter 3 with character 1 to obtain the original/correct parameters(i.e., aaaa111a bbbb222b 111.11 111111 cc) and process the paymenttransfer. Even if an unauthorized individual intercepts the datatransmission and access the modified credentials (e g, aaaa333a, 333.33,333333, the security of the original credentials is maintained.Typically, it is not possible to execute the payment transfer using themodified credentials (e.g., aaaa333a, 333.33, 333333). As anotherexample, the system may modify the activity parameter 3 of the transferamount value such that the decimal point is moved in a particulardirection by 2 places, resulting in the modified activity parameter of1.1111 and the first activity data string may of: “aaaa111a bbbb222b1.1111 111111 cc”.

In some embodiments, the first static activity data set (or the alteredfirst static activity data set described below) associated with thefirst electronic activity is constructed as one or more line items of aninline activity data set. In some embodiments, the inline activity dataset refers to a file or data packet that is transmitted to the recipientsystem for execution of the associated electronic activities. An inlineactivity data set may comprise activity data strings associated with oneor more electronic activities and is configured such that processing theinline activity data set allows the recipient system to perform theassociated one or more electronic activities.

The system, via the electronic activity processing application, may alsogenerate a credential key pair for communications with the secondnetworked device, and insert a key sub-component into the first staticactivity data set as another activity parameter item. The credential keypair comprises a source credential key sub-component (e.g., a privatekey) and a corresponding complementary target credential keysub-component (e.g., a public key). Typically, the source credential keysub-component and the target credential key sub-component arecomplementary asymmetric key pairs and their encoding is intrinsicallylinked. The target credential key-sub component is transmitted to thesecond networked device after generation. The key pairs are constructedsuch that the electronic activity data transmitted by the system (asdescribed in detailed below) is encoded by the system using sourcecredential key sub-component, and only the second networked devicehaving the target credential key sub-component is able to decode theencoded activity data. In some embodiments, the generation andtransmission of the key pairs is a one-time action performed during aninitial communication with the recipient system, and are utilized toencode/decode subsequent data transmissions. In other embodiments, thekey pairs are generated for each data transmission. In some embodiments,the source credential key sub-component and the target credential keysub-component of the credential key pair are similar to public andprivate keys utilized in a certificate signing request (CSR),respectively. In some embodiments, the source credential keysub-component and the target credential key sub-component of thecredential key pair are structured in accordance with asymmetric publicand private keys employed in public-key cryptography for communicationbetween the system and the second networked device, respectively. Inother embodiments, the source credential key sub-component and thetarget credential key sub-component of the credential key pair arestructured in accordance with symmetric public and private keys ofPretty Good Privacy (PGP) encryption program for communication betweenthe system and the capture device, respectively.

In some embodiments, the system generates, another activity parameteritems having a specific or unique authorization instruction. Theauthorization instruction typically comprises at least one processinginstruction (e.g., a data processing instruction, a permissioninstruction to indicate authorization for the electronic activity, apointer instruction indicating a reference object of the associatedactivity data string, a data modification instruction to obtain originalparameters, a predetermined method and/or the like) that is required foridentifying and processing the associated activity data string andsuccessfully performing the electronic activity at the recipient systemand/or the second networked device.

The system then encodes each of the authorization instructions in theactivity data format. For instance, the system encodes the firstauthorization instruction associated with the first electronic activityin the activity data format such that at least a portion of the firstencoded authorization instruction matches the first activity data stringassociated with the first electronic activity. As alluded to previously,the authorization instruction is encoded, using the source credentialkey sub-component of the credential key pair described previously, toresemble an activity data string. The authorization instruction maytypically take the form of technical instructions comprising lineinstructions, action objects, data/object operators, and/or otherhandles and syntax. These technical instructions are transformed toresemble an activity data string, and activity parameters in particular,such that the instructions may be decoded and the associated activitydata string may be identified and processed correctly only using thetarget credential key sub-component at the second networked device.

The system may also generate a first authorization instructionassociated with the first electronic activity for the recipient system,wherein the first authorization instruction comprises a processinginstruction for the recipient system to perform the first electronicactivity, and insert it into the first static activity data set 310.

The system may then transmit the constructed first static activity dataset 310 to a second resource application 174 of the second networkeddevice 164 associated with the second user 162, via the establishedoperative communication link, as illustrated by transmission “A” ofFIGS. 3A-3B. Moreover, the system may further store the first staticactivity data set 310 on the second networked device 164.

