CPC H04L 63/08 (2013.01) | 20 Claims |
1. A computer-implemented method comprising:
receiving, by a computing device and from a first user device, first personal identifiable information (PII) of a first user and a first authorization for a first permission;
associating the first PII with a first identifier;
enabling, by the computing device and for one or more third-party computing systems, access to a result based on at least part of the first PII and consistent with the first permission, wherein the result is associated with a second identifier;
based on the result, sending, by the computing device and to the first user device, a request for a second user;
receiving, by the computing device and from the first user device, contact information associated with the second user;
sending, by the computing device and to a second user device, a request for second PII of a second user;
receiving a request for a second permission of the first user from a first third-party computing system of the one or more third-party computing systems, wherein the first third-party computing system is associated with a third identifier;
sending, to the first user device and to the second user device, an encoded link as part of a request for a second authorization for the second permission, wherein the encoded link comprises the first identifier, the second identifier, and the third identifier;
receiving, via access to the encoded link and from the first user device, a first response to the request for the second authorization, wherein the first response comprises the second authorization, the first identifier, the second identifier, and the third identifier;
receiving, via access to the encoded link and from the second user device, a second response to the request for the second authorization, wherein the second response comprises the second authorization, the first identifier, the second identifier, and the third identifier; and
enabling, by the computing device and for a second third-party computing system, access to at least part of the first PII and the second PII to initiate a process consistent with the second permission and a third permission, wherein the access is via a secure channel.
|