Token enrollment system and method

Information

  • Patent Grant
  • 10015147
  • Patent Number
    10,015,147
  • Date Filed
    Thursday, October 22, 2015
    9 years ago
  • Date Issued
    Tuesday, July 3, 2018
    6 years ago
Abstract
Embodiments of the invention are directed to methods, apparatuses, computer readable media and systems for providing a token service environment that allows a token requesting party (e.g. token requestor) to specify parameters for token generation for controlling and customizing the token generation process. For example, the token requesting party may specify (e.g. select from a list or provide a list of) the accounts for tokenization. The accounts may be identified by account identifiers (e.g. account numbers) or bank identification numbers (BINs). The token requesting party may also specify encryption keys for the tokens to be generated. The token requesting party may also specify additional parameters such as notification thresholds indicating when notifications associated with the tokens are to be generated.
Description
BACKGROUND

In a traditional electronic payment transaction, a consumer's primary account number is exposed to various entities involved during a transaction lifecycle. The account number is passed from a merchant terminal, to an acquirer system, a payment processing network, payment gateways, etc. Because the actual account number can be exposed at various points in the transaction lifecycle, payment “tokens” have been developed to conduct payment transactions. A payment token serves as an additional security layer to the account number and in effect becomes a proxy/surrogate to the actual account number. Thus, the payment token may be used in place of account number while submitting transactions. The use of payment tokens instead of account numbers can reduce the risk of fraudulent activity since the real account number is not exposed.


In conventional systems, a token service provider generates and manages the tokens. The token service provider may be the same entity as a transaction processing network. The token service provider may generate tokens for the account numbers issued by different issuers (e.g. banks) and store the tokens along with corresponding account numbers at a token vault. However, the conventional systems do not allow the issuers or other token requesting parties (e.g. token requestors) to customize or control the token generation process based on the requirements or preferences of the token requestors. Currently, only the token service provider may control the token generation process. Accordingly, token requestors are discouraged from participating in the token service because they cannot adequately oversee the token generation process.


Embodiments of the present invention solve these problems and other problems, individually and collectively.


BRIEF SUMMARY

Embodiments of the present invention enable a token requesting party (e.g. a token requestor) to control and customize the token generation process of a token service provider. The token requesting party may specify parameters to the token service provider for use during token generation. For example, the token requesting party may specify the accounts for the tokens to be generated, encryption keys for the tokens and threshold for generation of notifications associated with the tokens, among other parameters.


According to embodiments, tokens may be generated as a proxy for any information associated with the account, such as, account identifying number, account holder name, address, account holder identification number, account holder position in an organization, etc. Tokens may be generated for payment transactions (e.g. payment tokens) or for access transactions (e.g. access tokens). If the tokens are generated for payment transactions, the token requesting party may include an issuer, an acquirer, a merchant, a bank, a cardholder, a payment processing network, etc.


According to various embodiments, a token requesting party may register with the token service provider to benefit from tokenization services offered by the token service provider. The token service provider may be the same as a transaction processor (e.g. a transaction processing network). The token service provider may be associated with a token server computer to provide an online portal and/or a website for registering a token requesting party. The online portal may also serve as an interface to allow the token requesting party to interact with the one or more modules of the token server computer for controlling and customizing the generation of the tokens. The modules may include, but are not limited to, a key management module, a provisioning module, a notification module and a risk management module. The token server computer may further include a token vault to store the generated tokens and the mapping between the tokens and the account information represented by the tokens.


According to an embodiment, a method performed by a token server computer operated by a token service provider includes providing, an interface to a party. The party controls generation of tokens for account identifiers via the interface. The method also includes receiving a set of account identifiers from a computer operated by the party via the interface. The method further includes receiving a selection of an option associated with encryption keys from the computer operated by the party via the interface. The method includes determining tokens based on the option associated with the encryption keys. A token associated with at least one encryption key is determined for each account identifier of the set of account identifiers. The method also includes storing the tokens and associated encryption keys for later use in token transaction processing.


In some embodiments, the method also includes receiving a notification criteria from the computer operated by the party via the interface, and sending a notification to the computer operated by the party when a token satisfies the notification criteria. The notification criteria includes generation of the token or provisioning of the token. The method may also include receiving a restriction to be placed on one or more of the generated tokens from the computer operated by the party via the interface.


In some embodiments, the option associated with the encryption keys instructs using one or more encryption keys provided by the party. In other embodiments, the option associated with the encryption keys instructs using one or more encryption keys generated by the token server computer.


In some embodiments, receiving the set of account identifiers from the computer operated by the party further comprises presenting a list of a plurality of account identifiers via the interface, and receiving a selection of the set of account identifiers on the list of the plurality of account identifiers from the computer operated by the party via the interface. In other embodiments, receiving the set of account identifiers from the computer operated by the party further comprises receiving a file containing the set of account identifiers from the computer operated by the party via the interface.


In some embodiments, the method may also include receiving provisioning parameters for the generated tokens via the interface. The provisioning parameters include one or more of risk decision rules, design elements or provisioning conditions. The method may further include provisioning the generated tokens on user devices based on the provisioning parameters.


Another embodiment is directed to apparatuses, systems, and computer-readable media configured to perform the methods described above.


These and other embodiments are described in further detail below.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows a block diagram of a tokenization system including a token server computer, in accordance with some embodiments of the invention.



FIG. 2 illustrates a flowchart for token generation process controlled by a token requesting party, in accordance with some embodiments of the invention.



FIG. 3 illustrates a screenshot of a user interface providing the terms for controlling and customizing the token generation process, in accordance with some embodiments of the invention.



FIG. 4 illustrates a screenshot of a user interface providing the general information of the token requesting party that is controlling and customizing the token generation process, in accordance with some embodiments of the invention.



FIG. 5A illustrates a screenshot of a user interface providing the product eligibility for controlling and customizing the token generation process, in accordance with some embodiments of the invention.



FIG. 5B illustrates a screenshot of a user interface for receiving a selection of account ranges by the token requesting party, in accordance with some embodiments of the invention.



FIG. 6A illustrates a screenshot of a user interface for receiving information regarding encryption keys associated with tokens according to a first option, in accordance with some embodiments of the invention.



FIG. 6B illustrates a screenshot of a user interface for receiving information regarding encryption keys associated with tokens according to a second option, in accordance with some embodiments of the invention.



FIG. 6C illustrates a screenshot of a user interface for receiving information regarding encryption keys associated with tokens according to a third option, in accordance with some embodiments of the invention.



FIG. 6D illustrates a screenshot of a user interface for receiving information regarding encryption keys associated with tokens according to a fourth option, in accordance with some embodiments of the invention.



FIG. 7 illustrates a screenshot of a user interface for receiving provisioning options selected by the token requesting party, in accordance with some embodiments of the invention.



FIG. 8 illustrates a screenshot of a user interface for receiving processing options selected by the token requesting party, in accordance with some embodiments of the invention.



FIG. 9 illustrates a screenshot of a user interface for receiving lifecycle management options selected by the token requesting party, in accordance with some embodiments of the invention.



FIG. 10 illustrates a screenshot of a user interface for finalizing the enrollment in the token service, in accordance with some embodiments of the invention.



FIG. 11 illustrates a flowchart for conducting a transaction using a token, in accordance with some embodiments of the invention.



FIG. 12 shows an exemplary computer system according to embodiments of the present invention.





DETAILED DESCRIPTION

Embodiments of the invention are directed to methods, apparatuses, computer readable media and systems for providing a token service environment that allows a token requesting party (e.g. token requestor) to specify parameters for token generation to control and customize the token generation process. For example, the token requesting party may specify (e.g. select from a list or provide a list of) the accounts for tokenization. The accounts may be identified by account identifiers (e.g. account numbers) or bank identification numbers (BINs). The token requesting party may also specify encryption keys for the tokens to be generated. The token requesting party may also specify additional parameters such as notification thresholds indicating when notifications associated with the tokens are to be generated.


According to various embodiments, tokens may be generated for payment transactions (e.g. payment tokens) or for access transactions (e.g. access tokens). For access transactions, the tokens may be used to access a physical structure (e.g. a building) or a virtual location (e.g. a webpage, a database stored on a server, etc.). If the tokens are generated for payment transactions, the token requesting party may include an issuer, an acquirer, a merchant, a bank, a cardholder, a payment processing network, etc.


According to various embodiments, the token requesting party may register with the token service provider to benefit from tokenization services (e.g. to enroll in the token service) offered by the token service provider. In some embodiments, the token service provider may be managed or provided by a transaction processing network (e.g. a payment processing network). The token service provider may include an online portal and/or website for registering the token requesting party. The online portal may serve as an interface to allow the token requesting party to interact with the one or more modules of a token server computer of the token service provider. The token requesting party may control and customize the token generation process through the modules of the token server computer. The token server computer may further include or communicate with a token vault to store the generated tokens, encryption keys associated with the tokens and the mapping between the tokens and the account information represented by the tokens.


As discussed in further detail below, various parties in a tokenization environment (e.g. an account holder, an issuer, an acquirer, a merchant, a payment processor, etc.) may provide various types of information in order to be able to use a token vault managed and/or operated by a token service provider. Embodiments provide a system which, in combination, allows a token requesting party to 1) specify accounts for tokenization, 2) specify encryption keys associated with the generated tokens, and 3) configure notification thresholds associated with the generation, provisioning and use of the tokens. According to various embodiments, the token requesting party may customize additional parameters associated with the token generation process such as identifying the party that will manage the tokens once the tokens are generated, how the tokens will be processed during a tokenized transaction and/or card metadata for an identification card that may be generated for the tokenized account.


Before discussing specific embodiments and examples, some descriptions of terms used herein are provided below.


A “token” may include an identifier for a payment account that is a substitute for an account identifier, such as a primary account number (PAN). For example, a token may include a series of alphanumeric characters that may be used as a substitute for an original account identifier. For example, a token “4900 0000 0000 0001” may be used in place of a PAN “4147 0900 0000 1234.” In some embodiments, a token may be “format preserving” and may have a numeric format that conforms to the account identifiers used in existing payment processing networks (e.g., ISO 8583 financial transaction message format). In some embodiments, a token may be used in place of a PAN to initiate, authorize, settle or resolve a payment transaction or represent the original credential in other systems where the original credential would typically be provided. In some embodiments, a token value may be generated such that the recovery of the original PAN or other account identifier from the token value may not be computationally derived. Further, in some embodiments, the token format may be configured to allow the entity receiving the token to identify it as a token and recognize the entity that issued the token.


A “key” may refer to a piece of information that is used in a cryptographic algorithm to transform input data into another representation. An exemplary encryption key may include a master derivation key (MDK) which may be used to generate a limited use key (LUK) that is provided to a computer device of a user. An LUK can be an encryption key that is intended for limited use (e.g., a limited number of transactions or a limited time period) and is not intended to be used for the lifetime of an account. Further details regarding LUKs can be found in U.S. Published Patent Application No. 2015/0180836, which is herein incorporated by reference in its entirety and is assigned to the same assignee as the present application. The MDK may be used to generate and provision the token, as well as, authenticate the token when used in authorization processing by validating static and variable transaction data.