Now referring to FIG. 2, as illustrated by block 206, the system, e.g.,based on executing computer readable instructions of the application158, is configured to cause the second networked device to present, viaa second user interface of the second resource application, theplurality of first activity parameter items of the first static activitydata set on the second networked device associated with the second user.As described previously, this presentation may be based on theprocessing instruction parameter item present in the activity data set.Here, for example, the processing instruction may be structured to causethe second resource application to run in the background until apredetermined time interval in the future, at which time the applicationinitiates presentation of the plurality of first activity parameteritems of the first static activity data set on a second user interfaceof the second resource application. In this manner, the static data maybe sent to the second networked device ahead of time, such that even ifthe second networked device is offline or loses network connectivity atthe predetermined time interval, the second resource application torunning in the background is still able to display the static datareceived ahead of time. As another example, the processing instructionmay be structured to cause the second resource application to run in thebackground until it determines that the second user is not operating onany other applications before initiating presentation of the static dataon a second user interface of the second resource application.

In some embodiments, the plurality of first activity parameter items ofthe first static activity data set first are first converted to anatural language format before presenting them on the second networkeddevice associated with the second user, such as ““D” (first user) hasrequested finalization authorization of “A1” (resource magnitude).” Insome embodiments, the first activity parameter items may be presented asgraphical elements (e.g., icons, action buttons, etc.). Moreover, it isnoted that the second user interface 174 a of the second resourceapplication 174 of the second networked device 164 is substantiallysimilar to the first user interface 122 a of the first resourceapplication 122 of the first networked device 104 illustrated by FIG. 4.

Next, the system may also present, via a second user interface of thesecond resource application, a request for the second user to authorizethe first electronic activity. In some embodiments this presentation mayinclude a graphical element such as an action button, a toggle switch, acheck box, etc., that is structured to receive a user input.

As discussed previously, as an additional advantage of the presentinvention, the system further allows the second user toalter/change/modify the static activity data of the first electronicactivity and append the data with additional parameter items, withoutrequiring initiation of another separate electronic activity with themodified parameters. In this regard, the system may present theplurality of first activity parameter items of the first static activitydata set first such that, on or more of the parameter items may bealtered by the second user via the second user interface, e.g., in theform of graphical elements that are structured to be modified, alongwith graphical import elements (e.g., text box files) or audio inputelements for receiving additional parameter items from the second user.

Next, at block 208, the system may receive, via the second userinterface of the second resource application, a first user input fromthe second user for altering a resource magnitude type activityparameter item (312 b) of the plurality of first activity parameteritems for the first electronic activity. For example, in the instanceswhere the first activity is associated with a payment transfer of aresource magnitude (payment amount) from the second user, the systemallows for the second user to modify the resource magnitude (paymentamount), in-situ, while the first electronic activity is ongoing,without requiring initiation of another new activity with the newpayment amount. Moreover, the first user input from the second user mayfurther comprise a description or reason for the alteration in a naturallanguage format.

In response to the receiving the second user input altering the resourcemagnitude type activity parameter item, the system constructs a newsecond activity parameter item 322 b containing the altered resourcemagnitude type activity parameter item, i.e., the new magnitude/value ofthe resource magnitude type activity parameter item, as illustrated byFIGS. 3A-3B. The system then stores the new second activity parameteritem 322 b at the memory of second networked device 164, e.g., with alink/pointer to the memory location of the stored first static activitydata set. Moreover, the system also constructs a new second userannotation item 322 c containing the description or reason or othercontextual input contained in the first user input from the second user.The system then also stores the new second user annotation item 322 c atthe memory of second networked device 164, e.g., with a link/pointer tothe memory location of the stored second activity parameter item 322 band with a link/pointer to the memory location of the stored firststatic activity data set. As such, in response to the receiving thefirst user input from the second user, the system may construct at leastone second activity parameter item associated with altering the resourcemagnitude type activity parameter item of the plurality of firstactivity parameter items.

The first user is typically required to validate the alterations to thefirst electronic activity. However, for decreasing the transmission timeand increasing the processing speeds and for obviating the need for thefirst networked device to parse all of the incoming data to identify therelevant data elements, the system does not transmit all of theparameter items of the first electronic activity, but instead onlytransmits those parameter items that are not already stored at the firstnetworked device. To achieve this, the system then constructs a secondstatic activity data set associated with altering the resource magnitudetype activity parameter item of the plurality of first activityparameter items for the first electronic activity, as indicated by block210. As illustrated by FIGS. 3A-3B, the system may construct a secondstatic activity data set 320. The second static activity data set 320comprises only the those parameter items that are not already stored atthe first networked device and the unique activity identifier of thefirst electronic activity in order for the first networked device tolink the altered parameter items with already stored unaltered items inthe first networked device. In this regard, the system extracts theunique activity identifier parameter item 312 a from the stored firststatic activity data set 310 and appends it with the new or alteredparameter items (e.g., the new second activity parameter item 322 b, asecond user annotation item 322 c, etc.) to construct the second staticactivity data set 320. Here, the second static activity data set 320typically comprises a plurality of second activity parameter items 322,comprising: the unique activity identifier parameter item 312 a, the newsecond activity parameter item 322 b, a second user annotation item 322c, etc. The second activity parameter item 322 b is associated with theassociated with altering the resource magnitude type activity parameteritem based on the user input from the second user. The a second userannotation item 322 c may be a statement or comment or description inputby the second user indicating the modification to the resourcemagnitude, reasons for the modification, etc., typically in a naturallanguage format. As such, the second static activity data set comprisesat least (i) the at least one second activity parameter item associatedwith altering the resource magnitude type activity parameter item of theplurality of first activity parameter items, and (ii) a unique activityidentifier parameter item of the plurality of first activity parameteritems.

