US 12,192,187 B2
Aggregating permissions across multiple platforms with co-signers
Brad Norcross, Richardson, TX (US); Sandeep K. Vanka, Plano, TX (US); Mitchell Mays, Little Elm, TX (US); Roshni Rao, Frisco, TX (US); Susan Hannagan, Dallas, TX (US); Tahressa Moore, Lucas, TX (US); Bryan Parker, Richardson, TX (US); Camille Gaelle Gupta, Frisco, TX (US); Arielle Mcmahon, Plano, TX (US); Rebecca Hummel, Richardson, TX (US); Jiaxin Guo, Chicago, IL (US); Mia Frederick, The Colony, TX (US); Alexis Pritchard, Dallas, TX (US); and Srikanth Vadlapati, Louisville, KY (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on May 3, 2022, as Appl. No. 17/661,839.
Prior Publication US 2023/0362148 A1, Nov. 9, 2023
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/08 (2013.01) 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
receiving, by a computing device and from a first user device, first personal identifiable information (PII) of a first user and a first authorization for a first permission;
associating the first PII with a first identifier;
enabling, by the computing device and for one or more third-party computing systems, access to a result based on at least part of the first PII and consistent with the first permission, wherein the result is associated with a second identifier;
based on the result, sending, by the computing device and to the first user device, a request for a second user;
receiving, by the computing device and from the first user device, contact information associated with the second user;
sending, by the computing device and to a second user device, a request for second PII of a second user;
receiving a request for a second permission of the first user from a first third-party computing system of the one or more third-party computing systems, wherein the first third-party computing system is associated with a third identifier;
sending, to the first user device and to the second user device, an encoded link as part of a request for a second authorization for the second permission, wherein the encoded link comprises the first identifier, the second identifier, and the third identifier;
receiving, via access to the encoded link and from the first user device, a first response to the request for the second authorization, wherein the first response comprises the second authorization, the first identifier, the second identifier, and the third identifier;
receiving, via access to the encoded link and from the second user device, a second response to the request for the second authorization, wherein the second response comprises the second authorization, the first identifier, the second identifier, and the third identifier; and
enabling, by the computing device and for a second third-party computing system, access to at least part of the first PII and the second PII to initiate a process consistent with the second permission and a third permission, wherein the access is via a secure channel.