A “key check value (KCV)” may refer to value obtained by passing a data value through a non-reversible algorithm. The key check value may be calculated using a cryptographic algorithm which takes as input a secret key and an arbitrary string, and which gives a cryptographic check value as output. The computation of a correct check value without knowledge of the secret key is not feasible.


A “zone control master key (ZCMK)” may refer to a key encryption key that is shared between the parties in the transaction environment such as the acquirer, the issuer, etc. which may be used to encrypt working keys shared between these parties. The ZCMK may be used to encrypt other encryption keys for transport and may not be used for encrypting data, such as transaction data or account holder identifying data.


A “cryptographic algorithm” can be an encryption algorithm that transforms original data into an alternate representation, or a decryption algorithm that transforms encrypted information back to the original data. Examples of cryptographic algorithms may include triple data encryption standard (TDES), data encryption standard (DES), advanced encryption standard (AES), etc. Encryption techniques may include symmetric and asymmetric encryption techniques.


A “Bank Identification Number (BIN)” may be assigned by a payment processing network to an issuer of a payment account. BINs may be consistent with industry account and issuer identification specifications (e.g. ISO 7812) such that the payment processing network assigning the BIN may be identified based on the BIN and associated account ranges. Similarly, the issuer of the payment account may be identified based on the BIN assigned to the issuer by the payment processing network.


In some embodiments, the token format may allow entities in the payment system to identify the issuer associated with the token. For example, the format of the token may include a token issuer identifier that allows an entity (e.g. the payment processing network) to identify an issuer of the token. For instance, the token issuer identifier may be associated with an issuer's BIN of the underlying PAN in order to support the existing payment flow. The token issuer identifier may be a different number than the issuer's BIN and may be static. For example, if the issuer's BIN for an issuer is 412345, the token issuer identifier may be 528325 and this number may be static for all tokens issued from or for that issuer. In some embodiments, the token issuer identifier range (e.g., issuer BIN range) may have the same attributes as the associated issuer card range and can be included in an issuer identifier routing table (e.g., BIN routing table). The issuer identifier routing table may be provided to the relevant entities in the payment system (e.g., merchants and acquirers).


A “token BIN” may refer to a specific BIN that has been designated only for the purpose of issuing tokens and may be flagged accordingly in BIN tables. Token BINs may not have a dual purpose and may not be used to issue both primary account numbers (PANs) and tokens.


A “token issuer identifier range (issuer BIN range)” may refer to a unique identifier (e.g., of 6 to 12 digits length) originating from a set of pre-allocated token issuer identifiers (e.g., 6 digit token BINs). In some embodiments, the token BIN ranges may be used to generate a payment token. In some embodiments, a token may pass the basic validation rules of an account number including, for example, a LUHN check or checksum validation that may be set up by different entities within the payment system. In some embodiments, a payment token issuer identifier may be mapped to a real issuer identifier (e.g., a BIN) for an issuer. For example, a payment token issuer identifier may include a six digit numerical value that may be associated with an issuer. For instance, any token including the payment token issuer identifier may be associated with a particular issuer. As such, the issuer may be identified using the corresponding issuer identifier range associated with the token issuer identifier. For example, a payment token issuer identifier “490000” corresponding to a payment token “4900 0000 0000 0001” can be mapped to an issuer identifier “414709” corresponding to a payment account identifier “4147 0900 0000 1234”. In some embodiments, a payment token issuer identifier is static for an issuer. For example, a payment token issuer identifier (e.g., “490000”) may correspond to a first issuer and another payment token issuer identifier (e.g., “520000”) may correspond to a second issuer, and the first and second payment token issuer identifiers may not be changed or altered without informing all entities within the transaction processing system. In some embodiments, a payment token issuer identifier range may correspond to an issuer identifier. For example, payment tokens including payment token issuer identifiers from “490000”-“490002” may correspond to a first issuer (e.g., mapped to issuer identifier “414709”) and payment tokens including payment token issuer identifiers from “520000”-“520002” may correspond to a second issuer (e.g., mapped to real issuer identifier “417548”). Token BIN Ranges and assignment of tokens from these BIN ranges may be made available to the parties accepting the transaction to make routing decisions.


A “token vault” may refer to a repository that maintains established token-to-account identifying number mappings. For example, the token vault may maintain one-to-one mapping between a token and an account identifying number represented by the token. Token vaults, due to the sensitive nature of the data mappings that are stored and managed in them, may be protected by strong underlying physical and logical security.


“Provisioning” may include a process of providing data for use. For example, provisioning may include providing, delivering, or enabling a token on a device. Provisioning may be completed by any entity within or external to the transaction processing system. For example, in some embodiments, tokens may be provisioned by an issuer or a payment processing network onto a mobile device of a consumer (e.g. account holder). The provisioned tokens may have corresponding token data stored and maintained in the token vault or token registry.


“Tokenization” is a process by which data is replaced with substitute data. For example, an account identifier may be tokenized by replacing the primary account identifier with a substitute number (e.g. a token) that may be associated with the account identifier. Further, tokenization may be applied to any other-information which may be replaced with a substitute value (i.e., token). Tokenization may be used to enhance transaction efficiency, improve transaction security, increase service transparency, or to provide a method for third-party enablement.


“Token exchange” or “de-tokenization” is a process of restoring the data that was substituted during tokenization. For example, a token exchange may include replacing a token with a corresponding account number that was associated with the token during tokenization of the account number. Thus, the de-tokenization may refer to the process of redeeming a token for the associated account number value based on a token-to-account number mapping stored, for example, in a token vault. The ability to retrieve an account number in exchange for the associated token may be restricted to specifically authorized entities, individuals, applications, or systems. Further, de-tokenization or token exchange may be applied to any other information. In some embodiments, token exchange may be achieved via a transactional message, such as an ISO message, an application programming interface (API), or another type of web interface (e.g., web request).


“Token Processing” may refer to transaction processing in which a token is present in lieu of the account number. The token is processed from the point of interaction throughout the network. The token processing further includes using the token vault for de-tokenization of the token in order to complete the transaction.


A “consumer” may include an individual or a user that may be associated with one or more personal accounts and/or consumer devices. The consumer may also be referred to as a cardholder, account holder, or user.


A “server computer” may typically be a powerful computer or cluster of computers. For example, the server computer can be a large mainframe, a minicomputer cluster, or a group of servers functioning as a unit. The server computer may be associated with an entity such as a payment processing network, a wallet provider, a merchant, an authentication cloud, an acquirer or an issuer.


An “issuer” can include an account issuer. The account (which may be associated with one or more devices) may refer to any suitable account including a payment account (e.g. credit card account, a checking account, a savings account, a merchant account assigned to a consumer, or a prepaid account), an employment account, an identification account, an enrollment account (e.g. a student account), etc.


A “processing network” may include an electronic system used to accept, transmit, or process transactions made by devices. The processing network may transfer information among transacting parties (e.g., issuers, acquirers, merchants, device users, etc.).



FIG. 1 illustrates an exemplary tokenization environment 100 including a token server computer 101 of a token service provider. The token server computer 101 may be in communication with a token requesting party 116. The token requesting party 116 may operate a token requesting party computer. In some embodiments, the token server computer 101 may also be in communication with a transaction processing network computer 114 (e.g., a payment processing network computer). In other embodiments, the token server computer 101 may part of the transaction processing network.


The token server computer 101 may be responsible for provisioning a token to a specific user device of an account holder using a provisioning module 108 in conjunction with a data processor 103. Provisioning may include creating a token within a token vault 102 for an account, sending the token to the token requesting party 116 and sending the token to a device of the account holder.


According to embodiments directed to payment transactions, the token requesting party 116 may be an account holder, a payment processing network, an issuer, an acquirer and/or a merchant. Embodiments discussed below are directed to the token requesting party 116 being an issuer or a third party acting on behalf of the issuer. However, embodiments of the invention are not restricted to a token requestor that is an issuer.


In some embodiments, the token requesting party 116 may register with the token server computer 101 using an online portal or a website of the token server computer 101. The online portal or the website may provide a user interface 104 to allow the token requesting party 116 to interact with the token server computer 101 to control the token generation process.


Using the user interface 104, the token requesting party 116 may request the token server computer 101 to generate one or more tokens for a plurality of accounts issued, owned and/or managed by the token requesting party 116. The token requesting party 116 (e.g. a computer operated by the token requesting party) may provide a set of account identifiers to the token server computer 101. The token server computer 101 may generate (or determine) a token for each one of the account identifiers received from a computer operated by the token requesting party 116. The generated tokens may be stored at a token vault 102. The token vault 102 may also store a mapping between each token and the account identifier identifying the account represented by the token. The token vault 102 may also be used by the transaction processing network computer 114 to de-tokenize the token and convert the token to the account number represented by the token when a transaction authorization is processed through the transaction processing network computer 114. The token vault 102 may also manage all domain restrictions associated with each token provisioned.


The token requesting party 116 may also select, with the data processor 103 executing the key management module 106 of the token server computer 101, an option associated with encryption keys. For example, the token requesting party 116 may choose to provide the encryption keys to the token server computer 101 via the key management module 106. In some embodiments, the token requesting party 116 may choose to leave the key generation to the token server computer 101. The token server computer 101 may generate (or determine) the tokens based on the option associated with the encryption keys. The token server computer 101 may generate a token associated with at least one encryption key for each account identifier of the set of account identifiers. The token server computer 101 may store the encryption keys along with the associated tokens in the token vault 102. The encryption keys may then be provided to a user device of the account holder. The tokens and corresponding encryption keys may be used in tokenized transactions processed by the transaction processing network computer.


The token requesting party 116 may also initiate a request to receive a message when a token has been generated and/or provisioned for one of the accounts associated with the token requesting party 116. The token requesting party 116 may specify notification criteria via the user interface 104. The token server computer 101 may generate a notification using the data processor 103 executing code in the notification module 110 based on the notification criteria (e.g. when a token satisfies the notification criteria) provided by the token requesting party 116. It may also send the notification to the token requesting party 116. For example, the token requesting party 116 may request a notification when a token is generated. The notification module 110 of the token server computer 101 may generate and send a notification to the token requesting party 116 when the token is generated. Similarly, the token requesting party 116 may request a notification when a token is provisioned on a user device. The notification module 110 of the token server computer 101 may generate and send a notification to the token requesting party 116 when the token is provisioned on the user device. For example, the notification module 110 may be informed by the provisioning module 108 that the token has been provisioned on the user device.


