Tokenization in mobile environments
First Claim
1. A method for tokenizing data, comprising:
- receiving, at an input/output interface of a communication system, information associated with an interaction between a user and the communication system;
generating, by a token server of the communication system, a first set of token tables, each token table in the first set of token tables mapping each of a plurality of input values to a different token value;
tokenizing, by a security engine of the communication system, the received information using the first set of token tables to form first tokenized information;
transmitting, by the input/output interface of the communication system, the first set of token tables to a central security system communicatively coupled to both the communication system and a central server communicatively coupled to a network associated with the interaction; and
transmitting, by the input/output interface of the communication system, the first tokenized information to the central server, the central server configured to receive the first set of token tables and a second set of token tables from the central security system, each token table in the second set of token tables mapping each of a plurality of input values to a different token value, and further configured to tokenize the first tokenized information using the second set of token tables to form second tokenized information and to transmit the second tokenized information to the network.
1 Assignment
0 Petitions
Accused Products
Abstract
Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules.
111 Citations
20 Claims
-
1. A method for tokenizing data, comprising:
-
receiving, at an input/output interface of a communication system, information associated with an interaction between a user and the communication system; generating, by a token server of the communication system, a first set of token tables, each token table in the first set of token tables mapping each of a plurality of input values to a different token value; tokenizing, by a security engine of the communication system, the received information using the first set of token tables to form first tokenized information; transmitting, by the input/output interface of the communication system, the first set of token tables to a central security system communicatively coupled to both the communication system and a central server communicatively coupled to a network associated with the interaction; and transmitting, by the input/output interface of the communication system, the first tokenized information to the central server, the central server configured to receive the first set of token tables and a second set of token tables from the central security system, each token table in the second set of token tables mapping each of a plurality of input values to a different token value, and further configured to tokenize the first tokenized information using the second set of token tables to form second tokenized information and to transmit the second tokenized information to the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for tokenizing data, comprising:
a communication system, configured to; receive, at an input/output interface of the communication system, information associated with an interaction between a user and the communication system; generate, by a token server of the communication system, a first set of token tables, each token table in the first set of token tables mapping each of a plurality of input values to a different token value; tokenize, by a security engine of the communication system, the received information using on the first set of token tables to form first tokenized information; transmit, by the input/output interface of the communication system, the first set of token tables to a central security system communicatively coupled to both the communication system and a central server communicatively coupled to a network associated with the interaction; and transmit, by the input/output interface of the communication system, the first tokenized information to the central, the central server configure to receive the first set of token tables and a second set of token tables from the central security system, each token table in the second set of token tables mapping each of a plurality of input values to a different token value, and further configured to tokenize the first tokenized information using the second set of token tables to form second tokenized information and to transmit the second tokenized information to the network. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
Specification