The system may then transmit the second static activity data set to thefirst resource application of the first networked device for alterationvalidation, as indicated by transmission B of FIGS. 3A-3B. The secondstatic activity data set is structured to cause the first networkeddevice to associate the second static activity data set with the firstelectronic activity based on identifying that the both the stored firststatic activity data set 310 and the received second static activitydata set 320 comprise the unique activity identifier 312 a. The devicemay then extract the second activity parameter item 322 b from thereceived second activity data set 320, and determine that the resourcemagnitude of the first activity has been altered. In other words, thesystem may parse the second static activity data set to identify theunique activity identifier parameter item of the plurality of firstactivity parameter items. The system may then associate the secondstatic activity data set with the first electronic activity. Here, thesystem may retrieve the constructed first static activity data setassociated with the first electronic activity. The first static activitydata set comprises the plurality of first activity parameter itemscomprising the resource magnitude type activity parameter item.Moreover, the system may subsequently present, via the first userinterface of the first resource application, the at least one secondactivity parameter item associated with altering the resource magnitudetype activity parameter item of the plurality of first activityparameter items to the first user. The system may also present, via thefirst user interface of the first resource application, a request forthe alteration validation of the second static activity data set fromthe first user. Here, the system may present the plurality of firstactivity parameter items comprising the resource magnitude type activityparameter item.

The second static activity data set is structured to cause the firstnetworked device to present the altered resource magnitude type activityparameter item to the first user, via a first user interface of thefirst resource application, as illustrated by FIG. 4. Here, asillustrated by FIG. 4, the system may present the presenting some of allof the plurality of first activity parameter items, such as the resourcemagnitude type activity parameter item 312 b. The system may thenoverlay a presentation of the at least one second activity parameteritem 322 b along with a graphical link (e.g., a strike out of the item312 b to indicate that it is no longer current as illustrated by FIG. 4)to the presented the resource magnitude type activity parameter item 312b. The system may further present the second user annotation item 322 c.

At block 360 of FIGS. 3A-3B, the system parses the second staticactivity data set associated with altering the resource magnitude typeactivity parameter item of the plurality of first activity parameteritems for the first electronic activity, to determine whether thealtered/new resource magnitude type activity parameter item 322 b isassociated with an (i) increase or (ii) decrease in the resourcemagnitude, and perform further processing accordingly, as will bedescribed for each case below.

The first case of an increase in resource magnitude of the secondactivity parameter item is illustrated in FIG. 3A. Here, the second usermay have added to the resource magnitude such that the resourcemagnitude of the second activity parameter item 322 b is greater thanthat of the original resource magnitude parameter 312 b. For example,the second user may have increased the payment amount requested by thefirst user or added a tip. Here, based on determining that the secondactivity data set is associated with an increase in the resourcemagnitude type activity parameter item, the system automaticallytransmits the alteration validation of the second static activity dataset to the recipient system 108, for the recipient system to finalizethe activity are perform the resource transfer.

The second case of a decrease in resource magnitude of the secondactivity parameter item is illustrated in FIG. 3B. Here, the second usermay have reduced the resource magnitude such that the resource magnitudeof the second activity parameter item 322 b is lesser than that of theoriginal resource magnitude parameter 312 b. For example, the seconduser may have disputed the payment amount requested by the first userand suggested a lower amount. Here, based on determining that the secondactivity data set is associated with a decrease in the resourcemagnitude type activity parameter item, the system typically presents,via the first user interface of the first resource application, arequest for the alteration validation of the second static activity dataset from the first user.

In response, the system may receive, via the first user interface of thefirst resource application, a second user input from the first usereither (a) accepting the reduced/decreased magnitude and hence providingthe alteration validation of the second static activity data set, or (b)further altering the resource magnitude of the second activity parameteritem. In instance (a). where the user providing the alterationvalidation of the second static activity data set, the control moves toblock 212 described below. However, in the instance (b). where the firstuser alters the resource magnitude of the second activity parameteritem, the system implements a negotiation dialogue function of theinvention that allows for the first user and the second user in turnalter the resource magnitude until either alteration validation isprovided by the first user or until the activity is terminated.

