Coordination platform for generating and managing authority tokens

ABSTRACT

Aspects of the disclosure relate to using secure authentication tokens to grant power of attorney. A computing platform may receive user input indicating a task and requesting that a power of attorney be granted to an individual. The computing platform may generate an authority token granting the individual the power of attorney to perform the task, and may send the authority token, along with task information indicating the task, to the individual. The computing platform may receive a validation request including the authority token and the task information. Based on successful validation, the computing platform may send validation information to an event processing system. After receiving confirmation that the task has been performed by the individual, the computing platform may update dashboard information to indicate that the task has been completed, which may cause the user device to display a dashboard indicating completion of the task.

BACKGROUND

Aspects of the disclosure relate to data processing systems, informationsecurity, and electronic event processing. In particular, one or moreaspects of the disclosure relate to computing platforms that implementtoken generation and validation methods in coordinating, delegating, andgranting authority, as well as verifying such grants of authority.

In some cases, an individual may be indisposed or otherwise unavailableto perform a task that requires in person performance by the individualor another individual granted power of attorney, and may grant the powerof attorney to the other individual accordingly. In some instances,however, such grant of power of attorney may raise various securityconcerns, including information security concerns, because the grant ofpower of attorney may be misused to perform tasks beyond the scope ofthe granted authority and/or used by a bad actor impersonating the truerecipient of the power of attorney. Accordingly, these security concernsmay limit willingness to grant power of attorney from a remote orotherwise different location than a law office, an enterpriseorganization at which the task may be performed (e.g., a financialinstitution, medical facility, utility company, or the like), or thelike. This sparse grant of power of attorney may result in technicalinefficiencies such as an inability to perform tasks, process and/orexecute various events, or the like until an individual is able tophysically return to the enterprise organization. Furthermore, thesesecurity concerns may limit transfer of power of attorney in anelectronic manner.

SUMMARY

Aspects of the disclosure provide effective, efficient, scalable, andconvenient technical solutions that address and overcome the technicalproblems associated with granting and validating authority tokens, suchas power of attorney tokens. For example, some aspects of the disclosureprovide techniques that may enable computing devices to identify a powerof attorney recipient, generate an authority token granting a limitedpower of attorney to that recipient, and subsequently validate theauthority token. In some instances, this authority token may beencrypted and/or may be validated using biometric data. In doing so,various technical advantages may be realized. For example, one technicaladvantage is increased security of electronic transfer of power ofattorney (e.g., by encrypting the token for decryption exclusively by anevent processing system configured to perform a specific taskcorresponding to the power of attorney). Another technical advantage isimproved power of attorney validation by implementing multi-layervalidation that includes validating the authority token (e.g., based onsuccessful decryption), validating task information (e.g., ensuring thattasks performed are limited to those for which power of attorney hasbeen granted), and/or validating identity (e.g., using biometrics toverify that the individual attempting to perform the task is the truerecipient of the authority token). Accordingly, these advantages mayresult in increased enterprise efficiencies (e.g., task performance,event processing, or the like) and/or increased security of electronicpower of attorney grants and utilization.

In accordance with one or more embodiments of the disclosure, acomputing platform comprising at least one processor, a communicationinterface, and memory storing computer-readable instructions mayreceive, from a user device corresponding to a first individual, contactinformation for a second individual. The computing platform may storethe contact information in a user profile corresponding to the secondindividual. The computing platform may receive user input indicating atask to be performed and requesting that a power of attorney be grantedto the second individual, where the task is required to be performed inperson by one of: the first individual or an individual who has beengranted power of attorney by the first individual. The computingplatform may generate an authority token granting the second individualthe power of attorney for the first individual to perform the task.Using the contact information, the computing platform may send theauthority token and task information indicating the task to a userdevice corresponding to the second individual. After sending theauthority token and the task information indicating the task to the userdevice corresponding to the second individual, the computing platformmay receive, from an event processing system, a validation requestcomprising the authority token and the task information indicating thetask. The computing platform may validate the authority token and thetask information indicating the task. Based on successful validation ofthe authority token and the task information indicating the task, thecomputing platform may send authority validation information to theevent processing system. The computing platform may receive confirmationinformation from the user device corresponding to the second individualindicating that the task has been completed. After receivingconfirmation that the task has been performed by the second individual,the computing platform may update client dashboard information toindicate that the task has been completed, which may cause the userdevice to display a client dashboard indicating that the task has beencompleted.

In one or more instances, the first individual may be located in a firststate, and the task may be limited to performance in a second state. Inone or more instances, the task may be performed at a first enterpriseorganization, and the authority token may be formatted for useexclusively by the first enterprise organization.

In one or more instances, the computing platform may generate theauthority token by: 1) sending, to the user device corresponding to thesecond individual, a request to input biometric data, 2) receivingbiometric information corresponding to the second individual, and 3)generating, based at least in part on the biometric information, theauthority token.

In one or more instances, the computing platform may send, to the userdevice corresponding to the second individual, a request to display anindication of the task and prompt for acceptance of the task. Thecomputing platform may receive, from the user device corresponding tothe second individual, task acceptance information indicating that thesecond individual will perform the task. In these instances, thecomputing platform may generate the authority token based on receipt ofthe task acceptance information.

In one or more instances, the request to input the biometric data may besent along with the request to display the indication of the task andthe biometric data may be received along with the task acceptanceinformation. In one or more instances, the request to input thebiometric data may be sent along with the authority token.

In one or more instances, the computing platform may receive additionalbiometric data from the user device corresponding to the secondindividual. By comparing the additional biometric data to the biometricdata, the computing platform may identify a biometric match for thesecond individual. Based on identifying the biometric match for thesecond individual, the computing platform may send biometric validationinformation to the event processing system.

In one or more instances, sending the authority validation informationand the biometric validation information to the event processing systemmay cause the event processing system to perform one or more actionscorresponding to the task. In one or more instances, the clientdashboard may include a status of one or more tasks including the task,where each of the one or more tasks are performed by one or moreindividuals including the second individual.

These features, along with many others, are discussed in greater detailbelow.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of example and not limitedin the accompanying figures in which like reference numerals indicatesimilar elements and in which:

FIGS. 1A-1B depict an illustrative computing environment forimplementing techniques for generation and validation of a power ofattorney token in accordance with one or more example embodiments;

FIGS. 2A-2J depict an illustrative event sequence for implementingtechniques for generation and validation of a power of attorney token inaccordance with one or more example embodiments;

FIG. 3 depicts an illustrative method for implementing techniques forgeneration and validation of a power of attorney token in accordancewith one or more example embodiments; and

FIGS. 4-8 depict illustrative graphical user interfaces for implementingtechniques for generation and validation of a power of attorney token inaccordance with one or more example embodiments.

DETAILED DESCRIPTION

In the following description of various illustrative embodiments,reference is made to the accompanying drawings, which form a parthereof, and in which is shown, by way of illustration, variousembodiments in which aspects of the disclosure may be practiced. In someinstances, other embodiments may be utilized, and structural andfunctional modifications may be made, without departing from the scopeof the present disclosure.

