×

Systems and methods for secure detokenization

  • US 10,652,028 B2
  • Filed: 06/20/2018
  • Issued: 05/12/2020
  • Est. Priority Date: 07/23/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a token provider computer, a de-tokenization request comprising a token and a requestor certificate associated with a requestor computer, the requestor certificate indicating that the requestor computer is authorized to receive a credential associated with the token, the requestor certificate including a requestor public key, and wherein the de-tokenization request originated from the requestor computer;

    determining, by the token provider computer, the credential associated with the token;

    determining, by the token provider computer, that the requestor computer is authorized to receive the credential based on the requestor certificate;

    encrypting, by the token provider computer, the credential with the requestor public key included in the requestor certificate; and

    sending, by the token provider computer, a de-tokenization response to the requestor computer, the de-tokenization response including the encrypted credential.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×