The first user may provide a second user input from the first user foraltering the second static activity data set (e.g., by increasing theresource magnitude of the second activity parameter item 322 b). Inresponse, the system may construct a third static activity data set byaltering the second static activity data set, in a manner substantiallysimilar to the construction of the second activity data set describedpreviously. As such, third static activity data set 330 associated withthe first electronic activity typically comprises (i) the at least onethird activity parameter item associated with the second user input foraltering the at least one second activity parameter item, and (ii) theunique activity identifier parameter item 312 a of the plurality offirst activity parameter items, along with other parameter items such asfirst user annotation items etc.

The system then transmits the third static activity data set to thesecond resource application of the second networked device for approvalfrom the second user, as indicated by transmission C. Similar to themanner described before, here the third static activity data set isstructured to cause the second device to parse the third static activitydata set to identify the unique activity identifier parameter item ofthe plurality of first activity parameter items, and then associatingthe third static activity data set with the first electronic activity.The transmission C of the third static activity data set is structuredto present the third static activity data set to the second user, viathe second user interface of the second resource application. The systemmay also present, via the first user interface of the first resourceapplication, a request for the alteration validation of the secondstatic activity data set from the first user.

Again, the second either further alters the resource magnitude, in whichcase the process proceeds in the same manner as described before untilthe second user provides a confirmation, or the second user provides aconfirmation to the third static data set itself, as evaluated by thesystem at block 370. The system alters the first static activity dataset in response to receiving a confirmation from the second user at thefirst device as indicated by transmission D, via the second userinterface of the second resource application. The alteration of thefirst activity data set is described below.

Now referring to FIG. 2, at block 212, the system may alter the firststatic activity data set based on receiving an alteration validation ofthe second static activity data set from the first resource applicationof the first networked device. As indicated by block 212 of FIG. 2, thesystem may construct a final altered static activity data set 310′ withthe final activity parameter items. Here, the system may remove theresource magnitude type activity parameter item 312 b of the pluralityof first activity parameter items 312 from the first activity data set310. The system may extract the second activity parameter item 322 bfrom the second activity data set 320 (in the case of FIG. 3A) or themost recent activity parameter item from the most recent data set (inthe case of FIG. 3B). The system may then append or insert the at leastone second activity parameter item at a predetermined location in theplurality of first activity parameter items of the first activity dataset, to construct the altered static activity data set 310′, asillustrated by FIG. 3A. The system may then transmit this altered staticactivity data set 310′ to the recipient system 108 for the recipientsystem to finalize the activity are perform the resource transfer, andalso to the second networked device 164 to indicate that the activityhas been finalized.

In some embodiments, altering the first static activity data set furthercomprises: receiving, via the first user interface of the first resourceapplication, a second user input from the first user for altering the atleast one second activity parameter item of the second static activitydata set associated with altering the resource magnitude type activityparameter item of the plurality of first activity parameter items; inresponse to the receiving the second user input from the first user,constructing at least one third activity parameter item 322 b associatedwith the second user input for altering the at least one second activityparameter item; constructing a third static activity data set associatedwith the first electronic activity, wherein the second static activitydata set comprises (i) the at least one third activity parameter itemassociated with the second user input for altering the at least onesecond activity parameter item, and (ii) the unique activity identifierparameter item of the plurality of first activity parameter items;transmitting the third static activity data set to the second resourceapplication of the second networked device, wherein the transmission ofthe third static activity data set is structured to present the at leastone third activity parameter item to the second user, via the seconduser interface of the second resource application; and altering thefirst static activity data set in response to receiving a confirmationfrom the second user associated with the at least one third activityparameter item, via the second user interface of the second resourceapplication, by: (i) removing the resource magnitude type activityparameter item of the plurality of first activity parameter items fromthe first activity data set; and (ii) appending the at least one thirdactivity parameter item at a predetermined location in the plurality offirst activity parameter items of the first activity data set.

Next at block 214, the system may transmit the altered first staticactivity data set 310′ to the recipient system, wherein the first staticactivity data set, when processed, is structured to cause the recipientsystem to perform the first electronic activity based on the alteredfirst static activity data set. Moreover, the system may present, to thefirst user via the first resource application and to the second user viathe second resource application, a notification indicating thecompletion of the first electronic activity based on receiving anactivity communication from the recipient system.

Moreover, the system may generate a second authorization instruction forthe first electronic activity, wherein the second authorizationinstruction is structured to modify the processing instruction (describepreviously) for the recipient system based on the altered first staticactivity data set. Here, the system may transmit the secondauthorization instruction for the first electronic activity to therecipient system as well. The second authorization instruction isstructured such that, when processed, is structured to cause therecipient system to perform the first electronic activity based on thealtered first static activity data set at not the first static activitydata set 310.

