Unique code for token verification
First Claim
Patent Images
1. A method comprising:
- receiving, by a second computer, from a first computer, a request for a verification value associated with a transaction, the request including a token;
generating, by the second computer, a dynamic data element that is not shared with the first computer and a third computer;
storing, by the second computer, a record including the dynamic data element and the token;
generating, by the second computer, a first verification value based on the dynamic data element and the token wherein the first verification value is formatted as a dynamic card verification value 2 (dCVV2);
providing, by the second computer, the first verification value to the first computer;
receiving, by the second computer, from the third computer, a request to validate the first verification value, the request including the first verification value and the token;
identifying, by the second computer, the record including the dynamic data element based on the token;
generating, by the second computer, a second verification value based on the dynamic data element and the token;
determining, by the second computer, whether the second verification value matches the first verification value; and
providing, by the second computer, to the third computer, a value credential associated with the token when the second verification value matches the first verification value, and not providing the value credential associated with the token when the second verification value does not match the first verification value,wherein the transaction is a payment transaction, andwherein the third computer sends the value credential to an authorizing entity computer, which authorizes the payment transaction based on the value credential.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for tokenizing credentials is disclosed. In addition to a token, a verification value can be provided for each interaction. The verification value can be generated based at least in part on a dynamic data element. The dynamic data element may be kept secret, while the verification value can be distributed for use during an interaction. When the verification value is used, it can be validated by re-creating the verification value based at least on the stored dynamic data element.
-
Citations
19 Claims
-
1. A method comprising:
-
receiving, by a second computer, from a first computer, a request for a verification value associated with a transaction, the request including a token; generating, by the second computer, a dynamic data element that is not shared with the first computer and a third computer; storing, by the second computer, a record including the dynamic data element and the token; generating, by the second computer, a first verification value based on the dynamic data element and the token wherein the first verification value is formatted as a dynamic card verification value 2 (dCVV2); providing, by the second computer, the first verification value to the first computer; receiving, by the second computer, from the third computer, a request to validate the first verification value, the request including the first verification value and the token; identifying, by the second computer, the record including the dynamic data element based on the token; generating, by the second computer, a second verification value based on the dynamic data element and the token; determining, by the second computer, whether the second verification value matches the first verification value; and providing, by the second computer, to the third computer, a value credential associated with the token when the second verification value matches the first verification value, and not providing the value credential associated with the token when the second verification value does not match the first verification value, wherein the transaction is a payment transaction, and wherein the third computer sends the value credential to an authorizing entity computer, which authorizes the payment transaction based on the value credential. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A second computer comprising:
-
a processor device; and a non-transitory computer readable medium, the non-transitory computer readable medium comprising code, executable by the processor device, for implementing a method comprising; receiving, from a first computer, a request for a verification value associated with a transaction, the request including a token; generating a dynamic data element that is not shared with the first computer and a third computer; storing a record including the dynamic data element and the token; generating a first verification value based on the dynamic data element and the token wherein the first verification value is formatted as a dynamic card verification value 2 (dCVV2); providing the first verification value to the first computer; receiving, from the third computer, a request to validate the first verification value, the request including the first verification value and the token; identifying the record including the dynamic data element based on the token; generating a second verification value based on the dynamic data element and the token; determining whether the second verification value matches the first verification value; and providing, to the third computer, a value credential associated with the token when the second verification value matches the first verification value, and not providing the value credential associated with the token when the second verification value does not match the first verification value, wherein the transaction is a payment transaction, and wherein the third computer sends the value credential to an authorizing entity computer, which authorizes the payment transaction based on the value credential. - View Dependent Claims (10, 11, 12)
-
-
13. A method comprising:
-
receiving, by a third computer, from a first computer, an authorization request message for a payment transaction, the authorization request message including a token and a first verification value, wherein the first verification value is formatted as a dynamic card verification value 2 (dCVV2); sending, by the third computer, the token and the first verification value to a second computer, wherein the second computer identifies a dynamic data element based on the token, wherein the dynamic data element is not shared by the second computer with the first computer and the third computer, wherein the second computer generates a second verification value based on the dynamic data element and the token, and wherein the second computer determines whether the second verification value matches the first verification value and provides, to the third computer, a value credential associated with the token when the second verification value matches the first verification value and does not provide the value credential associated with the token when the second verification value does not match the first verification value; receiving, by the third computer, from the second computer, the value credential associated with the token; and sending, by the third computer, the authorization request message and the value credential to an authorizing entity computer, wherein the authorizing entity computer authorizes the payment transaction based on the value credential. - View Dependent Claims (14, 15, 16)
-
-
17. A third computer comprising:
-
a processor device; and a non-transitory computer readable medium, the non-transitory computer readable medium comprising code, executable by the processor device, for implementing a method comprising; receiving, from a first computer, an authorization request message for a payment transaction, the authorization request message including a token and a first verification value, wherein the first verification value is formatted as a dynamic card verification value 2 (dCVV2); sending the token and the first verification value to a second computer, wherein the second computer identifies a dynamic data element based on the token, wherein the dynamic data element is not shared by the second computer with the first computer and the third computer, wherein the second computer generates a second verification value based on the dynamic data element and the token, and wherein the second computer determines whether the second verification value matches the first verification value and provides, to the third computer, a value credential associated with the token when the second verification value matches the first verification value and does not provide the value credential associated with the token when the second verification value does not match the first verification value; receiving, from the second computer, the value credential associated with the token; and sending the authorization request message and the value credential to an authorizing entity computer, wherein the authorizing entity computer authorizes the payment transaction based on the value credential. - View Dependent Claims (18, 19)
-
Specification