The token server computer 101 may also include a risk management module 112 that can work in conjunction with the data processor 103 to set up rules for risk decisioning when the token server computer 101 receives the token provisioning request from the token requesting party 116. As part of further customization of the token generation process, the token requesting party 116 may indicate rules for provisioning or processing the token based on a risk assessment associated with a transacting party, a device used in the transaction, or the account itself. In some embodiments, the token requesting party 116 may provide a restriction that is placed on one or more of the generated tokens based on the risk decisioning rules.


The token server computer 101 shown in FIG. 1 is provided for illustration purposes and should not be construed as limiting. The token server computer 101 may include more or less components than those illustrated in FIG. 1. For example, the token server computer 101 may include additional software modules, such as a processing module, a lifecycle management module, etc. These and other modules may, in conjunction with the data processor 103, allow the token server computer 101 to perform one or more of the following functions: map an account identifier to a token and store the mapping in the token vault with relevant domain restrictions; provision a token from the token vault to a user device; manage (e.g., delete, suspend, resume, etc.) the token both at the token vault and on the user device; generate encryption keys based on the token requesting party's request; manage encryption keys based on predetermined criteria; process tokenized transactions including performing cryptogram validation, domain restriction checks, and validity checks; and perform post-transaction verification processing to verify that transactions and account updates are conducted on the user device after the transaction is processed by the transaction processing network.


In some embodiments, the token server computer 101 may support contactless payment use cases. This includes support for contactless payment methods using a secure element and Host Card Emulation (HCE)-based payment applications.


The token generation process controlled by a token requesting party is discussed next referring to the flowchart illustrated in FIG. 2.


At step S200, the token requesting party 116 may register with an online portal or website of the token server computer 101 in order to interact with the token server computer 101. The registration may provide the token requesting party 116 with secure access to important content and services provided by the token server computer 101. Each request that the token requesting party 116 creates to submit information for token generation may be called a “subscription”. Accordingly, a token requesting party 116 may have one or more registered subscriptions with the token server computer 101. The token requesting party 116 may organize their subscriptions by portfolios. For example, the token requesting party 116 may use one subscription to manage tokens for payment accounts, and another subscription to manage tokens for employment accounts. The types of tokens managed by each subscription may further be defined such as all credit accounts may be managed by one subscription and all debit accounts may be managed by another subscription. A given subscription may be used to access both secure element-based and HCE-based form factors, because both of these services may be supported by the token server computer 101.


At step S202, the token server computer 101 may provide the user interface 104 to the token requesting party 116 as part of the registration process. During the registration, the user interface 104 may allow the token requesting party 116 to view the status of their existing subscriptions, and sort or filter the list of subscriptions. The status of a subscription can be (1) “new” if the token requesting party 116 started creating a new subscription (in some embodiments, the initial status of subscriptions may always be “new”); (2) “saved” to indicate that the subscription information is saved but has not been submitted yet, information can be changed or added to the subscription; (3) “submitted” for subscriptions where all the enrollment steps have been completed and the subscription is ready to be processed by the token service provider; (4) “in progress” to indicate that the token requesting party 116 submitted the subscription request and the token service provider's systems are being set up; (5) “completed” for subscriptions that are processed by the token service provider; and (6) “deleted” to indicate that the subscription has been deleted by the system administrator of the token service provider.


The user interface 104 may provide a subscription management screen to allow the token requesting party 116 to view its subscriptions. When the token requesting party 116 creates a new subscription, the token server computer 101 automatically assigns an incremental subscription ID number to track the progress of the subscription. If the token requesting party 116 has multiple subscriptions, the token requesting party 116 can filter the subscription list by entering criteria in a filter results field. According to exemplary embodiments, the subscription list may be filtered numerically (e.g. using subscription ID numbers or date) or alphabetically.


During the registration process, the token requesting party 116 may be asked to acknowledge the terms and conditions for participating in the token service provided by the token server computer 101. FIG. 3 illustrates a screenshot 400 of a user interface 104 (which could also be present on the computer operated by the token requesting party 116) providing the terms for controlling and customizing the token generation process. The user interface 104 may provide multiple tabs 402-416 that the token requesting party should navigate to provide information to customize the token generation process. Each tab is discussed below in connection with a corresponding figure.


The first tab 402 may be the terms tab where the token requesting party 116 may be asked to upload a signed copy off the term and conditions document 420. The token requesting party 116 may also be asked to upload a signed copy of the service participation agreement 422 to express legal consent to participate in the token service provided by the token server computer 101. This step may be used to support both secure element-based and other HCE-based payment form factors. The token requesting party 116 can download a blank copy of the terms and conditions document as well as the service participation agreement, sign a physical copy of the documents and upload a digital copy of the signed documents to the token vault 102. The token requesting party 116 may be required to upload the signed documents only when it creates a first subscription. All subscriptions the token requesting party 116 creates thereafter may not require the legal consent documents, as it is inferred that the agreement uploaded on the first subscription applies to all subsequent subscriptions.


The user interface may also include a second tab, the general information tab 404. FIG. 4 illustrates a screenshot of a user interface providing the general information 500 of the token requesting party. The “General Information” tab 404 may not require any action from the token requesting party. Its main purpose is to ensure that the token requesting party is providing information in the other tabs for the right organization. This tab is for the token requesting party's reference, and displays general information about the organization, including a business ID, name and address.


Referring back to FIG. 2, at step S204, the token requesting party 116 may provide a set of account identifiers to the token server computer 101 for tokenization. FIG. 5A illustrates the third tab, the product eligibility tab 406, showing a screenshot 600 providing two options for the token requesting party 116 to provide account identifiers: (1) by selecting the account identifiers on the user interface (option 602), or (2) by uploading a file containing the account identifiers (option 604).


According to option 602, the token requesting party 116 may select from a list of account identifiers displayed by the token server computer 101 via the user interface 104. FIG. 5B illustrates a screenshot 610 providing a plurality of account identifier ranges 612 that can be selected by the token requesting party 116 for tokenization. Each account identifier range may include a plurality of account identifiers identifying a plurality of accounts. The screenshot 610 of the user interface may also include a window for the token requesting party to provide test account numbers.


According to option 604, the token requesting party 116 may provide a list of account identifiers (e.g., stored on a file) to token server computer 101. A file template may be available for download when the token requesting party 116 selects the option to provide a list of the account identifiers to the token server computer 101. The token requesting party 116 may download the template, fill in the information, and upload the file.


The account identifiers identify the accounts that the token requesting party 116 would like to be tokenized (e.g. tokens will be generated for the set of account identifiers provided by the token requesting party 116). An account identifier selected under a first subscription of the token requesting party 116 may not be eligible for tokenization under a second subscription of the token requesting party 116 to prevent from assigning multiple tokens to a single account identifier. In some embodiments, the token requesting party 116 may provide a range of account identification numbers (e.g. Bank Identification Numbers (BINs) or account ranges) that are eligible for tokenization. The token server computer 101 may use this information to determine whether an account identified by an account identifier is eligible for tokenization when a token provisioning request is received. If the identified accounts are eligible for tokenization, the token server computer 101 assigns tokens to the accounts and generates a mapping between each token and corresponding account identifier.


According to various embodiments, the token server computer 101 may require an encryption key (e.g. a Master Derivation Key (MDK)) to generate and provision a token. The MDK is used to generate and provision the token, as well as to authenticate the token when the token is used in authorization processing by validating static and variable transaction data. Encryption keys may be required for both secure element-based and other HCE-based payment form factors.


Referring back to FIG. 2, at step S206, the token requesting party 116 may select an option regarding how the encryption keys associated with the tokens will be provided. According to various embodiments, the encryption key may be a master derivation key (MDK). For payment transactions where the token requesting party 116 is an issuer, the issuer may use a dedicated set of keys (e.g., MDKs) per bank identification number (BIN) range or per primary account number (PAN) range for cloud-based payment transactions in order to avoid situations where the same keys are used for both secure element based and cloud-based transactions. An MDK can be used as a base key to generate limited use keys that are provided to account holder's device.


The token requesting party 116 may select one of the four options for providing the encryption keys under the key management tab 408 of the user interface. According to a first option, the token requesting party 116 may choose to use existing encryption keys which may already be stored by the token server computer 101, as illustrated in the screenshot 700 provided in FIG. 6A. If the token requesting party 116 chooses to use the existing encryption keys as indicated by the selection of corresponding graphical element 702, the token requesting party 116 may be asked to provide information (e.g. encryption BIN and derivative key index) associated with the keys to ensure that correct encryption keys will be retrieved from storage and associated with the generated tokens. The user interface may provide a dedicated window to receive the required information. For example, the user interface may provide an encryption BIN window 704 and a derivative key index window 706 to receive the information.


According to a second option, the token requesting party 116 may create new encryption keys and share the new keys with the token server computer 101, as illustrated in the screenshot 710 provided in FIG. 6B. The token requesting party 116 may provide the new encryption key information using the fields provided by the user interface. For example, the token requesting party 116 may provide the zone control master key (ZCMK) (e.g. a key encryption key) at field 712, MDK set A at field 713, the ZCMK key check value (KCV) (e.g. a cryptographically secure hash of the ZCMK) at field 714, the MDK set B at field 715, the sequence number at field 716, the MDK key check value at field 717, and the derivative key index (DKI) (e.g. an index that may be used to derive one or more secret keys from the ZCMK or MDK) at field 718. The token server computer 101 may store the received encryption key(s) and the token along with the corresponding account identifying information in the token vault 102.


According to a third option, the token requesting party 116 may request the token server computer 101 to generate the new encryption keys using the information provided by the token requesting party 116, as indicated by the selection of corresponding graphical affordance 721 illustrated in the screenshot 720 provided in FIG. 6C. The token requesting party 116 may provide information for generation of the encryption keys using the fields provided by the user interface. For example, the token requesting party 116 may provide the zone control master key (ZCMK) at field 722, the ZCMK key check value (KCV) at field 724, the sequence number at field 726 and the derivative key index (DKI) at field 728. The token server computer 101 may generate the encryption keys using the provided data and store the generated encryption keys along with the token and the corresponding account identifying information in the token vault 102.


According to a fourth option, the token requesting party 116 may request the token server computer 101 to generate the new encryption keys without the token requesting party 116 providing any information, as illustrated in the screenshot 730 provided in FIG. 6D. The token server computer 101 may generate and store the generated encryption keys along with the token and the corresponding account identifying information in the token vault 102. According to this option, the generated encryption keys may not be provided to the token requesting party 116.


Referring back to FIG. 2, at step S208, the token requesting party 116 may provide notification criteria and provisioning parameters to the token server computer 101 for the tokens generated by the token server computer 101. FIG. 7 illustrates a screenshot 800 illustrating the fifth tab, the provisioning options tab 410, for providing the provisioning parameters and notification criteria to the token server computer 101. The provisioning options tab 410 may include several subsections such as risk decisioning section 802, card metadata/card art/terms and conditions section 806 and the token provisioning notification section 808. The token requesting party 116 may customize the provisioning options using the sections 802, 806 and 808 illustrated on FIG. 7. In some embodiments, the token requesting party 116 may choose to apply the card metadata/card art/terms and conditions to a selected set of account identifiers (e.g. an account range or a BIN range). Accordingly, the token requesting party 116 may provide different card metadata for different accounts. In some embodiments, the token requesting party 116 may assign the same card metadata/card art/terms and conditions to multiple account ranges.


