Sensitive data aliasing for transaction-card and other applications
First Claim
Patent Images
1. A method of using data sets associated with transaction card identifiers directed for use in a retail environment, the method being implemented by a computer-based circuit configured and software-programmed to perform the steps of:
- accessing, by the computer-based circuit, alias identifiers that represent the transaction card identifiers;
associating the alias identifiers to encrypted forms of the transaction card identifiers;
using the alias identifiers to analyze retail-environment aspects of the data sets, and generating user-directed output therefrom, independent of the transaction card identifiers and the encrypted forms of the transaction card identifiers;
maintaining the association between the alias identifiers and the transaction card identifiers for secured access and decoding, in response to and using disparately processed data, one of;
the alias identifiers, andthe transaction card identifiers.
6 Assignments
0 Petitions
Accused Products
Abstract
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing retail transaction information are analyzed using aliases representing transaction card identifiers. In another embodiment, the transaction card identifiers are stored in an encrypted form for use from a secure access, while the alias identifier is available for standard access.
-
Citations
20 Claims
-
1. A method of using data sets associated with transaction card identifiers directed for use in a retail environment, the method being implemented by a computer-based circuit configured and software-programmed to perform the steps of:
-
accessing, by the computer-based circuit, alias identifiers that represent the transaction card identifiers; associating the alias identifiers to encrypted forms of the transaction card identifiers; using the alias identifiers to analyze retail-environment aspects of the data sets, and generating user-directed output therefrom, independent of the transaction card identifiers and the encrypted forms of the transaction card identifiers; maintaining the association between the alias identifiers and the transaction card identifiers for secured access and decoding, in response to and using disparately processed data, one of; the alias identifiers, and the transaction card identifiers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification