Please download the dossier by clicking on the dossier button x
×

Systems and methods for secure detokenization

  • US 10,038,563 B2
  • Filed: 08/09/2017
  • Issued: 07/31/2018
  • Est. Priority Date: 07/23/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • sending, by a requestor computer, to a second token provider computer, a de-tokenization request comprising a requestor certificate and a second token, the requestor certificate including a requestor public key and indicating that the requestor computer is authorized to receive a credential,wherein the second token provider computer replaces the second token with a first token in the de-tokenization request, wherein the second token provider computer forwards the de-tokenization request with the requestor certificate and the first token to a first token provider computer,wherein the first token provider computer determines a credential associated with the first token, and wherein the first token provider computer encrypts the credential with the requestor public key; and

    receiving, by the requestor computer, from the first token provider computer, the encrypted credential.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×