It is noted that various connections between elements are discussed inthe following description. It is noted that these connections aregeneral and, unless specified otherwise, may be direct or indirect,wired or wireless, and that the specification is not intended to belimiting in this respect.

As a brief introduction to the concepts described further herein, one ormore aspects of the disclosure describe a secure vault that provides acentralized place where authority tokens may be stored. The authoritytokens may, for instances, may provide consent by a first individual toone or more other individuals to handle actions on the firstindividual's behalf. The secure vault may operate as a certificateauthority and may provide an individual with a single place to create,manage, and/or revoke authority delegations. For example, if anindividual is using DNA identification or other multi-factorauthentication to conduct business, but is indisposed, he or she may beable to delegate authority to a family member (e.g., to give power ofattorney) to handle matters on the disposed individuals behalf. Aspectsof the disclosure may be applied in use cases involving finance, naturaldisasters, emergences, medical events, life events, and/or otherinstances.

Accordingly, by performing one or more of the methods described herein,power of attorney may be granted in a remote and secure manner and maybe verified using multi-factor authentication. This may allow forindisposed or otherwise unavailable individuals to perform tasks thatmay require in person performance (e.g., by the individuals or onegranted a power of attorney) while minimizing security risks. Forexample, a secure token may be created in the secure vault and rightsassociated with the token may be granted from one user to another as arepresentation of the power of attorney. This secure token may bevalidated along with an indication of the task to be performed (e.g., aholder of the token is limited to perform a particular task), biometricinformation (e.g., to further verify the identity of the holder of thepower of attorney), or the like. Furthermore, in some instances, thetime limited nature of the secure token may contribute to increasedsecurity.

FIGS. 1A-1B depict an illustrative computing environment that implementsgeneration and validation of a power of attorney token in accordancewith one or more example embodiments. Referring to FIG. 1A, computingenvironment 100 may include one or more computer systems. For example,computing environment 100 may include an authority coordination platform102, an initiating user device 103, recipient user device 104, and eventprocessing system 105.

As described further below, authority coordination platform 102 may be acomputer system that includes one or more computing devices (e.g.,servers, server blades, or the like) and/or other computer components(e.g., processors, memories, communication interfaces) that may be usedto generate, manage, and otherwise validate power of attorney (POA)tokens. In some instances, the authority coordination platform 102 maybe configured to maintain a database of user profiles that may includecontact information for one or more POA recipients. In some instances,the authority coordination platform 102 may host client dashboardinterface information indicative of one or more tasks for which POAtokens are active or otherwise scheduled for generation, an individualresponsible for the tasks, a task status, or the like.

Initiating user device 103 may be a mobile device, tablet, smartphone,desktop computer, laptop computer, or the like, that may be used by anindividual to request POA token generation. For example, the initiatinguser device 103 may be operated by an individual who is indisposed orotherwise unable to complete a task that requires in person performanceby the individual or another individual who has been granted power ofattorney. In some instances, the initiating user device 103 may beconfigured to display a client dashboard interface that includes one ormore tasks, task owners (e.g., individuals granted POA to perform thetasks), task statuses, or the like.

Recipient user device 104 may be a mobile device, tablet, smartphone,desktop computer, laptop computer, enhanced reality device (e.g.,headset, glasses, or the like), or the like, that may be used by anindividual who has been granted POA to perform a task for the user ofthe initiating user device 103. In some instances, the recipient userdevice 104 may be configured to receive and store a POA token. In someinstances, the recipient user device 104 may be configured with a cameraand/or one or more biometric sensors that may be used to collectbiometric data corresponding to the user of the recipient user device104.

Event processing system 105 may be a server, server blade, or the likeconfigured to perform one or more enterprise activities (e.g., financialtransactions, utility management, or the like) that may require use of aPOA. In some instances, event processing system 105 may be configured toperform a task for which a user of the recipient user device 104 hasbeen granted POA by the user of the initiating user device 103.

Computing environment 100 also may include one or more networks, whichmay interconnect authority coordination platform 102, initiating userdevice 103, recipient user device 104, event processing system 105, orthe like. For example, computing environment 100 may include a network101 (which may interconnect, e.g., authority coordination platform 102,initiating user device 103, recipient user device 104, event processingsystem 105, or the like).

In one or more arrangements, authority coordination platform 102,initiating user device 103, recipient user device 104, and/or eventprocessing system 105 may be any type of computing device capable ofsending and/or receiving requests and processing the requestsaccordingly. For example, authority coordination platform 102,initiating user device 103, recipient user device 104, event processingsystem 105, and/or the other systems included in computing environment100 may, in some instances, be and/or include server computers, desktopcomputers, laptop computers, tablet computers, smart phones, or the likethat may include one or more processors, memories, communicationinterfaces, storage devices, and/or other components. As noted above,and as illustrated in greater detail below, any and/or all of authoritycoordination platform 102, initiating user device 103, recipient userdevice 104, and/or event processing system 105 may, in some instances,be special-purpose computing devices configured to perform specificfunctions.

Referring to FIG. 1B, authority coordination platform 102 may includeone or more processors 111, memory 112, and communication interface 113.A data bus may interconnect processor 111, memory 112, and communicationinterface 113. Communication interface 113 may be a network interfaceconfigured to support communication between authority coordinationplatform 102 and one or more networks (e.g., network 101, or the like).Memory 112 may include one or more program modules having instructionsthat when executed by processor 111 cause authority coordinationplatform 102 to perform one or more functions described herein and/orone or more databases that may store and/or otherwise maintaininformation which may be used by such program modules and/or processor111. In some instances, the one or more program modules and/or databasesmay be stored by and/or maintained in different memory units ofauthority coordination platform 102 and/or by different computingdevices that may form and/or otherwise make up authority coordinationplatform 102. For example, memory 112 may have, host, store, and/orinclude authority coordination module 112 a, authority coordinationdatabase 112 b, and a machine learning engine 112 c.

Authority coordination module 112 a may have instructions that directand/or cause authority coordination platform 102 to execute advancedgeneration, encryption, and validation techniques related to POA tokens,as discussed in greater detail below. Authority coordination database112 b may store information used by authority coordination module 112 aand/or authority coordination platform 102 in application of advancedgeneration, encryption, and validation techniques related to POA tokens,and/or in performing other functions. Machine learning engine 112 c mayhave instructions that direct and/or cause the authority coordinationplatform 102 to set, define, and/or iteratively refine optimizationrules and/or other parameters used by the authority coordinationplatform 102 and/or other systems in computing environment 100.

FIGS. 2A-2J depict an illustrative event sequence that implementsgeneration and validation of a power of attorney token in accordancewith one or more example embodiments. Referring to FIG. 2A, at step 201,the initiating user device 103 may receive contact information. Forexample, the initiating user device 103 may receive information for oneor more individuals who may be granted POA by a user of the initiatinguser device 103. In some instances, in receiving the contactinformation, the initiating user device 103 may receive phone numbers,email addresses, physical addresses, social media account information,or the like. In some instances, the initiating user device 103 mayreceive contact information prior to receiving a request to grant POA toa particular individual. For example, the initiating user device 103 maycompile a list of one or more individuals who may be granted POA at afuture time. In doing so, the initiating user device 103 may expeditethe process of granting the POA once requested.

