Systems and methods for secure detokenization
First Claim
Patent Images
1. A method comprising:
- sending, by a requestor computer, to a second token provider computer, a de-tokenization request comprising a requestor certificate and a second token, the requestor certificate including a requestor public key and indicating that the requestor computer is authorized to receive a credential,wherein the second token provider computer replaces the second token with a first token in the de-tokenization request, wherein the second token provider computer forwards the de-tokenization request with the requestor certificate and the first token to a first token provider computer,wherein the first token provider computer determines a credential associated with the first token, and wherein the first token provider computer encrypts the credential with the requestor public key; and
receiving, by the requestor computer, from the first token provider computer, the encrypted credential.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor'"'"'s authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor.
-
Citations
20 Claims
-
1. A method comprising:
-
sending, by a requestor computer, to a second token provider computer, a de-tokenization request comprising a requestor certificate and a second token, the requestor certificate including a requestor public key and indicating that the requestor computer is authorized to receive a credential, wherein the second token provider computer replaces the second token with a first token in the de-tokenization request, wherein the second token provider computer forwards the de-tokenization request with the requestor certificate and the first token to a first token provider computer, wherein the first token provider computer determines a credential associated with the first token, and wherein the first token provider computer encrypts the credential with the requestor public key; and receiving, by the requestor computer, from the first token provider computer, the encrypted credential. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A requestor computer comprising:
-
a processor; and a computer readable medium, the computer readable medium comprising code, executable by the processor, for implementing a method comprising; sending to a second token provider computer, a de-tokenization request comprising a requestor certificate and a second token, the requestor certificate including a requestor public key and indicating that the requestor computer is authorized to receive a credential, wherein the second token provider computer replaces the second token with a first token in the de-tokenization request, wherein the second token provider computer forwards the de-tokenization request with the requestor certificate and the first token to a first token provider computer, wherein the first token provider computer determines a credential associated with the first token, and wherein the first token provider computer encrypts the credential with the requestor public key; and receiving from the first token provider computer, the encrypted credential. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification