×

Systems and methods for secure detokenization

  • US 9,780,953 B2
  • Filed: 07/22/2015
  • Issued: 10/03/2017
  • Est. Priority Date: 07/23/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a second token provider computer, from a requestor computer, a de-tokenization request comprising a requestor certificate and a second token generated by the second token provider computer, the requestor certificate including a requestor public key;

    determining, by the second token provider computer, a first token associated with the second token, wherein the first token was generated by a first token provider computer;

    replacing, by the second token provider computer, the second token with the first token in the de-tokenization request; and

    forwarding, by the second token provider computer, the de-tokenization request with the requestor certificate and the first token to the first token provider computer, wherein the first token provider computer returns a credential associated with the first token to the requestor computer, wherein the credential returned to the requestor computer is encrypted using the requestor public key, and wherein the requestor certificate indicates that the requestor computer is authorized to receive the credential.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×