METHODS AND SYSTEMS FOR PROVIDING A LOW VALUE TOKEN BUFFER
First Claim
1. A method comprising:
- receiving, by a first server computer, a request message including a first token from an access device, the first token being a substitute for a real credential, the first token being configured to be processed by the access device to conduct a transaction;
determining, by the first server computer, a second token associated with the first token, the second token not being configured to be processed by the access device to conduct the transaction;
updating, by the first server computer, the request message to include the second token; and
sending, by the first server computer, the request message including the second token to a second server computer, the second server computer using the second token to either obtain the first token or the real credential to incorporate into the request message before transmitting the request message to an authorizing entity computer.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention are directed at methods and systems for providing a low value token buffer using only low value tokens (i.e., tokens that cannot be used to conduct transactions) within an organization to reduce access to high value tokens (i.e., tokens that are directly tied to real credentials and can be used to conduct transactions) within the organization. Accordingly, whenever a high value token is received by the organization, the high value token is changed to a low value token while being used within the organization. The low value token may be transformed to high value token upon (or before) delivery outside the organization.
71 Citations
16 Claims
-
1. A method comprising:
-
receiving, by a first server computer, a request message including a first token from an access device, the first token being a substitute for a real credential, the first token being configured to be processed by the access device to conduct a transaction; determining, by the first server computer, a second token associated with the first token, the second token not being configured to be processed by the access device to conduct the transaction; updating, by the first server computer, the request message to include the second token; and sending, by the first server computer, the request message including the second token to a second server computer, the second server computer using the second token to either obtain the first token or the real credential to incorporate into the request message before transmitting the request message to an authorizing entity computer. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A first server computer comprising:
-
a processor; and a memory comprising code, executable by the processor, for implementing a method comprising; receiving a request message including a first token from an access device, the first token being a substitute for a real credential, the first token being configured to be processed by the access device to conduct a transaction; determining a second token associated with the first token, the second token not being configured to be processed by the access device to conduct the transaction; updating the request message to include the second token; and sending the request message including the second token to a second server computer, the second server computer using the second token to either obtain the first token or the real credential to incorporate into the request message before transmitting the request message to an authorizing entity computer. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving, by a server computer, a request message including a first token from an access device, the first token being a substitute for a real credential, the first token being configured to be processed by the access device to conduct a transaction; determining, by the server computer, a second token associated with the first token, the second token not being configured to be processed by the access device to conduct the transaction; sending, by the server computer, the second token to an application system, wherein the application system performs analysis using the second token; receiving, by the server computer, the second token and results of the analysis from the application system; determining, by the server computer, the real credential using the second token; updating, by the server computer, the request message to include the real credential; and sending, by the server computer, the request message including the real credential to an authorizing entity computer. - View Dependent Claims (16)
-
Specification