Mobile tokenization hub
First Claim
1. A method for providing tokens to a first mobile device and a second mobile device, wherein the first mobile device comprises a secure element and a memory and is associated with a first user, and wherein the second mobile device comprises memory and does not include a secure element, the method comprising:
- receiving, by a server, a first token request from the first mobile device, wherein the token request comprises an identifier of the first mobile device;
determining, by the server, based on the identifier for the first mobile device, that the first mobile device comprises the secure element;
based on the determining that the first mobile device has the secure element, generating, by the server, a first token and mapping the first token to an account identifier of the first user;
writing, by the server, the generated first token to the secure element of the first mobile device;
receiving, by the server, a second token request from the second mobile device, wherein the second token request comprises an identifier of the second mobile device;
determining, by the server, based on the identifier of the second mobile device that the second mobile device does not comprise a secure element;
based on the determination that the second mobile device does not contain a secure element, generating by the server, a time-to-live token; and
sending, by the server, the generated time-to-live token to the second mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention relate to systems and methods for implementing a mobile tokenization hub with a common tokenization capabilities (CTC) module that may provide tokenization for various entities in various contexts. For example, the CTC module can provide and store tokens for mobile payment transactions, transit transactions, digital wallet applications, merchant point of sale (POS) applications, personalization services, and the like.
-
Citations
11 Claims
-
1. A method for providing tokens to a first mobile device and a second mobile device, wherein the first mobile device comprises a secure element and a memory and is associated with a first user, and wherein the second mobile device comprises memory and does not include a secure element, the method comprising:
-
receiving, by a server, a first token request from the first mobile device, wherein the token request comprises an identifier of the first mobile device; determining, by the server, based on the identifier for the first mobile device, that the first mobile device comprises the secure element; based on the determining that the first mobile device has the secure element, generating, by the server, a first token and mapping the first token to an account identifier of the first user; writing, by the server, the generated first token to the secure element of the first mobile device; receiving, by the server, a second token request from the second mobile device, wherein the second token request comprises an identifier of the second mobile device; determining, by the server, based on the identifier of the second mobile device that the second mobile device does not comprise a secure element; based on the determination that the second mobile device does not contain a secure element, generating by the server, a time-to-live token; and sending, by the server, the generated time-to-live token to the second mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification