Identification and Verification for Provisioning Mobile Application
First Claim
1. A method comprising:
- receiving, by a server computer, a first set of user information from at least one of a first mobile application or an authorizing server;
storing, by the server computer, the received first set of user information;
receiving, by the server computer, a request for a token from a second mobile application, the request comprising at least a second set of user information, wherein the second set of user information includes at least a portion of the first set of user information;
comparing the second set of user information with the first set of user information;
generating the token by the server computer based on the comparing; and
transmitting, by the server computer, the token to the second mobile application.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments are directed to the generation of a token associated with a status. The status of the token may affect how the token is treated and the types of restrictions placed on the token. The status of the token may indicate that the token is generated based on verification of secure user data. Alternatively, the status of the token may indicate that the token is generated based on insufficient user data and, as such, restrictions may be imposed on the token. The token requestor may be a mobile application, such as a merchant mobile application provisioned on a user device. In response to a token request from the merchant, the token provider issues tokens with varying status based on a confidence level. The status of the token may be indicated in terms of token assurance level.
265 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a server computer, a first set of user information from at least one of a first mobile application or an authorizing server; storing, by the server computer, the received first set of user information; receiving, by the server computer, a request for a token from a second mobile application, the request comprising at least a second set of user information, wherein the second set of user information includes at least a portion of the first set of user information; comparing the second set of user information with the first set of user information; generating the token by the server computer based on the comparing; and transmitting, by the server computer, the token to the second mobile application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving, by a server computer, a request for a token from a mobile application, the request comprising identifying information associated with an account and a value assigned to a user of the account; validating, by the server computer, the value assigned to the user of the account; determining, by the server computer, a confidence level based on the validating; generating the token by the server computer, wherein a status of the token is based at least in part on the confidence level, the status of the token being indicative of a level of restriction associated with the token; and transmitting, by the server computer, the token to the mobile application. - View Dependent Claims (12, 13)
-
-
14. A server computer comprising a processor and a computer readable medium comprising code, executable by the processor, for implementing a method comprising:
-
receiving, by a server computer, a first set of user information from at least one of a first mobile application or an authorizing server; storing, by the server computer, the received first set of user information; receiving, by the server computer, a request for a token from a second mobile application, the request comprising at least a second set of user information, wherein the second set of user information includes at least a portion of the first set of user information; comparing the second set of user information with the first set of user information; generating the token by the server computer based on the comparing; and transmitting, by the server computer, the token to the second mobile application. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A server computer comprising a processor and a computer readable medium comprising code, executable by the processor, for implementing a method comprising:
-
receiving, by a server computer, a request for a token from a mobile application, the request comprising identifying information associated with an account and a value assigned to a user of the account; validating, by the server computer, the value assigned to the user of the account; determining, by the server computer, a confidence level based on the validating; generating the token by the server computer, wherein a status of the token is based at least in part on the confidence level, the status of the token being indicative of a level of restriction associated with the token; and transmitting, by the server computer, the token to the mobile application. - View Dependent Claims (20)
-
Specification