-
公开(公告)号:US11429965B2
公开(公告)日:2022-08-30
申请号:US17160984
申请日:2021-01-28
发明人: Michael A. Keresman, III , Chandra Balasubramanian , Gary Bender , Mark Carlson , Edward Katzin , Francis M. Sherwin
摘要: A method for obscuring a value of a sensitive data element includes: (a) receiving the sensitive data element, the sensitive data element being received over a data communications network (110) at a hardware computing device (142) of a trusted tokenization service provider (140); (b) generating a token corresponding to the received sensitive data element; (c) storing the token and sensitive data element in a memory device (146) such that they are correlated with one another; (d) providing the generated token to a first party (130) that uses the token in place of the sensitive data element in a request for authorization to complete a transaction, the request being sent from the first party (130); (e) intercepting the request for authorization including the token; (f) using the token contained in the intercepted request to look-up and retrieve the correlated sensitive data element in the memory device (160); (g) replacing the token contained in the request with the sensitive data element retrieved from the memory device (160); and (h) forwarding the request containing the sensitive data element to a second party (160 and/or 162) which employs the sensitive data element to determine whether completion of the transaction should be authorized or declined.
-
公开(公告)号:US10235671B2
公开(公告)日:2019-03-19
申请号:US15213197
申请日:2016-07-18
发明人: Michael A. Keresman, III , Francis M. Sherwin , Chandra Balasubramanian , Gary Bender , Ed Katzin , Mark Carlson
摘要: A method for obscuring a value of a sensitive data element includes: (a) receiving the sensitive data element, the sensitive data element being received over a data communications network (110) at a hardware computing device (142) of a trusted tokenization service provider (140); (b) generating a token corresponding to the received sensitive data element; (c) storing the token and sensitive data element in a memory device (146) such that they are correlated with one another; (d) providing the generated token to a first party (130) that uses the token in place of the sensitive data element in a request for authorization to complete a transaction, the request being sent from the first party (130); (e) intercepting the request for authorization including the token; (f) using the token contained in the intercepted request to look-up and retrieve the correlated sensitive data element in the memory device (160); (g) replacing the token contained in the request with the sensitive data element retrieved from the memory device (160); and (h) forwarding the request containing the sensitive data element to a second party (160 and/or 162) which employs the sensitive data element to determine whether completion of the transaction should be authorized or declined.
-
公开(公告)号:US20170017959A1
公开(公告)日:2017-01-19
申请号:US15213197
申请日:2016-07-18
发明人: Michael A. Keresman, III , Francis M. Sherwin , Chandra Balasubramanian , Gary Bender , Ed Katzin , Mark Carlson
CPC分类号: G06Q20/40 , G06Q20/02 , G06Q20/382 , G06Q20/385 , H04L63/0428
摘要: A method for obscuring a value of a sensitive data element includes: (a) receiving the sensitive data element, the sensitive data element being received over a data communications network (110) at a hardware computing device (142) of a trusted tokenization service provider (140); (b) generating a token corresponding to the received sensitive data element; (c) storing the token and sensitive data element in a memory device (146) such that they are correlated with one another; (d) providing the generated token to a first party (130) that uses the token in place of the sensitive data element in a request for authorization to complete a transaction, the request being sent from the first party (130); (e) intercepting the request for authorization including the token; (f) using the token contained in the intercepted request to look-up and retrieve the correlated sensitive data element in the memory device (160); (g) replacing the token contained in the request with the sensitive data element retrieved from the memory device (160); and (h) forwarding the request containing the sensitive data element to a second party (160 and/or 162) which employs the sensitive data element to determine whether completion of the transaction should be authorized or declined.
