CASHLESS TRANSACTION PROCESSING METHODS AND APPARATUS

    公开(公告)号:US20190087823A1

    公开(公告)日:2019-03-21

    申请号:US16048670

    申请日:2018-07-30

    Abstract: A cashless transaction processing method is disclosed. The method comprises: receiving, in an issuer server, a transaction token request from a customer device, the transaction token request comprising an indication of a payment card account associated with a customer; providing a token to the customer device in response to the transaction token request; storing an indication of the token on the issuer server; receiving, from an acquirer server, a transaction authorization request, the transaction authorization request comprising a token; authenticating the token received in the transaction authorization request against the stored token; and initiating a transaction for the transaction amount from the payment card account associated with the customer.

    SYSTEMS AND METHODS FOR REAL-TIME IDENTITY VERIFICATION USING A TOKEN CODE

    公开(公告)号:US20230254303A1

    公开(公告)日:2023-08-10

    申请号:US18302489

    申请日:2023-04-18

    CPC classification number: H04L63/0823 H04L9/3213 H04L9/3228 H04L63/0428

    Abstract: An identity authority computing device having a processor in communication with a database is described herein. The database stores a plurality of persistent user identifiers associated with a plurality of users. The processor is programmed to receive a service request over a public network, the service request including a service provider identifier and a single-use token value associated with one of the users. The processor is also programmed to determine at least one persistent user identifier associated in the database with the token value, and generate an updated service request including the at least one persistent user identifier. The processor further is programmed to generate an encrypted service request using a public encryption key associated with the service provider identifier, and transmit the encrypted service request to a service provider computing device associated with the service provider identifier.

    Systems and methods for real-time identity verification using a token code

    公开(公告)号:US11652813B2

    公开(公告)日:2023-05-16

    申请号:US16593012

    申请日:2019-10-04

    CPC classification number: H04L63/0823 H04L9/3213 H04L9/3228 H04L63/0428

    Abstract: An identity authority computing device having a processor in communication with a database is described herein. The database stores a plurality of persistent user identifiers associated with a plurality of users. The processor is programmed to receive a service request over a public network, the service request including a service provider identifier and a single-use token value associated with one of the users. The processor is also programmed to determine at least one persistent user identifier associated in the database with the token value, and generate an updated service request including the at least one persistent user identifier. The processor further is programmed to generate an encrypted service request using a public encryption key associated with the service provider identifier, and transmit the encrypted service request to a service provider computing device associated with the service provider identifier.

    Systems and Methods for Use in Computer Network Security

    公开(公告)号:US20190327085A1

    公开(公告)日:2019-10-24

    申请号:US15958289

    申请日:2018-04-20

    Inventor: Keyur Patel

    Abstract: Systems and methods are provided for managing data across a network based on multiple keys assigned to different participants in association with the data. One exemplary method includes identifying, by an originating party, a relying party, identifying data relevant to at least one interaction between the originating party and the relying party, and encrypting the data based on a secret. The method also includes generating a key set based on the secret, where the key set has at least three keys and is structured such that the secret is derivable from at least two of the at least three keys, and disseminating a first key of the key set and the encrypted data to a control party and disseminating a second key of the key set to the relying party.

    SYSTEMS AND METHODS FOR SECURE PROVISIONING OF DATA USING SECURE TOKENS

    公开(公告)号:US20210103679A1

    公开(公告)日:2021-04-08

    申请号:US16593074

    申请日:2019-10-04

    Inventor: Keyur Patel

    Abstract: A secure token (ST) system including at least one ST computing device to provision data using secure tokens over a network is provided. The ST computing device is configured to receive first customer data from a credit issuer computing device, the first customer data including at least one or more account identifiers associated with a customer and a social security number (SSN) associated with the customer. The ST computing device is also configured to hash the SSN, wherein the hashed SSN includes a hash value, assign a unique identifier to each of the one or more account identifiers, and generate a secure token by associating the hash value to each unique identifier. The ST computing device is further configured to store the secure token within the database, and transmit the secure token to at least one of the credit issuer computing device and a third party computing device.

    Systems and methods for use in computer network security

    公开(公告)号:US10771245B2

    公开(公告)日:2020-09-08

    申请号:US15958289

    申请日:2018-04-20

    Inventor: Keyur Patel

    Abstract: Systems and methods are provided for managing data across a network based on multiple keys assigned to different participants in association with the data. One exemplary method includes identifying, by an originating party, a relying party, identifying data relevant to at least one interaction between the originating party and the relying party, and encrypting the data based on a secret. The method also includes generating a key set based on the secret, where the key set has at least three keys and is structured such that the secret is derivable from at least two of the at least three keys, and disseminating a first key of the key set and the encrypted data to a control party and disseminating a second key of the key set to the relying party.

    SYSTEMS AND METHODS FOR SECURE PROVISIONING OF DATA USING SECURE TOKENS

    公开(公告)号:US20230009742A1

    公开(公告)日:2023-01-12

    申请号:US17932890

    申请日:2022-09-16

    Inventor: Keyur Patel

    Abstract: A secure token (ST) system including at least one ST computing device to provision data using secure tokens over a network is provided. The ST computing device is configured to receive first customer data from a credit issuer computing device, the first customer data including at least one or more account identifiers associated with a customer and a social security number (SSN) associated with the customer. The ST computing device is also configured to hash the SSN, wherein the hashed SSN includes a hash value, assign a unique identifier to each of the one or more account identifiers, and generate a secure token by associating the hash value to each unique identifier. The ST computing device is further configured to store the secure token within the database, and transmit the secure token to at least one of the credit issuer computing device and a third party computing device.

    Systems and methods for secure provisioning of data using secure tokens

    公开(公告)号:US11914752B2

    公开(公告)日:2024-02-27

    申请号:US17932890

    申请日:2022-09-16

    Inventor: Keyur Patel

    Abstract: A secure token (ST) system including at least one ST computing device to provision data using secure tokens over a network is provided. The ST computing device is configured to receive first customer data from a credit issuer computing device, the first customer data including at least one or more account identifiers associated with a customer and a social security number (SSN) associated with the customer. The ST computing device is also configured to hash the SSN, wherein the hashed SSN includes a hash value, assign a unique identifier to each of the one or more account identifiers, and generate a secure token by associating the hash value to each unique identifier. The ST computing device is further configured to store the secure token within the database, and transmit the secure token to at least one of the credit issuer computing device and a third party computing device.

    Systems and methods for secure provisioning of data using secure tokens

    公开(公告)号:US11449636B2

    公开(公告)日:2022-09-20

    申请号:US16593074

    申请日:2019-10-04

    Inventor: Keyur Patel

    Abstract: A secure token (ST) system including at least one ST computing device to provision data using secure tokens over a network is provided. The ST computing device is configured to receive first customer data from a credit issuer computing device, the first customer data including at least one or more account identifiers associated with a customer and a social security number (SSN) associated with the customer. The ST computing device is also configured to hash the SSN, wherein the hashed SSN includes a hash value, assign a unique identifier to each of the one or more account identifiers, and generate a secure token by associating the hash value to each unique identifier. The ST computing device is further configured to store the secure token within the database, and transmit the secure token to at least one of the credit issuer computing device and a third party computing device.

Patent Agency Ranking