At step 202, the initiating user device 103 may establish a connectionwith the authority coordination platform 102. For example, theinitiating user device 103 may establish a first wireless dataconnection with the authority coordination platform 102 to link theinitiating user device 103 to the authority coordination platform 102(e.g., in preparation for sending the contact information). In someinstances, the initiating user device 103 may determine whether or not aconnection is already established with the authority coordinationplatform 102. If a connection is already established with the authoritycoordination platform 102, the initiating user device 103 might notre-establish the connection. If a connection is not already establishedwith the authority coordination platform 102, the initiating user device103 may establish the first wireless data connection as describedherein.

At step 203, the initiating user device 103 may send the contactinformation received at step 201. In some instances, the initiating userdevice 103 may send the contact information to the authoritycoordination platform 102 while the first wireless data connection isestablished.

At step 204, the authority coordination platform 102 may receive thecontact information sent at step 203. In some instances, the authoritycoordination platform 102 may receive the contact information via thecommunication interface 113 and while the first wireless data connectionis established.

At step 205, the authority coordination platform 102 may store one ormore contact profiles based on the contact information received at step204. For example, the authority coordination platform 102 may storeinformation for an initiating user account (e.g., corresponding to theuser of initiating user device 103 who may want to grant POA to otherindividuals). For each initiating user account, the authoritycoordination platform 102 may store one or more contact profiles (e.g.,corresponding to the other individuals who may be granted POA by theuser of the initiating user device 103). In storing the one or morecontact profiles, the authority coordination platform 102 may storephone numbers, email addresses, social media account information,physical addresses, or the like corresponding to these other individualswho may be granted POA in the future. In doing so, the authoritycoordination platform 102 may store individual identities and theircontact information in advance of a POA request from the initiating userdevice 103, and may expedite the process of notifying these individualsof the POA request and/or granting the POA accordingly. In someinstances, the individuals may provide consent or otherwise authorizethe authority coordination platform 102 to include them in the contactprofiles.

Referring to FIG. 2B, at step 206, the initiating user device 103 mayreceive task information. For example, the initiating user device 103may receive a user input indicating a task to be performed. In someinstances, the initiating user device 103 may receive user inputindicating a task to be performed where the task must be performed inperson by the user of the initiating user device 103 (e.g., a firstindividual) or another individual who has been granted power of attorneyby the first individual (e.g., a second individual). In these instances,the first individual may be located in a first state, and the secondindividual may be located in a second state. Additionally oralternatively, the first individual may be unable to perform the task(e.g., he or she may be indisposed, incarcerated, or otherwiseunavailable), and the second individual may be able to perform the task.For example, the initiating user device 103 may receive task informationrequesting that POA be granted to perform a task such as: operation of asafety deposit box (e.g., accessing and/or conducting transactionsinvolving such a box, opening and/or closing such a box, or the like),operation of utilities (e.g., turning on and/or turning off electricity,water, heat, cable, and/or other utility services), authorizing and/ormaking medical decisions, authorizing and/or making financial decisions,and/or conducting other tasks. In some instances, along with the taskinformation, the initiating user device 103 may receive a request togrant POA to perform that task (e.g., a specific POA directed to theindicated task). Additionally or alternatively, the initiating userdevice 103 may receive a request to grant a durable POA, general POA, orthe like. In some instances, the initiating user device 103 may receiveuser input indicating an individual (e.g., the second individual) towhom POA should be granted (who may e.g., be specified in the userprofiles stored at step 205). In other instances, the initiating userdevice 103 might not receive user input indicating a specific individualto whom POA should be granted.

At step 207, the initiating user device 103 may send the taskinformation, received at step 206, to the authority coordinationplatform 102. In some instances, the initiating user device 103 may sendthe task information while the first wireless data connection isestablished. In some instances, the initiating user device 103 may send,along with or included in the task information, an indication of anindividual to whom POA should be granted and/or a request to grant thePOA.

At step 208, the authority coordination platform 102 may receive thetask information sent at step 207. In some instances, the authoritycoordination platform 102 may receive the task information via thecommunication interface 113 and while the first wireless data connectionis established.

At step 209, the authority coordination platform 102 may generate clientdashboard information using the task information. For example, theauthority coordination platform 102 may generate information that may beused (e.g., by the initiating user device 103) to generate a dashboardor task list similar to graphical user interface 405, which is shown inFIG. 4. For example, the authority coordination platform 102 maygenerate information corresponding to tasks to be performed, individualsgranted POA to perform the tasks, a status of the tasks, or the like. Inthe example illustrated in FIG. 4, it is assumed that the taskinformation received at step 208 requested that a safety deposit box beclosed, and that a request to grant POA to turn off power was previouslyreceived and is in progress by “Individual #3.” For example, asillustrated in FIG. 4, the authority coordination platform 102 maymanage multiple tasks simultaneously for the first individual user,which may each be performed by different POA recipients.

At step 210, the authority coordination platform 102 may identify arecipient device using the contact profiles stored at step 205. Forexample, the authority coordination platform 102 may have received anidentity (e.g., a name, or the like) for an individual to be granted POAto perform the task. In this example, the authority coordinationplatform 102 may index the name within the contact profiles to identifycontact information for the individual (e.g., the second individual)such as a phone number of the recipient user device 104.

In some instances, the authority coordination platform 102 might notreceive an identity for an individual to be granted POA, and may insteadapply one or more machine learning algorithms and/or datasets toidentify the second individual. For example, in some instances, theauthority coordination platform 102 may maintain historical dataregarding tasks performed by the second individual, an acceptance ratefor the second individual (e.g., how often does the second individualaccept tasks), whether or not the second individual was successful inperforming these tasks, or the like. In these instances, the authoritycoordination platform 102 may select an individual (e.g., the secondindividual) who is most likely to succeed at performing the task. Insome instances, the authority coordination platform 102 may generate aPOA score for each additional individual that has a contact profile(e.g., based on the historical data) and may use the POA score to selectthe second individual. For example, the authority coordination platform102 may generate a ranked list of individuals based on the POA scores,and may select the individual with the highest score.

In some instances, the authority coordination platform 102 may receivean identity for an individual to be granted POA, but may use a machinelearning process as described above to identify a different and/orrecommended individual to be granted POA. In these instances, theauthority coordination platform 102 may send a message, notification, orthe like to the initiating user device 103 recommending the recommendedindividual, and prompting a user of the initiating user device 103(e.g., the first user) to select between the initial individual and therecommended individual.

Referring to FIG. 2C, at step 211, the authority coordination platform102 may establish a connection with recipient user device 104. Forexample, the authority coordination platform 102 may establish a secondwireless data connection with the recipient user device 104 to link theauthority coordination platform 102 to the recipient user device 104(e.g., in preparation for sending the task information). In someinstances, the authority coordination platform 102 may identify whetheror not a connection is already established with the recipient userdevice 104. If a connection is already established with the recipientuser device 104, the authority coordination platform 102 might notre-establish the connection. If a connection is not yet established withthe recipient user device 104, the authority coordination platform 102may establish the second wireless data connection as described herein.