As will be appreciated by one of skill in the art, the present inventionmay be embodied as a method (including, for example, acomputer-implemented process, a business process, and/or any otherprocess), apparatus (including, for example, a system, machine, device,computer program product, and/or the like), or a combination of theforegoing. Accordingly, embodiments of the present invention may takethe form of an entirely hardware embodiment, an entirely softwareembodiment (including firmware, resident software, micro-code, and thelike), or an embodiment combining software and hardware aspects that maygenerally be referred to herein as a “system.” Furthermore, embodimentsof the present invention may take the form of a computer program producton a computer-readable medium having computer-executable program codeembodied in the medium.

Any suitable transitory or non-transitory computer readable medium maybe utilized. The computer readable medium may be, for example but notlimited to, an electronic, magnetic, optical, electromagnetic, infrared,or semiconductor system, apparatus, or device. More specific examples ofthe computer readable medium include, but are not limited to, thefollowing: an electrical connection having one or more wires; a tangiblestorage medium such as a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), a compact discread-only memory (CD-ROM), or other optical or magnetic storage device.

In the context of this document, a computer readable medium may be anymedium that can contain, store, communicate, or transport the programfor use by or in connection with the instruction execution system,apparatus, or device. The computer usable program code may betransmitted using any appropriate medium, including but not limited tothe Internet, wireline, optical fiber cable, radio frequency (RF)signals, or other mediums.

Computer-executable program code for carrying out operations ofembodiments of the present invention may be written in an objectoriented, scripted or unscripted programming language. However, thecomputer program code for carrying out operations of embodiments of thepresent invention may also be written in conventional proceduralprogramming languages, such as the “C” programming language or similarprogramming languages.

Embodiments of the present invention are described above with referenceto flowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products. It will be understood thateach block of the flowchart illustrations and/or block diagrams, and/orcombinations of blocks in the flowchart illustrations and/or blockdiagrams, can be implemented by computer-executable program codeportions. These computer-executable program code portions may beprovided to a processor of a general purpose computer, special purposecomputer, or other programmable data processing apparatus to produce aparticular machine, such that the code portions, which execute via theprocessor of the computer or other programmable data processingapparatus, create mechanisms for implementing the functions/actsspecified in the flowchart and/or block diagram block or blocks.

These computer-executable program code portions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the code portions stored in the computer readablememory produce an article of manufacture including instructionmechanisms which implement the function/act specified in the flowchartand/or block diagram block(s).

The computer-executable program code may also be loaded onto a computeror other programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer-implemented process such that the codeportions which execute on the computer or other programmable apparatusprovide steps for implementing the functions/acts specified in theflowchart and/or block diagram block(s). Alternatively, computer programimplemented steps or acts may be combined with operator or humanimplemented steps or acts in order to carry out an embodiment of theinvention.

As the phrase is used herein, a processor may be “configured to” performa certain function in a variety of ways, including, for example, byhaving one or more general-purpose circuits perform the function byexecuting particular computer-executable program code embodied incomputer-readable medium, and/or by having one or moreapplication-specific circuits perform the function.

Embodiments of the present invention are described above with referenceto flowcharts and/or block diagrams. It will be understood that steps ofthe processes described herein may be performed in orders different thanthose illustrated in the flowcharts. In other words, the processesrepresented by the blocks of a flowchart may, in some embodiments, be inperformed in an order other that the order illustrated, may be combinedor divided, or may be performed simultaneously. It will also beunderstood that the blocks of the block diagrams illustrated, in someembodiments, merely conceptual delineations between systems and one ormore of the systems illustrated by a block in the block diagrams may becombined or share hardware and/or software with another one or more ofthe systems illustrated by a block in the block diagrams. Likewise, adevice, system, apparatus, and/or the like may be made up of one or moredevices, systems, apparatuses, and/or the like. For example, where aprocessor is illustrated or described herein, the processor may be madeup of a plurality of microprocessors or other processing devices whichmay or may not be coupled to one another. Likewise, where a memory isillustrated or described herein, the memory may be made up of aplurality of memory devices which may or may not be coupled to oneanother.

While certain exemplary embodiments have been described and shown in theaccompanying drawings, it is to be understood that such embodiments aremerely illustrative of, and not restrictive on, the broad invention, andthat this invention not be limited to the specific constructions andarrangements shown and described, since various other changes,combinations, omissions, modifications and substitutions, in addition tothose set forth in the above paragraphs, are possible. Those skilled inthe art will appreciate that various adaptations and modifications ofthe just described embodiments can be configured without departing fromthe scope and spirit of the invention. Therefore, it is to be understoodthat, within the scope of the appended claims, the invention may bepracticed other than as specifically described herein.

