CPC G06F 21/6245 (2013.01) [G06F 21/32 (2013.01); G06F 21/602 (2013.01); G06F 21/6209 (2013.01)] | 20 Claims |
1. A computer-implemented method comprising:
receiving, by a computing device and from a user device, personal identifiable information (PII) of a user;
receiving, by the computing device, a first authorization for a first permission;
encrypting the PII responsive to the first authorization;
storing the encrypted PII associated with a first identifier, wherein the first identifier comprises a user identifier;
enabling, by the computing device and for one or more third-party computing systems, access to a result based on at least part of the PII and consistent with the first permission, wherein the result is associated with a second identifier;
receiving a request for a second permission of the user from a first third-party computing system of the one or more third-party computing systems, wherein the first third-party computing system is associated with a third identifier;
sending, to the user device, an encoded link as part of a request for a second authorization for the second permission, wherein the encoded link comprises the first identifier, the second identifier, and the third identifier;
receiving, from the user device and via access to the encoded link, a response to the request for the second authorization, wherein the response comprises the second authorization, the first identifier, the second identifier, and the third identifier;
accessing, by the computing device and based on receiving the second authorization, the encrypted PII;
decrypting the encrypted PII; and
enabling, by the computing device and for a second third-party computing system, access to at least part of the decrypted PII to initiate a process consistent with the second permission, wherein the access is via a secure channel.
|