At step 212, the authority coordination platform 102 may send taskinterface information to the recipient user device 104. For example, theauthority coordination platform 102 may send the task interfaceinformation to the recipient user device 104 via the communicationinterface and while the second wireless data connection is established.In some instances, along with the task interface information, theauthority coordination platform 102 may send a request or one or morecommands to prompt for a task acceptance input. In some instances, theauthority coordination platform 102 may send, along with the taskinterface information, a request to input biometric data (e.g., afingerprint, facial image data, retinal image data, or the like).

At step 213, the recipient user device 104 may receive the taskinterface information sent at step 212. In some instances, the recipientuser device 104 may receive the task interface information while thesecond wireless data connection is established. In some instances, therecipient user device 104 may receive the request or one or morecommands to prompt for the task acceptance input and/or the request toinput biometric data.

At step 214, the recipient user device 104 may generate and display atask interface, and may receive a task acceptance input at the taskinterface. For example, the recipient user device 104 may use the taskinterface information received at step 213 to generate a graphical userinterface similar to graphical user interface 505, which is shown inFIG. 5. For example, the recipient user device 104 may indicate the taskand request whether or not the second individual is willing to completethe task. In some instances, the recipient user device 104 may receive auser input indicating that the second individual is willing to completethe task. In other instances, the recipient user device 104 may receivea user input indicating that the second individual is not willing tocomplete the task. In some instances, the recipient user device 104 maydisplay the task interface based on the request or one or more commandsto prompt for the task acceptance input. In some instances, therecipient user device 104 may also display a prompt for biometric dataand may collect biometric data accordingly using the prompt.

At step 215, the recipient user device 104 may send task acceptanceinformation (e.g., indicating whether or not the second individualaccepted the task) to the authority coordination platform 102. In someinstances, the recipient user device 104 may send the task acceptanceinformation to the authority coordination platform 102 while the secondwireless data connection is established. In some instances, therecipient user device 104 may send biometric data, collected at step214, to the authority coordination platform 102 along with the taskacceptance information.

At step 216, the authority coordination platform 102 may receive thetask acceptance information sent at step 215. For example, the authoritycoordination platform 102 may receive the task acceptance informationvia the communication interface 113 and while the second wireless dataconnection is established. If the authority coordination platform 102receives task acceptance information indicating that the secondindividual has accepted the task, the authority coordination platform102 may proceed to step 217. If the authority coordination platform 102receives task acceptance information indicating that the secondindividual has not accepted the task, the authority coordinationplatform 102 may return to step 210 to identify an alternativeindividual.

Referring to FIG. 2D, at step 217, the authority coordination platform102 may generate an authority token granting POA to the secondindividual. In some instances, the authority coordination platform 102may include biometric information. For example, in some instances, therecipient user device 104 may prompt the second individual to inputbiometric information (e.g., fingerprint, facial scan, retinal scan,photograph, or the like), and may send the biometric information to theauthority coordination platform 102 along with the task acceptanceinformation. In these instances, the authority coordination platform 102may embed the biometric information into the authority token.

In some instances, the authority coordination platform 102 may encryptthe authority token using a symmetric key, public key, and/or publicprivate key exchange with the event processing system 105 (e.g., thesystem configured to perform the task). In doing so, the authoritycoordination platform 102 may secure the authority token from access byan alternative system.

In some instances, the authority coordination platform 102 may formatthe authority token for use by the event processing system 105. Forexample, an event processing system maintained by a first enterpriseorganization may process authority tokens in a different format than anevent processing system maintained by a second enterprise organization.Accordingly, the authority coordination platform 102 may format theauthority token using parameters for the event processing system 105.This may further enhance security as other unintended systems may beunable to process the authority token even if it is decrypted.

In some instances, in generating the authority token, the authoritycoordination platform 102 may encode a time limitation into theauthority token. In doing so, the authority coordination platform 102may cause the authority token to expire if the task corresponding to thetoken is not performed within a predetermined period of time.

In some instances, in generating the authority token, the authoritycoordination platform 102 may generation token validation informationthat may be used to validate the authority token in the future. In theseinstances, the authority coordination platform 102 may store the tokenvalidation information.

In some instances, in generating the authority token, the authoritycoordination platform 102 may request a signature from the firstindividual granting the POA, and may cause the initiating user device103 to display a written POA for signature. In these instances, the POAmay be vetted in advance by an attorney licensed to practice in thestate in which the POA is being signed, where the POA will be used(e.g., by the second individual), or the like.

At step 218, the authority coordination platform 102 may send theauthority token, generated at step 217, to the recipient user device104. In some instances, the authority coordination platform 102 may sendthe authority token to the recipient user device 104 via thecommunication interface 113 and while the second wireless dataconnection is established. In some instances, the authority coordinationplatform 102 may send, along with the authority token, one or morecommands directing the recipient user device 104 to prompt for biometricdata.

At step 219, the recipient user device 104 may receive the authoritytoken sent at step 218. In some instances, the recipient user device 104may receive the authority token while the second wireless dataconnection is established. In some instances, the recipient user device104 may receive the one or more commands directing the recipient userdevice 104 to prompt for biometric data. In some instances, in receivingthe authority token, the recipient user device 104 may receive a timelimited token that may expire if the task is not performed within apredetermined period of time (e.g., a day, a week, a month, or thelike). For example, the second individual might not be granted power ofattorney indefinitely.

At step 220, the recipient user device 104 may capture a biometricinput. In some instances, if the recipient user device 104 previouslycaptured biometric information (e.g., at step 214), the recipient userdevice 104 might not re-capture the biometric information. If therecipient user device 104 did not previously capture biometricinformation however, the recipient user device 104 may generate agraphical user interface similar to graphical user interface 705, whichis illustrated in FIG. 7. For example, the recipient user device 104 maycapture fingerprint data, retinal data, image data, or the like that maybe used to verify an identity of the second individual.

At step 221, the recipient user device 104 may send biometric data(e.g., based on the input received at step 220) to the authoritycoordination platform 102. For example, the recipient user device 104may send the biometric data to the authority coordination platform 102while the second wireless data connection is established.

At step 222, the authority coordination platform 102 may receive andstore the biometric data sent at step 221. In some instances, theauthority coordination platform 102 may receive the biometric data viathe communication interface and while the second wireless dataconnection is established. In some instances, the authority coordinationplatform 102 may store the biometric data along with the tokenvalidation information (e.g., in preparation for validating an identityof the second individual in the future).

