Electronic authorization system and method
First Claim
Patent Images
1. An electronic authorization system comprising:
- a data source system operating on a first processor and configured to transmit transaction data;
a secure data system operating on a second processor and coupled to the data source system over an open network, the secure data system is configured to receive the transaction data from the data source system, generate a unique encrypted identifier for the transaction data and to transmit the unique encrypted identifier to the data source system;
wherein the data source system is configured to receive the unique encrypted identifier and replace payment card data associated with the transaction data in a database with the unique encrypted identifier.
4 Assignments
0 Petitions
Accused Products
Abstract
An electronic authorization system comprising a data source system configured to transmit transaction data. A secure data system is coupled to the data source system over an open network, the secure data system is configured to receive the transaction data from the data source system, generate a unique encrypted identifier for the transaction data and to transmit the unique encrypted identifier to the data source system. The data source system is configured to receive the unique encrypted identifier and replace payment card data associated with the transaction data in a database with the unique encrypted identifier.
27 Citations
19 Claims
-
1. An electronic authorization system comprising:
-
a data source system operating on a first processor and configured to transmit transaction data; a secure data system operating on a second processor and coupled to the data source system over an open network, the secure data system is configured to receive the transaction data from the data source system, generate a unique encrypted identifier for the transaction data and to transmit the unique encrypted identifier to the data source system; wherein the data source system is configured to receive the unique encrypted identifier and replace payment card data associated with the transaction data in a database with the unique encrypted identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for electronic authorization comprising:
-
receiving transaction data from a data source system over an open network at a secure data network; generating a unique encrypted identifier for the transaction data at the secure data network using a processor; storing the transaction data and the unique encrypted identifier at the secure data network in a non-volatile memory device; and transmitting the unique encrypted identifier to the data source system in a message format that causes the data source system to replace stored payment card data with the unique encrypted identifier. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification