System and Method for Tokenization
    11.
    发明申请

    公开(公告)号:US20190172061A1

    公开(公告)日:2019-06-06

    申请号:US16266571

    申请日:2019-02-04

    摘要: A method for obscuring a value of a sensitive data element includes: (a) receiving the sensitive data element, the sensitive data element being received over a data communications network (110) at a hardware computing device (142) of a trusted tokenization service provider (140); (b) generating a token corresponding to the received sensitive data element; (c) storing the token and sensitive data element in a memory device (146) such that they are correlated with one another; (d) providing the generated token to a first party (130) that uses the token in place of the sensitive data element in a request for authorization to complete a transaction, the request being sent from the first party (130); (e) intercepting the request for authorization including the token; (f) using the token contained in the intercepted request to look-up and retrieve the correlated sensitive data element in the memory device (160); (g) replacing the token contained in the request with the sensitive data element retrieved from the memory device (160); and (h) forwarding the request containing the sensitive data element to a second party (160 and/or 162) which employs the sensitive data element to determine whether completion of the transaction should be authorized or declined.

    System and method for conversion between internet and non-internet based transactions

    公开(公告)号:US10210511B2

    公开(公告)日:2019-02-19

    申请号:US14472874

    申请日:2014-08-29

    摘要: A method is provided for completing an authenticated commercial transaction over an internet protocol (IP) network (40) for an account holder (60) engaged in the transaction via a non-IP based telecommunications platform (30). The method includes: receiving a first message from the account holder (60) via the non-IP based telecommunications platform (30), the first message triggering authentication of the account holder (60) and being in a first communication format; establishing account information for a payment instrument being used in the transaction based upon content in the first message; generating a second message using a second communication format different from the first format, the second message including the established account information; submitting the second message via the IP network (40) to a network entity (110, 200) such that an authentication document is generated (120), the authentication document (120) containing an input field (122); generating a third message using the first format, the third message being submitted to the account holder (60) via the non-IP based telecommunications platform (30) such that the account holder (60) is prompted to enter a security code; receiving a fourth message containing the entered security code from the account holder (60) via the non-IP based telecommunications platform (30), the fourth message being in the first format; and, accessing the authentication document (120) via the IP network (40) to fill-in the input field (122) of the authentication document (120) with the security code contained in the fourth message.

    Centralized identity authentication for electronic communication networks

    公开(公告)号:US10223695B2

    公开(公告)日:2019-03-05

    申请号:US16009476

    申请日:2018-06-15

    摘要: A method of centralized identity authentication for use in connection with a communications network includes registering users of the communications network such that each registered user's identity is uniquely defined and determinable, and registering a plurality of vendors having a presence on the communications network. The registered vendors selectively transact with registered users, wherein the transactions include: (i) the registered vendor selling goods and/or services to the registered user; (ii) the registered vendor granting the registered user access to personal records maintained by the registered vendor; and/or (iii) the registered vendor communicating to the registered user personal information maintained by the registered vendor. The method also includes each user's identity being authenticated over the communications network prior to completion of transactions between registered vendors and registered users.

    Centralized identity authentication for electronic communication networks

    公开(公告)号:US10032165B2

    公开(公告)日:2018-07-24

    申请号:US14026326

    申请日:2013-09-13

    摘要: A method of centralized identity authentication for use in connection with a communications network includes registering users of the communications network such that each registered user's identity is uniquely defined and determinable, and registering a plurality of vendors having a presence on the communications network. The registered vendors selectively transact with registered users, wherein the transactions include: (i) the registered vendor selling goods and/or services to the registered user; (ii) the registered vendor granting the registered user access to personal records maintained by the registered vendor; and/or (iii) the registered vendor communicating to the registered user personal information maintained by the registered vendor. The method also includes each user's identity being authenticated over the communications network prior to completion of transactions between registered vendors and registered users.

    SYSTEM AND METHOD FOR TOKENIZATION
    18.
    发明申请
    SYSTEM AND METHOD FOR TOKENIZATION 审中-公开
    系统和方法

    公开(公告)号:US20170017959A1

    公开(公告)日:2017-01-19

    申请号:US15213197

    申请日:2016-07-18

    IPC分类号: G06Q20/40 H04L29/06

    摘要: A method for obscuring a value of a sensitive data element includes: (a) receiving the sensitive data element, the sensitive data element being received over a data communications network (110) at a hardware computing device (142) of a trusted tokenization service provider (140); (b) generating a token corresponding to the received sensitive data element; (c) storing the token and sensitive data element in a memory device (146) such that they are correlated with one another; (d) providing the generated token to a first party (130) that uses the token in place of the sensitive data element in a request for authorization to complete a transaction, the request being sent from the first party (130); (e) intercepting the request for authorization including the token; (f) using the token contained in the intercepted request to look-up and retrieve the correlated sensitive data element in the memory device (160); (g) replacing the token contained in the request with the sensitive data element retrieved from the memory device (160); and (h) forwarding the request containing the sensitive data element to a second party (160 and/or 162) which employs the sensitive data element to determine whether completion of the transaction should be authorized or declined.

    摘要翻译: 用于遮蔽敏感数据元素的值的方法包括:(a)接收敏感数据元素,敏感数据元素在可信赖标记服务提供商的硬件计算设备(142)处通过数据通信网络(110)接收, (140); (b)产生对应于所接收的敏感数据元素的令牌; (c)将令牌和敏感数据元素存储在存储设备(146)中,使得它们彼此相关; (d)将所生成的令牌提供给第一方(130),所述第一方(130)在第一方(130)发送所述请求以在完成交易的请求中使用所述令牌代替所述敏感数据元素。 (e)截取包括令牌在内的授权请求; (f)使用包含在截取的请求中的令牌来查找和检索存储器件(160)中的相关敏感数据元素; (g)用从所述存储设备(160)检索的所述敏感数据元素替换所述请求中包含的令牌; 以及(h)将包含敏感数据元素的请求转发给使用敏感数据元素的第二方(160和/或162),以确定交易的完成是否应被授权或拒绝。

    System and Method for Tokenization
    20.
    发明申请

    公开(公告)号:US20210150525A1

    公开(公告)日:2021-05-20

    申请号:US17160984

    申请日:2021-01-28

    摘要: A method for obscuring a value of a sensitive data element includes: (a) receiving the sensitive data element, the sensitive data element being received over a data communications network (110) at a hardware computing device (142) of a trusted tokenization service provider (140); (b) generating a token corresponding to the received sensitive data element; (c) storing the token and sensitive data element in a memory device (146) such that they are correlated with one another; (d) providing the generated token to a first party (130) that uses the token in place of the sensitive data element in a request for authorization to complete a transaction, the request being sent from the first party (130); (e) intercepting the request for authorization including the token; (f) using the token contained in the intercepted request to look-up and retrieve the correlated sensitive data element in the memory device (160); (g) replacing the token contained in the request with the sensitive data element retrieved from the memory device (160); and (h) forwarding the request containing the sensitive data element to a second party (160 and/or 162) which employs the sensitive data element to determine whether completion of the transaction should be authorized or declined.