Referring to FIG. 2E, at step 223, the recipient user device 104 mayreceive a task performance input. For example, the recipient user device104 may receive a user input attempting to perform the task. Incontinuing with the illustrative example described above, the recipientuser device 104 may receive a user input attempting to close a safetydeposit box. In some instances, the second individual may be located ata physical location of the safety deposit box and/or interacting with anemployee of an enterprise organization that is managing the safetydeposit box when the recipient user device 104 receives the taskperformance input. For example, the recipient user device 104 mayreceive a user input that causes the recipient user device 104 togenerate a matrix barcode, such as a quick response (QR) code, that maybe scanned or otherwise verified (e.g., as a print out, on a display ofthe recipient user device 104, sent electronically, or the like by theevent processing system 105 and/or by an employee of an enterpriseorganization that maintains the event processing system 105).Additionally or alternatively the recipient user device 104 may receivea user input that causes the recipient user device 104 to otherwisecommunicate the authority token to the event processing system 105.

At step 224, the recipient user device 104 may establish a connectionwith the event processing system 105. For example, the recipient userdevice 104 may establish a third wireless data connection with the eventprocessing system 105 to link the recipient user device 104 to the eventprocessing system 105 (e.g., in preparation for sending a taskperformance request and/or otherwise communicating the authority token).In some instances, the recipient user device 104 may identify whether ornot a connection is already established with the event processing system105. If a connection is already established with the event processingsystem 105, the recipient user device 104 might not re-establish theconnection. If a connection is not yet established with the eventprocessing system 105, the recipient user device 104 may establish thethird wireless data connection as described herein.

At step 225, the recipient user device 104 may send a performancerequest to the event processing system 105 requesting that the task beperformed. In some instances, the recipient user device 104 may send,along with the performance request, information about the task to beperformed, the authority token, and/or the biometric data. In someinstances, the recipient user device 104 may send the performancerequest to the event processing system 105 while the third wireless dataconnection is established.

At step 226, the event processing system 105 may receive the performancerequest sent at step 225. For example, the event processing system 105may receive the performance request while the third wireless dataconnection is established. In some instances, in communicating andreceiving the performance request at steps 225 and 226, the eventprocessing system 105 may scan or otherwise capture a matrix barcodefrom the recipient user device 104 (e.g., displayed at the recipientuser device 104).

At step 227, the event processing system 105 may validate the authoritytoken. For example, the event processing system 105 may identify whetheror not the authority token may be correctly decrypted by the eventprocessing system 105 based on the encryption techniques applied at theauthority coordination platform 102. For example, the event processingsystem 105 may share one or more public, private, or public-private keypairs with the authority coordination platform 102, and may apply thekey to the authority token for decryption. In some instances, if theevent processing system 105 successfully decrypts the authority token,the event processing system 105 may determine that the authority tokenis valid. In other instances, the event processing system 105 mayrequest or otherwise access additional verification information for theauthority token, which may in some instances be stored at the authoritycoordination platform 102 (e.g., the token validation information storedat step 217). For example, the event processing system 105 maycommunicate with the authority coordination platform 102 to requestvalidation of the authority token (e.g., by comparing the authoritytoken to the token validation information). In this example, theauthority token may be validated by the authority coordination platform102, and the authority coordination platform 102 may send an authorityvalidation message to the event processing system 105 indicating thatthe authority token is valid. In validating the authority token, theevent processing system 105 may determine that the second individual hasPOA to perform a specific task (e.g., the task). If the event processingsystem 105 determines that the authority token is valid the eventprocessing system 105 may proceed to step 228. If the event processingsystem 105 determines that the authority token is not valid, the eventprocessing system 105 may proceed to step 229.

Referring to FIG. 2F, at step 228, the event processing system 105 mayvalidate the information about the task to be performed. For example,the event processing system 105 may validate whether or not the secondindividual (who has been granted POA) has POA to perform the specifictask that he or she is requesting (e.g., although the second individualmay have POA to close the safety deposit box, he or she might not havePOA to turn off the power or other utility service). In some instances,the event processing system 105 may validate this task information bycomparing the information about the task to be performed to taskinformation included in the decrypted authority token. If theinformation matches, the event processing system 105 may determine thatthe task should be performed, and may proceed to step 233. If theinformation does not match the event processing system 105 may determinethat the task should not be performed, and may proceed to step 229.

In some instances, the event processing system 105 may validate theinformation about the task to be performed by communicating with theauthority coordination platform 102 to request validation (e.g., bycomparing the information to task information previously received/storedat the authority coordination platform 102). In these instances, theinformation about the task to be performed may be validated by theauthority coordination platform 102. In some instances, the authoritycoordination platform 102 may receive the information about the task tobe performed along with the authority token, validate both the task andthe authority token, and send a single authority validation message tothe event processing system 105 indicating whether or not validation wassuccessful.

At step 229, the event processing system 105 may generate and send anerror message to the recipient user device 104, the initiating userdevice 103, and/or the authority coordination platform 102 indicatingthat the task was not executed or otherwise performed by the eventprocessing system 105. At step 230, the authority coordination platform102, initiating user device 103, and/or recipient user device 104 mayreceive the error message sent from the event processing system 105.

At step 231, the initiating user device 103 and/or the recipient userdevice 104 may display the error message received at step 230. Forexample, in displaying the error message, the initiating user device 103may display a graphical user interface similar to graphical userinterface 605, which is shown in FIG. 6. For example, the initiatinguser device 103 may display a graphical user interface indicating thatthe task was unable to be completed, and requesting an action to betaken with regard to the POA. In some instances, next steps performedafter display of the error message may depend on a user input receivedat the initiating user device 103 (e.g., select a new POA recipient,retry with the same POA recipient, or the like).

At step 232, the event processing system 105 may generate and send abiometric prompt to the recipient user device 104. In some instances,the event processing system 105 may send the biometric prompt to therecipient user device 104 while the fourth wireless data connection isestablished.

At step 233, the recipient user device 104 may receive the biometricprompt sent at step 232. In some instances, the recipient user device104 may receive the biometric prompt sent at step 232 while the thirdwireless data connection is established.

Referring to FIG. 2G, at step 234, the recipient user device 104 maypresent the biometric prompt received at step 233. For example, therecipient user device 104 may display a graphical user interface similarto graphical user interface 705, which is shown in FIG. 7, that allowsthe second individual to provide biometric information such asfingerprint data, facial data, retinal data (e.g., for purposes ofverifying the identity of the second individual).

At step 235, the recipient user device 104 may receive a biometric inputat the biometric prompt presented at step 234. In some instances,actions performed at step 235 may be similar to those described above atstep 220. For example, the recipient user device 104 may capture asecond biometric input at step 235 to compare with the biometric inputcollected at step 220.

At step 236, the recipient user device 104 may send biometricinformation, based on the biometric input received at step 235, to theauthority coordination platform 102. In some instances, the recipientuser device 104 may send the biometric information to the authoritycoordination platform 102 while the second wireless data connection isestablished.

At step 237, the authority coordination platform 102 may receive thebiometric information sent at step 236. For example, the authoritycoordination platform 102 may receive the biometric information via thecommunication interface and while the second wireless data connection isestablished.