For example, the risk decisioning section 802 allows the token requesting party 116 to request access to a risk management module 112 and the data processor 103 to set up risk decision rules. The token requesting party 116 may need to make a decision as to whether or not to use the risk management module 112 to set up rules for risk decisioning when the token server computer 101 receives the token provisioning request. If the token requesting party 116 decides not to use the risk management module 112, the system may default to automatic approval of the token provisioning request.


If a card is generated for the account, the token requesting party 116 may have the option to customize the design of the card image using the card metadata/card art/terms and conditions section 806. The token requesting party 116 can select a default card art or may provide a specific card art. The token requesting party 116 may also specify any specific terms and conditions that should be presented to the account holder during the token provisioning process on to a user device. The token requesting party 116 may enter a short description to be displayed on the card image displayed on the user device during the token provisioning process. If the token requesting party 116 decides to use specific card art, the token requesting party 116 may download the relevant card art template required to prepare the card art images. The token requesting party 116 may prepare the card art images as per the specifications described in the template and upload the relevant file. If the token requesting party 116 wants to use specific terms and conditions, the token requesting party 116 may upload its terms and conditions file. The terms and conditions file may be a text file or HTML file. The token requesting party 116 may assign card art information at an account level, BIN level, product level, and issuer level. Existing online IDs that need access to this service can be provided in the field provided. In some embodiments, the processing options selected by the token requesting party 116 for its first subscription may apply to all subsequent subscriptions.


Using the token provisioning notification section 808 of the provisioning options tab 410, the token requesting party 116 may request that it be notified (e.g. receive a message) when a token has been provisioned for one of the accounts owned or managed by the token requesting party 116. For example, the token requesting party 116 may request to receive notifications when Lifecycle Management events occur, when Active Account Management events occur, and/or when Account Parameter Index verification fails. In some embodiments, the token requesting party 116 may have the option to allow the token server computer 101 to send token transaction history alerts to the account holders and/or the token requesting party 116.


The token server computer 101 may also provide additional customization options to the token requesting party 116. For example, the token requesting party 116 may navigate to processing options tab 412 to select options available for token transaction processing, as shown in the screenshot 900 of the user interface illustrated in FIG. 8. The token requesting party 116 may be asked to agree to use a token convert service provided by the token server computer 101 to de-tokenize the tokens during a transaction. The token convert service may minimize the issuer processing requirements for device-initiated token transactions. The token requesting party 116 may be asked to select an option to process token transactions. For example, a dropdown menu 902 may be provided to the token requesting party 116 with available options for token processing. If the token requesting party 116 does not agree to use the token convert service, the token requesting party 116 may not be able to interact with the token server computer 101.


The token requesting party 116 may navigate to lifecycle tab 414 to take advantage of the lifecycle management service for management of lifecycle activities for generated tokens. The token requesting party 116 may indicate an entity that will use the lifecycle management service for the generated tokens by selecting the provided entities on the screenshot 1000 of the user interface 104 illustrated in FIG. 9. Optionally, if the token requesting party 116 has an existing subscription with the token server computer 101, the token requesting party 116 may request access for additional entities to the lifecycle management service by entering valid IDs in request lifecycle management application access field 1002. The token lifecycle management options the token requesting party 116 selects for its first subscription may become the default selection for subsequent subscriptions.


After the token requesting party 116 has entered all the required information on all menu tabs 402-414, the token requesting party 116 can submit the information on the submit tab 416, as illustrated in FIG. 10. On the screenshot 1100 shown in FIG. 10, all menu tabs 402-414 may display a visual cue (e.g. green check mark) 1102 next to menu tab name before the token requesting party 116 can submit the subscription information. The visual cue 1102 may indicate that each tab 402-414 has been completed satisfactorily. The token requesting party 116 may be required to select “Yes” to agree with a licensing requirement 1104 to successfully proceed with the submission. The estimated date for completion of configuration may also be shown in the setup date section 1106 of this screenshot 1100. The setup date may only be a target date for completion.


After the token requesting party 116 clicks the submit tab 416, a pop-up window may open up to give the token requesting party 116 an opportunity to cancel the submission, preview the subscription information, or submit the subscription. The preview may be available in the form of a PDF document. The token requesting party 116 may cancel to exit submission and correct information in any menu tab, if needed. Clicking submit may be the final action and may not be undone. After the information is submitted, the subscription may be available in a read-only format for review. If there are errors that prevent the subscription from being submitted, the token server computer 101 may identify the errors and communicate the errors to the token requesting party 116. In response to the identified errors, the token requesting party 116 can create a new subscription or edit the saved subscription.


Once the token requesting party 116 completes providing information for (e.g. customizing) the token generation, the token server computer 101 may proceed with generation of the tokens.


Referring back to FIG. 2, at step S210, after the subscription request is submitted, the token server computer 101 may process the provided information and generate the tokens based on the information provided by the token requesting party 116. The token server computer 101 may store the generated tokens along with corresponding encryption keys and account identifiers in the token vault 102.


At step S212, the token server computer 101 may optionally provide a copy of the generated tokens to the token requesting party 116. The token server computer 101 may also provide a mapping illustrating the correspondence between the tokens and the corresponding account identifiers to the token requesting party 116.


At step S214, the token server computer 101 may provision the generated token(s) on user devices of the account holders using the provisioning module 108. For example, if a payment token is generated for a payment account of the account holder, the token may be provisioned on a mobile communication device of the account holder. The account holder may initiate a transaction using the token provisioned on their user device.


A tokenized transaction processing is discussed next in connection with FIG. 11. The transaction may be a purchase transaction or an access transaction where the user presents a token representing their account to an access device.


In an exemplary purchase transaction, the user (e.g. account holder) purchases a good or service at from a merchant using a user device 120 (e.g., a mobile communication device). At step S302, the user device 120 can interact with an access device 122 at a merchant associated with a merchant computer to initiate the transaction. The user device 120 may present the token stored thereon to the access device 122. For example, the user may tap the user device 120 against a near field communications (NFC) reader in the access device 122. Alternatively, the user may indicate payment details to the merchant electronically, such using a digital wallet or in through an online transaction. In some purchase transactions the access device 122 may include a virtual access device (e.g., a computing system providing a merchant website or “backend” services for a merchant application executing on the user device 120). In these examples, the merchant computer may be thought of as implementing the virtual access device.


At step S304, the access device 122 (or virtual access device, which may be at the merchant computer) generates an authorization request message to cause the transaction to be performed. The authorization request message may include the token and information associated with the transaction. In some embodiments, the information associated with the transaction may be encrypted using encryption keys, such as a limited use key (LUK). The encryption keys may be used to create cryptograms from the transaction information, and these cryptograms may be of limited use and may be used to verify that transactions are authentic.


The authorization request message may be an electronic message that is sent to the transaction processing network computer 114 and/or an issuer of the user account to request authorization for a transaction using the account. An authorization request message, according to some embodiments, may comply with a message type defined by the International Organization for Standardization (ISO) 8583 standard, which is a standard for systems that exchange electronic transaction information associated with payments made by users using a user device (which could be a mobile communication device). The authorization request message may include an issuer account identifier that may be associated with a user device or a user account.


As provided above, the authorization request message may also comprise additional data elements. For example, the authorization request message may include “identification information” including, by way of example only: a service code, a CVV (card verification value), a dCVV (dynamic card verification value), an expiration date, etc. The authorization request message may also include “transaction information,” such as any information associated with a current transaction, such as the transaction amount, merchant identifier, merchant location, etc., as well as any other information that may be utilized in determining whether to identify and/or authorize a transaction. The authorization request message may also include other information, such as an identifier of the access device 122 that generated the authorization request message, information about the location of the access device 122, etc.


At step S306, the access device 122 may send the authorization request message including the token to the transaction processing network computer 114. In some embodiments, the access device 122 may first send the authorization request message to an acquirer computer, which may then forward the authorization request message to the transaction processing network computer 114. The acquirer computer may be a system of an acquirer providing an account of the merchant, which will ultimately receive the funds for the transaction from an issuer providing the user account.


After receiving the authorization request message, the transaction processing network computer 114 may analyze the authorization request message to determine that the authorization request message includes a token. The transaction processing network computer 114 may query the token vault 102 to find the account identifier represented by the token. At step S308, the transaction processing network computer 114 may replace the token with the corresponding account identifier. At step S310, the transaction processing network computer 114 may transmit the authorization request message including the account identifier to the token requesting party 116 (e.g. an issuer computer associated with the issuer of the user's account). The transaction processing network computer 114 may identify the appropriate token requesting party 116 based on the token included in the authorization request message.


At step S312, the token requesting party 116 may process the authorization request, for example, to determine a risk associated with the authorization request and/or whether there are sufficient funds to pay for the transaction. Based on the processing, the token requesting party 116 may determine whether the authorization request should be approved or denied. The token requesting party 116 may generate an authorization response message including an indication of whether the transaction (e.g. the authorization request) is approved or denied.


At step S314, the token requesting party 116 may send the authorization response message back to the transaction processing network computer 114 to indicate whether or not the current transaction is authorized. The authorization response message may be an electronic message reply to an authorization request message generated by an issuing financial institution or a transaction processing network, and may comply with the ISO 8583 standard. The authorization response message may include, by way of example only, one or more of the following status indicators: Approval—transaction was approved; Decline—transaction was not approved; or Call Center—response pending more information, merchant must call the authorization phone number. The authorization response message may also include an authorization code, which may be a code that an issuer returns in response to an authorization request message in an electronic message (either directly or through the transaction processing network) to the access device 122 (e.g. point of sale (POS) equipment) that indicates an approval of the transaction, and may serve as proof of authorization.


At step S316, the transaction processing network computer 114 receives the authorization response message from the token requesting party 116. The transaction processing network computer 114 may replace the account identifier with the corresponding token so that the actual account number is never provided to the access device 122. The transaction processing network computer 114 may then transmit the authorization response message to the access device 122. If there was an acquirer between the transaction processing network computer 114 and the access device 122, the authorization response message may be first sent to the acquirer computer, which may then send the authorization response message back to the access device 122, where the merchant can determine whether to proceed with the transaction. In some embodiments, such as when a fraud rule is triggered at transaction processing network computer 114, the transaction processing network computer 114 may decline a transaction previously authorized by token requesting party 116.


