US 11,924,213 B2
User permissions for access to secure data at third-party
Michelle Felice-Steele, Woodland Hills, CA (US); Michele Raneri, Orange, CA (US); Paul DeSaulniers, Ladera Ranch, CA (US); Joe Manna, Tustin, CA (US); Jeff Softley, Rancho Mission Viejo, CA (US); Srikumar Puthupadi Kanthadai, El Monte, CA (US); Aga Dzhafar Hady Ogiu Dzhafarov, Mission Viejo, CA (US); Pat Finneran, Queen Creek, AZ (US); Donna Meryl Smith, Irvine, CA (US); Gregory Lennox Wright, Newport Coast, CA (US); Marizette Galvez, Chino, CA (US); Ujjayan Banerjee, Irvine, CA (US); Ravi Devesetti, Fremont, CA (US); Shivakumar Ramanathan, Irvine, CA (US); and Mukeshkumar G. Patel, Downey, CA (US)
Assigned to ConsumerInfo.com, Inc., Costa Mesa, CA (US)
Filed by ConsumerInfo.com, Inc., Costa Mesa, CA (US)
Filed on Jan. 18, 2022, as Appl. No. 17/578,238.
Application 17/578,238 is a continuation of application No. 16/445,808, filed on Jun. 19, 2019, granted, now 11,265,324.
Claims priority of provisional application 62/826,319, filed on Mar. 29, 2019.
Claims priority of provisional application 62/727,479, filed on Sep. 5, 2018.
Prior Publication US 2022/0217146 A1, Jul. 7, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 9/451 (2018.01); G06F 9/54 (2006.01); G06F 16/13 (2019.01); G06F 16/23 (2019.01); G06F 16/245 (2019.01); G06F 16/248 (2019.01); G06F 21/62 (2013.01); G06Q 40/03 (2023.01); H04L 67/306 (2022.01)
CPC H04L 63/102 (2013.01) [G06F 9/451 (2018.02); G06F 9/54 (2013.01); G06F 16/13 (2019.01); G06F 16/23 (2019.01); G06F 16/2379 (2019.01); G06F 16/245 (2019.01); G06F 16/248 (2019.01); G06F 21/6218 (2013.01); G06Q 40/03 (2023.01); H04L 63/062 (2013.01); H04L 63/083 (2013.01); H04L 63/0861 (2013.01); H04L 63/0884 (2013.01); H04L 63/18 (2013.01); H04L 67/306 (2013.01); H04L 2463/121 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage devices storing software instructions executable by the computing system to perform the method, the method comprising:
receiving, from a user computing device of a user, a selection of a third-party entity;
identifying an Application Programming Interface (API) token associated with the third-party entity;
transmitting the API token to a system in electronic communication with the third-party entity;
receiving, via the system, indicators of one or more accounts of the user with the third-party entity;
receiving, from the user computing device, a selection of an account of the one or more accounts;
accessing, via a secure communication session initiated with the API token, a plurality of data items of the selected account of the user with the third-party entity;
transmitting first user interface data to the user computing device, the first user interface data configured to depict a first user interface on a display of the user computing device, the first user interface including one or more interactive elements selectable to indicate authorized uses of the data items by the computing system;
receiving, from the user computing device, a selection of authorized uses of at least a subset of the data items; and
in response to receiving the selection of authorized uses, selectively sharing at least the subset of the data items with a computing device for the one or more authorized uses, wherein the computing device is different than the user computing device and the computing system.