At step 238, the authority coordination platform 102 may validate thebiometric information received at step 237 with the biometricinformation received and stored at step 222. In doing so, the authoritycoordination platform 102 may validate that the individual providing theauthority token to the event processing system 105 is the secondindividual (e.g., the true user of the recipient user device 104 and notanother individual who has come into possession of the recipient userdevice 104). If the authority coordination platform 102 determines thatthe biometric information does not match, an error message may be sentand displayed (e.g., as described above with regard to steps 229-231).If the authority coordination platform 102 determines that the biometricinformation does match, the authority coordination platform 102 mayproceed to step 239.

Referring to FIG. 2H, at step 239, the authority coordination platform102 may establish a connection with event processing system 105. Forexample, the authority coordination platform 102 may establish a fourthwireless data connection to link the authority coordination platform 102to the event processing system 105. In some instances, the authoritycoordination platform 102 may determine whether or not a connection isalready established with the event processing system 105. If aconnection is already established with the event processing system 105,the authority coordination platform 102 might not re-establish theconnection. If a connection is not yet established, the authoritycoordination platform 102 may establish the fourth wireless dataconnection as described herein.

At step 240, the authority coordination platform 102 may send abiometric validation message to the event processing system 105indicating that the biometric information has been validated. Forexample, the authority coordination platform 102 may send the biometricvalidation message to the event processing system 105 via thecommunication interface and while the fourth wireless data connection isestablished. In some instances, the authority coordination platform 102may send the biometric validation message to the event processing system105 based on or in response to determining that there is a match betweenthe biometric data at step 238.

At step 241, the event processing system 105 may receive the biometricvalidation message sent at step 240. In some instances, the eventprocessing system 105 may receive the biometric validation message whilethe fourth wireless data connection is established.

At step 242, the event processing system 105 may execute the taskrequested at step 225 (e.g., by the performance request). For example,the event processing system 105 may perform a transaction, take actionwith regard to a safety deposit box (e.g., open, close, transfer, or thelike), take action with regard to a utility service (e.g., open, close,transfer, or the like), take action with regard to a medical decision,or the like. In some instances, the event processing system 105 mayexecute the task based on or in response to one or more of the authorityvalidation message or the biometric validation message. For example, oneor more of the authority validation message or the biometric validationmessage may cause the event processing system 105 to perform the task.

At step 243, the event processing system 105 may send a firstperformance confirmation message to the authority coordination platform102. For example, the event processing system 105 may send a messageindicating that the task has been successfully completed. In someinstances, the event processing system 105 may send the firstperformance confirmation message to the authority coordination platform102 while the fourth wireless data connection is established. In someinstances, in sending the first performance confirmation message, theevent processing system 105 may send a receipt, or other confirmationindicating that the task was successfully completed.

At step 244, the authority coordination platform 102 may receive thefirst performance confirmation message sent at step 243. For example,the authority coordination platform 102 may receive the firstperformance confirmation message via the communication interface 113 andwhile the fourth wireless data connection was established.

Referring to FIG. 2I, at step 245, the recipient user device 104 maysend a second performance confirmation message (e.g., indicating thatthe second user performed the task) to the authority coordinationplatform. In some instances, the recipient user device 104 may send thesecond performance confirmation message to the authority coordinationplatform 102 while the second wireless data connection is established.In some instances, in sending the second performance confirmationmessage, the recipient user device 104 may send a confirmation email,receipt, or the like received from the event processing system 105indicating that the task was successfully performed.

At step 246, the authority coordination platform 102 may receive thesecond performance confirmation message sent at step 245. For example,the authority coordination platform 102 may receive the secondperformance confirmation message via the communication interface andwhile the second wireless data connection is established.

At step 247, the authority coordination platform 102 may verify that aperformance confirmation message was received from both the recipientuser device 104 and the event processing system 105. If performanceconfirmation messages were not received from both devices, the authoritycoordination platform 102 may perform additional actions to verifywhether the task was performed (e.g., send a request to the recipientuser device 104 and/or the event processing system 105 to verify whetheror not the task was performed, or the like). If performance confirmationmessages were received from both devices, the authority coordinationplatform 102 may proceed to step 248.

At step 248, the authority coordination platform 102 may void theauthority token. For example, the authority coordination platform 102may revoke the POA allowing the second individual to perform the task onbehalf of the first individual, and render the authority tokenineffective.

At step 249, the authority coordination platform 102 may update theclient dashboard information generated at step 209. For example, theauthority coordination platform 102 may update the client dashboardinformation to reflect that the task has been completed. In someinstances, updating the client dashboard information may cause theinitiating user device 103 to display a client dashboard interfaceindicating that the task has been completed (e.g., as described below atstep 252).

Referring to FIG. 2J, at step 250, the initiating user device 103 mayreceive a client dashboard access request. For example, the initiatinguser device 103 may receive a request from the first individual to checkthe status of the task.

At step 251, the initiating user device 103 may access the clientdashboard information (e.g., which was updated at step 249). In someinstances, the initiating user device 103 may access the clientdashboard information while the first wireless data connection isestablished.

At step 252, the initiating user device 103 may display a clientdashboard interface using the client dashboard information. For example,in some instances, the initiating user device 103 may display agraphical user interface similar to graphical user interface 805, whichis shown in FIG. 8. For example, the initiating user device 103 may showthat the task of closing the safety deposit box has been completed bythe second individual.

FIG. 3 depicts an illustrative method for implementing generation andvalidation of a power of attorney token in accordance with one or moreexample embodiments. Referring to FIG. 3, at step 305, a computingplatform having at least one processor, a communication interface, andmemory may receive and store contact profile information for a pluralityof POA recipients. At step 310, the computing platform may receive taskinformation indicating a task to be performed for an individual by oneof the plurality of POA recipients. At step 315, the computing platformmay generate client dashboard information indicating the task and a taskstatus. At step 320, the computing platform may use the contact profileinformation to identify a recipient computing device corresponding toone of the POA recipients. At step 325, the computing platform may sendthe task information to the recipient device. At step 330, the computingplatform may identify whether or not the task was accepted. If the taskwas not accepted, the computing platform may return to step 320. If thetask was accepted, the computing platform may proceed to step 335.

At step 335, the computing platform may generate an authority tokengranting POA to the user of the recipient device to perform the task. Atstep 340, the computing platform may receive biometric data from therecipient device identifying a user of the recipient device. At step345, the computing platform may determine whether an error message wasreceived with regard to attempted performance of the task. If an errormessage was received, the method may end. If an error message was notreceived, the computing platform may proceed to step 350.

At step 350, the computing platform may receive additional biometricinformation. At step 355, the computing platform may validate theadditional biometric information. If the biometric information was notvalidated, the method may end. If the biometric information wasvalidated, the computing platform may proceed to step 360.

At step 360, the computing platform may send a validation message to anevent processing system, indicating that the biometric information wasvalidated. At step 365, the computing platform may receive one or moreperformance confirmation messages. At step 370, the computing platformmay validate the performance confirmation messages. If the performanceconfirmation messages are not validated, the method may end. If theconfirmation messages are validated, the computing platform may proceedto step 375.

At step 375, the computing platform may void the authority token. Atstep 380, the computing platform may updated the client dashboardinformation to indicate that the task was successfully completed.

In some instances, the systems, event sequence, and/or methods describedabove might not be limited to granting power of attorney, and may insome instances relate to use cases involving responding to naturaldisasters, emergencies, and/or other life events that may leavecustomers and clients unable to access personal documents from theirhomes or cities. Additionally or alternatively, the systems and methodsdescribed above may be used to maintain control and/or otherwise protectsensitive information and/or to increase access to identificationinformation, financial services, and/or medical services duringemergencies.

For example, in some instances, the systems and methods described abovemay be used to validate an identity of an individual and provide anemergency identification, credit line, medical/insurance records, or thelike. In these instances, information may be stored in a digital vault(e.g., which may be stored or otherwise maintained at the authoritycoordination platform 102, and may, in some instances, be used to storeauthority tokens as described above) that may prompt an individual toidentify him/herself with a combination of biometrics, secret questions,and/or a secondary identifier.

In some instances, an emergency electronic vault may be deployed whichmay store financial information, government identification information,insurance card information, or the like. In some instances, clients mayenroll into the emergency vault, which may “use know your customer (KYC)services,” or the like to authenticate identity of the client. In someinstances, the system may utilize multi-factor authentication to accessthe vault, and may have established partnerships configured to accept anemergency identifier stored within.

As a particular use case, a hurricane may cause residents to relocatefrom their hometown. In some instances, these individuals might not haveaccess personal documents, financial documents, or the like. One or moreof the systems described herein may allow these affected individuals tohave access to a bank-provided emergency identifier, access to afinancial credit line, access to medical records/insurance information,or the like.

Additionally or alternatively, the systems, event sequence, and/ormethods described above may relate to storing digital secrets in avault. For example, methods and systems may be included herein forstoring secret information in a digital vault including obtaining, froma user, answers to a number of different questions, and identifyingwhich subsets or combinations of the questions for which correct answerlater provided by an entity may enable that entity to gain access to thesecret information in the vault. In some instances, the number ofquestions in each combination may be less than the total number ofquestions, and in some instances, one subset may have at least twoquestions. For each subset, a corresponding string of answers may begenerated, the string may be hashed, and the resulting hash value may becombined with the digital secret. This may hide the digital secret,which may then be stored in the vault. Methods and systems forregistering authentication material include storing a hashed string ofanswers for each combination, thus generating multiple authenticators.In some instances, similar techniques or methods may be used to encryptor otherwise store the authority token described above.

In these instances, the vault as described above may be implemented insimilar methods as described above with regard to the authority token

Additionally or alternatively, the systems, event sequence, and/ormethods described above may relate to emergency identification, medicaltreatment, and/or records access authorization media. For example, asingle notice of notification in print form, electronic media form, orthe like may provide authorization to treat in accordance with theguidelines set out by a patient and to contact those persons andentities designed by the patient including medical conditions,medications being taken, allergies of the patient, identification of thepatient's primary care physician, identification of an emergencycontact, a family member or friend, the existence of a living will,health care proxy and prior appointment of power of attorney for thepatient and from what entity a copy of the document(s) may be obtained,a signed written consent of the patient (e.g., in a Health InsurancePortability and Accountability Act (HIPAA)-compliant format) authorizingcontact, patient health information disclosure, treatment for thepatient in accordance with the information provided in the notice, orthe like. These systems and methods may also present aid personnel andothers with information focused on the search and recovery of anindividual who may be missing or lost. In doing so, one or more of thesesystems may perform similar techniques to those described above withregard to the authority token.

Accordingly, the techniques described above with regard to generationand validation of the authority token may be applied to a variety ofadditional scenarios without departing from the scope of the disclosure.

One or more aspects of the disclosure may be embodied in computer-usabledata or computer-executable instructions, such as in one or more programmodules, executed by one or more computers or other devices to performthe operations described herein. Generally, program modules includeroutines, programs, objects, components, data structures, and the likethat perform particular tasks or implement particular abstract datatypes when executed by one or more processors in a computer or otherdata processing device. The computer-executable instructions may bestored as computer-readable instructions on a computer-readable mediumsuch as a hard disk, optical disk, removable storage media, solid-statememory, RAM, and the like. The functionality of the program modules maybe combined or distributed as desired in various embodiments. Inaddition, the functionality may be embodied in whole or in part infirmware or hardware equivalents, such as integrated circuits,application-specific integrated circuits (ASICs), field programmablegate arrays (FPGA), and the like. Particular data structures may be usedto more effectively implement one or more aspects of the disclosure, andsuch data structures are contemplated to be within the scope of computerexecutable instructions and computer-usable data described herein.

Various aspects described herein may be embodied as a method, anapparatus, or as one or more computer-readable media storingcomputer-executable instructions. Accordingly, those aspects may takethe form of an entirely hardware embodiment, an entirely softwareembodiment, an entirely firmware embodiment, or an embodiment combiningsoftware, hardware, and firmware aspects in any combination. Inaddition, various signals representing data or events as describedherein may be transferred between a source and a destination in the formof light or electromagnetic waves traveling through signal-conductingmedia such as metal wires, optical fibers, or wireless transmissionmedia (e.g., air or space). In general, the one or morecomputer-readable media may be and/or include one or more non-transitorycomputer-readable media.

As described herein, the various methods and acts may be operativeacross one or more computing servers and one or more networks. Thefunctionality may be distributed in any manner, or may be located in asingle computing device (e.g., a server, a client computer, and thelike). For example, in alternative embodiments, one or more of thecomputing platforms discussed above may be combined into a singlecomputing platform, and the various functions of each computing platformmay be performed by the single computing platform. In such arrangements,any and/or all of the above-discussed communications between computingplatforms may correspond to data being accessed, moved, modified,updated, and/or otherwise used by the single computing platform.Additionally or alternatively, one or more of the computing platformsdiscussed above may be implemented in one or more virtual machines thatare provided by one or more physical computing devices. In sucharrangements, the various functions of each computing platform may beperformed by the one or more virtual machines, and any and/or all of theabove-discussed communications between computing platforms maycorrespond to data being accessed, moved, modified, updated, and/orotherwise used by the one or more virtual machines.

Aspects of the disclosure have been described in terms of illustrativeembodiments thereof. Numerous other embodiments, modifications, andvariations within the scope and spirit of the appended claims will occurto persons of ordinary skill in the art from a review of thisdisclosure. For example, one or more of the steps depicted in theillustrative figures may be performed in other than the recited order,and one or more depicted steps may be optional in accordance withaspects of the disclosure.