At step S318, after the access device 122 receives the authorization response message, the access device 122 may provide the authorization response message for the user. The response message may be displayed by a display device (e.g., a display device that is part of or coupled to the access device 122), printed out on a receipt, communicated to the user device 120, etc. Alternately, if the transaction is an online transaction (e.g., via a website or application), the access device 122 may provide a web page, display module, or other indication of the authorization response message to the user device 120.


At step S320, a normal clearing and settlement process can be conducted by the transaction processing network computer 114. A clearing process is a process of exchanging financial details between an acquirer and an issuer to facilitate posting to a user's account and reconciliation of the user's settlement position. However, it should be noted that embodiments of the invention are not limited to a single settlement process.


In some embodiments, the user device may be used to obtain access to a resource or a location. For example, the user device may include data which is passed to an access device to allow the user to access a building or a room in the building. For example, a building operator system may provision the user device with access data (e.g. an access token) that allows the user to access the building. Once the user device is provisioned with access data, it may be used to conduct an access transaction, similar to the payment transaction discussed above. When the user presents the user device to the access reader of the building, access may be granted to the user.


The user interface 104 discussed above may also include an administrator module. In some embodiments, only transaction processing network administrators may have access to the administrator module. The administrator module may allow the administrator to view all the subscriptions a token requesting party has submitted, manage the submitted subscriptions, change an enrollment type of the token requesting party from one model to another, and update enrollment status after the configuration setup is complete for respective internal systems. The administrator can update the status of subscription or delete a subscription. The delete option is used when the token requesting party requests the transaction processing network to delete the subscription from the system to ensure that the payment processor does not process the subscription.


Embodiments of the present application provide a token server computer that enables a token requesting party to provide (1) a range of Bank Identification Numbers (BINs) or a range of account numbers for which to generate a token, (2) one or more encryption keys to be used by the token server computer for provisioning the tokens on behalf of the token requesting party, and (3) a request to generate notifications when tokens are provisioned for account numbers owned, generated or otherwise managed by the token requesting party. Accordingly, embodiments enable a token requesting party to control and customize the token generation process handled by a token server computer.


In some embodiments, the token requesting party may be responsible for any loss caused by a fraudulent use of an account or a token associated with the account issued by the token requesting party. Accordingly, it may be in the best interest of the token requesting party to control the generation of tokens.


Embodiments further allow multiple token requesting parties (e.g. multiple account issuers) to register with the token server computer at the same time. Onboarding processes are preferably quick and efficient. Transactions described herein may include financial transactions conducted with electronic wallets.


The various participants and elements shown in FIGS. 1-11 may operate one or more computer apparatuses (e.g., a server computer) to facilitate the functions described herein. Any of the elements in FIGS. 1-11 may use any suitable number of subsystems to facilitate the functions described herein. Examples of such subsystems or components are shown in FIG. 12. The subsystems such as a printer 1208, keyboard 1216, fixed disk 1218 (or other memory comprising computer readable media), monitor 1212, which is coupled to a display adapter 1210, and others are shown. Peripherals and input/output (I/O) devices, which couple to I/O controller 1202, can be connected to the computer system by any number of means known in the art, such as serial port 1214. For example, serial port 1214 or external interface 1220 can be used to connect the computer apparatus to a wide area network such as the Internet, a mouse input device, or a scanner. The interconnection via system bus allows the central processor 1206 to communicate with each subsystem and to control the execution of instructions from system memory 1204 or the fixed disk 1218, as well as the exchange of information between subsystems.


Specific details regarding some of the above-described aspects are provided below. The specific details of the specific aspects may be combined in any suitable manner without departing from the spirit and scope of embodiments of the invention.


Storage media and computer readable media for containing code, or portions of code, may include any appropriate media known or used in the art, including storage media and communication media, such as but not limited to volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage and/or transmission of information such as computer readable instructions, data structures, program modules, or other data, including RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, data signals, data transmissions, or any other medium which may be used to store or transmit the desired information and which may be accessed by the computer. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art may appreciate other ways and/or methods to implement the various embodiments.


It may be understood that the present invention as described above may be implemented in the form of control logic using computer software in a modular or integrated manner. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art may know and appreciate other ways and/or methods to implement the present invention using hardware and a combination of hardware and software


Any of the software components or functions described in this application, may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions, or commands on a non-transitory computer readable storage medium, such as a random access memory (RAM), a read only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.


The above description is illustrative and is not restrictive. Many variations of the invention may become apparent to those skilled in the art upon review of the disclosure. The scope of the invention may, therefore, be determined not with reference to the above description, but instead may be determined with reference to the pending claims along with their full scope or equivalents.


One or more features from any embodiment may be combined with one or more features of any other embodiment without departing from the scope of the invention.


A recitation of “a”, “an” or “the” is intended to mean “one or more” unless specifically indicated to the contrary.

Claims
  • 1. A method comprising: providing, by a token server computer operated by a token service provider, an interface to a party, wherein the party controls generation of payment tokens for account identifiers via the interface;receiving, at the token server computer, a set of account identifiers from a computer operated by the party via the interface;receiving, at the token server computer, one or more encryption keys from the computer operated by the party via the interface;receiving, at the token server computer, a request to generate payment tokens for the set of account identifiers using the one or more encryption keys such that each generated payment token represents an account identifier among the set of account identifiers;for each account identifier in the set of account identifiers: determining, by the token server computer, a payment token based on the one or more encryption keys provided by the party, wherein the payment token determined for an account identifier substitutes the account identifier in a payment transaction initiated using the payment token, wherein a format of the payment token is similar to a format of the account identifier substituted by the payment token; andstoring the payment token and associated encryption keys for later use in token transaction processing.
  • 2. The method of claim 1, further comprising: receiving, at the token server computer, a notification criteria from the computer operated by the party via the interface; andsending, by the token server computer, a notification to the computer operated by the party when the payment token satisfies the notification criteria.
  • 3. The method of claim 2, wherein the notification criteria includes generation of the payment token or provisioning of the payment token.
  • 4. The method of claim 1, further comprising: receiving, by the token server computer from the computer operated by the party via the interface, an instruction instructing using the one or more encryption keys provided by the party during generation of the payment tokens.
  • 5. The method of claim 1, further comprising: receiving, at the token server computer, a restriction to be placed on one or more of the generated payment tokens from the computer operated by the party via the interface.
  • 6. The method of claim 1, wherein receiving the set of account identifiers from the computer operated by the party further comprises: presenting, by the token server computer, a list of a plurality of account identifiers via the interface; andreceiving, at the token server computer, a selection of the set of account identifiers on the list of the plurality of account identifiers from the computer operated by the party via the interface.
  • 7. The method of claim 1, wherein receiving the set of account identifiers from the computer operated by the party further comprises: receiving, at the token server computer, a file containing the set of account identifiers from the computer operated by the party via the interface.
  • 8. The method of claim 1, further comprising: receiving, at the token server computer, provisioning parameters for the generated payment tokens via the interface, wherein the provisioning parameters include one or more of risk decision rules, design elements or provisioning conditions; andprovisioning, by the token server computer, the generated payment tokens on user devices based on the provisioning parameters.
  • 9. A token server computer operated by a token service provider, comprising: one or more processors;a non-transitory computer readable storage medium communicatively coupled with the one or more processors and storing instructions which, when executed by the one or more processors, cause the token server computer to: provide an interface to a party, wherein the party controls generation of payment tokens for account identifiers via the interface;receive a set of account identifiers from a computer operated by the party via the interface;receive one or more encryption keys from the computer operated by the party via the interface;receive a request to generate payment tokens for the set of account identifiers using the one or more encryption keys such that each generated payment token represents an account identifier among the set of account identifiers;for each account identifier in the set of account identifiers: determine a payment token based on the one or more encryption keys provided by the party, wherein the payment token determined for an account identifier substitutes the account identifier in a payment transaction initiated using the payment token, wherein a format of the payment token is similar to a format of the account identifier substituted by the payment token; anda token vault for storing the payment token and associated encryption keys for later use in token transaction processing.
  • 10. The token server computer of claim 9, further including: a notification module for: receiving a notification criteria to generate one or more notifications from the computer operated by the party via the interface;generating a notification when the payment token satisfies the notification criteria; andsending the notification to the computer operated by the party.
  • 11. The token server computer of claim 9, wherein instructions to receive a set of account identifiers from a computer operated by the party further comprises instructions to: present a list of a plurality of account identifiers via the interface; andreceive a selection of the set of account identifiers on the list of the plurality of account identifiers from the computer operated by the party via the interface.
  • 12. The token server computer of claim 9, wherein instructions to receive a set of account identifiers from a computer operated by the party further comprises instructions to: receive a file containing the set of account identifiers from the computer operated by the party via the interface.
  • 13. A method comprising: accessing, by a computer operated by a party, an interface provided by a token server computer operated by a token service provider to control generation of payment tokens for account identifiers;providing, by the computer operated by the party, a set of account identifiers to the token server computer via the interface;providing, by the computer operated by the party, one or more encryption keys to the token server computer via the interface;providing, by the computer operated by the party to the token server computer via the interface, an instruction to generate a set of payment tokens using the one or more encryption keys provided by the computer operated by the party; andcustomizing, by the computer operated by the party, generation of payment tokens by the token server computer, wherein a payment token associated with at least one encryption key is generated for each account identifier of the set of account identifiers for later use in token transaction processing, wherein a payment token generated for an account identifier substitutes the account identifier in a payment transaction initiated using the payment token, wherein a format of the payment token is similar to a format of the account identifier substituted by the payment token.
  • 14. The method of claim 13, further comprising: providing, by the computer operated by the party, a notification criteria to receive one or more notifications from the token server computer via the interface, wherein the notification criteria includes generation of the payment token or provisioning of the payment token on a user device; andreceiving, by the computer operated by the party, a notification from the token server computer when the payment token satisfies the notification criteria.
  • 15. The method of claim 13, further comprising: selecting, by the computer operated by the party, the set of account identifiers on a list of a plurality of account identifiers provided by the token server computer via the interface.
  • 16. The method of claim 13, wherein providing a set of account identifiers to the token server computer further comprises: providing, by the computer operated by the party, a file containing the set of account identifiers to the token server computer via the interface.
  • 17. The method of claim 13, further comprising: providing, by the computer operated by the party, provisioning parameters for the generated payment tokens via the interface, wherein the provisioning parameters include one or more of risk decision rules, design elements or provisioning conditions; andreceiving, by the computer operated by the party, a notification from the token server computer when the generated payment tokens are provisioned on user devices based on the provisioning parameters.
RELATED APPLICATIONS

This application claims the benefit of and priority to U.S. Provisional Application No. 62/067,336, filed Oct. 22, 2014, the entire content of which is incorporated herein by reference for all purposes.

