AUTOMATED APPLICATION PROGRAMMING INTERFACE (API) SYSTEM AND METHOD
First Claim
1. A method for leveraging email to complete an online transaction from a third party vendor, the method comprising:
- storing, by a computer memory, customer information, the customer information including a customer name, customer email address, customer shipping address, and customer billing information;
receiving, by a receiver, an authorization request from an application programming interface associated with a third party vendor requesting access to a portion of the customer information;
receiving, by the receiver confirmation from a customer to allow the third party vendor to access the portion of the customer information;
transmitting, by a transmitter, an access code to the third party vendor;
receiving, by the receiver, a request message from the third party vendor, wherein the request message comprises the access code, wherein the request message requests an authorization token;
confirming, by the processor, the received access code; and
transmitting, by the transmitter, an authorization token to the third party vendor.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for leveraging email to complete an online transaction from a third party vendor, the method comprising: storing customer information, the customer information including a customer name, customer email address, customer shipping address, and customer billing information. The method further comprises receiving an authorization request from an application programming interface associated with a third party vendor requesting access to a portion of the customer information and receiving confirmation from a customer to allow the third party vendor to access the portion of the customer information. The method further comprising transmitting an access code to the third party vendor and receiving a request message from the third party vendor, wherein the request message comprises the access code, and wherein the request message requests an authorization token. The method may further comprise confirming the received access code and transmitting an authorization token to the third party vendor.
84 Citations
15 Claims
-
1. A method for leveraging email to complete an online transaction from a third party vendor, the method comprising:
-
storing, by a computer memory, customer information, the customer information including a customer name, customer email address, customer shipping address, and customer billing information; receiving, by a receiver, an authorization request from an application programming interface associated with a third party vendor requesting access to a portion of the customer information; receiving, by the receiver confirmation from a customer to allow the third party vendor to access the portion of the customer information; transmitting, by a transmitter, an access code to the third party vendor; receiving, by the receiver, a request message from the third party vendor, wherein the request message comprises the access code, wherein the request message requests an authorization token; confirming, by the processor, the received access code; and transmitting, by the transmitter, an authorization token to the third party vendor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for leveraging email to complete an online transaction from a third party vendor, the system comprising:
-
computer memory configured to store customer information, the customer information including a customer name, customer email address, customer shipping address, and customer billing information; a receiver configured to receive an authorization request from an application programming interface associated with a third party vendor requesting access to a portion of the customer information; the receiver further configured to receive confirmation from a customer to allow the third party vendor to access the portion of the customer information; a transmitter configured to transmit an access code to the third party vendor; the receiver further configured to receive a request message from the third party vendor, wherein the request message comprises the access code, wherein the request message requests an authorization token; a processor configured to confirm the received access code; and the transmitter further configured to transmit an authorization token to the third party vendor. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable medium having processor-executable instructions stored thereon which, when executed by at least one processor, will cause the at least one processor to perform a method for leveraging email to complete an online transaction from a third party vendor, the method comprising:
-
storing customer information, the customer information including a customer name, customer email address, customer shipping address, and customer billing information; receiving an authorization request from an application programming interface associated with a third party vendor requesting access to a portion of the customer information; receiving confirmation from a customer to allow the third party vendor to access the portion of the customer information; transmitting an access code to the third party vendor; receiving a request message from the third party vendor, wherein the request message comprises the access code, wherein the request message requests an authorization token; confirming the received access code; and transmitting an authorization token to the third party vendor.
-
Specification