Automated application programming interface (API) system and method
First Claim
1. A method for leveraging email to complete an online transaction from a third party vendor, the method comprising:
- storing, by a computer memory, customer information, the customer information including a customer name, customer email address, customer shipping address, and customer billing information;
receiving, by a receiving device, an authorization request from an application programming interface associated with a third party vendor requesting access to a portion of the customer information;
receiving, by the receiving device, confirmation from a customer to allow the third party vendor to access the portion of the customer information;
transmitting, by a transmitting device, an access code to the third party vendor;
receiving, by the receiving device, a request message from the third party vendor, wherein the request message comprises the access code, and the request message comprises a request for an authorization token;
confirming, by the processor of the receiving device, the received access code; and
transmitting, by the transmitting device, an authorization token corresponding to the request for an authorization token to the third party vendor.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for leveraging email to complete an online transaction from a third party vendor, the method comprising: storing customer information, the customer information including a customer name, customer email address, customer shipping address, and customer billing information. The method further comprises receiving an authorization request from an application programming interface associated with a third party vendor requesting access to a portion of the customer information and receiving confirmation from a customer to allow the third party vendor to access the portion of the customer information. The method further comprising transmitting an access code to the third party vendor and receiving a request message from the third party vendor, wherein the request message comprises the access code, and wherein the request message requests an authorization token. The method may further comprise confirming the received access code and transmitting an authorization token to the third party vendor.
4 Citations
15 Claims
-
1. A method for leveraging email to complete an online transaction from a third party vendor, the method comprising:
-
storing, by a computer memory, customer information, the customer information including a customer name, customer email address, customer shipping address, and customer billing information; receiving, by a receiving device, an authorization request from an application programming interface associated with a third party vendor requesting access to a portion of the customer information; receiving, by the receiving device, confirmation from a customer to allow the third party vendor to access the portion of the customer information; transmitting, by a transmitting device, an access code to the third party vendor; receiving, by the receiving device, a request message from the third party vendor, wherein the request message comprises the access code, and the request message comprises a request for an authorization token; confirming, by the processor of the receiving device, the received access code; and transmitting, by the transmitting device, an authorization token corresponding to the request for an authorization token to the third party vendor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for leveraging email to complete an online transaction from a third party vendor, the system comprising:
-
computer memory configured to store customer information, the customer information including a customer name, customer email address, customer shipping address, and customer billing information; a receiving device, configured to receive an authorization request from an application programming interface associated with a third party vendor requesting access to a portion of the customer information; the receiving device, further configured to receive confirmation from a customer to allow the third party vendor to access the portion of the customer information; a transmitting device, configured to transmit an access code to the third party vendor; the receiving device, further configured to receive a request message from the third party vendor, wherein the request message comprises the access code, and the request message comprises a request for an authorization token; a processor of the receiving device, configured to confirm the received access code; and the transmitting device, further configured to transmit an authorization token corresponding to the request for an authorization token to the third party vendor. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium having processor-executable instructions stored thereon which, when executed by at least one processor, causes the at least one processor to perform a method for leveraging email to complete an online transaction from a third party vendor, the method comprising:
-
storing customer information in a computer memory, the customer information including a customer name, customer email address, customer shipping address, and customer billing information; receiving an authorization request from an application programming interface associated with a third party vendor requesting access to a portion of the customer information; receiving confirmation, via a receiving device, from a customer to allow the third party vendor to access the portion of the customer information; transmitting, by a transmitting device, an access code to the third party vendor; receiving, via the receiving device, a request message from the third party vendor, wherein the request message comprises the access code, and the request message comprises a request for an authorization token; confirming, by a processor of the receiving device, the received access code; and transmitting, by the transmitting device, an authorization token corresponding to the request for an authorization token to the third party vendor.
-
Specification