What is claimed is:
 1. A system for dynamically appending andtransforming static activity data transmitted to a user deviceapplication, wherein the system is configured for dynamic restructuringand inter-connection of inline activity data, in-situ duringfinalization authorization of an electronic activity without requiringinitialization of an additional electronic activity, the systemcomprising: at least one memory device; at least one communicationdevice connected to a distributed network; at least one processingdevice operatively coupled to the at least one memory device; and amodule stored in the at least one memory device comprising executableinstructions that when executed by the at least one processing device,cause the at least one processing device to: determine, based onreceiving a first transmission from a first resource application of afirst networked device, that a first user associated with the firstnetworked device has requested finalization authorization of a firstelectronic activity, wherein the first electronic activity is associatedwith a first resource transfer from a second resource associated with asecond user to a first resource associated with the first user;construct a first static activity data set associated with the firstelectronic activity, wherein the first static activity data setcomprises a plurality of first activity parameter items; transmit thefirst static activity data set to a second resource application of thesecond networked device associated with the second user; present, via asecond user interface of the second resource application, the pluralityof first activity parameter items of the first static activity data seton the second networked device associated with the second user; receive,via the second user interface of the second resource application, afirst user input from the second user for altering a resource magnitudetype activity parameter item of the plurality of first activityparameter items for the first electronic activity; in response to thereceiving the second user input, construct a second static activity dataset associated with altering the resource magnitude type activityparameter item of the plurality of first activity parameter items forthe first electronic activity; transmit the second static activity dataset to the first resource application of the first networked device,wherein the transmission of the second static activity data set isstructured to present the altered resource magnitude type activityparameter item to the first user, via a first user interface of thefirst resource application; alter the first static activity data setbased on receiving an alteration validation of the second staticactivity data set from the first resource application of the firstnetworked device; transmit the altered first static activity data set tothe recipient system, wherein the first static activity data set, whenprocessed, is structured to cause the recipient system to perform thefirst electronic activity based on the altered first static activitydata set; and present, to the first user via the first resourceapplication and to the second user via the second resource application,a notification indicating the completion of the first electronicactivity based on receiving an activity communication from the recipientsystem.
 2. The system of claim 1, wherein altering the first staticactivity data, further comprises: parsing the second static activitydata set associated with altering the resource magnitude type activityparameter item of the plurality of first activity parameter items forthe first electronic activity; and based on determining that the secondactivity data set is associated with an increase in the resourcemagnitude type activity parameter item, automatically transmitting thealteration validation of the second static activity data set.
 3. Thesystem of claim 1, wherein altering the first static activity data set,further comprises: parsing the second static activity data setassociated with altering the resource magnitude type activity parameteritem of the plurality of first activity parameter items for the firstelectronic activity; and based on determining that the second activitydata set is associated with a decrease in the resource magnitude typeactivity parameter item, presenting, via the first user interface of thefirst resource application, a request for the alteration validation ofthe second static activity data set from the first user.
 4. The systemof claim 3, wherein altering the first static activity data set furthercomprises: receiving, via the first user interface of the first resourceapplication, a second user input from the first user for altering thesecond static activity data set, in response to presenting the requestfor the alteration validation of the second static activity data setfrom the first user; in response to the receiving the second user input,constructing a third static activity data set by altering the secondstatic activity data set; transmitting the third static activity dataset to the second resource application of the second networked device,wherein the transmission of the third static activity data set isstructured to present the third static activity data set to the seconduser, via the second user interface of the second resource application;and altering the first static activity data set in response to receivinga confirmation from the second user, via the second user interface ofthe second resource application.
 5. The system of claim 1, whereinconstructing the second static activity data set associated withaltering the resource magnitude type activity parameter item of theplurality of first activity parameter items further comprises: inresponse to the receiving the first user input from the second user,constructing at least one second activity parameter item associated withaltering the resource magnitude type activity parameter item of theplurality of first activity parameter items; constructing the secondstatic activity data set associated with the first electronic activity,wherein the second static activity data set comprises (i) the at leastone second activity parameter item associated with altering the resourcemagnitude type activity parameter item of the plurality of firstactivity parameter items, and (ii) a unique activity identifierparameter item of the plurality of first activity parameter items. 6.The system of claim 5, wherein altering the first static activity dataset further comprises: removing the resource magnitude type activityparameter item of the plurality of first activity parameter items fromthe first activity data set; and appending the at least one secondactivity parameter item at a predetermined location in the plurality offirst activity parameter items of the first activity data set.
 7. Thesystem of claim 5, wherein presenting the altered resource magnitudetype activity parameter item to the first user, via the first userinterface of the first resource application, further comprises: parsingthe second static activity data set to identify the unique activityidentifier parameter item of the plurality of first activity parameteritems; associating the second static activity data set with the firstelectronic activity; presenting, via the first user interface of thefirst resource application, the at least one second activity parameteritem associated with altering the resource magnitude type activityparameter item of the plurality of first activity parameter items to thefirst user; and presenting, via the first user interface of the firstresource application, a request for the alteration validation of thesecond static activity data set from the first user.