摘要翻译: 用于遮蔽敏感数据元素的值的方法包括:(a)接收敏感数据元素,敏感数据元素在可信赖标记服务提供商的硬件计算设备(142)处通过数据通信网络(110)接收, (140); (b)产生对应于所接收的敏感数据元素的令牌; (c)将令牌和敏感数据元素存储在存储设备(146)中,使得它们彼此相关; (d)将所生成的令牌提供给第一方(130),所述第一方(130)在第一方(130)发送所述请求以在完成交易的请求中使用所述令牌代替所述敏感数据元素。 (e)截取包括令牌在内的授权请求; (f)使用包含在截取的请求中的令牌来查找和检索存储器件(160)中的相关敏感数据元素; (g)用从所述存储设备(160)检索的所述敏感数据元素替换所述请求中包含的令牌; 以及(h)将包含敏感数据元素的请求转发给使用敏感数据元素的第二方(160和/或162),以确定交易的完成是否应被授权或拒绝。
-
公开(公告)号:US20210150525A1
公开(公告)日:2021-05-20
申请号:US17160984
申请日:2021-01-28
发明人: Michael A. Keresman, III , Chandra Balasubramanian , Gary Bender , Mark Carlson , Edward Katzin , Francis M. Sherwin
摘要: A method for obscuring a value of a sensitive data element includes: (a) receiving the sensitive data element, the sensitive data element being received over a data communications network (110) at a hardware computing device (142) of a trusted tokenization service provider (140); (b) generating a token corresponding to the received sensitive data element; (c) storing the token and sensitive data element in a memory device (146) such that they are correlated with one another; (d) providing the generated token to a first party (130) that uses the token in place of the sensitive data element in a request for authorization to complete a transaction, the request being sent from the first party (130); (e) intercepting the request for authorization including the token; (f) using the token contained in the intercepted request to look-up and retrieve the correlated sensitive data element in the memory device (160); (g) replacing the token contained in the request with the sensitive data element retrieved from the memory device (160); and (h) forwarding the request containing the sensitive data element to a second party (160 and/or 162) which employs the sensitive data element to determine whether completion of the transaction should be authorized or declined.
-
公开(公告)号:US10937026B2
公开(公告)日:2021-03-02
申请号:US16266571
申请日:2019-02-04
发明人: Michael A. Keresman, III , Chandra Balasubramanian , Gary Bender , Mark Carlson , Ed Katzin , Francis M. Sherwin
摘要: A method for obscuring a value of a sensitive data element includes: (a) receiving the sensitive data element, the sensitive data element being received over a data communications network (110) at a hardware computing device (142) of a trusted tokenization service provider (140); (b) generating a token corresponding to the received sensitive data element; (c) storing the token and sensitive data element in a memory device (146) such that they are correlated with one another; (d) providing the generated token to a first party (130) that uses the token in place of the sensitive data element in a request for authorization to complete a transaction, the request being sent from the first party (130); (e) intercepting the request for authorization including the token; (f) using the token contained in the intercepted request to look-up and retrieve the correlated sensitive data element in the memory device (160); (g) replacing the token contained in the request with the sensitive data element retrieved from the memory device (160); and (h) forwarding the request containing the sensitive data element to a second party (160 and/or 162) which employs the sensitive data element to determine whether completion of the transaction should be authorized or declined.
-
公开(公告)号:US20190172061A1
公开(公告)日:2019-06-06
申请号:US16266571
申请日:2019-02-04
发明人: Michael A. Keresman, III , Chandra Balasubramanian , Gary Bender , Mark Carlson , Ed Katzin , Francis M. Sherwin
摘要: A method for obscuring a value of a sensitive data element includes: (a) receiving the sensitive data element, the sensitive data element being received over a data communications network (110) at a hardware computing device (142) of a trusted tokenization service provider (140); (b) generating a token corresponding to the received sensitive data element; (c) storing the token and sensitive data element in a memory device (146) such that they are correlated with one another; (d) providing the generated token to a first party (130) that uses the token in place of the sensitive data element in a request for authorization to complete a transaction, the request being sent from the first party (130); (e) intercepting the request for authorization including the token; (f) using the token contained in the intercepted request to look-up and retrieve the correlated sensitive data element in the memory device (160); (g) replacing the token contained in the request with the sensitive data element retrieved from the memory device (160); and (h) forwarding the request containing the sensitive data element to a second party (160 and/or 162) which employs the sensitive data element to determine whether completion of the transaction should be authorized or declined.
-
-
-
-
-