Tokenization in mobile environments
First Claim
1. A method for tokenizing data, comprising:
- receiving, at an input/output interface of a communication system, information associated with an interaction between a user and the communication system;
generating, by a token server of the communication system, a first set of token tables, each token table in the first set of token tables mapping each of a plurality of input values to a different token value;
tokenizing, by a security engine of the communication system, the received information based on the first set of token tables to form first tokenized information;
transmitting, by the input/output interface of the communication system, the first tokenized information to a central server communicatively coupled to a network associated with the interaction;
transmitting, by the input/output interface of the communication system, the first set of token tables to a central security system communicatively coupled to both the communication system and the central server;
receiving, at the central server and from the central security system, the first set of token tables generated by the communication system and a second set of token tables generated by the central security system, each token table in the second set of token tables mapping each of a plurality of input values to a different token value;
detokenizing, by the central server, the first tokenized information based on the first set of token tables generated by the communication system;
tokenizing, by the central server, the detokenized information based on the second set of token tables generated by the central security system to form second tokenized information; and
transmitting, by the central server, the second tokenized information to the network.
3 Assignments
0 Petitions
Accused Products
Abstract
Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules.
-
Citations
20 Claims
-
1. A method for tokenizing data, comprising:
-
receiving, at an input/output interface of a communication system, information associated with an interaction between a user and the communication system; generating, by a token server of the communication system, a first set of token tables, each token table in the first set of token tables mapping each of a plurality of input values to a different token value; tokenizing, by a security engine of the communication system, the received information based on the first set of token tables to form first tokenized information; transmitting, by the input/output interface of the communication system, the first tokenized information to a central server communicatively coupled to a network associated with the interaction; transmitting, by the input/output interface of the communication system, the first set of token tables to a central security system communicatively coupled to both the communication system and the central server; receiving, at the central server and from the central security system, the first set of token tables generated by the communication system and a second set of token tables generated by the central security system, each token table in the second set of token tables mapping each of a plurality of input values to a different token value; detokenizing, by the central server, the first tokenized information based on the first set of token tables generated by the communication system; tokenizing, by the central server, the detokenized information based on the second set of token tables generated by the central security system to form second tokenized information; and transmitting, by the central server, the second tokenized information to the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for tokenizing data, comprising:
-
a communication system, configured to; receive, at an input/output interface of the communication system, information associated with an interaction between a user and the communication system; generate, by a token server of the communication system, a first set of token tables, each token table in the first set of token tables mapping each of a plurality of input values to a different token value; tokenize, by a security engine of the communication system, the received information based on the first set of token tables to form first tokenized information; transmit, by the input/output interface of the communication system, the first tokenized information to a central server communicatively coupled to a network associated with the interaction; and transmit, by the input/output interface of the communication system, the first set of token tables to a central security system communicatively coupled to both the communication system and the central server; and a central server, configured to; receive, from the central security system, the first set of token tables generated by the communication system and a second set of token tables generated by the central security system, each token table in the second set of token tables mapping each of a plurality of input values to a different token value; detokenize the first tokenized information based on the first set of token tables generated by the communication system; tokenize the detokenized information based on the second set of token tables generated by the central security system to form second tokenized information; and transmit the second tokenized information to the network. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification