Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for token gateway

A token network and token technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as problems with token requesters and difficulties for token requesters to conduct transactions.

Pending Publication Date: 2022-08-02
VISA INT SERVICE ASSOC
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is restrictive and can be problematic for token requesters
For example, if a particular token service provider is temporarily unavailable or slow, this can make it difficult for token requesters to transact

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for token gateway
  • Method and system for token gateway
  • Method and system for token gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Embodiments of the present disclosure provide a token gateway computer that provides escrow services that allow token service providers and authorization systems to manage the issuance and distribution of digital token credentials. The Token Gateway computer provides a flexible and extensible way to securely provision, process and manage token credentials across several use cases and token requestors. This capability may be provided and supplemented by a common set of interfaces between the token gateway computer and the different entities involved in the tokenization system, ie, token requesters, token aggregators and token service providers.

[0018] Token Gateway Computers can be used to enable a variety of digital payment use cases such as contactless transactions, Quick Response (QR) code transactions, e-commerce transactions, card on file transactions, Automated Clearing House (ACH), Real Time Payments (RTP) and Payment transactions for IoT devices. Tokenization ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method is disclosed. The method includes receiving, by a token gateway, a first request message from a token requester computer. The token gateway determines at least one token service computer from a plurality of token service computers, each of the plurality of token service computers operating independently of each other. The token gateway transmits at least one second request message to the at least one token serving computer and receives from the at least one token serving computer at least one first response message comprising at least one token and / or supplemental data associated with the at least one token. The token gateway transmits a second response message to the token requester computer, the second response message comprising the at least one token and / or the supplemental data.

Description

[0001] Cross-reference to related applications [0002] This application claims the benefit of the filing dates of US Provisional Application No. 62 / 951,997, filed December 20, 2019, and US Provisional Application No. 62 / 969,454, filed February 3, 2020. These applications are incorporated by reference in their entirety for all purposes. Background technique [0003] Access tokens (eg, payment tokens) can be used to access resources such as goods and services, secure locations, and secure data. Access tokens are a substitute for real credentials. The use of an access token protects real credentials because real credentials are not stored or transmitted where they are accessible to fraudulent entities such as hackers. [0004] In some access token systems, a token requester (eg, a mobile phone) may request a token from a token service provider. However, since the token requester may have many accounts, the token requester may interact with many different token service provide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L9/32H04L67/10
CPCH04L63/0807H04L9/3213H04L2209/56H04L2463/102H04L67/567
Inventor S·穆罕默德A·约翰逊S·巴诺F·拉比L·斯波尔M·C·布达R·阿德南A·圣塔纳拉曼
Owner VISA INT SERVICE ASSOC