CPC H04L 63/102 (2013.01) [G06F 21/6245 (2013.01); G06Q 40/02 (2013.01); G06F 3/0482 (2013.01); G06F 3/0484 (2013.01); G06F 3/04817 (2013.01); G06F 21/6263 (2013.01)] | 15 Claims |
1. A computing device comprising:
a network interface configured to communicate via a telecommunications network;
one or more user interfaces for visually presenting graphical elements and for receiving user inputs; and
a processor and a memory having stored thereon instructions which, when executed by the processor, cause the processor to:
present, via the one or more user interfaces, an interactive graphical interface that identifies an application for which an access permission for access to user information via an application programming interface (API) is controlled;
present, via the interactive graphical interface, a menu for selecting between a first subset of the user information and a second subset of the user information to be made accessible to the application via the API;
receive, from the one or more user interfaces, a signal indicating a user input corresponding with a selection of one of the first subset of the user information and the second subset of the user information via the menu;
use the network interface to transmit, to a service provider computing system, an indication of which one of the first subset of the user information and the second subset of the user information has been selected, to grant the application access to the selected subset of the user information;
present, via the interactive graphical interface, an alert from the service provider computing system that indicates that a frequency of access to the selected subset of the user information by the application exceeds a predetermined frequency threshold, the alert indicating that access to the selected subset of the user information by the application has been automatically revoked;
receive, via the interactive graphical interface, an interaction with the alert to indicate that the access to the selected subset of the user information by the application is authorized; and
transmit a reversal request indicating that the access to the selected subset of the user information by the application is to be restored.
|