×

Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts

  • US 10,530,761 B2
  • Filed: 08/27/2018
  • Issued: 01/07/2020
  • Est. Priority Date: 09/08/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • a first computing device; and

    a second computing device separate from the first computing device,wherein;

    the first computing device is configured to communicate with the second computing device, a third computing device associated with an external application, and a fourth computing device associated with an institution;

    the second computing device is configured to communicate with the first computing device, the third computing device, and the fourth computing device;

    the first computing device is further configured to;

    receive, from the third computing device, an authorization request including an indication of a user account;

    retrieve, from the fourth computing device associated with the institution, information associated with the user account held by the institution;

    generate at least;

    an electronic record of the information, anda token associated with the electronic record;

    cause at least one of a unique identifier associated with the token or the token to be provided to the third computing device; and

    provide, to the second computing device, at least;

    the electronic record of the information, andthe token associated with the electronic record; and

    the second computing device is further configured to;

    receive, from the first computing device, at least;

    the electronic record of the information, andthe token associated with the electronic record;

    receive, from the third computing device, at least;

    the at least one of the unique identifier associated with the token or the token, anda request to cause a transaction related to the user account to be executed;

    verify, based at least in part on the at least one of the unique identifier associated with the token or the token, authorization of the third computing device to cause the transaction to be executed;

    initiate the transaction via communication with the fourth computing device or another institution or transaction processor,whereby the third computing device is enabled to cause transactions related to the user account to be executed without sharing the information with the third computing device.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×