 8. The system ofclaim 7: wherein associating the second static activity data set withthe first electronic activity further comprises: retrieving theconstructed first static activity data set associated with the firstelectronic activity, wherein the first static activity data setcomprises the plurality of first activity parameter items comprising theresource magnitude type activity parameter item; and wherein presenting,via the first user interface of the first resource application, the atleast one second activity parameter item further comprises: presentingthe plurality of first activity parameter items comprising the resourcemagnitude type activity parameter item; and overlaying a presentation ofthe at least one second activity parameter item comprising a graphicallink to the presented the resource magnitude type activity parameteritem.
 9. The system of claim 5, wherein altering the first staticactivity data set further comprises: receiving, via the first userinterface of the first resource application, a second user input fromthe first user for altering the at least one second activity parameteritem of the second static activity data set associated with altering theresource magnitude type activity parameter item of the plurality offirst activity parameter items; in response to the receiving the seconduser input from the first user, constructing at least one third activityparameter item associated with the second user input for altering the atleast one second activity parameter item; constructing a third staticactivity data set associated with the first electronic activity, whereinthe second static activity data set comprises (i) the at least one thirdactivity parameter item associated with the second user input foraltering the at least one second activity parameter item, and (ii) theunique activity identifier parameter item of the plurality of firstactivity parameter items; transmitting the third static activity dataset to the second resource application of the second networked device,wherein the transmission of the third static activity data set isstructured to present the at least one third activity parameter item tothe second user, via the second user interface of the second resourceapplication; and altering the first static activity data set in responseto receiving a confirmation from the second user associated with the atleast one third activity parameter item, via the second user interfaceof the second resource application, by: removing the resource magnitudetype activity parameter item of the plurality of first activityparameter items from the first activity data set; and appending the atleast one third activity parameter item at a predetermined location inthe plurality of first activity parameter items of the first activitydata set.
 10. The system of claim 9, wherein the at least one thirdactivity parameter item to the second user, via the second userinterface of the second resource application, further comprises: parsingthe third static activity data set to identify the unique activityidentifier parameter item of the plurality of first activity parameteritems; associating the third static activity data set with the firstelectronic activity; presenting, via the first user interface of thefirst resource application, the at least one second activity parameteritem associated with altering the resource magnitude type activityparameter item of the plurality of first activity parameter items to thefirst user; and presenting, via the first user interface of the firstresource application, a request for the alteration validation of thesecond static activity data set from the first user.
 11. The system ofclaim 1, wherein constructing the first static activity data setassociated with the first electronic activity further comprises: storingthe first static activity data set comprising the plurality of firstactivity parameter items at a first memory device of the first networkeddevice; and generating a first authorization instruction associated withthe first electronic activity for the recipient system, wherein thefirst authorization instruction comprises a processing instruction forthe recipient system to perform the first electronic activity.
 12. Thesystem of claim 11, wherein transmitting the altered first staticactivity data set to the recipient system further comprises: generatinga second authorization instruction for the first electronic activity,wherein the second authorization instruction is structured to modify theprocessing instruction for the recipient system based on the alteredfirst static activity data set; and transmitting the secondauthorization instruction for the first electronic activity to therecipient system, wherein the second authorization instruction, whenprocessed, is structured to cause the recipient system to perform thefirst electronic activity based on the altered first static activitydata set.
 13. The system of claim 1, wherein the plurality of firstactivity parameter items of the first static activity data setassociated with the first electronic activity comprise a first userannotation item, wherein the first user annotation item is input by thefirst user, wherein the first user annotation item is in a naturallanguage format.
 14. The system of claim 1, wherein the second staticactivity data set associated with the first electronic activitycomprises a second user annotation item, wherein the second userannotation item is input by the second user, wherein the second userannotation item is in a natural language format.
 15. A computer programproduct for dynamically appending and transforming static activity datatransmitted to a user device application, whereby the computer programproduct is configured for dynamic restructuring and inter-connection ofinline activity data, in-situ during finalization authorization of anelectronic activity without requiring initialization of an additionalelectronic activity, the computer program product comprising anon-transitory computer-readable storage medium havingcomputer-executable instructions to: determine, based on receiving afirst transmission from a first resource application of a firstnetworked device, that a first user associated with the first networkeddevice has requested finalization authorization of a first electronicactivity, wherein the first electronic activity is associated with afirst resource transfer from a second resource associated with a seconduser to a first resource associated with the first user; construct afirst static activity data set associated with the first electronicactivity, wherein the first static activity data set comprises aplurality of first activity parameter items; transmit the first staticactivity data set to a second resource application of the secondnetworked device associated with the second