US Referenced Citations (528)
Number Name Date Kind
5613012 Hoffman et al. Mar 1997 A
5625694 Lee Apr 1997 A
5781438 Lee et al. Jul 1998 A
5883810 Franklin et al. Mar 1999 A
5953710 Fleming Sep 1999 A
5956699 Wong et al. Sep 1999 A
6000832 Franklin et al. Dec 1999 A
6014635 Harris et al. Jan 2000 A
6044360 Picciallo Mar 2000 A
6163771 Walker et al. Dec 2000 A
6227447 Campisano May 2001 B1
6236981 Hill May 2001 B1
6267292 Walker et al. Jul 2001 B1
6327578 Linehan Dec 2001 B1
6341724 Campisano Jan 2002 B2
6385596 Wiser et al. May 2002 B1
6422462 Cohen Jul 2002 B1
6425523 Shem-Ur et al. Jul 2002 B1
6592044 Wong et al. Jul 2003 B1
6636833 Flitcroft et al. Oct 2003 B1
6748367 Lee Jun 2004 B1
6805287 Bishop et al. Oct 2004 B2
6879965 Fung et al. Apr 2005 B2
6891953 DeMello et al. May 2005 B1
6901387 Wells et al. May 2005 B2
6931382 Laage et al. Aug 2005 B2
6938019 Uzo Aug 2005 B1
6941285 Sarcanin Sep 2005 B2
6980670 Hoffman et al. Dec 2005 B1
6985583 Brainard Jan 2006 B1
6990470 Hogan et al. Jan 2006 B2
6991157 Bishop et al. Jan 2006 B2
7051929 Li May 2006 B2
7069249 Stolfo et al. Jun 2006 B2
7103576 Mann, III et al. Sep 2006 B2
7113930 Eccles et al. Sep 2006 B2
7136835 Flitcroft et al. Nov 2006 B1
7177835 Walker et al. Feb 2007 B1
7177848 Hogan et al. Feb 2007 B2
7194437 Britto et al. Mar 2007 B1
7209561 Shankar et al. Apr 2007 B1
7264154 Harris Sep 2007 B2
7287692 Patel et al. Oct 2007 B1
7292999 Hobson et al. Nov 2007 B2
7350230 Forrest Mar 2008 B2
7353382 Labrou et al. Apr 2008 B2
7379919 Hogan et al. May 2008 B2
RE40444 Linehan Jul 2008 E
7415443 Hobson et al. Aug 2008 B2
7444676 Asghari-Kamrani et al. Oct 2008 B1
7469151 Khan et al. Dec 2008 B2
7548889 Bhambri et al. Jun 2009 B2
7567934 Flitcroft et al. Jul 2009 B2
7567936 Peckover et al. Jul 2009 B1
7571139 Giordano et al. Aug 2009 B1
7571142 Flitcroft et al. Aug 2009 B1
7580898 Brown et al. Aug 2009 B2
7584153 Brown et al. Sep 2009 B2
7593896 Flitcroft et al. Sep 2009 B1
7606560 Labrou et al. Oct 2009 B2
7627531 Breck et al. Dec 2009 B2
7627895 Gifford et al. Dec 2009 B2
7650314 Saunders Jan 2010 B1
7685037 Reiners et al. Mar 2010 B2
7702578 Fung et al. Apr 2010 B2
7707120 Dominguez et al. Apr 2010 B2
7712655 Wong May 2010 B2
7734527 Uzo Jun 2010 B2
7753265 Harris Jul 2010 B2
7770789 Oder, II et al. Aug 2010 B2
7784685 Hopkins, III Aug 2010 B1
7793851 Mullen Sep 2010 B2
7801826 Labrou et al. Sep 2010 B2
7805376 Smith Sep 2010 B2
7805378 Berardi et al. Sep 2010 B2
7818264 Hammad Oct 2010 B2
7828220 Mullen Nov 2010 B2
7835960 Breck et al. Nov 2010 B2
7841523 Oder, II et al. Nov 2010 B2
7841539 Hewton Nov 2010 B2
7844550 Walker et al. Nov 2010 B2
7848980 Carlson Dec 2010 B2
7849020 Johnson Dec 2010 B2
7853529 Walker et al. Dec 2010 B1
7853995 Chow et al. Dec 2010 B2
7865414 Fung et al. Jan 2011 B2
7873579 Hobson et al. Jan 2011 B2
7873580 Hobson et al. Jan 2011 B2
7890393 Talbert et al. Feb 2011 B2
7891563 Oder, II et al. Feb 2011 B2
7896238 Fein et al. Mar 2011 B2
7908216 Davis et al. Mar 2011 B1
7922082 Muscato Apr 2011 B2
7931195 Mullen Apr 2011 B2
7938318 Fein et al. May 2011 B2
7954705 Mullen Jun 2011 B2
7959076 Hopkins, III Jun 2011 B1
7996288 Stolfo Aug 2011 B1
8025223 Saunders et al. Sep 2011 B2
8046256 Chien et al. Oct 2011 B2
8060448 Jones Nov 2011 B2
8060449 Zhu Nov 2011 B1
8074877 Mullen et al. Dec 2011 B2
8074879 Harris Dec 2011 B2
8082210 Hansen Dec 2011 B2
8095113 Kean et al. Jan 2012 B2
8104679 Brown Jan 2012 B2
RE43157 Bishop et al. Feb 2012 E
8109436 Hopkins, III Feb 2012 B1
8121942 Carlson et al. Feb 2012 B2
8121956 Carlson et al. Feb 2012 B2
8126449 Beenau et al. Feb 2012 B2
8171525 Pelly et al. May 2012 B1
8196813 Vadhri Jun 2012 B2
8205791 Randazza et al. Jun 2012 B2
8219489 Patterson Jul 2012 B2
8224702 Mengerink et al. Jul 2012 B2
8225385 Chow et al. Jul 2012 B2
8229852 Carlson Jul 2012 B2
8265993 Chien et al. Sep 2012 B2
8280777 Mengerink et al. Oct 2012 B2
8281991 Wentker et al. Oct 2012 B2
8328095 Oder, II et al. Dec 2012 B2
8336088 Raj et al. Dec 2012 B2
8346666 Lindelsee et al. Jan 2013 B2
8376225 Hopkins, III Feb 2013 B1
8380177 Laracey Feb 2013 B2
8387873 Saunders et al. Mar 2013 B2
8401539 Beenau et al. Mar 2013 B2
8401898 Chien et al. Mar 2013 B2
8402555 Grecia Mar 2013 B2
8403211 Brooks et al. Mar 2013 B2
8412623 Moon et al. Apr 2013 B2
8412837 Emigh et al. Apr 2013 B1
8417642 Oren et al. Apr 2013 B2
8447699 Batada et al. May 2013 B2
8453223 Svigals et al. May 2013 B2
8453925 Fisher et al. Jun 2013 B2
8458487 Palgon et al. Jun 2013 B1
8484134 Hobson et al. Jul 2013 B2
8485437 Mullen et al. Jul 2013 B2
8494959 Hathaway et al. Jul 2013 B2
8498908 Mengerink et al. Jul 2013 B2
8504475 Brand et al. Aug 2013 B2
8504478 Saunders et al. Aug 2013 B2
8510816 Quach et al. Aug 2013 B2
8533860 Grecia Sep 2013 B1
8538845 Liberty Sep 2013 B2
8555079 Shablygin et al. Oct 2013 B2
8566168 Bierbaum et al. Oct 2013 B1
8567670 Stanfield et al. Oct 2013 B2
8571939 Lindsey et al. Oct 2013 B2
8577336 Mechaley, Jr. Nov 2013 B2
8577803 Chatterjee et al. Nov 2013 B2
8577813 Weiss Nov 2013 B2
8578176 Mattsson Nov 2013 B2
8583494 Fisher Nov 2013 B2
8584251 Mcguire et al. Nov 2013 B2
8589237 Fisher Nov 2013 B2
8589271 Evans Nov 2013 B2
8589291 Carlson et al. Nov 2013 B2
8595098 Starai et al. Nov 2013 B2
8595812 Bomar et al. Nov 2013 B2
8595850 Spies et al. Nov 2013 B2
8606638 Dragt Dec 2013 B2
8606700 Carlson et al. Dec 2013 B2
8606720 Baker et al. Dec 2013 B1
8615468 Varadarajan Dec 2013 B2
8620754 Fisher Dec 2013 B2
8635157 Smith et al. Jan 2014 B2
8646059 Von Behren et al. Feb 2014 B1
8651374 Brabson et al. Feb 2014 B2
8656180 Shablygin et al. Feb 2014 B2
8707404 Sorotokin Apr 2014 B2
8751391 Freund Jun 2014 B2
8762263 Gauthier et al. Jun 2014 B2
8838982 Carlson et al. Sep 2014 B2
8856539 Weiss Oct 2014 B2
8887308 Grecia Nov 2014 B2
8959347 Gupta Feb 2015 B2
9065643 Hurry et al. Jun 2015 B2
9070129 Sheets et al. Jun 2015 B2
9100826 Weiss Aug 2015 B2
9160741 Wentker et al. Oct 2015 B2
9191375 Kaler Nov 2015 B2
9229964 Stevelinck Jan 2016 B2
9245267 Singh Jan 2016 B2
9249241 Dai et al. Feb 2016 B2
9256871 Anderson et al. Feb 2016 B2
9280765 Hammad Mar 2016 B2
9530137 Weiss Dec 2016 B2
9852423 Sagady Dec 2017 B2
20010029485 Brody et al. Oct 2001 A1
20010034720 Armes Oct 2001 A1
20010054003 Chien et al. Dec 2001 A1
20020007320 Hogan et al. Jan 2002 A1
20020016749 Borecki et al. Feb 2002 A1
20020029193 Ranjan et al. Mar 2002 A1
20020035548 Hogan et al. Mar 2002 A1
20020073045 Rubin et al. Jun 2002 A1
20020116341 Hogan et al. Aug 2002 A1
20020133467 Hobson et al. Sep 2002 A1
20020147913 Lun Yip Oct 2002 A1
20030028481 Flitcroft et al. Feb 2003 A1
20030130955 Hawthorne Jul 2003 A1
20030191709 Elston et al. Oct 2003 A1
20030191945 Keech Oct 2003 A1
20040010462 Moon et al. Jan 2004 A1
20040050928 Bishop et al. Mar 2004 A1
20040059682 Hasumi et al. Mar 2004 A1
20040093281 Silverstein et al. May 2004 A1
20040139008 Mascavage, III Jul 2004 A1
20040143532 Lee Jul 2004 A1
20040158532 Breck et al. Aug 2004 A1
20040210449 Breck et al. Oct 2004 A1
20040210498 Freund Oct 2004 A1
20040232225 Bishop et al. Nov 2004 A1
20040260646 Berardi et al. Dec 2004 A1
20050037735 Coutts Feb 2005 A1
20050080730 Sorrentino Apr 2005 A1
20050108178 York May 2005 A1
20050199709 Linlor Sep 2005 A1
20050246293 Ong Nov 2005 A1
20050269401 Spitzer et al. Dec 2005 A1
20050269402 Spitzer et al. Dec 2005 A1
20060235795 Johnson et al. Oct 2006 A1
20060237528 Bishop et al. Oct 2006 A1
20060278704 Saunders et al. Dec 2006 A1
20070107044 Yuen et al. May 2007 A1
20070129955 Dalmia et al. Jun 2007 A1
20070136193 Starr Jun 2007 A1
20070136211 Brown et al. Jun 2007 A1
20070170247 Friedman Jul 2007 A1
20070179885 Bird et al. Aug 2007 A1
20070208671 Brown et al. Sep 2007 A1