What is claimed is:
 1. A computing platform, comprising: at least oneprocessor; a communication interface communicatively coupled to the atleast one processor; and memory storing computer-readable instructionsthat, when executed by the at least one processor, cause the computingplatform to: receive, from a user device corresponding to a firstindividual, contact information for a second individual; store thecontact information in a user profile corresponding to the secondindividual; receive user input indicating a task to be performed andrequesting that a power of attorney be granted to the second individual,wherein the task is required to be performed in person by one of: thefirst individual or an individual who has been granted power of attorneyby the first individual; generate an authority token granting the secondindividual the power of attorney for the first individual to perform thetask; send, using the contact information and to a user devicecorresponding to the second individual, the authority token and taskinformation indicating the task; after sending the authority token andthe task information indicating the task to the user devicecorresponding to the second individual, receive, from an eventprocessing system, a validation request comprising the authority tokenand the task information indicating the task; validate the authoritytoken and the task information indicating the task; based on successfulvalidation of the authority token and the task information indicatingthe task, send authority validation information to the event processingsystem; receive confirmation information from the user devicecorresponding to the second individual indicating that the task has beencompleted; and after receiving confirmation that the task has beenperformed by the second individual, update client dashboard informationto indicate that the task has been completed, wherein updating theclient dashboard information to indicate that the task has beencompleted causes the user device to display a client dashboardindicating that the task has been completed.
 2. The computing platformof claim 1, wherein the first individual is located in a first state,and wherein the task is to be performed in a second state.
 3. Thecomputing platform of claim 1, wherein the task is to be performed at afirst enterprise organization, and wherein the authority token isformatted for use exclusively by the first enterprise organization. 4.The computing platform of claim 1, wherein generating the authoritytoken comprises: sending, to the user device corresponding to the secondindividual, a request to input biometric data; receiving biometricinformation corresponding to the second individual; and generating,based at least in part on the biometric information, the authoritytoken.
 5. The computing platform of claim 4, wherein the memory storesadditional computer-readable instructions that, when executed by the atleast one processor, further cause the computing platform to: send, tothe user device corresponding to the second individual, a request todisplay an indication of the task and prompt for acceptance of the task;and receive, from the user device corresponding to the secondindividual, task acceptance information indicating that the secondindividual will perform the task, wherein generating the authority tokenis based on receipt of the task acceptance information.
 6. The computingplatform of claim 5, wherein the request to input the biometric data issent along with the request to display the indication of the task andwherein the biometric data is received along with the task acceptanceinformation.
 7. The computing platform of claim 4, wherein the requestto input the biometric data is sent along with the authority token. 8.The computing platform of claim 4, wherein the memory stores additionalcomputer-readable instructions that, when executed by the at least oneprocessor, further cause the computing platform to: receive additionalbiometric data from the user device corresponding to the secondindividual; identify, by comparing the additional biometric data to thebiometric data, a biometric match for the second individual; and send,based on identifying the biometric match for the second individual,biometric validation information to the event processing system.
 9. Thecomputing platform of claim 8, wherein sending the authority validationinformation and the biometric validation information to the eventprocessing system causes the event processing system to perform one ormore actions corresponding to the task.
 10. The computing platform ofclaim 1, wherein the client dashboard includes a status of one or moretasks including the task, wherein each of the one or more tasks areperformed by one or more individuals including the second individual.11. A method comprising: at a computing platform comprising at least oneprocessor, a communication interface, and memory: receiving, from a userdevice corresponding to a first individual, contact information for asecond individual; storing the contact information in a user profilecorresponding to the second individual; receiving user input indicatinga task to be performed and requesting that a power of attorney begranted to the second individual, wherein the task is required to beperformed in person by one of: the first individual or an individual whohas been granted power of attorney by the first individual; generatingan authority token granting the second individual the power of attorneyfor the first individual to perform the task; sending, using the contactinformation and to a user device corresponding to the second individual,the authority token and task information indicating the task; aftersending the authority token and the task information indicating the taskto the user device corresponding to the second individual, receiving,from an event processing system, a validation request comprising theauthority token and the task information indicating the task; validatingthe authority token and the task information indicating the task; basedon successful validation of the authority token and the task informationindicating the task, sending authority validation information to theevent processing system; receiving confirmation information from theuser device corresponding to the second individual indicating that thetask has been completed; and after receiving confirmation that the taskhas been performed by the second individual, updating client dashboardinformation to indicate that the task has been completed, whereinupdating the client dashboard information to indicate that the task hasbeen completed causes the user device to display a client dashboardindicating that the task has been completed.
 12. The method of claim 11,wherein the first individual is located in a first state, and whereinthe task is to be performed in a second state.
 13. The method of claim11, wherein the task is to be performed at a first enterpriseorganization, and wherein the authority token is formatted for useexclusively by the first enterprise organization.
 14. The method ofclaim 11, wherein generating the authority token comprises: sending, tothe user device corresponding to the second individual, a request toinput biometric data; receiving biometric information corresponding tothe second individual; and generating, based at least in part on thebiometric information, the authority token.
 15. The method of claim 14,wherein the memory stores additional computer-readable instructionsthat, when executed by the at least one processor, further cause thecomputing platform to: send, to the user device corresponding to thesecond individual, a request to display an indication of the task andprompt for acceptance of the task; and receive, from the user devicecorresponding to the second individual, task acceptance informationindicating that the second individual will perform the task, whereingenerating the authority token is based on receipt of the taskacceptance information.
 16. The method of claim 15, wherein the requestto input the biometric data is sent along with the request to displaythe indication of the task and wherein the biometric data is receivedalong with the task acceptance information.
 17. The method of claim 14,wherein the request to input the biometric data is sent along with theauthority token.
 18. The method of claim 14, wherein the memory storesadditional computer-readable instructions that, when executed by the atleast one processor, further cause the computing platform to: receiveadditional biometric data from the user device corresponding to thesecond individual; identify, by comparing the additional biometric datato the biometric data, a biometric match for the second individual; andsend, based on identifying the biometric match for the secondindividual, biometric validation information to the event processingsystem.
 19. The method of claim 18, wherein sending the authorityvalidation information and the biometric validation information to theevent processing system causes the event processing system to performone or more actions corresponding to the task.
 20. One or morenon-transitory computer-readable media storing instructions that, whenexecuted by a computing platform comprising at least one processor, acommunication interface, and memory, cause the computing platform to:receive, from a user device corresponding to a first individual, contactinformation for a second individual; store the contact information in auser profile corresponding to the second individual; receive user inputindicating a task to be performed and requesting that a power ofattorney be granted to the second individual, wherein the task isrequired to be performed in person by one of: the first individual or anindividual who has been granted power of attorney by the firstindividual; generate an authority token granting the second individualthe power of attorney for the first individual to perform the task;send, using the contact information and to a user device correspondingto the second individual, the authority token and task informationindicating the task; after sending the authority token and the taskinformation indicating the task to the user device corresponding to thesecond individual, receive, from an event processing system, avalidation request comprising the authority token and the taskinformation indicating the task; validate the authority token and thetask information indicating the task; based on successful validation ofthe authority token and the task information indicating the task, sendauthority validation information to the event processing system; receiveconfirmation information from the user device corresponding to thesecond individual indicating that the task has been completed; and afterreceiving confirmation that the task has been performed by the secondindividual, update client dashboard information to indicate that thetask has been completed, wherein updating the client dashboardinformation to indicate that the task has been completed causes the userdevice to display a client dashboard indicating that the task has beencompleted.