US 12,169,583 B2
Aggregating permissions across multiple platforms
Brad Norcross, Richardson, TX (US); Sandeep K. Vanka, Plano, TX (US); Mitchell Mays, Little Elm, TX (US); Roshni Rao, Frisco, TX (US); Susan Hannagan, Dallas, TX (US); Tahressa Moore, Lucas, TX (US); Bryan Parker, Richardson, TX (US); Camille Gaelle Gupta, Frisco, TX (US); Arielle McMahon, Plano, TX (US); Rebecca Hummel, Richardson, TX (US); Jiaxin Guo, Chicago, IL (US); Mia Frederick, The Colony, TX (US); Alexis Pritchard, Dallas, TX (US); and Srikanth Vadlapati, Louisville, KY (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on May 3, 2022, as Appl. No. 17/661,823.
Prior Publication US 2023/0359759 A1, Nov. 9, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 21/32 (2013.01); G06F 21/60 (2013.01)
CPC G06F 21/6245 (2013.01) [G06F 21/32 (2013.01); G06F 21/602 (2013.01); G06F 21/6209 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
receiving, by a computing device and from a user device, personal identifiable information (PII) of a user;
receiving, by the computing device, a first authorization for a first permission;
encrypting the PII responsive to the first authorization;
storing the encrypted PII associated with a first identifier, wherein the first identifier comprises a user identifier;
enabling, by the computing device and for one or more third-party computing systems, access to a result based on at least part of the PII and consistent with the first permission, wherein the result is associated with a second identifier;
receiving a request for a second permission of the user from a first third-party computing system of the one or more third-party computing systems, wherein the first third-party computing system is associated with a third identifier;
sending, to the user device, an encoded link as part of a request for a second authorization for the second permission, wherein the encoded link comprises the first identifier, the second identifier, and the third identifier;
receiving, from the user device and via access to the encoded link, a response to the request for the second authorization, wherein the response comprises the second authorization, the first identifier, the second identifier, and the third identifier;
accessing, by the computing device and based on receiving the second authorization, the encrypted PII;
decrypting the encrypted PII; and
enabling, by the computing device and for a second third-party computing system, access to at least part of the decrypted PII to initiate a process consistent with the second permission, wherein the access is via a secure channel.