Tokenization in mobile environments
First Claim
1. A method for tokenizing data, comprising:
- providing, by a mobile device to a central security system communicatively coupled to each of a plurality of mobile devices via a network, information to be tokenized and an identification of one or more use rules;
receiving, by the mobile device from the central security system, a token card from the central security system, the token card generated by the central security system by querying a token table selected at least part based on the identified one or more use rules with a portion of the information and replacing the portion of the information with a token value mapped to a value of the portion of the information by the selected token table;
receiving, at the mobile device, a request to use the token card in an interaction by a user of the mobile device, the mobile device configured to display a representation of the token card in response to receiving the request; and
in response to receiving a selection of the displayed representation of the token card, providing, by the mobile device, the token card to a central processing system configured to authorize the use of the token card in the interaction in response to the identified one or more use rules being satisfied by the interaction.
1 Assignment
0 Petitions
Accused Products
Abstract
Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules.
92 Citations
19 Claims
-
1. A method for tokenizing data, comprising:
-
providing, by a mobile device to a central security system communicatively coupled to each of a plurality of mobile devices via a network, information to be tokenized and an identification of one or more use rules; receiving, by the mobile device from the central security system, a token card from the central security system, the token card generated by the central security system by querying a token table selected at least part based on the identified one or more use rules with a portion of the information and replacing the portion of the information with a token value mapped to a value of the portion of the information by the selected token table; receiving, at the mobile device, a request to use the token card in an interaction by a user of the mobile device, the mobile device configured to display a representation of the token card in response to receiving the request; and in response to receiving a selection of the displayed representation of the token card, providing, by the mobile device, the token card to a central processing system configured to authorize the use of the token card in the interaction in response to the identified one or more use rules being satisfied by the interaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for tokenizing data, comprising:
a mobile device comprising a hardware processor and a non-transitory computer-readable storage medium storing executable instructions that, when executed, perform steps comprising; providing, by the mobile device to a central security system communicatively coupled to each of a plurality of mobile devices via a network, information to be tokenized and an identification of one or more use rules; receiving, by the mobile device from the central security system, a token card from the central security system, the token card generated by the central security system by querying a token table selected at least part based on the identified one or more use rules with a portion of the information and replacing the portion of the information with a token value mapped to a value of the portion of the information by the selected token table; receiving, at the mobile device, a request to use the token card in an interaction by a user of the mobile device, the mobile device configured to display a representation of the token card in response to receiving the request; and in response to receiving a selection of the displayed representation of the token card, providing, by the mobile device, the token card to a central processing system configured to authorize the use of the token card in the interaction in response to the identified one or more use rules being satisfied by the interaction. - View Dependent Claims (15, 16)
-
17. A non-transitory computer-readable storage medium storing executable computer instructions that, when executed by a hardware processor, perform steps for tokenizing data comprising:
-
providing, by a mobile device to a central security system communicatively coupled to each of a plurality of mobile devices via a network, information to be tokenized and an identification of one or more use rules; receiving, by the mobile device from the central security system, a token card from the central security system, the token card generated by the central security system by querying a token table selected at least part based on the identified one or more use rules with a portion of the information and replacing the portion of the information with a token value mapped to a value of the portion of the information by the selected token table; receiving, at the mobile device, a request to use the token card in an interaction by a user of the mobile device, the mobile device configured to display a representation of the token card in response to receiving the request; and in response to receiving a selection of the displayed representation of the token card, providing, by the mobile device, the token card to a central processing system configured to authorize the use of the token card in the interaction in response to the identified one or more use rules being satisfied by the interaction. - View Dependent Claims (18, 19)
-
Specification