20070245414 Chan et al. Oct 2007 A1
20070288377 Shaked Dec 2007 A1
20070291995 Rivera Dec 2007 A1
20080015988 Brown et al. Jan 2008 A1
20080029607 Mullen Feb 2008 A1
20080035738 Mullen Feb 2008 A1
20080052226 Agarwal et al. Feb 2008 A1
20080054068 Mullen Mar 2008 A1
20080054079 Mullen Mar 2008 A1
20080054081 Mullen Mar 2008 A1
20080065554 Hogan et al. Mar 2008 A1
20080065555 Mullen Mar 2008 A1
20080201264 Brown et al. Aug 2008 A1
20080201265 Hewton Aug 2008 A1
20080228646 Myers et al. Sep 2008 A1
20080243702 Hart et al. Oct 2008 A1
20080245855 Fein et al. Oct 2008 A1
20080245861 Fein et al. Oct 2008 A1
20080263645 Renter Oct 2008 A1
20080283591 Oder, II et al. Nov 2008 A1
20080302869 Mullen Dec 2008 A1
20080302876 Mullen Dec 2008 A1
20080313264 Pestoni Dec 2008 A1
20090006262 Brown et al. Jan 2009 A1
20090010488 Matsuoka et al. Jan 2009 A1
20090037333 Flitcroft et al. Feb 2009 A1
20090037388 Cooper et al. Feb 2009 A1
20090043702 Bennett Feb 2009 A1
20090048971 Hathaway et al. Feb 2009 A1
20090076966 Bishop Mar 2009 A1
20090106112 Dalmia et al. Apr 2009 A1
20090106160 Skowronek Apr 2009 A1
20090134217 Flitcroft et al. May 2009 A1
20090157555 Biffle et al. Jun 2009 A1
20090159673 Mullen et al. Jun 2009 A1
20090159700 Mullen et al. Jun 2009 A1
20090159707 Mullen et al. Jun 2009 A1
20090173782 Muscato Jul 2009 A1
20090200371 Kean et al. Aug 2009 A1
20090248583 Chhabra Oct 2009 A1
20090276347 Kargman Nov 2009 A1
20090281948 Carlson Nov 2009 A1
20090294527 Brabson et al. Dec 2009 A1
20090307139 Mardikar et al. Dec 2009 A1
20090308921 Mullen Dec 2009 A1
20090327131 Beenau et al. Dec 2009 A1
20100008535 Abulafia et al. Jan 2010 A1
20100088237 Wankmueller Apr 2010 A1
20100094755 Kloster Apr 2010 A1
20100106644 Annan et al. Apr 2010 A1
20100120408 Beenau et al. May 2010 A1
20100133334 Vadhri Jun 2010 A1
20100138347 Chen Jun 2010 A1
20100145860 Pelegero Jun 2010 A1
20100161433 White Jun 2010 A1
20100185545 Royyuru et al. Jul 2010 A1
20100199089 Vysogorets Aug 2010 A1
20100211505 Saunders et al. Aug 2010 A1
20100223186 Hogan et al. Sep 2010 A1
20100228668 Hogan et al. Sep 2010 A1
20100235284 Moore Sep 2010 A1
20100258620 Torreyson et al. Oct 2010 A1
20100291904 Musfeldt et al. Nov 2010 A1
20100299267 Faith et al. Nov 2010 A1
20100306076 Taveau et al. Dec 2010 A1
20100325041 Berardi et al. Dec 2010 A1
20110010292 Giordano et al. Jan 2011 A1
20110016047 Wu et al. Jan 2011 A1
20110016320 Bergsten et al. Jan 2011 A1
20110040640 Erikson Feb 2011 A1
20110047076 Carlson et al. Feb 2011 A1
20110083018 Kesanupalli et al. Apr 2011 A1
20110087596 Dorsey Apr 2011 A1
20110093397 Carlson et al. Apr 2011 A1
20110125597 Oder, II et al. May 2011 A1
20110153437 Archer et al. Jun 2011 A1
20110153498 Makhotin et al. Jun 2011 A1
20110154466 Harper et al. Jun 2011 A1
20110161233 Tieken Jun 2011 A1
20110178926 Lindelsee et al. Jul 2011 A1
20110191244 Dai Aug 2011 A1
20110238511 Park et al. Sep 2011 A1
20110238573 Varadarajan Sep 2011 A1
20110246317 Coppinger Oct 2011 A1
20110258111 Raj et al. Oct 2011 A1
20110272471 Mullen Nov 2011 A1
20110272478 Mullen Nov 2011 A1
20110276380 Mullen et al. Nov 2011 A1
20110276381 Mullen et al. Nov 2011 A1
20110276424 Mullen Nov 2011 A1
20110276425 Mullen Nov 2011 A1
20110295745 White et al. Dec 2011 A1
20110302081 Saunders et al. Dec 2011 A1
20120028609 Hruska Feb 2012 A1
20120030047 Fuentes et al. Feb 2012 A1
20120031969 Hammad Feb 2012 A1
20120035998 Chien et al. Feb 2012 A1
20120041881 Basu et al. Feb 2012 A1
20120047237 Arvidsson et al. Feb 2012 A1
20120066078 Kingston et al. Mar 2012 A1
20120072350 Goldthwaite et al. Mar 2012 A1
20120078735 Bauer et al. Mar 2012 A1
20120078798 Downing et al. Mar 2012 A1
20120078799 Jackson et al. Mar 2012 A1
20120095852 Bauer et al. Apr 2012 A1
20120095865 Doherty et al. Apr 2012 A1
20120116902 Cardina et al. May 2012 A1
20120123882 Carlson et al. May 2012 A1
20120123940 Killian et al. May 2012 A1
20120129514 Beenau et al. May 2012 A1
20120143767 Abadir Jun 2012 A1
20120143772 Abadir Jun 2012 A1
20120158580 Eram et al. Jun 2012 A1
20120158593 Garfinkle et al. Jun 2012 A1
20120173431 Ritchie et al. Jul 2012 A1
20120185386 Salama et al. Jul 2012 A1
20120197807 Schlesser et al. Aug 2012 A1
20120203664 Torossian et al. Aug 2012 A1
20120203666 Torossian et al. Aug 2012 A1
20120215688 Musser et al. Aug 2012 A1
20120215696 Salonen Aug 2012 A1
20120221421 Hammad Aug 2012 A1
20120226582 Hammad Sep 2012 A1
20120231844 Coppinger Sep 2012 A1
20120233004 Bercaw Sep 2012 A1
20120246070 Vadhri Sep 2012 A1
20120246071 Jain et al. Sep 2012 A1
20120246079 Wilson et al. Sep 2012 A1
20120265631 Cronic et al. Oct 2012 A1
20120271770 Harris et al. Oct 2012 A1
20120297446 Webb et al. Nov 2012 A1
20120300932 Cambridge et al. Nov 2012 A1
20120303503 Cambridge et al. Nov 2012 A1
20120303961 Kean et al. Nov 2012 A1
20120304273 Bailey et al. Nov 2012 A1
20120310725 Chien et al. Dec 2012 A1
20120310831 Harris et al. Dec 2012 A1
20120316992 Oborne Dec 2012 A1
20120317035 Royyuru et al. Dec 2012 A1
20120317036 Bower et al. Dec 2012 A1
20130017784 Fisher Jan 2013 A1
20130018757 Anderson et al. Jan 2013 A1
20130019098 Gupta et al. Jan 2013 A1
20130031006 Mccullagh et al. Jan 2013 A1
20130054337 Brendell et al. Feb 2013 A1
20130054466 Muscato Feb 2013 A1
20130054474 Yeager Feb 2013 A1
20130081122 Svigals et al. Mar 2013 A1
20130091028 Oder, II et al. Apr 2013 A1
20130110658 Lyman et al. May 2013 A1
20130111599 Gargiulo May 2013 A1
20130117185 Collison et al. May 2013 A1
20130124290 Fisher May 2013 A1
20130124291 Fisher May 2013 A1
20130124364 Mittal May 2013 A1
20130138525 Bercaw May 2013 A1
20130144888 Faith et al. Jun 2013 A1
20130145148 Shablygin et al. Jun 2013 A1
20130145172 Shablygin et al. Jun 2013 A1
20130159178 Colon et al. Jun 2013 A1
20130159184 Thaw Jun 2013 A1
20130166402 Parento et al. Jun 2013 A1
20130166456 Zhang et al. Jun 2013 A1
20130173736 Krzeminski et al. Jul 2013 A1
20130185202 Goldthwaite et al. Jul 2013 A1
20130191286 Cronic et al. Jul 2013 A1
20130191289 Cronic et al. Jul 2013 A1
20130198071 Jurss Aug 2013 A1
20130198080 Anderson et al. Aug 2013 A1
20130200146 Moghadam Aug 2013 A1
20130204787 Dubois Aug 2013 A1
20130204793 Kerridge et al. Aug 2013 A1
20130212007 Mattsson Aug 2013 A1
20130212017 Bangia Aug 2013 A1
20130212019 Mattsson et al. Aug 2013 A1
20130212024 Mattsson et al. Aug 2013 A1
20130212026 Powell et al. Aug 2013 A1
20130212666 Mattsson et al. Aug 2013 A1
20130218698 Moon et al. Aug 2013 A1
20130218769 Pourfallah et al. Aug 2013 A1
20130226799 Raj Aug 2013 A1
20130226813 Voltz Aug 2013 A1
20130246199 Carlson Sep 2013 A1
20130246202 Tobin Sep 2013 A1
20130246203 Laracey Sep 2013 A1
20130246258 Dessert Sep 2013 A1
20130246259 Dessert Sep 2013 A1
20130246261 Purves et al. Sep 2013 A1
20130246267 Tobin Sep 2013 A1
20130254028 Salci Sep 2013 A1
20130254052 Royyuru et al. Sep 2013 A1
20130254102 Royyuru Sep 2013 A1
20130254117 Von Mueller et al. Sep 2013 A1
20130262296 Thomas et al. Oct 2013 A1
20130262302 Lettow et al. Oct 2013 A1
20130262315 Hruska Oct 2013 A1
20130262316 Hruska Oct 2013 A1
20130262317 Collinge et al. Oct 2013 A1
20130275300 Killian et al. Oct 2013 A1
20130275307 Khan Oct 2013 A1
20130275308 Paraskeva et al. Oct 2013 A1
20130282502 Jooste Oct 2013 A1
20130282575 Mullen et al. Oct 2013 A1
20130282588 Hruska Oct 2013 A1
20130297501 Monk et al. Nov 2013 A1
20130297504 Nwokolo et al. Nov 2013 A1
20130297508 Belamant Nov 2013 A1
20130304649 Cronic et al. Nov 2013 A1
20130308778 Fosmark et al. Nov 2013 A1
20130311382 Fosmark et al. Nov 2013 A1
20130317982 Mengerink et al. Nov 2013 A1
20130332344 Weber Dec 2013 A1
20130339253 Sincai Dec 2013 A1
20130346314 Mogollon et al. Dec 2013 A1
20140007213 Sanin et al. Jan 2014 A1
20140013106 Redpath Jan 2014 A1
20140013114 Redpath Jan 2014 A1
20140013452 Aissi et al. Jan 2014 A1
20140019352 Shrivastava Jan 2014 A1
20140025581 Calman Jan 2014 A1
20140025585 Calman Jan 2014 A1
20140025958 Calman Jan 2014 A1
20140032417 Mattsson Jan 2014 A1
20140032418 Weber Jan 2014 A1
20140040137 Carlson et al. Feb 2014 A1
20140040139 Brudnicki et al. Feb 2014 A1
20140040144 Plomske et al. Feb 2014 A1
20140040145 Ozvat et al. Feb 2014 A1
20140040148 Ozvat et al. Feb 2014 A1
20140040628 Fort et al. Feb 2014 A1
20140041018 Bomar et al. Feb 2014 A1
20140046853 Spies et al. Feb 2014 A1
20140047551 Nagasundaram et al. Feb 2014 A1
20140052532 Tsai et al. Feb 2014 A1
20140052620 Rogers et al. Feb 2014 A1
20140052637 Jooste et al. Feb 2014 A1
20140068706 Aissi Mar 2014 A1
20140074637 Hammad Mar 2014 A1
20140108172 Weber et al. Apr 2014 A1
20140114857 Griggs et al. Apr 2014 A1
20140136847 Huang May 2014 A1
20140143137 Carlson May 2014 A1
20140164243 Aabye et al. Jun 2014 A1
20140188586 Carpenter et al. Jul 2014 A1
20140294701 Dai et al. Oct 2014 A1
20140310183 Weber Oct 2014 A1
20140330721 Wang Nov 2014 A1
20140330722 Laxminarayanan et al. Nov 2014 A1
20140331265 Mozell et al. Nov 2014 A1
20140337236 Wong et al. Nov 2014 A1
20140344153 Raj et al. Nov 2014 A1
20140372308 Sheets Dec 2014 A1
20150019443 Sheets et al. Jan 2015 A1
20150026049 Theurer Jan 2015 A1
20150026767 Sweet Jan 2015 A1
20150032625 Dill et al. Jan 2015 A1
20150032626 Dill et al. Jan 2015 A1
20150032627 Dill et al. Jan 2015 A1
20150046338 Laxminarayanan et al. Feb 2015 A1
20150046339 Wong et al. Feb 2015 A1
20150052064 Karpenko et al. Feb 2015 A1
20150058227 Dua Feb 2015 A1
20150088756 Makhotin et al. Mar 2015 A1
20150106239 Gaddam et al. Apr 2015 A1
20150112870 Nagasundaram et al. Apr 2015 A1
20150112871 Kumnick Apr 2015 A1
20150120472 Aabye et al. Apr 2015 A1
20150127529 Makhotin et al. May 2015 A1
20150127547 Powell et al. May 2015 A1
20150140960 Powell et al. May 2015 A1
20150142673 Nelsen et al. May 2015 A1
20150161597 Subramanian et al. Jun 2015 A1
20150178724 Ngo et al. Jun 2015 A1
20150180836 Wong et al. Jun 2015 A1
20150186864 Jones et al. Jul 2015 A1
20150193222 Pirzadeh et al. Jul 2015 A1
20150195133 Sheets et al. Jul 2015 A1
20150199679 Palanisamy et al. Jul 2015 A1
20150199689 Kumnick et al. Jul 2015 A1
20150220917 Aabye et al. Aug 2015 A1
20150269566 Gaddam et al. Sep 2015 A1
20150287030 Sagady Oct 2015 A1
20150312038 Palanisamy Oct 2015 A1
20150319158 Kumnick Nov 2015 A1
20150332262 Lingappa Nov 2015 A1
20150356560 Shastry et al. Dec 2015 A1
20160028550 Gaddam et al. Jan 2016 A1
20160042263 Gaddam et al. Feb 2016 A1
20160065370 Le Saint et al. Mar 2016 A1
20160092696 Guglani et al. Mar 2016 A1
20160092872 Prakash et al. Mar 2016 A1
20160103675 Aabye et al. Apr 2016 A1
20170249622 Ortiz Aug 2017 A1
Foreign Referenced Citations (15)
Number Date Country
2156397 Feb 2010 EP
2001035304 May 2001 WO
2001035304 May 2001 WO
2004042536 May 2004 WO
2006113834 Oct 2006 WO
2009032523 Mar 2009 WO
2010078522 Jul 2010 WO
2012068078 May 2012 WO
2012098556 Jul 2012 WO
2012142370 Oct 2012 WO
2012167941 Dec 2012 WO
2013048538 Apr 2013 WO
2013056104 Apr 2013 WO
2013119914 Aug 2013 WO
2013179271 Dec 2013 WO
Non-Patent Literature Citations (32)
Entry
Sirbu, M.A. Credits and debits on the Internet. IEEE Spectrum vol. 34, Issue: 2. Pub. Date: 1997 http://ieeexplore.ieee.org/stamp.jsp?tp=&arnumber=570823.
Chang, Shih-Fang. Application Marketplace as a Service: A Reference Architecture for Application Marketplace Service. 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). Pub. Date: 2010. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5662792.
Hisamatsu, A.; Psihva, D.; Nishantha, G.G.D. Online Banking and Modern Approaches Toward its Enhanced Security. 2010 the 12th International Conference on Advanced Communication Technology (ICACT). Pub. Date: 2010. http://ieeexplore.ieee.org/document/5440305/.
Wang, U.S. Appl. No. 62/000,288 (unpublished), Payment System Canonical Address Format filed on May 19, 2014.
Sharma et al., U.S. Appl. No. 62/003,717 (unpublished), Mobile Merchant Application filed on May 28, 2014.
Kalgi et al., U.S. Appl. No. 62/024,426, (unpublished) Secure Transactions Using Mobile Devices filed on Jul. 14, 2014.
Prakash et al., U.S. Appl. No. 62/037,033 (unpublished), Sharing Payment Token filed on Aug. 13, 2014.
Hoverson et al., U.S. Appl. No. 62/038,174 (unpublished), Customized Payment Gateway filed on Aug. 15, 2014.
Wang, U.S. Appl. No. 62/042,050 (unpublished), Payment Device Authentication and Authorization System filed on Aug. 26, 2014.
Gaddam et al., U.S. Appl. No. 62/053,736 (unpublished), Completing Transactions Without a User Payment Device filed on Sep. 22, 2014.
Patterson, U.S. Appl. No. 62/054,346 (unpublished), Mirrored Token Vault filed on Sep. 23, 2014.
Dimmick, U.S. Appl. No. 14/952,514 (unpublished), Systems Communications With Non-Sensitive Identifiers filed on Nov. 25, 2015.
Dimmick, U.S. Appl. No. 14/952,444 (unpublished), Tokenization Request Via Access Device filed on Nov. 25, 2015.
Prakash et al., U.S. Appl. No. 14/955,716 (unpublished), Provisioning Platform for Machine-To-Machine Devices filed on Dec. 1, 2015.
Wong et al., U.S. Appl. No. 14/966,948 (unpublished), Automated Access Data Provisioning filed on Dec. 11, 2015.
Stubbs et al., U.S. Appl. No. 62/103,522 (unpublished), Methods and Systems for Wallet Provider Provisioning filed on Jan. 14, 2015.
Mcguire, U.S. Appl. No. 14/600,523 (unpublished), Secure Payment Processing Using Authorization Request filed on Jan. 20, 2015.
Flurscheim et al., U.S. Appl. No. 15/004,705 (unpublished), Cloud-Based Transactions With Magnetic Secure Transmission filed on Jan. 22, 2016.
Flurscheim et al., U.S. Appl. No. 62/108,403 (unpublished), Wearables With NFC HCE filed on Jan. 27, 2015.
Sabba et al., U.S. Appl. No. 15/011,366 (unpublished), Token Check Offline filed on Jan. 29, 2016.
Patterson, U.S. Appl. No. 15/019,157 (unpublished), Token Processing Utilizing Multiple Authorizations filed on Feb. 9, 2016.
Cash et al., U.S. Appl. No. 15/041,495 (unpublished), Peer Forward Authorization of Digital Requests filed on Feb. 11, 2016.
Le Saint et al., U.S. Appl. No. 15/008,388 (unpublished), Methods for Secure Credential Provisioning filed on Jan. 27, 2016.
Kinagi, U.S. Appl. No. 62/117,291 (unpublished), Token and Cryptogram Using Transaction Specific Information filed on Feb. 17, 2015.
Galland et al. U.S. Appl. No. 62/128,709 (unpublished), Tokenizing Transaction Amounts filed on Mar. 5, 2015.
Rangarajan et al., U.S. Appl. No. 61/751,763 (unpublished), Payments Bridge filed on Jan. 11, 2013.
Li, U.S. Appl. No. 61/894,749 (unpublished), Methods and Systems for Authentication and Issuance of Tokens in a Secure Environment filed on Oct. 23, 2013.
Aissi et al., U.S. Appl. No. 61/738,832 (unpublished), Management of Sensitive Data filed on Dec. 18, 2012.
Wong et al., U.S. Appl. No. 61/879,362 (unpublished), Systems and Methods for Managing Mobile Cardholder Verification Methods filed on Sep. 18, 2013.
Powell, U.S. Appl. No. 61/892,407 (unpublished), Issuer Over-The-Air Update Method and System filed on Oct. 17, 2013.
Powell, U.S. Appl. No. 61/926,236 (unpublished), Methods and Systems for Provisioning Mobile Devices With Payment Credentials and Payment Token Identifiers filed on Jan. 10, 2014.
Petition for Inter Partes Review of U.S. Pat. No. 8,533,860 Challenging Claims 1-30 Under 35 U.S.C. § 312 and 37 C.F.R. § 42.104, filed Feb. 17, 2016, Before the USPTO Patent Trial and Appeal Board, IPR 2016-00600, 65 pages.
Related Publications (1)
Number Date Country
20160119296 A1 Apr 2016 US
Provisional Applications (1)
Number Date Country
62067336 Oct 2014 US