Electronic authorization system and method
First Claim
Patent Images
1. A computer implemented method of tokenizing data, the method comprising:
- receiving a request from a first processor, the request comprising confidential data and a first input data portion;
receiving a second input data portion from a second processor;
generating a token based on the confidential data, the first input data portion and the second input data portion;
transmitting the token to the first processor in a field corresponding to a VISAD data format field;
generating one or more requests at the first processor based on the first input data portion;
tokenizing a response to the request at a third processor using the token;
receiving the response to the request at the first processor; and
storing the token in a non-transitory computer readable storage medium at the first processor.
4 Assignments
0 Petitions
Accused Products
Abstract
An electronic authorization system comprising a data source system configured to transmit transaction data. A secure data system is coupled to the data source system over an open network, the secure data system is configured to receive the transaction data from the data source system, generate a unique encrypted identifier for the transaction data and to transmit the unique encrypted identifier to the data source system. The data source system is configured to receive the unique encrypted identifier and replace payment card data associated with the transaction data in a database with the unique encrypted identifier.
-
Citations
20 Claims
-
1. A computer implemented method of tokenizing data, the method comprising:
-
receiving a request from a first processor, the request comprising confidential data and a first input data portion; receiving a second input data portion from a second processor; generating a token based on the confidential data, the first input data portion and the second input data portion; transmitting the token to the first processor in a field corresponding to a VISAD data format field; generating one or more requests at the first processor based on the first input data portion; tokenizing a response to the request at a third processor using the token; receiving the response to the request at the first processor; and storing the token in a non-transitory computer readable storage medium at the first processor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer implemented method of tokenizing data, the method comprising:
-
receiving input data to be tokenized at a first processor, the input data comprising confidential data in a first predefined data field, a first data portion and a second data portion; generating a token as a function of the confidential data, the first data portion and the second data portion; transmitting the token to a second processor in a field corresponding to the first predefined data field; storing the token at the second processor with the first data portion and the second data portion in a non-transitory computer readable storage medium; generating a data request at the second processor using the token; applying an encryption key to the confidential, the first data portion and the second data portion; and wherein the first predefined data field is from a VISAD data format. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage medium having executable computer program instructions embodied therein for tokenizing data, the actions of the computer program instructions comprising:
-
accessing input data to be tokenized at a first processor, the input data comprising confidential data and a first data portion from a second processor and a second data portion from a third processor; generating a token at the first processor; transmitting the token from the first processor to the second processor in a first predetermined set of data fields of a VISAD format; and storing the token at the second processor in a non-transitory computer readable storage medium. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification