×

Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts

  • US 10,523,653 B2
  • Filed: 06/08/2018
  • Issued: 12/31/2019
  • Est. Priority Date: 09/08/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • a first computing device associated with an institution; and

    a second computing device associated with a permissions manager,wherein;

    the first computing device and second computing device are configured to communicate with a third computing device associated with a user;

    the second computing device is configured to communicate with a fourth computing device associated with an external application;

    the first computing device is further configured to;

    receive an authorization request via a plug-in executing on the third computing device, the authorization request including information including at least;

    account credentials associated with an account of the user held by the institution, andan indication of the account of the user held by the institution,wherein the plug-in is configured to provide the account credentials to the first computing device without storing the account credentials on the third computing device;

    generate at least;

    an electronic record of the information including the account credentials, anda token associated with the electronic record; and

    provide the token to the second computing device;

    the second computing device is further configured to;

    receive the token and associate the token with the institution, the external application, and the account of the user;

    receive, from the fourth computing device, a request for account data associated with the account of the user; and

    in response to receiving the request for account data from the fourth computing device;

    identify the token as being associated with the external application and the account of the user; and

    communicate, to the first computing device associated with the institution, the token and the request for account data;

    the first computing device is further configured to;

    receive, from the second computing device, the token and the request for account data;

    verify, using the token, authorization to provide the account data;

    access the account data from the account of the user using the account credentials stored in the electronic record associated with the token; and

    communicate, to the second computing device, the account data associated with the account of the user; and

    the second computing device is further configured to;

    receive, from the first computing device, the account data; and

    communicate the account data to the fourth computing device,wherein neither the account credentials nor the token is communicated to the fourth computing device associated with the external application.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×