user; present, via a seconduser interface of the second resource application, the plurality offirst activity parameter items of the first static activity data set onthe second networked device associated with the second user; receive,via the second user interface of the second resource application, afirst user input from the second user for altering a resource magnitudetype activity parameter item of the plurality of first activityparameter items for the first electronic activity; in response to thereceiving the second user input, construct a second static activity dataset associated with altering the resource magnitude type activityparameter item of the plurality of first activity parameter items forthe first electronic activity; transmit the second static activity dataset to the first resource application of the first networked device,wherein the transmission of the second static activity data set isstructured to present the altered resource magnitude type activityparameter item to the first user, via a first user interface of thefirst resource application; alter the first static activity data setbased on receiving an alteration validation of the second staticactivity data set from the first resource application of the firstnetworked device; transmit the altered first static activity data set tothe recipient system, wherein the first static activity data set, whenprocessed, is structured to cause the recipient system to perform thefirst electronic activity based on the altered first static activitydata set; and present, to the first user via the first resourceapplication and to the second user via the second resource application,a notification indicating the completion of the first electronicactivity based on receiving an activity communication from the recipientsystem.
 16. The computer program product of claim 15, wherein alteringthe first static activity data, further comprises: parsing the secondstatic activity data set associated with altering the resource magnitudetype activity parameter item of the plurality of first activityparameter items for the first electronic activity; and based ondetermining that the second activity data set is associated with anincrease in the resource magnitude type activity parameter item,automatically transmitting the alteration validation of the secondstatic activity data set.
 17. The computer program product of claim 15,wherein altering the first static activity data set, further comprises:parsing the second static activity data set associated with altering theresource magnitude type activity parameter item of the plurality offirst activity parameter items for the first electronic activity; andbased on determining that the second activity data set is associatedwith a decrease in the resource magnitude type activity parameter item,presenting, via the first user interface of the first resourceapplication, a request for the alteration validation of the secondstatic activity data set from the first user.
 18. A computerized methodfor dynamically appending and transforming static activity datatransmitted to a user device application, wherein the computerizedmethod is configured for dynamic restructuring and inter-connection ofinline activity data, in-situ during finalization authorization of anelectronic activity without requiring initialization of an additionalelectronic activity, the computerized method comprising a non-transitorycomputer-readable storage medium having computer-executable instructionsto: determining, based on receiving a first transmission from a firstresource application of a first networked device, that a first userassociated with the first networked device has requested finalizationauthorization of a first electronic activity, wherein the firstelectronic activity is associated with a first resource transfer from asecond resource associated with a second user to a first resourceassociated with the first user; constructing a first static activitydata set associated with the first electronic activity, wherein thefirst static activity data set comprises a plurality of first activityparameter items; transmitting the first static activity data set to asecond resource application of the second networked device associatedwith the second user; presenting, via a second user interface of thesecond resource application, the plurality of first activity parameteritems of the first static activity data set on the second networkeddevice associated with the second user; receiving, via the second userinterface of the second resource application, a first user input fromthe second user for altering a resource magnitude type activityparameter item of the plurality of first activity parameter items forthe first electronic activity; in response to the receiving the seconduser input, constructing a second static activity data set associatedwith altering the resource magnitude type activity parameter item of theplurality of first activity parameter items for the first electronicactivity; transmitting the second static activity data set to the firstresource application of the first networked device, wherein thetransmission of the second static activity data set is structured topresent the altered resource magnitude type activity parameter item tothe first user, via a first user interface of the first resourceapplication; altering the first static activity data set based onreceiving an alteration validation of the second static activity dataset from the first resource application of the first networked device;transmitting the altered first static activity data set to the recipientsystem, wherein the first static activity data set, when processed, isstructured to cause the recipient system to perform the first electronicactivity based on the altered first static activity data set; andpresenting, to the first user via the first resource application and tothe second user via the second resource application, a notificationindicating the completion of the first electronic activity based onreceiving an activity communication from the recipient system.
 19. Thecomputerized method of claim 18, wherein altering the first staticactivity data, further comprises: parsing the second static activitydata set associated with altering the resource magnitude type activityparameter item of the plurality of first activity parameter items forthe first electronic activity; and based on determining that the secondactivity data set is associated with an increase in the resourcemagnitude type activity parameter item, automatically transmitting thealteration validation of the second static activity data set.
 20. Thecomputerized method of claim 18, wherein altering the first staticactivity data set, further comprises: parsing the second static activitydata set associated with altering the resource magnitude type activityparameter item of the plurality of first activity parameter items forthe first electronic activity; and based on determining that the secondactivity data set is associated with a decrease in the resourcemagnitude type activity parameter item, presenting, via the first userinterface of the first resource application, a request for thealteration validation of the second static activity data set from thefirst user.